scholarly journals METHOD FOR THE PERIOD DETERMINATION OF SECURITY LEVEL UPDATE IN STATISTICAL EN-ROUTE FILTERING

2017 ◽  
Vol 5 (11) ◽  
pp. 158-167
Author(s):  
Tae-Ho Cho ◽  
Jung-Sub Ahn

Energy management of WSN is one of the major issues. Many kind of attacks in WSN paralyze the network by exhausting node energy. Especially false report insertion attack, which is one of the several WSN attacks, is to inform users of false alarms as well as unnecessary energy consumption. F. Ye et al. proposed statistical en-route filtering to prevent false report injection attacks. In order to effectively use their scheme, techniques for determining thresholds using fuzzy logic have been studied. To effectively apply these techniques to the network, an appropriate security level period update should be set according to the network environments. In this paper, we propose a security period update method using fuzzy logic in order to improve the lifetime of the network in the statistical en-route filtering approach based on a wireless sensor network of the cluster environment. Normally SEF thresholds should be changed by a user according to the network environment. Our proposed method allows automatically setting the effective threshold for the environment by fuzzy logic. The experimental results show that the energy efficiency increased by 26.5%.

10.29007/sx5j ◽  
2018 ◽  
Author(s):  
Jung Sub Ahn ◽  
Dongjin Park ◽  
Tae Ho Cho

Sensor nodes of wireless sensor networks are deployed in open environments. Hence, an attacker can easily compromise the node. An attacker can compromise a node to generate false reports and inject them into the network. This causes unnecessary energy consumption associated with the process of transmitting false alarm messages and false data reports to the system. If the attacker keeps repeatedly attacking, the attacks will cause problems such as a reduction in the entire network life or disabling of the networks. Yu and Guan proposed a dynamic en-route filtering scheme to detect and drop these false reports before they reach the base station. In dynamic en-route filtering, the energy waste of the intermediate nodes occurs until it is detected early. In this paper, we propose a method to save the energy of the intermediate nodes by searching for the compromised node and blocking the reports generated at that node. When verifying a false report at the verification node, it can know its report information. The base station is able to find the cluster of compromised nodes using that information. In particular, by knowing the location of the node that has been compromised, we can block false alarms and energy losses by blocking reports generated in that cluster.


2021 ◽  
Vol 2021 ◽  
pp. 1-18
Author(s):  
Chuanjun Yi

In wireless sensor networks, the adversary can easily control the compromised nodes to inject false data reports. En-route filtering is an effective mechanism to resist such attacks, where the forwarding nodes of the reports can identify and drop the false reports. However, the existing en-route filtering strategies are vulnerable to report disruption attacks and selective forwarding attacks, and the probabilities and efficiencies of en-route filtering false reports are low. To address these problems, a precheck mechanism performed by the CoS (Center-of-Stimulus) node is presented to resist report disruption attacks, a report forwarding strategy with balancing the residual energy of the nodes is designed to resist selective forwarding attacks, and an en-route message authentication scheme (EMAS) based on monitoring and reporting mechanism is proposed to resist false data injection attacks. The theoretical analysis and simulation results show that in most cases, EMAS provides a higher security level and higher en-route filtering probability and efficiency and is very efficient in energy saving.


2018 ◽  
Vol 14 (09) ◽  
pp. 35 ◽  
Author(s):  
Chenglong Cao ◽  
Xiaoling Zhu

Energy is a key factor that affects the lifetime of wireless sensor network (WSN). This paper proposes an adaptive energy management model to improve the energy efficiency in WSN. Unlike existing clustering routing protocols, the overall performance indicators are introduced as the inputs of fuzzy logic control (FLC). Meanwhile, the probability adjustment value, as the out of FLC, is fed back to the network for the generation of new clusters. Since the design of membership functions (MFs) of FLC has a significant impact on system performance, a particle swarm optimization (PSO) algorithm is used to optimize MFs and its optimization goal is to reduce the number of dead nodes and increase the remaining energy level in WSN. Simulation experiments were conducted for the low energy adaptive clustering hierarchy protocol (LEACH), the conventional FLC, FLC using genetic algorithm (GA), and FLC using PSO. The results show that the proposed FLC-PSO has the best performance among the four protocols and it can be used efficiently in energy management of WSN.


Author(s):  
WASSWA SHAFIK ◽  
S.Mojtaba Matinkhah

Wireless Sensor Networks (WSNs) is considered to be a promising research area since it entails sensing capabilities. WSNs are confronted by fabricated explosion injection attacks and in return results into draining of vitality on sensor nodes routing mainly because of increased capabilities in a broad range of applications where sensor nodes use a battery as the power source. In this paper, we reveal and claim a state-of-the-art model to minimize vitality depletion of nodes within the network in return increases network period to more realistic stretch. It is revealed that the main cause is vitality consumption unbalances in different parts of the network direct resulting from having a static sink. More still, the network nodes neighboring the sink insistently partake in progressing data of other nodes to the sink. Consequently, the network nodes are supplementarily subjected to untimely vitality exhaustion. This paper mainly provides a novel movable (mobile) fuzzy logic sink approach and an intelligent system like expect systems that are able to scrutinize network situation, and make the superlative choice for spreading the network period robotically.


10.29007/xs1j ◽  
2018 ◽  
Author(s):  
Su Man Nam ◽  
Tae Ho Cho

In large-scale wireless sensor networks, sensors are vulnerable to false report and false vote injection attacks since they are deployed in hostile environments. These attacks drain their limited energy resources of forwarding nodes and drops important data. Probabilistic voting-based filtering scheme simultaneously detects both the attacks through vote verification. To effectively detect them, it is important to define the vote length of the reports since the vote length is fixed at the initial phase. We find the effective vote length using a simulation model since it is nearly impossible to evaluate the security protocol performance on the real nodes. We demonstrate that the security protocol, in which the vote length is five, achieves better detection ratio against the two attacks.


Sensors ◽  
2019 ◽  
Vol 19 (1) ◽  
pp. 196 ◽  
Author(s):  
Xing Hu ◽  
Linhua Ma ◽  
Yongqiang Ding ◽  
Jin Xu ◽  
Yan Li ◽  
...  

The geographic routing protocol only requires the location information of local nodes for routing decisions, and is considered very efficient in multi-hop wireless sensor networks. However, in dynamic wireless sensor networks, it increases the routing overhead while obtaining the location information of destination nodes by using a location server algorithm. In addition, the routing void problem and location inaccuracy problem also occur in geographic routing. To solve these problems, a novel fuzzy logic-based geographic routing protocol (FLGR) is proposed. The selection criteria and parameters for the assessment of the next forwarding node are also proposed. In FLGR protocol, the next forward node can be selected based on the fuzzy location region of the destination node. Finally, the feasibility of the FLGR forwarding mode is verified and the performance of FLGR protocol is analyzed via simulation. Simulation results show that the proposed FLGR forwarding mode can effectively avoid the routing void problem. Compared with existing protocols, the FLGR protocol has lower routing overhead, and a higher packet delivery rate in a sparse network.


Sign in / Sign up

Export Citation Format

Share Document