SlideShare a Scribd company logo
1 of 8
Download to read offline
International Journal of Computer Science & Information Technology (IJCSIT) Vol 9, No 3, June 2017
DOI:10.5121/ijcsit.2017.9305 63
PREVENTION METHOD OF FALSE REPORT
GENERATION IN CLUSTER HEADS FOR DYNAMIC
EN-ROUTE FILTERING OF WIRELESS SENSOR
NETWORKS
Jung-Sub Ahn1
and Tae-Ho Cho2
1
College of Information and Communication Engineering, Sungkyunkwan University,
Suwon 16419, Republic of Korea
2
College of Software Platform, Sungkyunkwan University, Suwon 16419, Republic of
Korea
ABSTRACT
Wireless sensor networks collect data through collaborative communication between sensor nodes. sensor
nodes of wireless sensor networks are deployed in open environments. Hence, an attacker can easily
compromise the node. An attacker can compromise a node to generate false reports and inject into the
network. This causes unnecessary energy consumption in the process of transmitting false alarm messages
and false data reports to the system. If the attacker keeps repeatedly attacking thereby causing problems
such as reduction in the entire network life or disabling the networks. Yu and Guan proposed a dynamic
en-route filtering scheme to detect and drop these false reports before reaching to the Base station. In the
dynamic en-route filtering, the energy waste of the intermediate nodes occurs until it is detected early. In
this paper, we propose a method to save the energy of the intermediate nodes by searching for the
compromised node and blocking the reports generated at that node. When verifying a false report at the
verification node, it can know report information. The base station is able to find the cluster of
compromised nodes using that information. In particular, the base station can know the location of the
node that has been compromised, we can block false alarms and energy losses by blocking reports
generated in that cluster.
KEYWORDS
Network Simulation, Wireless Sensor Network, Dynamic en-route filtering, False Report Injection Attack.
1. INTRODUCTION
A wireless sensor network (WSN) is composed of many sensor nodes for detecting events and a
base station (BS) for collecting event data, and is applied to various fields such as hospitals,
military, and industrial [1-3]. When the sensor node detects an event, it sends an event message to
the cluster head (CH), and the CH node generates a report based on the event message and
transmits to BS using multihop [4-5]. Sensor nodes deployed in the target field have limited
processing ability and battery power. It is vulnerable to various security attacks such as false
report injection attacks because it is deployed in open environments. Therefore, research on
security scheme considering limited node environment is actively studied today [6-8]. The
attacker can compromise the sensor node and use the confidential information contained in the
node to generate event data in the form of a report and inject it into the network to perform false
report injection attack. False report injection attacks cause false alarms in the system and
unnecessary energy consumption of intermediate nodes. To solve this problem, Yu and Guan
proposed Dynamic en-route filtering (DEF) [9]. DEF is composed of three phases as key pre-
International Journal of Computer Science & Information Technology (IJCSIT) Vol 9, No 3, June 2017
64
deployment phase, key post-deployment phase and report filtering phase. DEF detects false
reports using two keys. DEF have high filtering rate, but it continues to consume the energy of the
nodes until verification of false reports.
In this paper, we propose a compromised cluster detection method in dynamic en-route filtering
utilizing false reports, to find the location of corrupted nodes in the BS and to block reports
generated from the nodes. The proposed method sends a new verification result report to the BS
using the report information at the node that verified the false report. BS uses the verification
result report to know the generated location of the false report and the compromised keys
including authentication key and secret key. When the same verification result report is received
more than predetermined threshold, the BS transmits a message blocking the report. If the CH
node received that message, it can’t generate any report. As a result, it prevents unnecessary
energy consumption by the nodes. We have modelling and simulation of WSN to prove the
proposed scheme. Experimental results show that the proposed scheme saves energy by at least
6% and up to 29%.
The remainder of the paper is organized as follows: Section 2 describes false report injection
attack and DEF. Section 3 introduces detail procedure of proposed method. Section 4 reviews
analysis of the experiment results. Finally, Section 5 discuss conclusion and future work.
2. RELATED WORKS
2.1. FALSE REPORT INJECTION ATTACK
Figure 1.Overview of False report injection attack
Figure 1 shows an attacker compromising the node, and obtaining the secret information of the
node, to generate a false report and inject it into the networks. False Report Injection attacks can
exhaust all the energy of the all nodes in repetitive attacks. This problem reduces the networks
lifetime or disables the networks [10-12]. In addition, The BS informs the user of the wrong
information and causes confusion and time loss. Because false report has the false event
information. Other security attacks include sinkhole attacks and selective forwarding attacks.
Sinkhole attacks occur in a range type, and selective forwarding attacks only compromise some
nodes in the path [13-16]. BS neighbor nodes are most affected by false report injection attacks
because of all nodes on the routing path to the BS through the BS neighbor nodes. If BS neighbor
nodes are depleted of energy, the network is disabled.
International Journal of Computer Science & Information Technology (IJCSIT) Vol 9, No 3, June 2017
65
2.2. DYNAMIC EN-ROUTE FILTERING SCHEME
Dynamic en-route filtering scheme prevents false report injection attack which is one of
application layer attacks that may occur in WSN. This scheme distributes the authentication and
secret keys to each node before the nodes are deployed, and the member nodes in each cluster
encrypt the authentication key and send to the CH. The CH generates a message using the
authentication key and forwards the message to the next node according to the routing path. After
receiving the message, the nodes verify the message and load the authentication key or message
into memory. The stored authentication key is used to verify the event report.
Figure 2.3-phases procedure of DEF
Figure 2 shows the 3-phases procedure of DEF. The key pre-deployment phase is executed only
once at the BS when before the sensor nodes are deployed to the target field. In this phase, a
distinct seed key is preloaded on each node, and then authentication keys are generated using a
hash chain. The authentication key is calculated as follows:
kvi
m-1 = h(kvi
m)
kvi
m-2 = h(kvi
m-1) = h2
(kvi
m)
…
kvi
1 = hm-1
(kvi
m)
vi means the index of the node, and kvi
1 is first used key. Each node has l + 1 secret keys. l is
randomly to selected in the y-key pool of v size and the remaining key is randomly selected in the
z-key pool of w size. there is a node with at least one other z key in a cluster. The key post-
deployment phase is performed for verification of generated false reports from compromised
node. In this phase, each node generates an encrypted authentication message and sends to the CH
node. The authentication message is as follows:
Auth(vi) = {vi, ji, id(y1
vi
), {id(y1
vi
), kj
vi
},
..., id(yl
vi
), {id(yl
vi
), kji
v1
}yl
vi
,
id(zvi
), (id(zvi
), kji
vi
)zvi
}
ji is the index of the current authentication key. id(y1
vi
) is index of y1
vi
in the global key pool. {.}
yl
vi
means encryption operation using the yl
vi
. CH collects the authentication message from the
nodes belonging to the cluster and generates K(n).
K(n) = {Auth(v1),...,Auth(vn)}
CH selects q(q> 1) of transfer threshold value from neighbor nodes and transfers K(n). By
transmitting to q forwarding nodes, the report can be switched to another node when the
neighboring node is compromised. When the forwarding node receives K(n), it performs as
follows:
1) It verifies that K(n) has at least t distinct z-keyed indexes. If not, K(n) is judged to have been
falsified and discarded.
International Journal of Computer Science & Information Technology (IJCSIT) Vol 9, No 3, June 2017
66
2) If it checks that the index of the secret key in K(n) is the same, the corresponding message is
decrypted and the authentication key is stored in the memory. If there is no index, discard K(n).
3) K(n) is transmitted to q neighbor nodes. If time to live(TTL) of K(n) is zero, K(n) is discarded.
Otherwise, K (n) is transmitted to the next nodes belonging to the cluster.
The above operation is repeated until K(n) reaches BS or TTL becomes zero. The y-key and z-
key are used to decrypt K(n) at the forwarding node, but for different purposes. In the report
filtering phase, the event reporting nodes generate a message authentication code (MAC) and
send to the CH. After receiving the MAC, the CH generates a report including the MACs by a
preset threshold value k and sends to the BS. The report can detect the false report by verifying
the MAC using the authentication key distributed at the post-deployment phase at verification
node when report transmission to the BS is performed. This process is repeated until the report
arrives at the BS or discarded.
3. PROPOSED SCHEME
3.1. ASSUMPTIONS
It is assumed that network is divides into clusters and each cluster consists of nine member nodes
and a cluster head. Since sensor nodes are deployed by the user, BS stores cluster ID and location
information. The report does not disappear during transmission. BS has y-key pool and z-key
pool that are a set of keys distributed to each node. Any report can be verified by the BS. The
forwarding node can generate a verification report utilizing false reports. The verification report
is sent to the BS by the forwarding node verifying the false report. The attacker repeatedly
performs a false report injection attack on the same node. A false report injection attack occurs at
least two hops from the BS and occurs randomly. CH nodes deployed in a specific place are not
compromised.
3.2 DETAILED PROCEDURE
Figure 3. Overview of proposed scheme
Figure 3 shows overall of the proposed scheme. After the key distribution phase, a false event
occurs and the CH generates a false report. False reports continue to be forwarded until a
forwarding node with the same authentication key is found. If the forwarding node verifies a false
report, it drops the report and generates the following verification report:
VR = { SourceID || id(yl
vi
) || id(AuthN) }y1
vi
International Journal of Computer Science & Information Technology (IJCSIT) Vol 9, No 3, June 2017
67
SourceID is the ID of the CH where the report was generated. The forwarding node generates
encrypted VR with the secret key and transmit to the BS. The reason for the encryption is to
prevent capturing the report in the intermediate. The BS can decrypt the VR using the yl
vi
secret
key and identify the location of the compromised node using the SourceID and id(yl
vi
). Because the
secret key used above was never redistributed after the initial deployment. If redistribution is
done, the BS also updates the redistributed secret key. The BS stores the id(AuthN). If BS receive
same messages, it determines that the corresponding authentication key is exposed and performs
the key redistribution of the node having the corresponding authentication key. The content of
key redistribution is not covered in this paper. The BS uses the SourceID and the id(yl
vi
) to encrypt
the report-generation-disable message with the secret key. When the CH receives the report-
generation-disable message, it does not generate a report even if an event occurs.
4. PERFORMANCE ANALYSIS
4.1 EXPERIMENTAL ENVIRONMENT
The experimental environment was composed as follows. The total number of nodes arranged in
the sensor field is 1,000; 100 CH nodes and 900 member nodes. Each node is placed directly on
the field by the user. The size of sensor field is 1,000 x 1,000 m2. Each node consists of two y-
keys and one z-key key. The nodes consume 16.25μJ/byte, 12.5μJ/byte when transmitting and
receiving data respectively, 15μJ for MAC generating, 70 μJ for report generating and 75μJ for
report intermediate verification [18]. When generating a VR report that includes the encryption
process, it consumes 105μJ of energy. The size of the report generated by the CH is assumed to
be 30 bytes and one MAC is assumed to be 1 byte. False Report Injection attacks occur 1000
times in random places.
4.2 EXPERIMENTAL RESULTS
The energy consumption rate was compared with DEF and the proposed scheme. Figure 4 shows
the energy consumption of the proposed scheme versus FTR. When the attack ratio is low, there
is little difference in performance compared with the existing method. However, the higher the
attack ratio, the more energy is saved. The reason is that the proposed scheme prevents the load
on the same node from getting larger as the attack ratio increases. Also, the amount of false traffic
reports and the amount of drop are proportional. That shows Energy efficiency of 6% on 10%
FTR, 20% on 20 FTR and 29% after 80%. The large difference between 10% and 30% is due to
the threshold value. If WSN has low attack ratio, the report generation disable message is not sent
to the CH because the attack count is lower than the threshold value. Both DEF and Proposed
scheme detect more than 80% false reports. If the attacker continuously attacks through the same
node, the proposed scheme will save the maximum energy.
International Journal of Computer Science & Information Technology (IJCSIT) Vol 9, No 3, June 2017
68
Figure 4. Energy consumption versus FTR
Figure 5 shows the network lifetime according to FTR. It represents the lifetime of the network
when the attacker continuously executes the attacks. When the FTR is 100%, the lifetime
improvement performance is 22% in the DEF scheme but the lifetime improvement performance
is 72% in the proposed scheme.
Figure 5 Networks Lifetime versus FTR
International Journal of Computer Science & Information Technology (IJCSIT) Vol 9, No 3, June 2017
69
5. CONCLUSION AND FUTURE WORK
False report attacks in WSN cause false alarms and unnecessary energy consumption. To prevent
this problems, Yu and Guan proposed a dynamic filter scheme. However, in that scheme, when an
attacker continues to execute a false report injection attack, the energy of nodes is consumed. In
order to solve this problem, we propose a compromised cluster detection method in dynamic en-
route filtering utilizing false reports of wireless sensor networks. The BS can know the location
where the false report injection attack occurred through the verification report. Furthermore,
searching the CH that generated the false report and blocking the report generation. It prevents
unnecessary energy consumption of forwarding nodes. The Experimental results confirm that our
method saves 29% energy than the DEF. But, uncompromised nodes in the cluster also become
unusable. In the future works, we will study a scheme that can block only the compromised node
through collaborative verification of neighbor nodes in the cluster.
ACKNOWLEDGEMENTS
This research was supported by Basic Science Research Program through the National Research
Foundation of Korea (NRF) funded by the Ministry of Education, Science and Technology (No.
NRF-2015R1D1A1A01059484)
REFERENCES
[1] Reejamol, K. J., and P. Dhanya Raj. "Hole handling techniques in wireless sensor networks: A
survey." Computational Intelligence and Computing Research (ICCIC), 2016 IEEE International
Conference on. IEEE, (2016)
[2] Nam, Su Man, and Tae Ho Cho. "A fuzzy rule-based path configuration method for LEAP in sensor
networks." Ad Hoc Networks 31 (2015)
[3] H. Park and T. H. Cho. Partial path selection method in each subregion for routing path optimization
in SEF based sensor networks. Journal of Korean Institute of Intelligent Systems 22(1), pp. 108-113.
(2012)
[4] Mansouri, Djamel, et al. "Detecting DoS attacks in WSN based on clustering technique." 2013 IEEE
Wireless Communications and Networking Conference (WCNC). IEEE, (2013)
[5] Winkler, Thomas, and Bernhard Rinner. "Security and privacy protection in visual sensor networks:
A survey." ACM Computing Surveys (CSUR) 47.1 (2014)
[6] F. Ye, H. Luo, S. Lu and L. Zhang, "Statistical en-route filtering of injected false data in sensor
networks," Selected Areas in Communications, IEEE Journal on, vol. 23, pp. 839-850, (2005)
[7] Lu, Rongxing, et al. "BECAN: a bandwidth-efficient cooperative authentication scheme for filtering
injected false data in wireless sensor networks." IEEE transactions on parallel and distributed systems
23.1 (2012)
[8] Li, Feng, and Jie Wu. "A probabilistic voting-based filtering scheme in wireless sensor networks."
Proceedings of the 2006 international conference on Wireless communications and mobile computing.
ACM, (2006)
[9] Yu, Zhen, and Yong Guan. "A dynamic en-route filtering scheme for data reporting in wireless sensor
networks." IEEE/ACM Transactions on Networking (ToN) 18.1 (2010)
[10] Yang, Hao, and Songwu Lu. "Commutative cipher based en-route filtering in wireless sensor
networks." Vehicular Technology Conference, 2004. VTC2004-Fall. 2004 IEEE 60th. Vol. 2. IEEE,
(2004)
[11] Gupta, Pallavi, Vinay Prakash, and Preetam Suman. "Noticeable key points and issues of sensor
deployment for large area Wireless Sensor Network: A survey." System Modeling & Advancement in
Research Trends (SMART), International Conference. IEEE, (2016).
[12] Mohammed, Fihri, et al. "Investigating the impact of black-hole attack on hierarchical protocols and
direct transmission in WSN." Proceedings of the International Conference on Internet of things and
Cloud Computing. ACM, (2016)
International Journal of Computer Science & Information Technology (IJCSIT) Vol 9, No 3, June 2017
70
[13] Joshi, Jetendra, et al. "SEED: Secure and energy efficient data transmission in Wireless Sensor
Networks." Information and Communication Technology (ICoICT), 2016 4th International
Conference on. IEEE, (2016)
[14] Saghar, Kashif, et al. "RAEED: A formally verified solution to resolve sinkhole attack in Wireless
Sensor Network." Applied Sciences and Technology (IBCAST), 2016 13th International Bhurban
Conference on. IEEE, (2016)
[15] Wang, Ding, and Ping Wang. "Understanding security failures of two-factor authentication schemes
for real-time applications in hierarchical wireless sensor networks." Ad Hoc Networks 20 (2014)
[16] Kumar, Vikash, Anshu Jain, and P. N. Barwal. "Wireless sensor networks: security issues, challenges
and solutions." International Journal of Information and Computation Technology (IJICT) 4.8 (2014)
[17] Hwang, Ren Junn, and Yan Zhi Huang. "Secure Data Collection Scheme for Wireless Sensor
Networks." Advanced Information Networking and Applications Workshops (WAINA), 2017 31st
International Conference on. IEEE, (2017)
AUTHORS
Jung Sub Ahn received the B.S. degree in computer engineering from Kyunil Universityt in
2016 and now doing M.S. degree in Department of Electrical and Computer Engineering
from Sungkyunkwan University.
Tea Ho Cho received a Ph.D. degree in Electrical and Computer Engineering from the
University of Arizona, USA, in 1993, and B.S. and M.S. degrees in Electrical and Computer
Engineering from Sungkyunkwan University, Repulic of Korea, and the University of
Alabama, USA, respectively. He is currently a Professor in the College of Information and
Communication Engineering, Sungkyunkwan University, Korea.

More Related Content

What's hot

PREDICTION OF MALICIOUS OBJECTS IN COMPUTER NETWORK AND DEFENSE
PREDICTION OF MALICIOUS OBJECTS IN COMPUTER NETWORK AND DEFENSEPREDICTION OF MALICIOUS OBJECTS IN COMPUTER NETWORK AND DEFENSE
PREDICTION OF MALICIOUS OBJECTS IN COMPUTER NETWORK AND DEFENSEIJNSA Journal
 
A security method for multiple attacks in sensor networks against the false r...
A security method for multiple attacks in sensor networks against the false r...A security method for multiple attacks in sensor networks against the false r...
A security method for multiple attacks in sensor networks against the false r...ijitjournal
 
LOAD BALANCING MANAGEMENT USING FUZZY LOGIC TO IMPROVE THE REPORT TRANSFER SU...
LOAD BALANCING MANAGEMENT USING FUZZY LOGIC TO IMPROVE THE REPORT TRANSFER SU...LOAD BALANCING MANAGEMENT USING FUZZY LOGIC TO IMPROVE THE REPORT TRANSFER SU...
LOAD BALANCING MANAGEMENT USING FUZZY LOGIC TO IMPROVE THE REPORT TRANSFER SU...cscpconf
 
Information and data security pseudorandom number generation and stream cipher
Information and data security pseudorandom number generation and stream cipherInformation and data security pseudorandom number generation and stream cipher
Information and data security pseudorandom number generation and stream cipherMazin Alwaaly
 
DDoS Attack and Defense Scheme in Wireless Ad hoc Networks
DDoS Attack and Defense Scheme in Wireless Ad hoc NetworksDDoS Attack and Defense Scheme in Wireless Ad hoc Networks
DDoS Attack and Defense Scheme in Wireless Ad hoc NetworksIJNSA Journal
 
Error correction and detection th
Error correction and detection thError correction and detection th
Error correction and detection thShardaSalunkhe1
 
Info mimi-hop-by-hop authentication-copy
Info mimi-hop-by-hop authentication-copyInfo mimi-hop-by-hop authentication-copy
Info mimi-hop-by-hop authentication-copySelva Raj
 
Info mimi-hop-by-hop authentication
Info mimi-hop-by-hop authenticationInfo mimi-hop-by-hop authentication
Info mimi-hop-by-hop authenticationSelva Raj
 
Error detection in Data comunication
 Error detection in Data comunication Error detection in Data comunication
Error detection in Data comunicationUmme habiba
 
Limiting Self-Propagating Malware Based on Connection Failure Behavior
Limiting Self-Propagating Malware Based on Connection Failure Behavior Limiting Self-Propagating Malware Based on Connection Failure Behavior
Limiting Self-Propagating Malware Based on Connection Failure Behavior csandit
 
Error detection and correction unit-05
Error detection and correction unit-05Error detection and correction unit-05
Error detection and correction unit-05shrinivasgnaik
 
AN ENERGY EFFICIENT COUNTERMEASURE AGAINST MULTIPLE ATTACKS OF THE FALSE DATA...
AN ENERGY EFFICIENT COUNTERMEASURE AGAINST MULTIPLE ATTACKS OF THE FALSE DATA...AN ENERGY EFFICIENT COUNTERMEASURE AGAINST MULTIPLE ATTACKS OF THE FALSE DATA...
AN ENERGY EFFICIENT COUNTERMEASURE AGAINST MULTIPLE ATTACKS OF THE FALSE DATA...ijcsity
 

What's hot (14)

PREDICTION OF MALICIOUS OBJECTS IN COMPUTER NETWORK AND DEFENSE
PREDICTION OF MALICIOUS OBJECTS IN COMPUTER NETWORK AND DEFENSEPREDICTION OF MALICIOUS OBJECTS IN COMPUTER NETWORK AND DEFENSE
PREDICTION OF MALICIOUS OBJECTS IN COMPUTER NETWORK AND DEFENSE
 
A security method for multiple attacks in sensor networks against the false r...
A security method for multiple attacks in sensor networks against the false r...A security method for multiple attacks in sensor networks against the false r...
A security method for multiple attacks in sensor networks against the false r...
 
LOAD BALANCING MANAGEMENT USING FUZZY LOGIC TO IMPROVE THE REPORT TRANSFER SU...
LOAD BALANCING MANAGEMENT USING FUZZY LOGIC TO IMPROVE THE REPORT TRANSFER SU...LOAD BALANCING MANAGEMENT USING FUZZY LOGIC TO IMPROVE THE REPORT TRANSFER SU...
LOAD BALANCING MANAGEMENT USING FUZZY LOGIC TO IMPROVE THE REPORT TRANSFER SU...
 
Information and data security pseudorandom number generation and stream cipher
Information and data security pseudorandom number generation and stream cipherInformation and data security pseudorandom number generation and stream cipher
Information and data security pseudorandom number generation and stream cipher
 
DDoS Attack and Defense Scheme in Wireless Ad hoc Networks
DDoS Attack and Defense Scheme in Wireless Ad hoc NetworksDDoS Attack and Defense Scheme in Wireless Ad hoc Networks
DDoS Attack and Defense Scheme in Wireless Ad hoc Networks
 
G1102014246
G1102014246G1102014246
G1102014246
 
Error correction and detection th
Error correction and detection thError correction and detection th
Error correction and detection th
 
Info mimi-hop-by-hop authentication-copy
Info mimi-hop-by-hop authentication-copyInfo mimi-hop-by-hop authentication-copy
Info mimi-hop-by-hop authentication-copy
 
Info mimi-hop-by-hop authentication
Info mimi-hop-by-hop authenticationInfo mimi-hop-by-hop authentication
Info mimi-hop-by-hop authentication
 
Error detection in Data comunication
 Error detection in Data comunication Error detection in Data comunication
Error detection in Data comunication
 
As03402620266
As03402620266As03402620266
As03402620266
 
Limiting Self-Propagating Malware Based on Connection Failure Behavior
Limiting Self-Propagating Malware Based on Connection Failure Behavior Limiting Self-Propagating Malware Based on Connection Failure Behavior
Limiting Self-Propagating Malware Based on Connection Failure Behavior
 
Error detection and correction unit-05
Error detection and correction unit-05Error detection and correction unit-05
Error detection and correction unit-05
 
AN ENERGY EFFICIENT COUNTERMEASURE AGAINST MULTIPLE ATTACKS OF THE FALSE DATA...
AN ENERGY EFFICIENT COUNTERMEASURE AGAINST MULTIPLE ATTACKS OF THE FALSE DATA...AN ENERGY EFFICIENT COUNTERMEASURE AGAINST MULTIPLE ATTACKS OF THE FALSE DATA...
AN ENERGY EFFICIENT COUNTERMEASURE AGAINST MULTIPLE ATTACKS OF THE FALSE DATA...
 

Similar to Prevention Method of False Report Generation in Cluser Heads for Dynamic En-Route Filtering of Wireless Sensor Networks

WSN LIFETIME EXTENSION USING GA OPTIMISED FUZZY LOGIC
WSN LIFETIME EXTENSION USING GA OPTIMISED FUZZY LOGICWSN LIFETIME EXTENSION USING GA OPTIMISED FUZZY LOGIC
WSN LIFETIME EXTENSION USING GA OPTIMISED FUZZY LOGICAIRCC Publishing Corporation
 
WSN LIFETIME EXTENSION USING GA OPTIMISED FUZZY LOGIC
WSN LIFETIME EXTENSION USING GA OPTIMISED FUZZY LOGICWSN LIFETIME EXTENSION USING GA OPTIMISED FUZZY LOGIC
WSN LIFETIME EXTENSION USING GA OPTIMISED FUZZY LOGICijcsit
 
WSN Lifetime Extension Using GA Optimised Fuzzy Logic
WSN Lifetime Extension Using GA Optimised Fuzzy LogicWSN Lifetime Extension Using GA Optimised Fuzzy Logic
WSN Lifetime Extension Using GA Optimised Fuzzy LogicAIRCC Publishing Corporation
 
NUMBER OF NEIGHBOUR NODES BASED NEXT FORWARDING NODES DETERMINATION SCHEME FO...
NUMBER OF NEIGHBOUR NODES BASED NEXT FORWARDING NODES DETERMINATION SCHEME FO...NUMBER OF NEIGHBOUR NODES BASED NEXT FORWARDING NODES DETERMINATION SCHEME FO...
NUMBER OF NEIGHBOUR NODES BASED NEXT FORWARDING NODES DETERMINATION SCHEME FO...ijcsity
 
Fuzzy-Based Multiple Path Selection Method for Improving Energy Efficiency in...
Fuzzy-Based Multiple Path Selection Method for Improving Energy Efficiency in...Fuzzy-Based Multiple Path Selection Method for Improving Energy Efficiency in...
Fuzzy-Based Multiple Path Selection Method for Improving Energy Efficiency in...aciijournal
 
Filtering Schemes for Injected False Data in Wsn
Filtering Schemes for Injected False Data in WsnFiltering Schemes for Injected False Data in Wsn
Filtering Schemes for Injected False Data in WsnIOSR Journals
 
An Enhanced Detection and Energy-Efficient En-Route Filtering Scheme in Wirel...
An Enhanced Detection and Energy-Efficient En-Route Filtering Scheme in Wirel...An Enhanced Detection and Energy-Efficient En-Route Filtering Scheme in Wirel...
An Enhanced Detection and Energy-Efficient En-Route Filtering Scheme in Wirel...ieijjournal
 
A secure routing process to simultaneously defend against false report and wo...
A secure routing process to simultaneously defend against false report and wo...A secure routing process to simultaneously defend against false report and wo...
A secure routing process to simultaneously defend against false report and wo...ieijjournal
 
A SECURITY PERIOD UPDATE METHOD USING EVALUATION FUNCTION FOR IMPROVING ENERG...
A SECURITY PERIOD UPDATE METHOD USING EVALUATION FUNCTION FOR IMPROVING ENERG...A SECURITY PERIOD UPDATE METHOD USING EVALUATION FUNCTION FOR IMPROVING ENERG...
A SECURITY PERIOD UPDATE METHOD USING EVALUATION FUNCTION FOR IMPROVING ENERG...csandit
 
ENSP: ENERGY EFFICIENT NEXT HOP SELECTION IN A PROBABILISTIC VOTING-BASED FIL...
ENSP: ENERGY EFFICIENT NEXT HOP SELECTION IN A PROBABILISTIC VOTING-BASED FIL...ENSP: ENERGY EFFICIENT NEXT HOP SELECTION IN A PROBABILISTIC VOTING-BASED FIL...
ENSP: ENERGY EFFICIENT NEXT HOP SELECTION IN A PROBABILISTIC VOTING-BASED FIL...ieijjournal
 
Ensp energy efficient next hop selection in a probabilistic voting based filt...
Ensp energy efficient next hop selection in a probabilistic voting based filt...Ensp energy efficient next hop selection in a probabilistic voting based filt...
Ensp energy efficient next hop selection in a probabilistic voting based filt...ieijjournal
 
IMPROVEMENT OF FALSE REPORT DETECTION PERFORMANCE BASED ON INVALID DATA DETEC...
IMPROVEMENT OF FALSE REPORT DETECTION PERFORMANCE BASED ON INVALID DATA DETEC...IMPROVEMENT OF FALSE REPORT DETECTION PERFORMANCE BASED ON INVALID DATA DETEC...
IMPROVEMENT OF FALSE REPORT DETECTION PERFORMANCE BASED ON INVALID DATA DETEC...IJCNCJournal
 
Selecting number of forwarding reports
Selecting number of forwarding reportsSelecting number of forwarding reports
Selecting number of forwarding reportsijasa
 
Iaetsd a survey on enroute filtering scheme in
Iaetsd a survey on enroute filtering scheme inIaetsd a survey on enroute filtering scheme in
Iaetsd a survey on enroute filtering scheme inIaetsd Iaetsd
 
IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...
IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...
IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...IRJET Journal
 
Accelerated broadcast authentication with signature amortization for wsns
Accelerated broadcast authentication with signature amortization for wsnsAccelerated broadcast authentication with signature amortization for wsns
Accelerated broadcast authentication with signature amortization for wsnseSAT Publishing House
 
SELECTING VOTES FOR ENERGY EFFICIENCY IN PROBABILISTIC VOTING-BASED FILTERING...
SELECTING VOTES FOR ENERGY EFFICIENCY IN PROBABILISTIC VOTING-BASED FILTERING...SELECTING VOTES FOR ENERGY EFFICIENCY IN PROBABILISTIC VOTING-BASED FILTERING...
SELECTING VOTES FOR ENERGY EFFICIENCY IN PROBABILISTIC VOTING-BASED FILTERING...ijasa
 
FUZZY LOGIC-BASED EFFICIENT MESSAGE ROUTE SELECTION METHOD TO PROLONG THE NET...
FUZZY LOGIC-BASED EFFICIENT MESSAGE ROUTE SELECTION METHOD TO PROLONG THE NET...FUZZY LOGIC-BASED EFFICIENT MESSAGE ROUTE SELECTION METHOD TO PROLONG THE NET...
FUZZY LOGIC-BASED EFFICIENT MESSAGE ROUTE SELECTION METHOD TO PROLONG THE NET...IJCNCJournal
 
Fuzzy Logic-based Efficient Message Route Selection Method to Prolong the Net...
Fuzzy Logic-based Efficient Message Route Selection Method to Prolong the Net...Fuzzy Logic-based Efficient Message Route Selection Method to Prolong the Net...
Fuzzy Logic-based Efficient Message Route Selection Method to Prolong the Net...IJCNCJournal
 
Malicious Node Detection Mechanism for Wireless Ad Hoc Network
Malicious Node Detection Mechanism for Wireless Ad Hoc NetworkMalicious Node Detection Mechanism for Wireless Ad Hoc Network
Malicious Node Detection Mechanism for Wireless Ad Hoc NetworkCSCJournals
 

Similar to Prevention Method of False Report Generation in Cluser Heads for Dynamic En-Route Filtering of Wireless Sensor Networks (20)

WSN LIFETIME EXTENSION USING GA OPTIMISED FUZZY LOGIC
WSN LIFETIME EXTENSION USING GA OPTIMISED FUZZY LOGICWSN LIFETIME EXTENSION USING GA OPTIMISED FUZZY LOGIC
WSN LIFETIME EXTENSION USING GA OPTIMISED FUZZY LOGIC
 
WSN LIFETIME EXTENSION USING GA OPTIMISED FUZZY LOGIC
WSN LIFETIME EXTENSION USING GA OPTIMISED FUZZY LOGICWSN LIFETIME EXTENSION USING GA OPTIMISED FUZZY LOGIC
WSN LIFETIME EXTENSION USING GA OPTIMISED FUZZY LOGIC
 
WSN Lifetime Extension Using GA Optimised Fuzzy Logic
WSN Lifetime Extension Using GA Optimised Fuzzy LogicWSN Lifetime Extension Using GA Optimised Fuzzy Logic
WSN Lifetime Extension Using GA Optimised Fuzzy Logic
 
NUMBER OF NEIGHBOUR NODES BASED NEXT FORWARDING NODES DETERMINATION SCHEME FO...
NUMBER OF NEIGHBOUR NODES BASED NEXT FORWARDING NODES DETERMINATION SCHEME FO...NUMBER OF NEIGHBOUR NODES BASED NEXT FORWARDING NODES DETERMINATION SCHEME FO...
NUMBER OF NEIGHBOUR NODES BASED NEXT FORWARDING NODES DETERMINATION SCHEME FO...
 
Fuzzy-Based Multiple Path Selection Method for Improving Energy Efficiency in...
Fuzzy-Based Multiple Path Selection Method for Improving Energy Efficiency in...Fuzzy-Based Multiple Path Selection Method for Improving Energy Efficiency in...
Fuzzy-Based Multiple Path Selection Method for Improving Energy Efficiency in...
 
Filtering Schemes for Injected False Data in Wsn
Filtering Schemes for Injected False Data in WsnFiltering Schemes for Injected False Data in Wsn
Filtering Schemes for Injected False Data in Wsn
 
An Enhanced Detection and Energy-Efficient En-Route Filtering Scheme in Wirel...
An Enhanced Detection and Energy-Efficient En-Route Filtering Scheme in Wirel...An Enhanced Detection and Energy-Efficient En-Route Filtering Scheme in Wirel...
An Enhanced Detection and Energy-Efficient En-Route Filtering Scheme in Wirel...
 
A secure routing process to simultaneously defend against false report and wo...
A secure routing process to simultaneously defend against false report and wo...A secure routing process to simultaneously defend against false report and wo...
A secure routing process to simultaneously defend against false report and wo...
 
A SECURITY PERIOD UPDATE METHOD USING EVALUATION FUNCTION FOR IMPROVING ENERG...
A SECURITY PERIOD UPDATE METHOD USING EVALUATION FUNCTION FOR IMPROVING ENERG...A SECURITY PERIOD UPDATE METHOD USING EVALUATION FUNCTION FOR IMPROVING ENERG...
A SECURITY PERIOD UPDATE METHOD USING EVALUATION FUNCTION FOR IMPROVING ENERG...
 
ENSP: ENERGY EFFICIENT NEXT HOP SELECTION IN A PROBABILISTIC VOTING-BASED FIL...
ENSP: ENERGY EFFICIENT NEXT HOP SELECTION IN A PROBABILISTIC VOTING-BASED FIL...ENSP: ENERGY EFFICIENT NEXT HOP SELECTION IN A PROBABILISTIC VOTING-BASED FIL...
ENSP: ENERGY EFFICIENT NEXT HOP SELECTION IN A PROBABILISTIC VOTING-BASED FIL...
 
Ensp energy efficient next hop selection in a probabilistic voting based filt...
Ensp energy efficient next hop selection in a probabilistic voting based filt...Ensp energy efficient next hop selection in a probabilistic voting based filt...
Ensp energy efficient next hop selection in a probabilistic voting based filt...
 
IMPROVEMENT OF FALSE REPORT DETECTION PERFORMANCE BASED ON INVALID DATA DETEC...
IMPROVEMENT OF FALSE REPORT DETECTION PERFORMANCE BASED ON INVALID DATA DETEC...IMPROVEMENT OF FALSE REPORT DETECTION PERFORMANCE BASED ON INVALID DATA DETEC...
IMPROVEMENT OF FALSE REPORT DETECTION PERFORMANCE BASED ON INVALID DATA DETEC...
 
Selecting number of forwarding reports
Selecting number of forwarding reportsSelecting number of forwarding reports
Selecting number of forwarding reports
 
Iaetsd a survey on enroute filtering scheme in
Iaetsd a survey on enroute filtering scheme inIaetsd a survey on enroute filtering scheme in
Iaetsd a survey on enroute filtering scheme in
 
IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...
IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...
IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...
 
Accelerated broadcast authentication with signature amortization for wsns
Accelerated broadcast authentication with signature amortization for wsnsAccelerated broadcast authentication with signature amortization for wsns
Accelerated broadcast authentication with signature amortization for wsns
 
SELECTING VOTES FOR ENERGY EFFICIENCY IN PROBABILISTIC VOTING-BASED FILTERING...
SELECTING VOTES FOR ENERGY EFFICIENCY IN PROBABILISTIC VOTING-BASED FILTERING...SELECTING VOTES FOR ENERGY EFFICIENCY IN PROBABILISTIC VOTING-BASED FILTERING...
SELECTING VOTES FOR ENERGY EFFICIENCY IN PROBABILISTIC VOTING-BASED FILTERING...
 
FUZZY LOGIC-BASED EFFICIENT MESSAGE ROUTE SELECTION METHOD TO PROLONG THE NET...
FUZZY LOGIC-BASED EFFICIENT MESSAGE ROUTE SELECTION METHOD TO PROLONG THE NET...FUZZY LOGIC-BASED EFFICIENT MESSAGE ROUTE SELECTION METHOD TO PROLONG THE NET...
FUZZY LOGIC-BASED EFFICIENT MESSAGE ROUTE SELECTION METHOD TO PROLONG THE NET...
 
Fuzzy Logic-based Efficient Message Route Selection Method to Prolong the Net...
Fuzzy Logic-based Efficient Message Route Selection Method to Prolong the Net...Fuzzy Logic-based Efficient Message Route Selection Method to Prolong the Net...
Fuzzy Logic-based Efficient Message Route Selection Method to Prolong the Net...
 
Malicious Node Detection Mechanism for Wireless Ad Hoc Network
Malicious Node Detection Mechanism for Wireless Ad Hoc NetworkMalicious Node Detection Mechanism for Wireless Ad Hoc Network
Malicious Node Detection Mechanism for Wireless Ad Hoc Network
 

More from AIRCC Publishing Corporation

Call for Papers - International Journal of Computer Science & Information Tec...
Call for Papers - International Journal of Computer Science & Information Tec...Call for Papers - International Journal of Computer Science & Information Tec...
Call for Papers - International Journal of Computer Science & Information Tec...AIRCC Publishing Corporation
 
Discover Cutting-Edge Research in Computer Science and Information Technology!
Discover Cutting-Edge Research in Computer Science and Information Technology!Discover Cutting-Edge Research in Computer Science and Information Technology!
Discover Cutting-Edge Research in Computer Science and Information Technology!AIRCC Publishing Corporation
 
Constraint-based and Fuzzy Logic Student Modeling for Arabic Grammar
Constraint-based and Fuzzy Logic Student Modeling for Arabic GrammarConstraint-based and Fuzzy Logic Student Modeling for Arabic Grammar
Constraint-based and Fuzzy Logic Student Modeling for Arabic GrammarAIRCC Publishing Corporation
 
From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...
From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...
From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...AIRCC Publishing Corporation
 
Call for Articles - International Journal of Computer Science & Information T...
Call for Articles - International Journal of Computer Science & Information T...Call for Articles - International Journal of Computer Science & Information T...
Call for Articles - International Journal of Computer Science & Information T...AIRCC Publishing Corporation
 
Image Segmentation and Classification using Neural Network
Image Segmentation and Classification using Neural NetworkImage Segmentation and Classification using Neural Network
Image Segmentation and Classification using Neural NetworkAIRCC Publishing Corporation
 
International Journal of Computer Science & Information Technology (IJCSIT)
International Journal of Computer Science & Information Technology (IJCSIT)International Journal of Computer Science & Information Technology (IJCSIT)
International Journal of Computer Science & Information Technology (IJCSIT)AIRCC Publishing Corporation
 
Your Device May Know You Better Than You Know Yourself-Continuous Authenticat...
Your Device May Know You Better Than You Know Yourself-Continuous Authenticat...Your Device May Know You Better Than You Know Yourself-Continuous Authenticat...
Your Device May Know You Better Than You Know Yourself-Continuous Authenticat...AIRCC Publishing Corporation
 
A Comparative Study of Text Comprehension in IELTS Reading Exam using GPT-3
A Comparative Study of Text Comprehension in IELTS Reading Exam using GPT-3A Comparative Study of Text Comprehension in IELTS Reading Exam using GPT-3
A Comparative Study of Text Comprehension in IELTS Reading Exam using GPT-3AIRCC Publishing Corporation
 
From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...
From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...
From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...AIRCC Publishing Corporation
 
Image Segmentation and Classification using Neural Network
Image Segmentation and Classification using Neural NetworkImage Segmentation and Classification using Neural Network
Image Segmentation and Classification using Neural NetworkAIRCC Publishing Corporation
 
Use of Neuronal Networks and Fuzzy Logic to Modelling the Foot Sizes
Use of Neuronal Networks and Fuzzy Logic to Modelling the Foot SizesUse of Neuronal Networks and Fuzzy Logic to Modelling the Foot Sizes
Use of Neuronal Networks and Fuzzy Logic to Modelling the Foot SizesAIRCC Publishing Corporation
 
Exploring the EV Charging Ecosystem and Performing an Experimental Assessment...
Exploring the EV Charging Ecosystem and Performing an Experimental Assessment...Exploring the EV Charging Ecosystem and Performing an Experimental Assessment...
Exploring the EV Charging Ecosystem and Performing an Experimental Assessment...AIRCC Publishing Corporation
 
Call for Papers - International Journal of Computer Science & Information Tec...
Call for Papers - International Journal of Computer Science & Information Tec...Call for Papers - International Journal of Computer Science & Information Tec...
Call for Papers - International Journal of Computer Science & Information Tec...AIRCC Publishing Corporation
 
Current Issue - February 2024, Volume 16, Number 1 - International Journal o...
Current Issue - February 2024, Volume 16, Number 1  - International Journal o...Current Issue - February 2024, Volume 16, Number 1  - International Journal o...
Current Issue - February 2024, Volume 16, Number 1 - International Journal o...AIRCC Publishing Corporation
 
Variations in Outcome for the Same Map Reduce Transitive Closure Algorithm Im...
Variations in Outcome for the Same Map Reduce Transitive Closure Algorithm Im...Variations in Outcome for the Same Map Reduce Transitive Closure Algorithm Im...
Variations in Outcome for the Same Map Reduce Transitive Closure Algorithm Im...AIRCC Publishing Corporation
 
Call for Articles - International Journal of Computer Science & Information T...
Call for Articles - International Journal of Computer Science & Information T...Call for Articles - International Journal of Computer Science & Information T...
Call for Articles - International Journal of Computer Science & Information T...AIRCC Publishing Corporation
 
February 2024-: Top Read Articles in Computer Science & Information Technology
February 2024-: Top Read Articles in Computer Science & Information TechnologyFebruary 2024-: Top Read Articles in Computer Science & Information Technology
February 2024-: Top Read Articles in Computer Science & Information TechnologyAIRCC Publishing Corporation
 
Call for Articles- International Journal of Computer Science & Information T...
Call for Articles-  International Journal of Computer Science & Information T...Call for Articles-  International Journal of Computer Science & Information T...
Call for Articles- International Journal of Computer Science & Information T...AIRCC Publishing Corporation
 

More from AIRCC Publishing Corporation (20)

Call for Papers - International Journal of Computer Science & Information Tec...
Call for Papers - International Journal of Computer Science & Information Tec...Call for Papers - International Journal of Computer Science & Information Tec...
Call for Papers - International Journal of Computer Science & Information Tec...
 
The Smart Parking Management System - IJCSIT
The Smart Parking Management System  - IJCSITThe Smart Parking Management System  - IJCSIT
The Smart Parking Management System - IJCSIT
 
Discover Cutting-Edge Research in Computer Science and Information Technology!
Discover Cutting-Edge Research in Computer Science and Information Technology!Discover Cutting-Edge Research in Computer Science and Information Technology!
Discover Cutting-Edge Research in Computer Science and Information Technology!
 
Constraint-based and Fuzzy Logic Student Modeling for Arabic Grammar
Constraint-based and Fuzzy Logic Student Modeling for Arabic GrammarConstraint-based and Fuzzy Logic Student Modeling for Arabic Grammar
Constraint-based and Fuzzy Logic Student Modeling for Arabic Grammar
 
From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...
From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...
From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...
 
Call for Articles - International Journal of Computer Science & Information T...
Call for Articles - International Journal of Computer Science & Information T...Call for Articles - International Journal of Computer Science & Information T...
Call for Articles - International Journal of Computer Science & Information T...
 
Image Segmentation and Classification using Neural Network
Image Segmentation and Classification using Neural NetworkImage Segmentation and Classification using Neural Network
Image Segmentation and Classification using Neural Network
 
International Journal of Computer Science & Information Technology (IJCSIT)
International Journal of Computer Science & Information Technology (IJCSIT)International Journal of Computer Science & Information Technology (IJCSIT)
International Journal of Computer Science & Information Technology (IJCSIT)
 
Your Device May Know You Better Than You Know Yourself-Continuous Authenticat...
Your Device May Know You Better Than You Know Yourself-Continuous Authenticat...Your Device May Know You Better Than You Know Yourself-Continuous Authenticat...
Your Device May Know You Better Than You Know Yourself-Continuous Authenticat...
 
A Comparative Study of Text Comprehension in IELTS Reading Exam using GPT-3
A Comparative Study of Text Comprehension in IELTS Reading Exam using GPT-3A Comparative Study of Text Comprehension in IELTS Reading Exam using GPT-3
A Comparative Study of Text Comprehension in IELTS Reading Exam using GPT-3
 
From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...
From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...
From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...
 
Image Segmentation and Classification using Neural Network
Image Segmentation and Classification using Neural NetworkImage Segmentation and Classification using Neural Network
Image Segmentation and Classification using Neural Network
 
Use of Neuronal Networks and Fuzzy Logic to Modelling the Foot Sizes
Use of Neuronal Networks and Fuzzy Logic to Modelling the Foot SizesUse of Neuronal Networks and Fuzzy Logic to Modelling the Foot Sizes
Use of Neuronal Networks and Fuzzy Logic to Modelling the Foot Sizes
 
Exploring the EV Charging Ecosystem and Performing an Experimental Assessment...
Exploring the EV Charging Ecosystem and Performing an Experimental Assessment...Exploring the EV Charging Ecosystem and Performing an Experimental Assessment...
Exploring the EV Charging Ecosystem and Performing an Experimental Assessment...
 
Call for Papers - International Journal of Computer Science & Information Tec...
Call for Papers - International Journal of Computer Science & Information Tec...Call for Papers - International Journal of Computer Science & Information Tec...
Call for Papers - International Journal of Computer Science & Information Tec...
 
Current Issue - February 2024, Volume 16, Number 1 - International Journal o...
Current Issue - February 2024, Volume 16, Number 1  - International Journal o...Current Issue - February 2024, Volume 16, Number 1  - International Journal o...
Current Issue - February 2024, Volume 16, Number 1 - International Journal o...
 
Variations in Outcome for the Same Map Reduce Transitive Closure Algorithm Im...
Variations in Outcome for the Same Map Reduce Transitive Closure Algorithm Im...Variations in Outcome for the Same Map Reduce Transitive Closure Algorithm Im...
Variations in Outcome for the Same Map Reduce Transitive Closure Algorithm Im...
 
Call for Articles - International Journal of Computer Science & Information T...
Call for Articles - International Journal of Computer Science & Information T...Call for Articles - International Journal of Computer Science & Information T...
Call for Articles - International Journal of Computer Science & Information T...
 
February 2024-: Top Read Articles in Computer Science & Information Technology
February 2024-: Top Read Articles in Computer Science & Information TechnologyFebruary 2024-: Top Read Articles in Computer Science & Information Technology
February 2024-: Top Read Articles in Computer Science & Information Technology
 
Call for Articles- International Journal of Computer Science & Information T...
Call for Articles-  International Journal of Computer Science & Information T...Call for Articles-  International Journal of Computer Science & Information T...
Call for Articles- International Journal of Computer Science & Information T...
 

Recently uploaded

Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...PsychoTech Services
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 

Recently uploaded (20)

Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 

Prevention Method of False Report Generation in Cluser Heads for Dynamic En-Route Filtering of Wireless Sensor Networks

  • 1. International Journal of Computer Science & Information Technology (IJCSIT) Vol 9, No 3, June 2017 DOI:10.5121/ijcsit.2017.9305 63 PREVENTION METHOD OF FALSE REPORT GENERATION IN CLUSTER HEADS FOR DYNAMIC EN-ROUTE FILTERING OF WIRELESS SENSOR NETWORKS Jung-Sub Ahn1 and Tae-Ho Cho2 1 College of Information and Communication Engineering, Sungkyunkwan University, Suwon 16419, Republic of Korea 2 College of Software Platform, Sungkyunkwan University, Suwon 16419, Republic of Korea ABSTRACT Wireless sensor networks collect data through collaborative communication between sensor nodes. sensor nodes of wireless sensor networks are deployed in open environments. Hence, an attacker can easily compromise the node. An attacker can compromise a node to generate false reports and inject into the network. This causes unnecessary energy consumption in the process of transmitting false alarm messages and false data reports to the system. If the attacker keeps repeatedly attacking thereby causing problems such as reduction in the entire network life or disabling the networks. Yu and Guan proposed a dynamic en-route filtering scheme to detect and drop these false reports before reaching to the Base station. In the dynamic en-route filtering, the energy waste of the intermediate nodes occurs until it is detected early. In this paper, we propose a method to save the energy of the intermediate nodes by searching for the compromised node and blocking the reports generated at that node. When verifying a false report at the verification node, it can know report information. The base station is able to find the cluster of compromised nodes using that information. In particular, the base station can know the location of the node that has been compromised, we can block false alarms and energy losses by blocking reports generated in that cluster. KEYWORDS Network Simulation, Wireless Sensor Network, Dynamic en-route filtering, False Report Injection Attack. 1. INTRODUCTION A wireless sensor network (WSN) is composed of many sensor nodes for detecting events and a base station (BS) for collecting event data, and is applied to various fields such as hospitals, military, and industrial [1-3]. When the sensor node detects an event, it sends an event message to the cluster head (CH), and the CH node generates a report based on the event message and transmits to BS using multihop [4-5]. Sensor nodes deployed in the target field have limited processing ability and battery power. It is vulnerable to various security attacks such as false report injection attacks because it is deployed in open environments. Therefore, research on security scheme considering limited node environment is actively studied today [6-8]. The attacker can compromise the sensor node and use the confidential information contained in the node to generate event data in the form of a report and inject it into the network to perform false report injection attack. False report injection attacks cause false alarms in the system and unnecessary energy consumption of intermediate nodes. To solve this problem, Yu and Guan proposed Dynamic en-route filtering (DEF) [9]. DEF is composed of three phases as key pre-
  • 2. International Journal of Computer Science & Information Technology (IJCSIT) Vol 9, No 3, June 2017 64 deployment phase, key post-deployment phase and report filtering phase. DEF detects false reports using two keys. DEF have high filtering rate, but it continues to consume the energy of the nodes until verification of false reports. In this paper, we propose a compromised cluster detection method in dynamic en-route filtering utilizing false reports, to find the location of corrupted nodes in the BS and to block reports generated from the nodes. The proposed method sends a new verification result report to the BS using the report information at the node that verified the false report. BS uses the verification result report to know the generated location of the false report and the compromised keys including authentication key and secret key. When the same verification result report is received more than predetermined threshold, the BS transmits a message blocking the report. If the CH node received that message, it can’t generate any report. As a result, it prevents unnecessary energy consumption by the nodes. We have modelling and simulation of WSN to prove the proposed scheme. Experimental results show that the proposed scheme saves energy by at least 6% and up to 29%. The remainder of the paper is organized as follows: Section 2 describes false report injection attack and DEF. Section 3 introduces detail procedure of proposed method. Section 4 reviews analysis of the experiment results. Finally, Section 5 discuss conclusion and future work. 2. RELATED WORKS 2.1. FALSE REPORT INJECTION ATTACK Figure 1.Overview of False report injection attack Figure 1 shows an attacker compromising the node, and obtaining the secret information of the node, to generate a false report and inject it into the networks. False Report Injection attacks can exhaust all the energy of the all nodes in repetitive attacks. This problem reduces the networks lifetime or disables the networks [10-12]. In addition, The BS informs the user of the wrong information and causes confusion and time loss. Because false report has the false event information. Other security attacks include sinkhole attacks and selective forwarding attacks. Sinkhole attacks occur in a range type, and selective forwarding attacks only compromise some nodes in the path [13-16]. BS neighbor nodes are most affected by false report injection attacks because of all nodes on the routing path to the BS through the BS neighbor nodes. If BS neighbor nodes are depleted of energy, the network is disabled.
  • 3. International Journal of Computer Science & Information Technology (IJCSIT) Vol 9, No 3, June 2017 65 2.2. DYNAMIC EN-ROUTE FILTERING SCHEME Dynamic en-route filtering scheme prevents false report injection attack which is one of application layer attacks that may occur in WSN. This scheme distributes the authentication and secret keys to each node before the nodes are deployed, and the member nodes in each cluster encrypt the authentication key and send to the CH. The CH generates a message using the authentication key and forwards the message to the next node according to the routing path. After receiving the message, the nodes verify the message and load the authentication key or message into memory. The stored authentication key is used to verify the event report. Figure 2.3-phases procedure of DEF Figure 2 shows the 3-phases procedure of DEF. The key pre-deployment phase is executed only once at the BS when before the sensor nodes are deployed to the target field. In this phase, a distinct seed key is preloaded on each node, and then authentication keys are generated using a hash chain. The authentication key is calculated as follows: kvi m-1 = h(kvi m) kvi m-2 = h(kvi m-1) = h2 (kvi m) … kvi 1 = hm-1 (kvi m) vi means the index of the node, and kvi 1 is first used key. Each node has l + 1 secret keys. l is randomly to selected in the y-key pool of v size and the remaining key is randomly selected in the z-key pool of w size. there is a node with at least one other z key in a cluster. The key post- deployment phase is performed for verification of generated false reports from compromised node. In this phase, each node generates an encrypted authentication message and sends to the CH node. The authentication message is as follows: Auth(vi) = {vi, ji, id(y1 vi ), {id(y1 vi ), kj vi }, ..., id(yl vi ), {id(yl vi ), kji v1 }yl vi , id(zvi ), (id(zvi ), kji vi )zvi } ji is the index of the current authentication key. id(y1 vi ) is index of y1 vi in the global key pool. {.} yl vi means encryption operation using the yl vi . CH collects the authentication message from the nodes belonging to the cluster and generates K(n). K(n) = {Auth(v1),...,Auth(vn)} CH selects q(q> 1) of transfer threshold value from neighbor nodes and transfers K(n). By transmitting to q forwarding nodes, the report can be switched to another node when the neighboring node is compromised. When the forwarding node receives K(n), it performs as follows: 1) It verifies that K(n) has at least t distinct z-keyed indexes. If not, K(n) is judged to have been falsified and discarded.
  • 4. International Journal of Computer Science & Information Technology (IJCSIT) Vol 9, No 3, June 2017 66 2) If it checks that the index of the secret key in K(n) is the same, the corresponding message is decrypted and the authentication key is stored in the memory. If there is no index, discard K(n). 3) K(n) is transmitted to q neighbor nodes. If time to live(TTL) of K(n) is zero, K(n) is discarded. Otherwise, K (n) is transmitted to the next nodes belonging to the cluster. The above operation is repeated until K(n) reaches BS or TTL becomes zero. The y-key and z- key are used to decrypt K(n) at the forwarding node, but for different purposes. In the report filtering phase, the event reporting nodes generate a message authentication code (MAC) and send to the CH. After receiving the MAC, the CH generates a report including the MACs by a preset threshold value k and sends to the BS. The report can detect the false report by verifying the MAC using the authentication key distributed at the post-deployment phase at verification node when report transmission to the BS is performed. This process is repeated until the report arrives at the BS or discarded. 3. PROPOSED SCHEME 3.1. ASSUMPTIONS It is assumed that network is divides into clusters and each cluster consists of nine member nodes and a cluster head. Since sensor nodes are deployed by the user, BS stores cluster ID and location information. The report does not disappear during transmission. BS has y-key pool and z-key pool that are a set of keys distributed to each node. Any report can be verified by the BS. The forwarding node can generate a verification report utilizing false reports. The verification report is sent to the BS by the forwarding node verifying the false report. The attacker repeatedly performs a false report injection attack on the same node. A false report injection attack occurs at least two hops from the BS and occurs randomly. CH nodes deployed in a specific place are not compromised. 3.2 DETAILED PROCEDURE Figure 3. Overview of proposed scheme Figure 3 shows overall of the proposed scheme. After the key distribution phase, a false event occurs and the CH generates a false report. False reports continue to be forwarded until a forwarding node with the same authentication key is found. If the forwarding node verifies a false report, it drops the report and generates the following verification report: VR = { SourceID || id(yl vi ) || id(AuthN) }y1 vi
  • 5. International Journal of Computer Science & Information Technology (IJCSIT) Vol 9, No 3, June 2017 67 SourceID is the ID of the CH where the report was generated. The forwarding node generates encrypted VR with the secret key and transmit to the BS. The reason for the encryption is to prevent capturing the report in the intermediate. The BS can decrypt the VR using the yl vi secret key and identify the location of the compromised node using the SourceID and id(yl vi ). Because the secret key used above was never redistributed after the initial deployment. If redistribution is done, the BS also updates the redistributed secret key. The BS stores the id(AuthN). If BS receive same messages, it determines that the corresponding authentication key is exposed and performs the key redistribution of the node having the corresponding authentication key. The content of key redistribution is not covered in this paper. The BS uses the SourceID and the id(yl vi ) to encrypt the report-generation-disable message with the secret key. When the CH receives the report- generation-disable message, it does not generate a report even if an event occurs. 4. PERFORMANCE ANALYSIS 4.1 EXPERIMENTAL ENVIRONMENT The experimental environment was composed as follows. The total number of nodes arranged in the sensor field is 1,000; 100 CH nodes and 900 member nodes. Each node is placed directly on the field by the user. The size of sensor field is 1,000 x 1,000 m2. Each node consists of two y- keys and one z-key key. The nodes consume 16.25μJ/byte, 12.5μJ/byte when transmitting and receiving data respectively, 15μJ for MAC generating, 70 μJ for report generating and 75μJ for report intermediate verification [18]. When generating a VR report that includes the encryption process, it consumes 105μJ of energy. The size of the report generated by the CH is assumed to be 30 bytes and one MAC is assumed to be 1 byte. False Report Injection attacks occur 1000 times in random places. 4.2 EXPERIMENTAL RESULTS The energy consumption rate was compared with DEF and the proposed scheme. Figure 4 shows the energy consumption of the proposed scheme versus FTR. When the attack ratio is low, there is little difference in performance compared with the existing method. However, the higher the attack ratio, the more energy is saved. The reason is that the proposed scheme prevents the load on the same node from getting larger as the attack ratio increases. Also, the amount of false traffic reports and the amount of drop are proportional. That shows Energy efficiency of 6% on 10% FTR, 20% on 20 FTR and 29% after 80%. The large difference between 10% and 30% is due to the threshold value. If WSN has low attack ratio, the report generation disable message is not sent to the CH because the attack count is lower than the threshold value. Both DEF and Proposed scheme detect more than 80% false reports. If the attacker continuously attacks through the same node, the proposed scheme will save the maximum energy.
  • 6. International Journal of Computer Science & Information Technology (IJCSIT) Vol 9, No 3, June 2017 68 Figure 4. Energy consumption versus FTR Figure 5 shows the network lifetime according to FTR. It represents the lifetime of the network when the attacker continuously executes the attacks. When the FTR is 100%, the lifetime improvement performance is 22% in the DEF scheme but the lifetime improvement performance is 72% in the proposed scheme. Figure 5 Networks Lifetime versus FTR
  • 7. International Journal of Computer Science & Information Technology (IJCSIT) Vol 9, No 3, June 2017 69 5. CONCLUSION AND FUTURE WORK False report attacks in WSN cause false alarms and unnecessary energy consumption. To prevent this problems, Yu and Guan proposed a dynamic filter scheme. However, in that scheme, when an attacker continues to execute a false report injection attack, the energy of nodes is consumed. In order to solve this problem, we propose a compromised cluster detection method in dynamic en- route filtering utilizing false reports of wireless sensor networks. The BS can know the location where the false report injection attack occurred through the verification report. Furthermore, searching the CH that generated the false report and blocking the report generation. It prevents unnecessary energy consumption of forwarding nodes. The Experimental results confirm that our method saves 29% energy than the DEF. But, uncompromised nodes in the cluster also become unusable. In the future works, we will study a scheme that can block only the compromised node through collaborative verification of neighbor nodes in the cluster. ACKNOWLEDGEMENTS This research was supported by Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education, Science and Technology (No. NRF-2015R1D1A1A01059484) REFERENCES [1] Reejamol, K. J., and P. Dhanya Raj. "Hole handling techniques in wireless sensor networks: A survey." Computational Intelligence and Computing Research (ICCIC), 2016 IEEE International Conference on. IEEE, (2016) [2] Nam, Su Man, and Tae Ho Cho. "A fuzzy rule-based path configuration method for LEAP in sensor networks." Ad Hoc Networks 31 (2015) [3] H. Park and T. H. Cho. Partial path selection method in each subregion for routing path optimization in SEF based sensor networks. Journal of Korean Institute of Intelligent Systems 22(1), pp. 108-113. (2012) [4] Mansouri, Djamel, et al. "Detecting DoS attacks in WSN based on clustering technique." 2013 IEEE Wireless Communications and Networking Conference (WCNC). IEEE, (2013) [5] Winkler, Thomas, and Bernhard Rinner. "Security and privacy protection in visual sensor networks: A survey." ACM Computing Surveys (CSUR) 47.1 (2014) [6] F. Ye, H. Luo, S. Lu and L. Zhang, "Statistical en-route filtering of injected false data in sensor networks," Selected Areas in Communications, IEEE Journal on, vol. 23, pp. 839-850, (2005) [7] Lu, Rongxing, et al. "BECAN: a bandwidth-efficient cooperative authentication scheme for filtering injected false data in wireless sensor networks." IEEE transactions on parallel and distributed systems 23.1 (2012) [8] Li, Feng, and Jie Wu. "A probabilistic voting-based filtering scheme in wireless sensor networks." Proceedings of the 2006 international conference on Wireless communications and mobile computing. ACM, (2006) [9] Yu, Zhen, and Yong Guan. "A dynamic en-route filtering scheme for data reporting in wireless sensor networks." IEEE/ACM Transactions on Networking (ToN) 18.1 (2010) [10] Yang, Hao, and Songwu Lu. "Commutative cipher based en-route filtering in wireless sensor networks." Vehicular Technology Conference, 2004. VTC2004-Fall. 2004 IEEE 60th. Vol. 2. IEEE, (2004) [11] Gupta, Pallavi, Vinay Prakash, and Preetam Suman. "Noticeable key points and issues of sensor deployment for large area Wireless Sensor Network: A survey." System Modeling & Advancement in Research Trends (SMART), International Conference. IEEE, (2016). [12] Mohammed, Fihri, et al. "Investigating the impact of black-hole attack on hierarchical protocols and direct transmission in WSN." Proceedings of the International Conference on Internet of things and Cloud Computing. ACM, (2016)
  • 8. International Journal of Computer Science & Information Technology (IJCSIT) Vol 9, No 3, June 2017 70 [13] Joshi, Jetendra, et al. "SEED: Secure and energy efficient data transmission in Wireless Sensor Networks." Information and Communication Technology (ICoICT), 2016 4th International Conference on. IEEE, (2016) [14] Saghar, Kashif, et al. "RAEED: A formally verified solution to resolve sinkhole attack in Wireless Sensor Network." Applied Sciences and Technology (IBCAST), 2016 13th International Bhurban Conference on. IEEE, (2016) [15] Wang, Ding, and Ping Wang. "Understanding security failures of two-factor authentication schemes for real-time applications in hierarchical wireless sensor networks." Ad Hoc Networks 20 (2014) [16] Kumar, Vikash, Anshu Jain, and P. N. Barwal. "Wireless sensor networks: security issues, challenges and solutions." International Journal of Information and Computation Technology (IJICT) 4.8 (2014) [17] Hwang, Ren Junn, and Yan Zhi Huang. "Secure Data Collection Scheme for Wireless Sensor Networks." Advanced Information Networking and Applications Workshops (WAINA), 2017 31st International Conference on. IEEE, (2017) AUTHORS Jung Sub Ahn received the B.S. degree in computer engineering from Kyunil Universityt in 2016 and now doing M.S. degree in Department of Electrical and Computer Engineering from Sungkyunkwan University. Tea Ho Cho received a Ph.D. degree in Electrical and Computer Engineering from the University of Arizona, USA, in 1993, and B.S. and M.S. degrees in Electrical and Computer Engineering from Sungkyunkwan University, Repulic of Korea, and the University of Alabama, USA, respectively. He is currently a Professor in the College of Information and Communication Engineering, Sungkyunkwan University, Korea.