A Fast-voting Assurance for Data Fusion in Wireless Sensor Network
نویسندگان
چکیده
In wireless sensor networks, the voting technique is used to extract a reliable result from redundant information. Therefore, the security problem about data fusion has been the focus of study for a long time. This paper proposes a fast and tolerant voting mechanism (FTVM) for data fusion assurance, which will guarantee the base station to choose the valid fusion data in the shortest possible time. This mechanism adopts the MAC protocol based on CDMA technique, which makes it possible for some fusion nodes to communicate with the base station in a channel simultaneously without arousing data collision, and furthermore with the approach of choosing witness nodes by base station, many witness nodes could poll together, which will accelerate the election by a substantial degree. This work also adopts intrusion detection techniques to identity the compromised nodes and replaces them with backup nodes, such that the tolerance of the network is improved by a large degree. Results from a series of experiments verify the efficiency of FTVM. Copyright © 2013 IFSA.
منابع مشابه
Achieving Energy Conservation in Wireless Sensor Networks by using WB (Witness-Based) Approach
In this paper, Wireless sensor networks place sensors into an area to get data and send them back to a base station. Data fusion, in which collected data are fused before they are sent to the base station, is usually implemented over the network. Since a sensor is typically placed in locations that are accessible to malicious attackers, information assurance of the data fusion process is very i...
متن کاملRandom Key Pre-Distribution Techniques against Sybil Attacks
Sybil attacks pose a serious threat for Wireless Sensor Networks (WSN) security. They can create problems in routing, voting schemes, decision making, distributed storage and sensor re-programming. In a Sybil attack, the attacker masquerades as multiple sensor identities that are actually controlled by one or a few existing attacker nodes. Sybil identities are fabricated out of stolen keys, obt...
متن کاملTime-slotted voting mechanism for fusion data assurance in wireless sensor networks under stealthy attacks
In wireless sensor networks, data fusion is often performed in order to reduce the overall message transmission from the sensors toward the base station. We investigate the problem of data fusion assurance in multi-level data fusion or transmission in this paper. Different to a recent approach of direct voting where the base station polls other nodes directly regarding to the received fusion re...
متن کاملA 910MHz Injection Locked BFSK Transceiver for Wireless Body Sensor Network Using Colpitts Oscillator
A 910MHz high efficiency RF transceiver for Wireless Body Area Network in medical application is presented in this paper. High energy efficiency transmitter and receiver architectures are proposed. In wireless body sensor network, the transmitter must have higher efficiency compared with the receiver because a large amount of data is sent from sensor node to receiver of the base station and sma...
متن کاملClassification and Comparison of Methods for Discovering Coverage Loss Areas in Wireless Sensor Networks
In recent years, wireless sensor networks data is taken into consideration as an ideal source, in terms of speed, accuracy and cost, in order to study the Earth's surface. One of the most important challenges in this area, is the signaling network coverage and finding holes. In recent years, wireless sensor networks data is taken into consideration as an ideal source, in terms of speed, accurac...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2013