Advanced Path Control Method for Filtering Secure Method in Sensor Networks

نویسندگان

  • Byung Hee Kim
  • Tae Ho Cho
چکیده

In many wireless sensor network applications, sensor nodes that have a limited battery power are deployed in open and unattended environments. Owing to these features, an adversary can compromise the deployed sensor nodes and easily inject fabricated reports into the sensor network through the compromised nodes. This attack not only depletes a limited energy resource but also gives a false alarm for deceiving base station. Recently, filtering-based secure methods have been proposed to protect sensor networks from this type of attack. In these schemes, forwarding nodes verify all event reports to detect and drop a fabricated report. To verify received event reports, sensor nodes consume a significant amount of energy. In this paper, we propose an advance path control method by using a fuzzy system. The proposed method can conserves consumption energy and reduce latency. The sufficient resilience and energy efficiency of the proposed method are shown by the simulation results.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Path Selection Method for the Statistical Filtering-Based Sensor Networks Using a Security Evaluation Function

Sungkyunkwan University, Suwon 440-740, South Korea Summary Many sensor network applications are dependent on the secure operation of sensor networks, and will have serious consequences if the network is compromised or disrupted. Fabricated reports can be injected through compromised nodes, which can lead not only to false alarms but also to the depletion of limited energy resources in battery ...

متن کامل

Toward an energy efficient PKC-based key management system for wireless sensor networks

Due to wireless nature and hostile environment, providing of security is a critical and vital task in wireless sensor networks (WSNs). It is known that key management is an integral part of a secure network. Unfortunately, in most of the previous methods, security is compromised in favor of reducing energy consumption. Consequently, they lack perfect resilience and are not fit for applications ...

متن کامل

A Secure Routing Algorithm for Underwater Wireless Sensor Networks

Recently, underwater Wireless Sensor Networks (UWSNs) attracted the interest of many researchers and the past three decades have held the rapid progress of underwater acoustic communication. One of the major problems in UWSNs is how to transfer data from the mobile node to the base stations and choosing the optimized route for data transmission. Secure routing in UWSNs is necessary for packet d...

متن کامل

A Path Selection Method for Improving the Detection Power of Statistical Filtering in Sensor Networks

In many sensor network applications, sensor nodes are deployed in unattended environments, and hence are vulnerable to physical attacks, potentially compromising the node’s cryptographic keys. False sensing reports can be injected through compromised nodes, which can lead to not only false alarms but also the depletion of limited energy resources in battery powered networks. Ye et al. [4] propo...

متن کامل

Unauthenticated event detection in wireless sensor networks using sensors co-coverage

Wireless Sensor Networks (WSNs) offer inherent packet redundancy since each point within the network area is covered by more than one sensor node. This phenomenon, which is known as sensors co-coverage, is used in this paper to detect unauthenticated events. Unauthenticated event broadcasting in a WSN imposes network congestion, worsens the packet loss rate, and increases the network energy con...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008