Wireless sensor networks (WSNs) are regularly deployed in harsh and unattended environments, and
sensor nodes are easily exposed to attacks due to the random arrangement of the sensor field. An attacker
can inject fabricated reports from a compromised node with false votes and false vote-based reports. The
false report attacks can waste the energy of the intermediate nodes, shortening the network lifetime.
Furthermore, false votes cause the filtering out of legitimate reports. A probabilistic voting-based filtering
scheme (PVFS) was proposed as a countermeasure against this type of attacks by Li and Wu. PVFS uses a
vote threshold, a security threshold, and a verification node. The scheme does not make additional use
energy or communications resources because the verification node and threshold values are fixed. There
needs to be a verification node selection method that considers the energy resources of the node. In this
paper, we propose a verification path election scheme based on a fuzzy logic system. In the proposed
scheme, one node transmits reports in the node with a strong state through a fuzzy logic system after which
a neighbor is selected out of two from the surroundings. Experimental results show that the proposed
scheme improves energy savings up to maximum 13% relative to the PVFS.
Ensp energy efficient next hop selection in a probabilistic voting based filt...ieijjournal
In wireless sensor networks, sensor nodes are easily compromised due to their restricted hardware resources. These compromised nodes inject fabricated votes into legitimate reports, and generate false report and false vote injection attacks. These attacks deplete energy resources and block report transmission. A probabilistic voting-based filtering scheme was proposed to detect the bogus votes in reports en-route to protect against attacks. Although this method detects false votes in intermediate nodes, the sensor network needs to be effectively operated in consideration of a node's conditions. In this paper, the proposed method selects effective verification nodes by considering the condition of nodes based on a fuzzy logic system. In the proposed method, the intermediate node selects between two next hop nodes in its range through a fuzzy logic system before forwarding the report. Experimental results suggest that, compared to the original method, the proposed method improves energy savings up to 11% while maintaining a high security level.
ENSP: ENERGY EFFICIENT NEXT HOP SELECTION IN A PROBABILISTIC VOTING-BASED FIL...ieijjournal
In wireless sensor networks, sensor nodes are easily compromised due to their restricted hardware resources. These compromised nodes inject fabricated votes into legitimate reports, and generate false report and false vote injection attacks. These attacks deplete energy resources and block report transmission. A probabilistic voting-based filtering scheme was proposed to detect the bogus votes in reports en-route to protect against attacks. Although this method detects false votes in intermediate nodes, the sensor network needs to be effectively operated in consideration of a node's conditions. In this paper, the proposed method selects effective verification nodes by considering the condition of nodes based on a fuzzy logic system. In the proposed method, the intermediate node selects between two next hop nodes in its range through a fuzzy logic system before forwarding the report. Experimental results
suggest that, compared to the original method, the proposed method improves energy savings up to 11% while maintaining a high security level.
NUMBER OF NEIGHBOUR NODES BASED NEXT FORWARDING NODES DETERMINATION SCHEME FO...ijcsity
Wireless Sensor Networks (Wsn) Are Used In Various Areas. These Networks Are Deployed In An Open Environment. So, They Are Very Weak Against An Attack, And Easily Damaged.The Wsn Has Limited Resources In Terms Of Battery Life, Computing Power, Communication Bandwidth And So On. Many Attacks Aim At That Point.The False Report Injection Attack Is One Of Them. Yu Et Al. Proposed A Dynamic En-Route Filtering Scheme (Def),To Prevent A False Report Injection Attack.In This Paper, We Propose An Energy Enhancement Scheme For Def Using A Fuzzy System. The Def Is Divided Into Three Phases (Key Pre-Distribution Phase, Key Dissemination Phase, Report Forwarding Phase). We Applied Our Scheme At The Next Forwarding Node Determination. So We Used Three Input Factors Of A Fuzzy System To Make A Determination. These Are The Availability Of Energy, Distance To The Base Station,
And Usage Count.Through The Experiments, Our Proposed Method Shows Up To 8.2% Energy Efficiency,Compared With The Def. If The Networks Consume More Energy, Our Proposed Method Shows More Efficiency For The Energy.
FUZZY-BASED ENERGY EFFICIENT METHOD FOR MULTIPLE ATTACKS IN SENSOR NETWORKS: ...IJCI JOURNAL
An adversary can easily compromise sensor nodes in wireless sensor networks, and generate multiple
attacks through compromised nodes, such as false vote injection attacks and false report injection attacks.
The false vote injection attack tries to drop legitimate reports in an intermediate node, and the false report
injection attack tries to drain the energy consumption of each node. To prevent these attacks, a
probabilistic voting-based filtering scheme (PVFS) has been proposed to select verification nodes, and to
detect fabricated votes in the reports as they occur simultaneously. In this paper, we propose a method that
improves the energy efficiency of each node and the security level of the false report injection attack, while
maintaining the detection power of the false vote injection attack. Our proposed method effectively selects
verification node with considering the conditions of each node, based on a fuzzy rule-based system. The
verification node is decided through the energy remaining level, distance level, and number of detected
false votes in the fuzzy system. We evaluated the effectiveness of the proposed method, as compared to
PVFS, when two attacks occur simultaneously in the sensor network. The experimental results show that
our method saves energy by up to 8%, by improving and maintaining the defence against these multiple
attacks
BLACKLIST MANAGEMENT USING A VERIFICATION REPORT TO IMPROVE THE ENERGY EFFICI...ijwmn
Recently, the applications scope of Wireless Sensor Networks (WSNs) has been broadened. WSN communication security is important because sensor nodes are vulnerable to various security attacks when deployed in an open environment. An adversary could exploit this vulnerability to inject false reports into the network. En-route filtering techniques have been researched to block false reports. The CFFS scheme
filters the false report by collaboratively validating the report by clustering the nodes. However, CFFS is not considered effective against repetitive attacks. Repeated attacks have a significant impact on network lifetime. In this paper, we propose a method to detect repetitive attacks with cluster-based false data
filtering and to identify the compromised nodes and quickly block them. The proposed scheme uses fuzzy logic to determine the distribution of additional keys according to the network conditions, thereby improving energy efficiency.
AN ENHANCED DETECTION AND ENERGYEFFICIENT EN-ROUTE FILTERING SCHEME IN WIRELE...ieijjournal
Wireless sensor networks (WSNs), due to their small size, low cost, and untethered communication over a short-range, have great potential for applications and services. Due to hostile environments and an unattended nature, they are prone to many types of attacks by adversaries. False data injection attacks compromise data accuracy at the sink node and cause undesirable energy depletion at the sink and intermediate nodes. In order to detect and counter false data attacks, a number of en-route filtering schemes have been proposed. However, they lack a strong false report detection capacity or cannot support network dynamics well. Commutative cipher-based en-route filtering (CCEF) is based on fixed paths, and a
fixed detection probability, and does not consider the residual energy of a node. In an enhanced detectioncapacity and energy-efficient en-route filtering (EDEF) scheme, we use a fuzzy logic system which considers the residual energy, false traffic ratio (FTR), and number of message authentication codes
(MACs) in a report to evaluate the fitness of a node to be a verification node. This helps to balance network
energy usage and reduce the number of hops a false report may travel. The simulation results demonstrate the validity of our scheme with increased energy-efficiency (4.55 to 13.92%) and detection power (99.95%) against false report attacks in WSNs.
LOAD BALANCING MANAGEMENT USING FUZZY LOGIC TO IMPROVE THE REPORT TRANSFER SU...cscpconf
A wireless sensor network (WSN) consists of multiple sensor nodes and base stations (BS) that
collect information over widely deployed sensor nodes. Sensor nodes have limited energy source
and low computing power. Due to those features, there is a disadvantage that user's individual
node management is difficult and they are easily captured by attackers. Therefore, efficient
energy allocation of nodes is important and network security protocol is needed. The
Probabilistic Voting Filtering System (PVFS) is a system that prevents false vote injection
attack and false report attack injected from attackers. The reason for the existence of this
protocol is for energy management of nodes through defence against those attacks and in order
to efficiently manage the network based on PVFS, load balancing of nodes should be performed.
In the proposed scheme, fuzzy logic is applied to each cluster head node (CH) to perform load
balancing by determine whether to perform a role as a verification node and an event
forwarding node. The experiment shows that the event detection rate and the report delivery
success rate are improved in proposed scheme compare with original PVFS.
Wireless sensor networks provide ubiquitous computing systems in various open environments. In the
environment, sensor nodes can easily be compromised by adversaries to generate injecting false data
attacks. The injecting false data attack not only consumes unnecessary energy in en-route nodes, but also
causes false alarms at the base station. To detect this type of attack, a bandwidth-efficient cooperative
authentication (BECAN) scheme was proposed to achieve high filtering probability and high reliability
based on random graph characteristics and cooperative bit-compressed authentication techniques. This
scheme may waste energy resources in en-route nodes due to the fixed number of forwarding reports. In
this paper, our proposed method effectively selects a dynamic number of forwarding reports in the source
nodes based on an evaluation function. The experimental results indicate that our proposed method
enhances the energy savings while maintaining security levels as compared to BECAN.
Ensp energy efficient next hop selection in a probabilistic voting based filt...ieijjournal
In wireless sensor networks, sensor nodes are easily compromised due to their restricted hardware resources. These compromised nodes inject fabricated votes into legitimate reports, and generate false report and false vote injection attacks. These attacks deplete energy resources and block report transmission. A probabilistic voting-based filtering scheme was proposed to detect the bogus votes in reports en-route to protect against attacks. Although this method detects false votes in intermediate nodes, the sensor network needs to be effectively operated in consideration of a node's conditions. In this paper, the proposed method selects effective verification nodes by considering the condition of nodes based on a fuzzy logic system. In the proposed method, the intermediate node selects between two next hop nodes in its range through a fuzzy logic system before forwarding the report. Experimental results suggest that, compared to the original method, the proposed method improves energy savings up to 11% while maintaining a high security level.
ENSP: ENERGY EFFICIENT NEXT HOP SELECTION IN A PROBABILISTIC VOTING-BASED FIL...ieijjournal
In wireless sensor networks, sensor nodes are easily compromised due to their restricted hardware resources. These compromised nodes inject fabricated votes into legitimate reports, and generate false report and false vote injection attacks. These attacks deplete energy resources and block report transmission. A probabilistic voting-based filtering scheme was proposed to detect the bogus votes in reports en-route to protect against attacks. Although this method detects false votes in intermediate nodes, the sensor network needs to be effectively operated in consideration of a node's conditions. In this paper, the proposed method selects effective verification nodes by considering the condition of nodes based on a fuzzy logic system. In the proposed method, the intermediate node selects between two next hop nodes in its range through a fuzzy logic system before forwarding the report. Experimental results
suggest that, compared to the original method, the proposed method improves energy savings up to 11% while maintaining a high security level.
NUMBER OF NEIGHBOUR NODES BASED NEXT FORWARDING NODES DETERMINATION SCHEME FO...ijcsity
Wireless Sensor Networks (Wsn) Are Used In Various Areas. These Networks Are Deployed In An Open Environment. So, They Are Very Weak Against An Attack, And Easily Damaged.The Wsn Has Limited Resources In Terms Of Battery Life, Computing Power, Communication Bandwidth And So On. Many Attacks Aim At That Point.The False Report Injection Attack Is One Of Them. Yu Et Al. Proposed A Dynamic En-Route Filtering Scheme (Def),To Prevent A False Report Injection Attack.In This Paper, We Propose An Energy Enhancement Scheme For Def Using A Fuzzy System. The Def Is Divided Into Three Phases (Key Pre-Distribution Phase, Key Dissemination Phase, Report Forwarding Phase). We Applied Our Scheme At The Next Forwarding Node Determination. So We Used Three Input Factors Of A Fuzzy System To Make A Determination. These Are The Availability Of Energy, Distance To The Base Station,
And Usage Count.Through The Experiments, Our Proposed Method Shows Up To 8.2% Energy Efficiency,Compared With The Def. If The Networks Consume More Energy, Our Proposed Method Shows More Efficiency For The Energy.
FUZZY-BASED ENERGY EFFICIENT METHOD FOR MULTIPLE ATTACKS IN SENSOR NETWORKS: ...IJCI JOURNAL
An adversary can easily compromise sensor nodes in wireless sensor networks, and generate multiple
attacks through compromised nodes, such as false vote injection attacks and false report injection attacks.
The false vote injection attack tries to drop legitimate reports in an intermediate node, and the false report
injection attack tries to drain the energy consumption of each node. To prevent these attacks, a
probabilistic voting-based filtering scheme (PVFS) has been proposed to select verification nodes, and to
detect fabricated votes in the reports as they occur simultaneously. In this paper, we propose a method that
improves the energy efficiency of each node and the security level of the false report injection attack, while
maintaining the detection power of the false vote injection attack. Our proposed method effectively selects
verification node with considering the conditions of each node, based on a fuzzy rule-based system. The
verification node is decided through the energy remaining level, distance level, and number of detected
false votes in the fuzzy system. We evaluated the effectiveness of the proposed method, as compared to
PVFS, when two attacks occur simultaneously in the sensor network. The experimental results show that
our method saves energy by up to 8%, by improving and maintaining the defence against these multiple
attacks
BLACKLIST MANAGEMENT USING A VERIFICATION REPORT TO IMPROVE THE ENERGY EFFICI...ijwmn
Recently, the applications scope of Wireless Sensor Networks (WSNs) has been broadened. WSN communication security is important because sensor nodes are vulnerable to various security attacks when deployed in an open environment. An adversary could exploit this vulnerability to inject false reports into the network. En-route filtering techniques have been researched to block false reports. The CFFS scheme
filters the false report by collaboratively validating the report by clustering the nodes. However, CFFS is not considered effective against repetitive attacks. Repeated attacks have a significant impact on network lifetime. In this paper, we propose a method to detect repetitive attacks with cluster-based false data
filtering and to identify the compromised nodes and quickly block them. The proposed scheme uses fuzzy logic to determine the distribution of additional keys according to the network conditions, thereby improving energy efficiency.
AN ENHANCED DETECTION AND ENERGYEFFICIENT EN-ROUTE FILTERING SCHEME IN WIRELE...ieijjournal
Wireless sensor networks (WSNs), due to their small size, low cost, and untethered communication over a short-range, have great potential for applications and services. Due to hostile environments and an unattended nature, they are prone to many types of attacks by adversaries. False data injection attacks compromise data accuracy at the sink node and cause undesirable energy depletion at the sink and intermediate nodes. In order to detect and counter false data attacks, a number of en-route filtering schemes have been proposed. However, they lack a strong false report detection capacity or cannot support network dynamics well. Commutative cipher-based en-route filtering (CCEF) is based on fixed paths, and a
fixed detection probability, and does not consider the residual energy of a node. In an enhanced detectioncapacity and energy-efficient en-route filtering (EDEF) scheme, we use a fuzzy logic system which considers the residual energy, false traffic ratio (FTR), and number of message authentication codes
(MACs) in a report to evaluate the fitness of a node to be a verification node. This helps to balance network
energy usage and reduce the number of hops a false report may travel. The simulation results demonstrate the validity of our scheme with increased energy-efficiency (4.55 to 13.92%) and detection power (99.95%) against false report attacks in WSNs.
LOAD BALANCING MANAGEMENT USING FUZZY LOGIC TO IMPROVE THE REPORT TRANSFER SU...cscpconf
A wireless sensor network (WSN) consists of multiple sensor nodes and base stations (BS) that
collect information over widely deployed sensor nodes. Sensor nodes have limited energy source
and low computing power. Due to those features, there is a disadvantage that user's individual
node management is difficult and they are easily captured by attackers. Therefore, efficient
energy allocation of nodes is important and network security protocol is needed. The
Probabilistic Voting Filtering System (PVFS) is a system that prevents false vote injection
attack and false report attack injected from attackers. The reason for the existence of this
protocol is for energy management of nodes through defence against those attacks and in order
to efficiently manage the network based on PVFS, load balancing of nodes should be performed.
In the proposed scheme, fuzzy logic is applied to each cluster head node (CH) to perform load
balancing by determine whether to perform a role as a verification node and an event
forwarding node. The experiment shows that the event detection rate and the report delivery
success rate are improved in proposed scheme compare with original PVFS.
Wireless sensor networks provide ubiquitous computing systems in various open environments. In the
environment, sensor nodes can easily be compromised by adversaries to generate injecting false data
attacks. The injecting false data attack not only consumes unnecessary energy in en-route nodes, but also
causes false alarms at the base station. To detect this type of attack, a bandwidth-efficient cooperative
authentication (BECAN) scheme was proposed to achieve high filtering probability and high reliability
based on random graph characteristics and cooperative bit-compressed authentication techniques. This
scheme may waste energy resources in en-route nodes due to the fixed number of forwarding reports. In
this paper, our proposed method effectively selects a dynamic number of forwarding reports in the source
nodes based on an evaluation function. The experimental results indicate that our proposed method
enhances the energy savings while maintaining security levels as compared to BECAN.
FUZZY LOGIC-BASED EFFICIENT MESSAGE ROUTE SELECTION METHOD TO PROLONG THE NET...IJCNCJournal
- The document discusses a fuzzy logic-based method for efficient message routing in wireless sensor networks to prolong the network lifetime. It aims to balance energy load across nodes by selectively tagging nodes at risk of energy exhaustion and rerouting messages around them.
- It proposes using fuzzy logic to evaluate nodes based on their potential importance, energy level, and event occurrence frequency to determine tagging. Tagged nodes avoid routing traffic but still detect and generate reports.
- The method was tested by applying it to a probabilistic voting-based filtering security scheme and was shown to improve energy efficiency, node survival rate, and report transmission success compared to not tagging nodes.
Iaetsd a survey on enroute filtering scheme inIaetsd Iaetsd
This document discusses enroute filtering schemes in wireless sensor networks to prevent false data injection attacks. It provides an overview of existing statistical enroute filtering and location-based resilient security schemes that have limitations such as threshold restrictions. The document then proposes using a cluster-based compromise resilient enroute filtering scheme where sensor nodes are organized into clusters. In this scheme, cluster heads aggregate and transmit data to base stations through forwarding nodes. This is said to provide higher security than other filtering schemes by overcoming prior limitations and disadvantages related to compromised node thresholds, non-resilience to attacks, and dependency on node localization.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
This document describes a proposed algorithm to detect Sybil attacks in wireless sensor networks using a time difference of arrival (TDOA) localization method. Sybil attacks involve a single node forging multiple identities on the network to disrupt normal functioning. The algorithm is applied to clusters formed using the LEACH routing protocol. It aims to detect malicious head nodes (which could be Sybil attackers) by using the time differences of signals arriving at member nodes from the head node. If inconsistencies are found, the head node is identified as malicious. The algorithm seeks to detect Sybil attacks without high computational or memory overhead compared to other detection methods.
GEOGRAPHIC INFORMATION-BASED ROUTING OPTIMIZATION USING GA FOR CLUSTER-BASED ...ijwmn
Wireless sensor networks are used for data collection and event detection in various fields such as homenetworks, military systems, and forest fire monitoring, and are composed of many sensor nodes and a basestation. Sensor nodes have limited computing power, limited energy, are randomly distributed in an open environment that operates independently, and have difficulties in individual management. Taking advantage of those weaknesses, attackers can compromise sensor nodes for various kinds of network attacks. Several security protocols have been proposed to prevent these attacks. Most of the security protocols form routings with cluster head nodes. In the case of routing using only cluster head nodes, it is difficult to re-route when the size of the cluster is increased or the number of the surviving nodes is reduced. To prevent these attacks, the proposed scheme maintains security in a cluster-based security protocol and shows energy efficient routing using genetic algorithm by selecting the appropriate cluster head nodes and
utilizing the characteristics of the sensor node with different transmission outputs based on the distance between each node. In this paper, we use a probabilistic voting-based filtering scheme, one of the clusterbased security protocols, and the shortest path, which is a hierarchical routing protocol that the original probabilistic voting-based filtering scheme is using, to test the proposed scheme. This experiment shows the performance comparison of the routing success rate and routing cost according to the number of nodes on the field, as well as the performance comparison according to the cluster size per number of nodes.
IMPROVEMENT OF FALSE REPORT DETECTION PERFORMANCE BASED ON INVALID DATA DETEC...IJCNCJournal
This document summarizes a research paper that proposes a method to improve the detection of false reports in wireless sensor networks using machine learning. The method trains a neural network model using data from a forest fire simulation based on cellular automata. This allows the neural network to analyze report contents and predict situations occurring in the field to help identify false reports, without relying solely on message authentication codes which can be compromised during attacks. The document provides background on related work in security protocols for wireless sensor networks, artificial neural networks, and cellular automata models for simulating forest fire spread.
Detection of PUE Attack by SPARS Model using WSPRTEditor IJCATR
Cognitive radio is a system which improves the utilization of the spectrum by sensing the white spaces in its vicinity. This
sensed information will be utilized by the Secondary User (SU) to transmit the data. But some of the malicious users attacks th
system by generating the signal same as that of the primary transmitter. The attack caused by generating the signal same as t
primary transmitter is called as Primary User Emulation Attack (PUEA). In this paper the Signal Activity Pattern Acquisition
Reconstruction System (SPARS) is used to detect the attack. But this system suffers from low True Positive Rate. To incr
positive rate or sensitivity a new technique was proposed called as Weighted Sequential Probability Ratio Test (WSPRT). By
improving the true positive rate or sensitivity, the detection capability of the system will be improved.
Prevention and Detection of Misbehaving Node in WSN Based On the Intrusion De...theijes
This document proposes an intrusion detection system called EAACK to prevent and detect misbehaving nodes in wireless sensor networks. EAACK aims to overcome some of the shortcomings of existing systems like Watchdog. It consists of three parts: ACK, S-ACK and MRA. ACK provides end-to-end acknowledgment between nodes. S-ACK involves three successive nodes cooperating to detect misbehavior. MRA authenticates misbehavior reports to prevent false reports. The document analyzes EAACK's performance compared to existing systems, finding it has lower packet loss and higher delivery rates. It concludes EAACK provides effective attack detection and key management to ensure security while being able to extend to other attack types in the future.
A Survey of Routing Protocols for Structural Health MonitoringIJEEE
Wireless sensor networks have emerged in recent years as a promising technology that can impact the field of structural monitoring and infrastructure asset management. Various routing protocols are used to define communication among sensor nodes of the wireless sensor network for purpose of disseminating information. These routing protocols can be designed to improve the network performance in terms of energy consumption, delay and security issues. This paper discusses the requirements of routing protocol for Structural health monitoring and presents summary of various routing protocols used for WSNs for Structural health monitoring.
AN ENERGY EFFICIENT COUNTERMEASURE AGAINST MULTIPLE ATTACKS OF THE FALSE DATA...ijcsity
Nodes are easily exposed from generated attacks on various layers because they compose simple functions in sensor networks. The false data injection attack drains finite energy resource in a compromised node,and the false HELLO flood attack threatens constructed routing paths in an adversary node. A localized encryption and authentication protocol (LEAP) was developed to prevent the aforementioned attacks through the use of four keys. However, when these attacks occur simultaneously, LEAP may not prevent damage from spreading rapidly throughout the network. In this paper, we propose a method that addresses these attacks through the use of four types of keys, including two new keys. We also improve energy consumption while maintaining a suitable security level. The effectiveness of the proposed method was evaluated relative to that of LEAP when multiple attacks occur. The experimental results reveal that the proposed method enhances energy saving by up to 12% while maintaining sufficient detection power
Filtering Schemes for Injected False Data in WsnIOSR Journals
This document summarizes and compares several en-route filtering schemes that aim to detect and drop false data reports injected by compromised nodes in wireless sensor networks. It first describes statistical en-route filtering (SEF), commutative cipher based en-route filtering (CCEF), secure ticket-based en-route filtering (STEF), and dynamic en-route filtering (DEF). It then focuses on the bandwidth efficient cooperative authentication (BECAN) scheme, and proposes adding a hybrid authentication scheme (HAS) based on RSA encryption to increase BECAN's security by preventing compromised nodes from gathering enough signatures to inject false reports. The document implements this approach in NS2 and results show it has lower energy consumption and higher throughput than existing methods
E NERGY - E FFICIENT P ATH C ONFIGURATION M ETHOD FOR DEF IN WSN Sijitjournal
In wireless sensor ne
tworks (WSNs), sensor nodes have stringent energy and computation requirements.
Since they are left unattended, an adversary can generate false report attacks through compromised nodes.
This would result in an increased number of verifications to filter th
ese reports, causing waste of scarce
energy resources. In this paper, we propose energy
-
efficient path configuration method for dynamic en
-
route filtering (EDEF), which uses fuzzy logic to select the forwarding node(s). In order to cater to
compromised nod
es and to detect and filter the false reports, we create alternative paths. Our proposed
method selects forwarding nodes based on the key content of neighbor nodes, the number of neighbor
nodes, and the residual energy. Auth
-
keys are distributed randomly f
rom the global key pool. Simulation
results demonstrate the effectiveness of our proposed method with up to 8.2% energy efficiency as
compared to the dynamic en
-
route filtering (DEF) scheme.
Redundancy Management in Heterogeneous Wireless Sensor NetworksSaeid Hossein Pour
Communication security and reliability are two important issues in any network. A typical communication task in a wireless sensor network is for every sensor node to sense its local environment and, upon request, sends data of interest back to a base station (sink). Due to the distributed nature of these networks and their deployment in remote areas, these networks are vulnerable to numerous security threats that can adversely affect their proper functioning. This problem is more critical if the network is deployed for some mission-critical applications such as a tactical battlefield. Due to resource constraints in the sensor nodes like processing power, memory, bandwidth and power sources, traditional security mechanisms with large overhead of computation and communication are infeasible in WSNs.
Security in sensor networks is, therefore, a particularly challenging task. The main requirements of wireless sensor networks are to extend the network lifetime and energy efficiency as well as provide a secure and reliable connection.
In this project redundancy management of heterogeneous wireless sensor networks (HWSNs) is proposed, to answer user queries in the presence of unreliable and malicious nodes. The objective of the redundancy management is to exploit tradeoff between energy consumption against the gain in quality of service (QoS) such as reliability, timeliness and security to maximize the system lifetime. The presence of heterogeneous nodes in a sensor network is known to increase network reliability and lifetime. Selecting multipath routing can yield a variety of benefits such as fault tolerance, increased bandwidth and improved security. Furthermore, the best redundancy level for path redundancy and source redundancy is analyzed and the best intrusion detection system (IDS) is provided.
This document discusses robust false data injection attacks in electricity markets by limited adversaries. It proposes a worst-case robust attack strategy for adversaries with only partial network information, modeled as bounded uncertainties. The strategy formulates designing such attacks as a convex semi-definite programming problem to efficiently find attacks that remain undetectable under any potential network configuration within the uncertainty bounds. The strategy is analyzed theoretically and tested on the IEEE 14-bus system to evaluate its robustness against different uncertainty levels.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Wireless Sensor Network (WSN) consists of large number of sensor nodes capable of forming
instantaneous network with dynamic topology. Each node simultaneously as both router and
host. Number of nodes in a WSN can vary either due to the mobility or death of nodes due to
drained conditions. Low Energy Aware Cluster Hierarchy (LEACH) is a most popular dynamic
clustering protocol for WSN. Deployment in unattended environment, limited memory, limited
power and low computational power of a sensor node make these networks susceptible to
attacks launched by malicious nodes. This paper provides an overview of LEACH protocol and
how LEACH can be compromised by malicious nodes. We propose a attack on LEACH –
Snooze attack. This paper we present a way to simulate this attack on NS-2 which is
demonstrative on throughput. We observe that during simulation throughput drops as an effect
of attack. It is observed that the effect of the attack gets aggregated as we increase the number
of attackers.
Fuzzy-Based Multiple Path Selection Method for Improving Energy Efficiency in...aciijournal
In wireless sensor networks, adversaries can easily compromise sensors because the sensor resources are
limited. The compromised nodes can inject false data into the network injecting false data attacks. The
injecting false data attack has the goal of consuming unnecessary energy in en-route nodes and causing
false alarms in a sink. A bandwidth-efficient cooperative authentication scheme detects this attack based on
the random graph characteristics of sensor node deployment and a cooperative bit-compressed
authentication technique. Although this scheme maintains a high filtering probability and high reliability in
the sensor network, it wastes energy in en-route nodes due to a multireport solution. In this paper, our
proposed method effectively selects a number of multireports based on the fuzzy rule-based system. We
evaluated the performance in terms of the security level and energy savings in the presence of the injecting
false data attacks. The experimental results indicate that the proposed method improves the energy
efficiency up to 10% while maintaining the same security level as compared to the existing scheme.
SELECTING VOTES FOR ENERGY EFFICIENCY IN PROBABILISTIC VOTING-BASED FILTERING...ijasa
Wireless sensor networks are easily compromised by an adversary, such as fabricated with false votes attacks and false votes on real reports attacks. These attacks generate false data to drain the energy resource of sensors and interrupt the inflow of a real report. PVFS was proposed to detect them by verifying votes in the real report. When a real event occurs, a cluster head collects all of the votes from its neighboring nodes and selects the votes up to a defined number of votes. In this paper, our proposed method decides the number of votes based on a fuzzy rule-based system to improve energy savings as compared to PVFS. We evaluated the effectiveness of the proposal as two attacks occur simultaneously in the sensor network. The experimental results show that our method saves energy resources and maintains the security level against these multiple attacks
The document summarizes a proposed scheme to extend the lifetime of wireless sensor networks using genetic algorithm optimized fuzzy logic. It discusses how the scheme improves on an existing Probabilistic Voting Filtering System (PVFS) by applying fuzzy logic and genetic algorithms to optimize cluster head selection and report verification. The key points are:
1) It uses fuzzy logic systems and a genetic algorithm to determine the optimal number of message authentication codes and selection of verification nodes for cluster head reports, based on factors like energy levels and attack rates.
2) This aims to better distribute energy consumption and prevent energy exhaustion at critical cluster heads, extending the overall network lifetime.
3) The genetic algorithm is used to iteratively modify the
WSN LIFETIME EXTENSION USING GA OPTIMISED FUZZY LOGICijcsit
A wireless sensor network (WSN) consists of multiple sensor nodes and base stations that collect information from widely deployed sensors. However, the disadvantage is that WSNs are randomly distributed in an open environment, which makes them difficult to manage individually and more easily found and compromised by an attacker. An attacker can execute a false report insertion or invalid vote insertion attack through a compromised node. The Probabilistic Voting Filtering System (PVFS) is a system that prevents these two types of attacks. Before sending a report, the proposed method probabilistically selects a validation node, determines the validity of the report, and filters the report based on the thresholds that have been set. In this paper, the proposed scheme improves the lifetime, detection rate, and report delivery rate of the entire network by increasing the lifetime of the cluster head (CH) by selecting the numbers of message authentication codes (MACs) and verification nodes of the report. Using this system, the event detection rate and the network lifetime are improved by up to 18% and 6%, respectively, relative to the existing PVFS.
A wireless sensor network (WSN) consists of multiple sensor nodes and base stations that collect information from widely deployed sensors. However, the disadvantage is that WSNs are randomly distributed in an open environment, which makes them difficult to manage individually and more easily found and compromised by an attacker. An attacker can execute a false report insertion or invalid vote insertion attack through a compromised node. The Probabilistic Voting Filtering System (PVFS) is a system that prevents these two types of attacks. Before sending a report, the proposed method probabilistically selects a validation node, determines the validity of the report, and filters the report based on the thresholds that have been set. In this paper, the proposed scheme improves the lifetime, detection rate, and report delivery rate of the entire network by increasing the lifetime of the cluster head (CH) by selecting the numbers of message authentication codes (MACs) and verification nodes of the report. Using this system, the event detection rate and the network lifetime are improved by up to 18% and 6%, respectively, relative to the existing PVFS.
FUZZY LOGIC-BASED EFFICIENT MESSAGE ROUTE SELECTION METHOD TO PROLONG THE NET...IJCNCJournal
- The document discusses a fuzzy logic-based method for efficient message routing in wireless sensor networks to prolong the network lifetime. It aims to balance energy load across nodes by selectively tagging nodes at risk of energy exhaustion and rerouting messages around them.
- It proposes using fuzzy logic to evaluate nodes based on their potential importance, energy level, and event occurrence frequency to determine tagging. Tagged nodes avoid routing traffic but still detect and generate reports.
- The method was tested by applying it to a probabilistic voting-based filtering security scheme and was shown to improve energy efficiency, node survival rate, and report transmission success compared to not tagging nodes.
Iaetsd a survey on enroute filtering scheme inIaetsd Iaetsd
This document discusses enroute filtering schemes in wireless sensor networks to prevent false data injection attacks. It provides an overview of existing statistical enroute filtering and location-based resilient security schemes that have limitations such as threshold restrictions. The document then proposes using a cluster-based compromise resilient enroute filtering scheme where sensor nodes are organized into clusters. In this scheme, cluster heads aggregate and transmit data to base stations through forwarding nodes. This is said to provide higher security than other filtering schemes by overcoming prior limitations and disadvantages related to compromised node thresholds, non-resilience to attacks, and dependency on node localization.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
This document describes a proposed algorithm to detect Sybil attacks in wireless sensor networks using a time difference of arrival (TDOA) localization method. Sybil attacks involve a single node forging multiple identities on the network to disrupt normal functioning. The algorithm is applied to clusters formed using the LEACH routing protocol. It aims to detect malicious head nodes (which could be Sybil attackers) by using the time differences of signals arriving at member nodes from the head node. If inconsistencies are found, the head node is identified as malicious. The algorithm seeks to detect Sybil attacks without high computational or memory overhead compared to other detection methods.
GEOGRAPHIC INFORMATION-BASED ROUTING OPTIMIZATION USING GA FOR CLUSTER-BASED ...ijwmn
Wireless sensor networks are used for data collection and event detection in various fields such as homenetworks, military systems, and forest fire monitoring, and are composed of many sensor nodes and a basestation. Sensor nodes have limited computing power, limited energy, are randomly distributed in an open environment that operates independently, and have difficulties in individual management. Taking advantage of those weaknesses, attackers can compromise sensor nodes for various kinds of network attacks. Several security protocols have been proposed to prevent these attacks. Most of the security protocols form routings with cluster head nodes. In the case of routing using only cluster head nodes, it is difficult to re-route when the size of the cluster is increased or the number of the surviving nodes is reduced. To prevent these attacks, the proposed scheme maintains security in a cluster-based security protocol and shows energy efficient routing using genetic algorithm by selecting the appropriate cluster head nodes and
utilizing the characteristics of the sensor node with different transmission outputs based on the distance between each node. In this paper, we use a probabilistic voting-based filtering scheme, one of the clusterbased security protocols, and the shortest path, which is a hierarchical routing protocol that the original probabilistic voting-based filtering scheme is using, to test the proposed scheme. This experiment shows the performance comparison of the routing success rate and routing cost according to the number of nodes on the field, as well as the performance comparison according to the cluster size per number of nodes.
IMPROVEMENT OF FALSE REPORT DETECTION PERFORMANCE BASED ON INVALID DATA DETEC...IJCNCJournal
This document summarizes a research paper that proposes a method to improve the detection of false reports in wireless sensor networks using machine learning. The method trains a neural network model using data from a forest fire simulation based on cellular automata. This allows the neural network to analyze report contents and predict situations occurring in the field to help identify false reports, without relying solely on message authentication codes which can be compromised during attacks. The document provides background on related work in security protocols for wireless sensor networks, artificial neural networks, and cellular automata models for simulating forest fire spread.
Detection of PUE Attack by SPARS Model using WSPRTEditor IJCATR
Cognitive radio is a system which improves the utilization of the spectrum by sensing the white spaces in its vicinity. This
sensed information will be utilized by the Secondary User (SU) to transmit the data. But some of the malicious users attacks th
system by generating the signal same as that of the primary transmitter. The attack caused by generating the signal same as t
primary transmitter is called as Primary User Emulation Attack (PUEA). In this paper the Signal Activity Pattern Acquisition
Reconstruction System (SPARS) is used to detect the attack. But this system suffers from low True Positive Rate. To incr
positive rate or sensitivity a new technique was proposed called as Weighted Sequential Probability Ratio Test (WSPRT). By
improving the true positive rate or sensitivity, the detection capability of the system will be improved.
Prevention and Detection of Misbehaving Node in WSN Based On the Intrusion De...theijes
This document proposes an intrusion detection system called EAACK to prevent and detect misbehaving nodes in wireless sensor networks. EAACK aims to overcome some of the shortcomings of existing systems like Watchdog. It consists of three parts: ACK, S-ACK and MRA. ACK provides end-to-end acknowledgment between nodes. S-ACK involves three successive nodes cooperating to detect misbehavior. MRA authenticates misbehavior reports to prevent false reports. The document analyzes EAACK's performance compared to existing systems, finding it has lower packet loss and higher delivery rates. It concludes EAACK provides effective attack detection and key management to ensure security while being able to extend to other attack types in the future.
A Survey of Routing Protocols for Structural Health MonitoringIJEEE
Wireless sensor networks have emerged in recent years as a promising technology that can impact the field of structural monitoring and infrastructure asset management. Various routing protocols are used to define communication among sensor nodes of the wireless sensor network for purpose of disseminating information. These routing protocols can be designed to improve the network performance in terms of energy consumption, delay and security issues. This paper discusses the requirements of routing protocol for Structural health monitoring and presents summary of various routing protocols used for WSNs for Structural health monitoring.
AN ENERGY EFFICIENT COUNTERMEASURE AGAINST MULTIPLE ATTACKS OF THE FALSE DATA...ijcsity
Nodes are easily exposed from generated attacks on various layers because they compose simple functions in sensor networks. The false data injection attack drains finite energy resource in a compromised node,and the false HELLO flood attack threatens constructed routing paths in an adversary node. A localized encryption and authentication protocol (LEAP) was developed to prevent the aforementioned attacks through the use of four keys. However, when these attacks occur simultaneously, LEAP may not prevent damage from spreading rapidly throughout the network. In this paper, we propose a method that addresses these attacks through the use of four types of keys, including two new keys. We also improve energy consumption while maintaining a suitable security level. The effectiveness of the proposed method was evaluated relative to that of LEAP when multiple attacks occur. The experimental results reveal that the proposed method enhances energy saving by up to 12% while maintaining sufficient detection power
Filtering Schemes for Injected False Data in WsnIOSR Journals
This document summarizes and compares several en-route filtering schemes that aim to detect and drop false data reports injected by compromised nodes in wireless sensor networks. It first describes statistical en-route filtering (SEF), commutative cipher based en-route filtering (CCEF), secure ticket-based en-route filtering (STEF), and dynamic en-route filtering (DEF). It then focuses on the bandwidth efficient cooperative authentication (BECAN) scheme, and proposes adding a hybrid authentication scheme (HAS) based on RSA encryption to increase BECAN's security by preventing compromised nodes from gathering enough signatures to inject false reports. The document implements this approach in NS2 and results show it has lower energy consumption and higher throughput than existing methods
E NERGY - E FFICIENT P ATH C ONFIGURATION M ETHOD FOR DEF IN WSN Sijitjournal
In wireless sensor ne
tworks (WSNs), sensor nodes have stringent energy and computation requirements.
Since they are left unattended, an adversary can generate false report attacks through compromised nodes.
This would result in an increased number of verifications to filter th
ese reports, causing waste of scarce
energy resources. In this paper, we propose energy
-
efficient path configuration method for dynamic en
-
route filtering (EDEF), which uses fuzzy logic to select the forwarding node(s). In order to cater to
compromised nod
es and to detect and filter the false reports, we create alternative paths. Our proposed
method selects forwarding nodes based on the key content of neighbor nodes, the number of neighbor
nodes, and the residual energy. Auth
-
keys are distributed randomly f
rom the global key pool. Simulation
results demonstrate the effectiveness of our proposed method with up to 8.2% energy efficiency as
compared to the dynamic en
-
route filtering (DEF) scheme.
Redundancy Management in Heterogeneous Wireless Sensor NetworksSaeid Hossein Pour
Communication security and reliability are two important issues in any network. A typical communication task in a wireless sensor network is for every sensor node to sense its local environment and, upon request, sends data of interest back to a base station (sink). Due to the distributed nature of these networks and their deployment in remote areas, these networks are vulnerable to numerous security threats that can adversely affect their proper functioning. This problem is more critical if the network is deployed for some mission-critical applications such as a tactical battlefield. Due to resource constraints in the sensor nodes like processing power, memory, bandwidth and power sources, traditional security mechanisms with large overhead of computation and communication are infeasible in WSNs.
Security in sensor networks is, therefore, a particularly challenging task. The main requirements of wireless sensor networks are to extend the network lifetime and energy efficiency as well as provide a secure and reliable connection.
In this project redundancy management of heterogeneous wireless sensor networks (HWSNs) is proposed, to answer user queries in the presence of unreliable and malicious nodes. The objective of the redundancy management is to exploit tradeoff between energy consumption against the gain in quality of service (QoS) such as reliability, timeliness and security to maximize the system lifetime. The presence of heterogeneous nodes in a sensor network is known to increase network reliability and lifetime. Selecting multipath routing can yield a variety of benefits such as fault tolerance, increased bandwidth and improved security. Furthermore, the best redundancy level for path redundancy and source redundancy is analyzed and the best intrusion detection system (IDS) is provided.
This document discusses robust false data injection attacks in electricity markets by limited adversaries. It proposes a worst-case robust attack strategy for adversaries with only partial network information, modeled as bounded uncertainties. The strategy formulates designing such attacks as a convex semi-definite programming problem to efficiently find attacks that remain undetectable under any potential network configuration within the uncertainty bounds. The strategy is analyzed theoretically and tested on the IEEE 14-bus system to evaluate its robustness against different uncertainty levels.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Wireless Sensor Network (WSN) consists of large number of sensor nodes capable of forming
instantaneous network with dynamic topology. Each node simultaneously as both router and
host. Number of nodes in a WSN can vary either due to the mobility or death of nodes due to
drained conditions. Low Energy Aware Cluster Hierarchy (LEACH) is a most popular dynamic
clustering protocol for WSN. Deployment in unattended environment, limited memory, limited
power and low computational power of a sensor node make these networks susceptible to
attacks launched by malicious nodes. This paper provides an overview of LEACH protocol and
how LEACH can be compromised by malicious nodes. We propose a attack on LEACH –
Snooze attack. This paper we present a way to simulate this attack on NS-2 which is
demonstrative on throughput. We observe that during simulation throughput drops as an effect
of attack. It is observed that the effect of the attack gets aggregated as we increase the number
of attackers.
Fuzzy-Based Multiple Path Selection Method for Improving Energy Efficiency in...aciijournal
In wireless sensor networks, adversaries can easily compromise sensors because the sensor resources are
limited. The compromised nodes can inject false data into the network injecting false data attacks. The
injecting false data attack has the goal of consuming unnecessary energy in en-route nodes and causing
false alarms in a sink. A bandwidth-efficient cooperative authentication scheme detects this attack based on
the random graph characteristics of sensor node deployment and a cooperative bit-compressed
authentication technique. Although this scheme maintains a high filtering probability and high reliability in
the sensor network, it wastes energy in en-route nodes due to a multireport solution. In this paper, our
proposed method effectively selects a number of multireports based on the fuzzy rule-based system. We
evaluated the performance in terms of the security level and energy savings in the presence of the injecting
false data attacks. The experimental results indicate that the proposed method improves the energy
efficiency up to 10% while maintaining the same security level as compared to the existing scheme.
SELECTING VOTES FOR ENERGY EFFICIENCY IN PROBABILISTIC VOTING-BASED FILTERING...ijasa
Wireless sensor networks are easily compromised by an adversary, such as fabricated with false votes attacks and false votes on real reports attacks. These attacks generate false data to drain the energy resource of sensors and interrupt the inflow of a real report. PVFS was proposed to detect them by verifying votes in the real report. When a real event occurs, a cluster head collects all of the votes from its neighboring nodes and selects the votes up to a defined number of votes. In this paper, our proposed method decides the number of votes based on a fuzzy rule-based system to improve energy savings as compared to PVFS. We evaluated the effectiveness of the proposal as two attacks occur simultaneously in the sensor network. The experimental results show that our method saves energy resources and maintains the security level against these multiple attacks
The document summarizes a proposed scheme to extend the lifetime of wireless sensor networks using genetic algorithm optimized fuzzy logic. It discusses how the scheme improves on an existing Probabilistic Voting Filtering System (PVFS) by applying fuzzy logic and genetic algorithms to optimize cluster head selection and report verification. The key points are:
1) It uses fuzzy logic systems and a genetic algorithm to determine the optimal number of message authentication codes and selection of verification nodes for cluster head reports, based on factors like energy levels and attack rates.
2) This aims to better distribute energy consumption and prevent energy exhaustion at critical cluster heads, extending the overall network lifetime.
3) The genetic algorithm is used to iteratively modify the
WSN LIFETIME EXTENSION USING GA OPTIMISED FUZZY LOGICijcsit
A wireless sensor network (WSN) consists of multiple sensor nodes and base stations that collect information from widely deployed sensors. However, the disadvantage is that WSNs are randomly distributed in an open environment, which makes them difficult to manage individually and more easily found and compromised by an attacker. An attacker can execute a false report insertion or invalid vote insertion attack through a compromised node. The Probabilistic Voting Filtering System (PVFS) is a system that prevents these two types of attacks. Before sending a report, the proposed method probabilistically selects a validation node, determines the validity of the report, and filters the report based on the thresholds that have been set. In this paper, the proposed scheme improves the lifetime, detection rate, and report delivery rate of the entire network by increasing the lifetime of the cluster head (CH) by selecting the numbers of message authentication codes (MACs) and verification nodes of the report. Using this system, the event detection rate and the network lifetime are improved by up to 18% and 6%, respectively, relative to the existing PVFS.
A wireless sensor network (WSN) consists of multiple sensor nodes and base stations that collect information from widely deployed sensors. However, the disadvantage is that WSNs are randomly distributed in an open environment, which makes them difficult to manage individually and more easily found and compromised by an attacker. An attacker can execute a false report insertion or invalid vote insertion attack through a compromised node. The Probabilistic Voting Filtering System (PVFS) is a system that prevents these two types of attacks. Before sending a report, the proposed method probabilistically selects a validation node, determines the validity of the report, and filters the report based on the thresholds that have been set. In this paper, the proposed scheme improves the lifetime, detection rate, and report delivery rate of the entire network by increasing the lifetime of the cluster head (CH) by selecting the numbers of message authentication codes (MACs) and verification nodes of the report. Using this system, the event detection rate and the network lifetime are improved by up to 18% and 6%, respectively, relative to the existing PVFS.
A security method for multiple attacks in sensor networks against the false r...ijitjournal
In a large scale wireless sensor network, various attacks rapidly spread damages in the network from
inside and outside attacks such as the false report injection attack and the sinkhole attack, respectively.
These attacks drain finite energy resources and devastate constructed routing paths via compromised
nodes. The security methods like SEF (statistical en-route filtering scheme) and LEAP (localized encryption
and authentication protocol) try to cope with these attacks. When these attacks occur at the same time, SEF
and LEAP should be operated simultaneously in the sensor network thus, it introduces some inefficiency. In
this paper, we propose a security method which improves the energy efficiency while maintaining the
security level compared to the simultaneous application of SEF and LEAP. The proposed method is
designed by identifying and eliminating the redundancies within the simultaneous application of the two
methods and providing more efficient functionalities. In the proposed method, two types of new keys are
designed and provided for simultaneous detection of the attacks. Four types of keys are used in each sensor
node – a P1 for encrypting information, a PK (pairwise key) for keeping secure paths, a P2 for verifying a
specific cluster, and a GK (group key) for encrypting message. Among these keys, P1 and P2 are newly
provided keys. We have evaluated the effectiveness of the proposed method compared to the simultaneous
application of SEF and LEAP when the multiple attacks occur. The experiment results show that our
proposed method saves energy up to 10% while maintaining the detection power
A security method for multiple attacks in sensor networks against false repor...ieijjournal
This document describes a proposed security method to detect multiple attacks in wireless sensor networks. The method aims to improve energy efficiency while maintaining security when both a probabilistic voting-based filtering scheme (PVFS) and a localized encryption and authentication protocol (LEAP) are applied simultaneously. The proposed method uses four new types of keys and eliminates redundant functions of applying PVFS and LEAP together, in order to reduce energy consumption without lowering detection capabilities against false report injection, false vote injection, and wormhole attacks. Experimental results showed the proposed method can save up to 11% more energy compared to simply applying PVFS and LEAP concurrently under multiple attack scenarios.
An Enhanced Detection and Energy-Efficient En-Route Filtering Scheme in Wirel...ieijjournal
Wireless sensor networks (WSNs), due to their small size, low cost, and untethered communication over a short-range, have great potential for applications and services. Due to hostile environments and an unattended nature, they are prone to many types of attacks by adversaries. False data injection attacks compromise data accuracy at the sink node and cause undesirable energy depletion at the sink and intermediate nodes. In order to detect and counter false data attacks, a number of en-route filtering schemes have been proposed. However, they lack a strong false report detection capacity or cannot support network dynamics well. Commutative cipher-based en-route filtering (CCEF) is based on fixed paths, and a fixed detection probability, and does not consider the residual energy of a node. In an enhanced detectioncapacity and energy-efficient en-route filtering (EDEF) scheme, we use a fuzzy logic system which considers the residual energy, false traffic ratio (FTR), and number of message authentication codes (MACs) in a report to evaluate the fitness of a node to be a verification node. This helps to balance network energy usage and reduce the number of hops a false report may travel. The simulation results demonstrate the validity of our scheme with increased energy-efficiency (4.55 to 13.92%) and detection power (99.95%)
Wireless sensor networks collect data through collaborative communication between sensor nodes. sensor nodes of wireless sensor networks are deployed in open environments. Hence, an attacker can easily compromise the node. An attacker can compromise a node to generate false reports and inject into the network. This causes unnecessary energy consumption in the process of transmitting false alarm messages and false data reports to the system. If the attacker keeps repeatedly attacking thereby causing problems such as reduction in the entire network life or disabling the networks. Yu and Guan proposed a dynamic en-route filtering scheme to detect and drop these false reports before reaching to the Base station. In the dynamic en-route filtering, the energy waste of the intermediate nodes occurs until it is detected early. In this paper, we propose a method to save the energy of the intermediate nodes by searching for the compromised node and blocking the reports generated at that node. When verifying a false report at the verification node, it can know report information. The base station is able to find the cluster of compromised nodes using that information. In particular, the base station can know the location of the node that has been compromised, we can block false alarms and energy losses by blocking reports generated in that cluster.
PREVENTION METHOD OF FALSE REPORT GENERATION IN CLUSTER HEADS FOR DYNAMIC EN-...ijcsit
Wireless sensor networks collect data through collaborative communication between sensor nodes. sensor nodes of wireless sensor networks are deployed in open environments. Hence, an attacker can easily compromise the node. An attacker can compromise a node to generate false reports and inject into the network. This causes unnecessary energy consumption in the process of transmitting false alarm messages and false data reports to the system. If the attacker keeps repeatedly attacking thereby causing problems such as reduction in the entire network life or disabling the networks. Yu and Guan proposed a dynamic en-route filtering scheme to detect and drop these false reports before reaching to the Base station. In the dynamic en-route filtering, the energy waste of the intermediate nodes occurs until it is detected early. In this paper, we propose a method to save the energy of the intermediate nodes by searching for the compromised node and blocking the reports generated at that node. When verifying a false report at the verification node, it can know report information. The base station is able to find the cluster of compromised nodes using that information. In particular, the base station can know the location of the node that has been compromised, we can block false alarms and energy losses by blocking reports
generated in that cluster.
Wireless sensor networks collect data through collaborative communication between sensor nodes. sensor
nodes of wireless sensor networks are deployed in open environments. Hence, an attacker can easily
compromise the node. An attacker can compromise a node to generate false reports and inject into the
network. This causes unnecessary energy consumption in the process of transmitting false alarm messages
and false data reports to the system. If the attacker keeps repeatedly attacking thereby causing problems
such as reduction in the entire network life or disabling the networks. Yu and Guan proposed a dynamic
en-route filtering scheme to detect and drop these false reports before reaching to the Base station. In the
dynamic en-route filtering, the energy waste of the intermediate nodes occurs until it is detected early. In
this paper, we propose a method to save the energy of the intermediate nodes by searching for the
compromised node and blocking the reports generated at that node. When verifying a false report at the
verification node, it can know report information. The base station is able to find the cluster of
compromised nodes using that information. In particular, the base station can know the location of the
node that has been compromised, we can block false alarms and energy losses by blocking reports
generated in that cluster.
Fuzzy Logic-based Efficient Message Route Selection Method to Prolong the Net...IJCNCJournal
Recently, sensor networks have been used in a wide range of applications, and interest in sensor node performance has increased. A sensor network is composed of tiny nodes with limited resources. The sensor network communicates between nodes in a configured network through self-organization. An energyefficient security protocol with a hierarchy structure with various advantages has been proposed to prolong the network lifetime of sensor networks. But due to structural problems in traditional protocols, nodes located upstream tend to consume relatively high energy compared to other nodes. A network protocol should be considered to provide minimal security and efficient allocation of energy consumption by nodes to increase the network lifetime. In this paper, we introduce a solution to solve the bottleneck problem through an efficient message route selection method. The proposed method selects an efficient messaging path using GA and fuzzy logic composed of multiple rules. Message route selection plays an important role in controlling the load balancing of nodes. A principal benefit of the proposed scheme is the potential portability of the clustering-based protocol. In addition, the proposed method is updated to find the optimal path through the genetic algorithm to respond to various environments. We demonstrated the effectiveness of the proposed method through an experiment in which the proposed method is applied to a probabilistic voting-based filtering scheme that is one of the cluster-based security schemes.
A SECURITY PERIOD UPDATE METHOD USING EVALUATION FUNCTION FOR IMPROVING ENERG...csandit
In recent years, Wireless Sensor Networks(WSNs) research has been carried out with the goals
of achieving high security and energy efficiency. In a WSN, sensor nodes are vulnerable to
physical attacks because they are deployed in an open environment. An attacker can inject a
false report into networks using these vulnerabilities. F. Ye et al. proposed statistical en-route
filtering to prevent false report injection attacks. In order to effectively use their scheme,
techniques for determining thresholds using fuzzy logic have been studied. To effectively apply
these techniques to the network, an appropriate update period should be set according to the
network environments. In this paper, we propose a security period update method in order to
improve the lifetime of the network in the statistical en-route filtering approach based on a
wireless sensor network of the cluster environment. The experimental results show that up to an
11.96% improvement of the energy efficiency can be achieved when the security threshold is set
to the optimal period.
A secure routing process to simultaneously defend against false report and wo...ieijjournal
This document proposes a new secure routing scheme to simultaneously detect and defend against wormhole attacks and false report attacks in wireless sensor networks. Existing security schemes focus on defending against single attacks but their performance degrades when multiple attacks occur simultaneously. The proposed scheme uses a key partition-based routing protocol to mitigate the detection probability reduction caused by wormholes. It also defines a new event report format containing verification counts and wormhole detection mechanisms. The scheme aims to detect attacks with few hops and low overhead even if the sender or receiver is compromised.
A KEY LEVEL SELECTION WITHIN HASH CHAINS FOR THE EFFICIENT ENERGY CONSUMPTION...ijasa
A wireless sensor network is composed of a base station (BS) and numerous sensor nodes. The sensor
nodes lack security because they operate in an open environment, such as the military. In particular, a false
report injection attack captures and compromises sensor nodes. The attack then causes the compromised
nodes to generate forward false reports. Owing to the false report injection attack, not only does the sensor
network have a false alarm, but its limited energy is also drained. In order to defend the false report
injection attack, over the past few years, several studies have been made looking for a solution to the
attack. Ye et al. studied statistical en-route filtering (SEF). SEF is a method of stochastically verifying event
reports in the en-route filtering phase. SEF can filter many false reports early using verification of
intermediate nodes. However, because the number of keys in a sensor node is fixed by the system, the
sensor network cannot control the event report verification probability depending on the circumstances of
the network. Therefore, it is difficult to efficiently consume energy of the sensor network. In order to solve
the problem, we propose a method which controls the event report verification probability by using a key
sequence level of an event report. In the proposed method, when an intermediate node receives an event
report, the node verifies the event report by comparing a key sequence level of the report and its key
sequence level. Elements determining the key sequence level include the density of neighbour nodes in the
sensing range of a center of stimulus (CoS), the number of hops from the CoS to the BS, and the average of
the key sequence level of intermediate nodes in each path. We simulated the proposed method and the SEF
method to evaluate the performance in terms of energy efficiency and security. In the simulation results, the
proposed method consumed an average of 7.9% less energy of the sensor nodes compared to SEF method.
The number of false reports arriving at the BS of the proposed method was also less, by an average of 6.4,
compared to the SEF method. Through the results, we can see that when the number of false report is large
in the sensor network, the proposed method is more energy-efficient and secure than the SEF method.
DDoS Attack and Defense Scheme in Wireless Ad hoc NetworksIJNSA Journal
The wireless ad hoc networks are highly vulnerable to distributed denial of service(DDoS) attacks because of its unique characteristics such as open network architecture, shared wireless medium and stringent resource constraints. These attacks throttle the tcp throughput heavily and reduce the quality of service(QoS) to end systems gradually rather than refusing the clients from the services completely. In this paper, we discussed the DDoS attacks and proposed a defense scheme to improve the performance of the ad hoc networks. Our proposed defense mechanism uses the medium access control (MAC) layer information to detect the attackers. The status values from MAC layer that can be used for detection are Frequency of receiving RTS/CTS packets, Frequency of sensing a busy channel and the number of RTS/DATA retransmissions. Once the attackers are identified, all the packets from those nodes will be blocked. The network resources are made available to the legitimate users. We perform the simulation with Network Simulator NS2 and we proved that our proposed system improves the network performance.
A Method of Improving Energy Efficiency Through Geofencing and False Data Blo...IJCNCJournal
In wireless sensor networks, sensor nodes have the disadvantage of being vulnerable to several attacks due to the use of wireless communication and constrained energy. Adversaries exploit vulnerable characteristics of these nodes to capture them and generate false positive and false negative attacks. These attacks result in false alarms in a base station and information loss in intermediate nodes. A context-aware architecture for a probabilistic voting-based filtering scheme (CAA-PVFS) identifies compromised nodes that cause the damage. Although this method immediately detects the compromised nodes using its CAA, its additional network use consumes unnecessary energy. In this paper, our proposed method configures geofencing for the compromised nodes and blocks the nodes using false data injection. The proposed method reduces the unnecessary energy of the additional network while maintaining security strength. Experimental results indicate that the proposed method offers energy savings of up to 17% while maintaining the security strength against the two attacks as compared to the existing method.
Derivative threshold actuation for single phase wormhole detection with reduc...ijdpsjournal
Communication in mobile Ad hoc networks is completed via multi
-
hop ways. Owing to the distributed
specification and restricted resource of nodes, MANET is a lot prone
to wormhole attacks i.e. wormhole
attacks place severe threats to each Ad hoc routing protocol and a few security enhancements. Thus,
so as
to discover wormholes, totally different techniques are in use. In all those techniques fixation of
threshold
is mer
ely by trial & error methodology or by random manner. Conjointly wormhole detection is in twin
part by putting the nodes that is higher than the edge in a suspicious set, however predicting the n
ode as a
wormhole by using some other algorithms. Our aim in
this paper is to deduce the traffic threshold level by
derivational approach for identifying wormholes in a very single phase in relay network having dissi
milar
characteristics.
GEOGRAPHIC INFORMATION-BASED ROUTING OPTIMIZATION USING GA FOR CLUSTER-BASED ...ijwmn
Wireless sensor networks are used for data collection and event detection in various fields such as home networks, military systems, and forest fire monitoring, and are composed of many sensor nodes and a base station. Sensor nodes have limited computing power, limited energy, are randomly distributed in an open environment that operates independently, and have difficulties in individual management. Taking advantage of those weaknesses, attackers can compromise sensor nodes for various kinds of network attacks. Several security protocols have been proposed to prevent these attacks. Most of the security protocols form routings with cluster head nodes. In the case of routing using only cluster head nodes, it is difficult to re-route when the size of the cluster is increased or the number of the surviving nodes is reduced. To prevent these attacks, the proposed scheme maintains security in a cluster-based security protocol and shows energy efficient routing using genetic algorithm by selecting the appropriate cluster head nodes and
utilizing the characteristics of the sensor node with different transmission outputs based on the distance between each node. In this paper, we use a probabilistic voting-based filtering scheme, one of the clusterbased security protocols, and the shortest path, which is a hierarchical routing protocol that the original probabilistic voting-based filtering scheme is using, to test the proposed scheme. This experiment shows the performance comparison of the routing success rate and routing cost according to the number of nodes on the field, as well as the performance comparison according to the cluster size per number of nodes.
THRESHOLD SENSITIVE HETEROGENOUS ROUTING PROTOCOL FOR BETTER ENERGY UTILIZATI...ijassn
Advancements in WSN have led to the wide applicability of sensor network in various fields. WSNs basic classification is Reactive and Proactive network. Reactive networks responds to the very immediate changes in its environment in required parameters of interest, as opposed to the Proactive network, due to continuous sensing nature of WSN. To make it more efficient and improved in terms of Energy in network’s
lifetime, we need to reduce the energy expense in the network model, which is one of the most significant issues in wireless sensor networks (WSNs) [1, 2]. In this paper, we proposed an efficient version of TSEP Protocol, which prolongs the networks lifetime by efficient utilization of sensor energy, as we have simulated. We evaluated the performance of our protocol and compared the results with the TSEP. And from the results of simulation, it can be concluded easily that our proposed efficient routing protocol performs better in terms of network lifetime and stability period
Similar to Ensf energy efficient next-hop selection (20)
A CONCEPTUAL FRAMEWORK OF A DETECTIVE MODEL FOR SOCIAL BOT CLASSIFICATIONijasa
Social media platform has greatly enhanced human interactive activities in the virtual community. Virtual
socialization has positively influenced social bonding among social media users irrespective of one’s
location in the connected global village. Human user and social bot user are the two types of social media
users. While human users personally operate their social media accounts, social bot users are developed
software that manages a social media account for the human user called the botmaster. This botmaster in
most cases are hackers with bad intention of attacking social media users through various attacking mode
using social bots. The aim of this research work is to design an intelligent framework that will prevent
attacks through social bots on social media network platforms.
DESIGN OF A MINIATURE RECTANGULAR PATCH ANTENNA FOR KU BAND APPLICATIONSijasa
A significant portion of communication devices employs microstrip antennas because of their compact size,
low profile, and ability to conform to both planar and non-planar surfaces. To achieve this, we present a
miniature inset-fed rectangular patch antenna using partial ground plane for Ku band applications. The
proposed antenna design used an operating frequency of 15.5 GHz, a FR4 substrate with a dielectric
constant of 4.3, and a thickness of 1.4 mm. It is fed by a 50 Ω inset feedline. Computer simulation
technology (CST) software is used to design, simulate, and analyze. The simulation yields the antenna
performance parameters, including return loss (S11), bandwidth, VSWR, gain, directivity, and radiation
efficiency. The simulation findings revealed that the proposed antenna resonated at 15.5 GHz, with a
return loss of -22.312 dB, a bandwidth of 2.73 GHz (2730 MHz), VSWR of 1.17, a gain of 3.843 dBi, a
directivity of 5.926 dBi, and an antenna efficiency of -2.083 dB (61.901%).
SMART SOUND SYSTEM APPLIED FOR THE EXTENSIVE CARE OF PEOPLE WITH HEARING IMPA...ijasa
We, as normal people, have access to a potent communication tool, which is sound. Although we can continuously gather, analyse, and interpret sounds thanks to our sense of hearing, it can be challenging for people with hearing impairment to perceive their surroundings through sound. Also known as PWHI (People with Hearing Impairment). Auditory/phonic impairment is one of the most prevailing sensory deficits in humans at present. Fortunately, there is room to apply a solution to this issue, given the development of technology. Our project involves capturing ambient sounds from the user’s surroundings and notifying the user through a mobile application using IoT and Deep Learning. Its architecture offers sound recognition using a tool, such as a microphone, to capture sounds from the user's surroundings. These sounds are identified and categorized as ambient sounds, like a doorbell, baby cry, and dog barking; as well as emergency-related sounds, such as alarms, sirens, et
AN INTELLIGENT AND DATA-DRIVEN MOBILE VOLUNTEER EVENT MANAGEMENT PLATFORM USI...ijasa
In Lewis and Clark High School’s Key Club, meetings are always held in a crowded classroom. The
system of event sign-up is inefficient and hinders members from joining events. This has led to students
becoming discouraged from joining Key Club and often resulted in a lack of volunteers for important
events. The club needed a more efficient way of connecting volunteers with volunteering opportunities. To
solve this problem, we developed a VolunteerMatch Mobile application using Dart and Flutter framework
for Key Club to use. The next steps will be to add a volunteer event recommendation and matching feature,
utilizing the results from the research on machine learning models and algorithms in this paper.
A STUDY OF IOT BASED REAL-TIME SOLAR POWER REMOTE MONITORING SYSTEMijasa
We have Developed an IoT-based real-time solar power monitoring system in this paper. It seeks an opensource IoT solution that can collect real-time data and continuously monitor the power output and environmental conditions of a photovoltaic panel.The Objective of this work is to continuously monitor the status of various parameters associated with solar systems through sensors without visiting manually, saving time and ensures efficient power output from PV panels while monitoring for faulty solar panels, weather conditionsand other such issues that affect solar effectiveness.Manually, the user must use a multimeter to determine what value of measurement of the system is appropriate for appliance consumers, which is difficult for the larger System. But the Solar Energy Monitoring system is designed to make it easier for users to use the solar system.This system is comprised of a microcontroller (Node MCU), a PV panel, sensors (INA219 Current Module, Digital Temperature Sensor, LDR), a Battery Charger Module, and a battery. The data from the PV panels and other appliances are sent to the cloud (Thingspeak) via the internet using IoT technology and a Wi-Fi module (NodeMCU). It also allows users in remote areas to monitor the parameters of the solar power plant using connected devices. The user can view the current, previous, and average parameters of the solar PV system, such as voltage, current, temperature, and light intensity using a Graphical User Interface. This will facilitate fault detection and maintenance of the solar power plant easier and saves time.
SENSOR BASED SMART IRRIGATION SYSTEM WITH MONITORING AND CONTROLLING USING IN...ijasa
This document presents a sensor-based smart irrigation system using IoT. The system uses soil moisture, temperature, and humidity sensors connected to a NodeMCU microcontroller. The sensor data is sent to a cloud server (ThingSpeak) and displayed as graphs on a website. A web page allows users to control a water pump remotely. The system was tested on a field over one day, recording sensor data and pump status in the morning, afternoon and night. Test results showed the pump turned on when soil moisture fell below a threshold and off when above a threshold, conserving water. The smart irrigation system allows remote monitoring and control to help farmers irrigate crops efficiently with minimal human effort or water waste.
COMPARISON OF BIT ERROR RATE PERFORMANCE OF VARIOUS DIGITAL MODULATION SCHEME...ijasa
This document compares the bit error rate (BER) performance of different digital modulation schemes (BPSK, QPSK, 16-QAM) over AWGN and Rayleigh fading channels using Simulink simulations. It finds that BPSK outperforms QPSK and 16-QAM in both channels. The BER is evaluated for these modulation schemes using two equalization techniques: constant modulus algorithm (CMA) and maximum likelihood sequence estimation (MLSE). According to the results, BPSK has better BER performance than QPSK and 16-QAM when using either equalizer, especially at lower SNR values. CMA equalization works better than MLSE equalization for all modulation schemes based on the BER values obtained.
PERFORMANCE OF CONVOLUTION AND CRC CHANNEL ENCODED V-BLAST 4×4 MIMO MCCDMA WI...ijasa
This document analyzes the performance of a 4x4 Vertical Bell Labs Layered Space-Time (V-Blast) multiple-input multiple-output multi-carrier code division multiple access (MIMO MC-CDMA) wireless communication system using different digital modulation schemes. The system uses minimum mean square error (MMSE) signal detection and 1/2-rated convolution and cyclic redundancy check (CRC) channel encoding. Simulation results show that binary phase-shift keying (BPSK) modulation outperforms differential phase-shift keying (DPSK), quadrature phase-shift keying (QPSK), and 16-quadrature amplitude modulation (QAM), achieving the lowest bit error rate (BER) especially at
A SCRUTINY TO ATTACK ISSUES AND SECURITY CHALLENGES IN CLOUD COMPUTINGijasa
Cloud computing is an anthology in which one or more computers are connected in a network. Cloud
computing is a cluster of lattice computing, autonomic computing and utility computing. Cloud provides an
on demand services to the users. Many numbers of users access the cloud to utilize the cloud resources.
The security is one the major problem in cloud computing. Hence security is a major issue in cloud
computing. Providing security is a major requirement of cloud computing. The study enclose all the
security issues and attack issues in cloud computing.
The International Journal of Ambient Systems and Applications (IJASA) ijasa
The International Journal of Ambient Systems and applications is a quarterly open access peer-reviewed journal that publishes articles which contribute new results in all areas of ambient Systems. The journal focuses on all technical and practical aspects of ambient Systems, networks, technologies and applications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced ambient Systems and establishing new collaborations in these areas.Authors are solicited to contribute to this journal by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in ambient Systems.
A SCRUTINY TO ATTACK ISSUES AND SECURITY CHALLENGES IN CLOUD COMPUTINGijasa
Cloud computing is an anthology in which one or more computers are connected in a network. Cloud computing is a cluster of lattice computing, autonomic computing and utility computing. Cloud provides an on demand services to the users. Many numbers of users access the cloud to utilize the cloud resources. The security is one the major problem in cloud computing. Hence security is a major issue in cloud computing. Providing security is a major requirement of cloud computing. The study enclose all the security issues and attack issues in cloud computing.
TOWARD ORGANIC COMPUTING APPROACH FOR CYBERNETIC RESPONSIVE ENVIRONMENTijasa
The developpment of the Internet of Things (IoT) concept revives Responsive Environments (RE) technologies. Nowadays, the idea of a permanent connection between physical and digital world is technologically possible. The capillar Internet relates to the Internet extension into daily appliances such as they become actors of Internet like any hu-man. The parallel development of Machine-to-Machine
communications and Arti cial Intelligence (AI) technics start a new area of cybernetic. This paper presents an approach for Cybernetic Organism (Cyborg) for RE based on Organic Computing (OC). In such approach, each appli-ance is a part of an autonomic system in order to control a physical environment.The underlying idea is that such systems must have self-x properties in order to adapt their behavior to
external disturbances with a high-degree of autonomy.
A STUDY ON DEVELOPING A SMART ENVIRONMENT IN AGRICULTURAL IRRIGATION TECHNIQUEijasa
Maintaining a good irrigation system is a necessity in today’s water scarcity environment. This paper describes a new approach for automated Smart Irrigation (SIR) system in agricultural management. Using
various types of sensors in the crop field area, temperature and moisture value of the soil is monitored.Based on the sensed data, SIR will automatically decide about the necessary action for irrigation and also notifies the user. The system will also focus on the reduction of energy consumption by the sensors during communication.
A REVIEW ON DDOS PREVENTION AND DETECTION METHODOLOGYijasa
Denial of Service (DoS) or Distributed-Denial of Service (DDoS) is major threat to network security.
Network is collection of nodes that interconnect with each other for exchange the Information. This
information is required for that node is kept confidentially. Attacker in network computer captures this
information that is confidential and misuse the network. Hence security is one of the major issues. There
are one or many attacks in network. One of the major threats to internet service is DDoS (Distributed
denial of services) attack. DDoS attack is a malicious attempt to suspending or interrupting services to
target node. DDoS or DoS is an attempt to make network resource or the machine is unavailable to its
intended user. Many ideas are developed for avoiding the DDoS or DoS. DDoS happen in two ways
naturally or it may due to some botnets .Various schemes are developed defense against to this attack.
Main idea of this paper is present basis of DDoS attack. DDoS attack types, DDoS attack components,
survey on different mechanism to prevent DDoS
The smart mobile terminal operator platform Android is getting popular all over the world with its wide variety of applications and enormous use in numerous spheres of our daily life. Considering the fact of increasing demand of home security and automation, an Android based control system is presented in this paper where the proposed system can maintain the security of home main entrance and also the car door lock. Another important feature of the designed system is that it can control the overall appliances in a room. The mobile to security system or home automation system interface is established through Bluetooth. The hardware part is designed with the PIC microcontroller.
The World Wide Web is booming and radically vibrant due to the well established standards and widely accountable framework which guarantees the interoperability at various levels of the application and the society as a whole. So far, the web has been functioning at the random rate on the basis of the human intervention and some manual processing but the next generation web which the researchers called semantic web, edging for automatic processing and machine-level understanding. The well set notion, Semantic Web would be turn possible if only there exists the further levels of interoperability prevails among the applications and networks. In achieving this interoperability and greater functionality among the applications, the W3C standardization has already released the well defined standards such as RDF/RDF Schema and OWL. Using XML as a tool for semantic interoperability has not achieved anything effective and failed to bring the interconnection at the larger level. This leads to the further inclusion of inference layer at the top of the web architecture and its paves the way for proposing the common design for encoding the ontology representation languages in the data models such as RDF/RDFS. In this research article, we have given the clear implication of semantic web research roots and its ontological background process which may help to augment the sheer understanding of named entities in the web.
Artificial neural networks (ANN) consider classification as one of the most dynamic research and
application areas. ANN is the branch of Artificial Intelligence (AI). The neural network was trained by
back propagation algorithm. The different combinations of functions and its effect while using ANN as a
classifier is studied and the correctness of these functions are analyzed for various kinds of datasets. The
back propagation neural network (BPNN) can be used as a highly successful tool for dataset classification
with suitable combination of training, learning and transfer functions. When the maximum likelihood
method was compared with backpropagation neural network method, the BPNN was more accurate than
maximum likelihood method. A high predictive ability with stable and well functioning BPNN is possible.
Multilayer feed-forward neural network algorithm is also used for classification. However BPNN proves to
be more effective than other classification algorithms.
In this paper a novel intelligent soft computing based cryptographic technique based on synchronization of
two chaotic systems (CSCT) between sender and receiver has been proposed to generate session key using
Pecora and Caroll (PC) method. Chaotic system has some unique features like sensitive to initial
conditions, topologically mixing; and dense periodic orbits. By nature, the Lorenz system is very sensitive
to initial conditions meaning that the error between attacker and receiver is going to grow exponentially if
there is a very slight difference between their initial conditions. All these features make chaotic system as
good alternatives for session key generation. In the proposed CSCT few parameters ( , b , r , x1 ,y2 and z2 )
are being exchanged between sender and receiver. Some of the parameter which takes major roles to form
the session key does not get transmitted via public channel, sender keeps these parameters secret. This way
of handling parameter passing mechanism prevents any kind of attacks during exchange of parameters like
sniffing, spoofing or phishing.
A black-hole attack in the Mobile Ad-hoc NETwork (MANET) is an attack occurs due to malicious nodes,
which attracts the data packets by falsely advertising a fresh route to the destination. In this paper, we
present a clustering approach in Ad-hoc On-demand Distance Vector (AODV) routing protocol for the
detection and prevention of black-hole attack in MANETs. In this approach every member of the cluster will
ping once to the cluster head, to detect the peculiar difference between the number of data packets received
and forwarded by the node. If anomalousness is perceived, all the nodes will obscure the malicious nodes
from the network.
Improving performance of routing protocols using mrp frameworkijasa
These days MANET (Mobile Ad-hoc Network) is an amazing remarkably altering or rising technology, for
the reason that of its elite nature of scattered mobile devices and self-motivated network topology. The
mobile ad-hoc routing protocol follows several principles in wireless MANET’s. The up to date and novel
applications based on wireless technology are being produced in the private as well as commercial sectors.
A lot of challenges which are facing wireless MANETs like network stability, security, energy efficiency
and performance analysis etc. At present wireless ad-hoc network get much more attention because of its
accessibility everywhere. As a result researchers produce several routing protocols. In this paper first of
all we analyzed the performance investigation of wireless routing protocols on the basis of ROH (Routing
Overhead), throughput, end-2-end delay and PDR (Packet Delivery Ratio). After that we proposed an MRP
(Mixed Routing Protocol) framework which improve performance.
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...IJECEIAES
Climate change's impact on the planet forced the United Nations and governments to promote green energies and electric transportation. The deployments of photovoltaic (PV) and electric vehicle (EV) systems gained stronger momentum due to their numerous advantages over fossil fuel types. The advantages go beyond sustainability to reach financial support and stability. The work in this paper introduces the hybrid system between PV and EV to support industrial and commercial plants. This paper covers the theoretical framework of the proposed hybrid system including the required equation to complete the cost analysis when PV and EV are present. In addition, the proposed design diagram which sets the priorities and requirements of the system is presented. The proposed approach allows setup to advance their power stability, especially during power outages. The presented information supports researchers and plant owners to complete the necessary analysis while promoting the deployment of clean energy. The result of a case study that represents a dairy milk farmer supports the theoretical works and highlights its advanced benefits to existing plants. The short return on investment of the proposed approach supports the paper's novelty approach for the sustainable electrical system. In addition, the proposed system allows for an isolated power setup without the need for a transmission line which enhances the safety of the electrical network
Using recycled concrete aggregates (RCA) for pavements is crucial to achieving sustainability. Implementing RCA for new pavement can minimize carbon footprint, conserve natural resources, reduce harmful emissions, and lower life cycle costs. Compared to natural aggregate (NA), RCA pavement has fewer comprehensive studies and sustainability assessments.
Using recycled concrete aggregates (RCA) for pavements is crucial to achieving sustainability. Implementing RCA for new pavement can minimize carbon footprint, conserve natural resources, reduce harmful emissions, and lower life cycle costs. Compared to natural aggregate (NA), RCA pavement has fewer comprehensive studies and sustainability assessments.
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesChristina Lin
Traditionally, dealing with real-time data pipelines has involved significant overhead, even for straightforward tasks like data transformation or masking. However, in this talk, we’ll venture into the dynamic realm of WebAssembly (WASM) and discover how it can revolutionize the creation of stateless streaming pipelines within a Kafka (Redpanda) broker. These pipelines are adept at managing low-latency, high-data-volume scenarios.
International Conference on NLP, Artificial Intelligence, Machine Learning an...gerogepatton
International Conference on NLP, Artificial Intelligence, Machine Learning and Applications (NLAIM 2024) offers a premier global platform for exchanging insights and findings in the theory, methodology, and applications of NLP, Artificial Intelligence, Machine Learning, and their applications. The conference seeks substantial contributions across all key domains of NLP, Artificial Intelligence, Machine Learning, and their practical applications, aiming to foster both theoretical advancements and real-world implementations. With a focus on facilitating collaboration between researchers and practitioners from academia and industry, the conference serves as a nexus for sharing the latest developments in the field.
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELgerogepatton
As digital technology becomes more deeply embedded in power systems, protecting the communication
networks of Smart Grids (SG) has emerged as a critical concern. Distributed Network Protocol 3 (DNP3)
represents a multi-tiered application layer protocol extensively utilized in Supervisory Control and Data
Acquisition (SCADA)-based smart grids to facilitate real-time data gathering and control functionalities.
Robust Intrusion Detection Systems (IDS) are necessary for early threat detection and mitigation because
of the interconnection of these networks, which makes them vulnerable to a variety of cyberattacks. To
solve this issue, this paper develops a hybrid Deep Learning (DL) model specifically designed for intrusion
detection in smart grids. The proposed approach is a combination of the Convolutional Neural Network
(CNN) and the Long-Short-Term Memory algorithms (LSTM). We employed a recent intrusion detection
dataset (DNP3), which focuses on unauthorized commands and Denial of Service (DoS) cyberattacks, to
train and test our model. The results of our experiments show that our CNN-LSTM method is much better
at finding smart grid intrusions than other deep learning algorithms used for classification. In addition,
our proposed approach improves accuracy, precision, recall, and F1 score, achieving a high detection
accuracy rate of 99.50%.
ACEP Magazine edition 4th launched on 05.06.2024Rahul
This document provides information about the third edition of the magazine "Sthapatya" published by the Association of Civil Engineers (Practicing) Aurangabad. It includes messages from current and past presidents of ACEP, memories and photos from past ACEP events, information on life time achievement awards given by ACEP, and a technical article on concrete maintenance, repairs and strengthening. The document highlights activities of ACEP and provides a technical educational article for members.
Batteries -Introduction – Types of Batteries – discharging and charging of battery - characteristics of battery –battery rating- various tests on battery- – Primary battery: silver button cell- Secondary battery :Ni-Cd battery-modern battery: lithium ion battery-maintenance of batteries-choices of batteries for electric vehicle applications.
Fuel Cells: Introduction- importance and classification of fuel cells - description, principle, components, applications of fuel cells: H2-O2 fuel cell, alkaline fuel cell, molten carbonate fuel cell and direct methanol fuel cells.
A review on techniques and modelling methodologies used for checking electrom...nooriasukmaningtyas
The proper function of the integrated circuit (IC) in an inhibiting electromagnetic environment has always been a serious concern throughout the decades of revolution in the world of electronics, from disjunct devices to today’s integrated circuit technology, where billions of transistors are combined on a single chip. The automotive industry and smart vehicles in particular, are confronting design issues such as being prone to electromagnetic interference (EMI). Electronic control devices calculate incorrect outputs because of EMI and sensors give misleading values which can prove fatal in case of automotives. In this paper, the authors have non exhaustively tried to review research work concerned with the investigation of EMI in ICs and prediction of this EMI using various modelling methodologies and measurement setups.
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMSIJNSA Journal
The smart irrigation system represents an innovative approach to optimize water usage in agricultural and landscaping practices. The integration of cutting-edge technologies, including sensors, actuators, and data analysis, empowers this system to provide accurate monitoring and control of irrigation processes by leveraging real-time environmental conditions. The main objective of a smart irrigation system is to optimize water efficiency, minimize expenses, and foster the adoption of sustainable water management methods. This paper conducts a systematic risk assessment by exploring the key components/assets and their functionalities in the smart irrigation system. The crucial role of sensors in gathering data on soil moisture, weather patterns, and plant well-being is emphasized in this system. These sensors enable intelligent decision-making in irrigation scheduling and water distribution, leading to enhanced water efficiency and sustainable water management practices. Actuators enable automated control of irrigation devices, ensuring precise and targeted water delivery to plants. Additionally, the paper addresses the potential threat and vulnerabilities associated with smart irrigation systems. It discusses limitations of the system, such as power constraints and computational capabilities, and calculates the potential security risks. The paper suggests possible risk treatment methods for effective secure system operation. In conclusion, the paper emphasizes the significant benefits of implementing smart irrigation systems, including improved water conservation, increased crop yield, and reduced environmental impact. Additionally, based on the security analysis conducted, the paper recommends the implementation of countermeasures and security approaches to address vulnerabilities and ensure the integrity and reliability of the system. By incorporating these measures, smart irrigation technology can revolutionize water management practices in agriculture, promoting sustainability, resource efficiency, and safeguarding against potential security threats.
Embedded machine learning-based road conditions and driving behavior monitoringIJECEIAES
Car accident rates have increased in recent years, resulting in losses in human lives, properties, and other financial costs. An embedded machine learning-based system is developed to address this critical issue. The system can monitor road conditions, detect driving patterns, and identify aggressive driving behaviors. The system is based on neural networks trained on a comprehensive dataset of driving events, driving styles, and road conditions. The system effectively detects potential risks and helps mitigate the frequency and impact of accidents. The primary goal is to ensure the safety of drivers and vehicles. Collecting data involved gathering information on three key road events: normal street and normal drive, speed bumps, circular yellow speed bumps, and three aggressive driving actions: sudden start, sudden stop, and sudden entry. The gathered data is processed and analyzed using a machine learning system designed for limited power and memory devices. The developed system resulted in 91.9% accuracy, 93.6% precision, and 92% recall. The achieved inference time on an Arduino Nano 33 BLE Sense with a 32-bit CPU running at 64 MHz is 34 ms and requires 2.6 kB peak RAM and 139.9 kB program flash memory, making it suitable for resource-constrained embedded systems.
Literature Review Basics and Understanding Reference Management.pptxDr Ramhari Poudyal
Three-day training on academic research focuses on analytical tools at United Technical College, supported by the University Grant Commission, Nepal. 24-26 May 2024
Literature Review Basics and Understanding Reference Management.pptx
Ensf energy efficient next-hop selection
1. International Journal of Ambient Systems and Applications (IJASA) Vol.2, No.4, December 2014
DOI:10.5121/ijasa.2014.2403 19
ENSF: ENERGY-EFFICIENT NEXT-HOP SELECTION
METHOD USING FUZZY LOGIC IN PROBABILISTIC
VOTING-BASED FILTERING SCHEME
Jae Kwan Lee1
and Tae Ho Cho2
1, 2
College of Information and Communication Engineering, Sungkyunkwan University,
Suwon 440-746, Republic of Korea
ABSTRACT
Wireless sensor networks (WSNs) are regularly deployed in harsh and unattended environments, and
sensor nodes are easily exposed to attacks due to the random arrangement of the sensor field. An attacker
can inject fabricated reports from a compromised node with false votes and false vote-based reports. The
false report attacks can waste the energy of the intermediate nodes, shortening the network lifetime.
Furthermore, false votes cause the filtering out of legitimate reports. A probabilistic voting-based filtering
scheme (PVFS) was proposed as a countermeasure against this type of attacks by Li and Wu. PVFS uses a
vote threshold, a security threshold, and a verification node. The scheme does not make additional use
energy or communications resources because the verification node and threshold values are fixed. There
needs to be a verification node selection method that considers the energy resources of the node. In this
paper, we propose a verification path election scheme based on a fuzzy logic system. In the proposed
scheme, one node transmits reports in the node with a strong state through a fuzzy logic system after which
a neighbor is selected out of two from the surroundings. Experimental results show that the proposed
scheme improves energy savings up to maximum 13% relative to the PVFS.
KEYWORDS
Wireless Sensor Networks, Fabricated Report, False Votes, Fuzzy Logic System
1. INTRODUCTION
Wireless sensor networks (WSNs) operate in open environments. WSNs have applications in the
fields of home networking, forest management, logistics management, fire monitoring and
healthcare [1]. The sensor nodes of the WSNs collect contextual information of the surroundings,
and the collected data are transmitted to the users [2-4]. The limitations of the sensor nodes are
the limited memory, and energy. Also the sensor nodes can be easily compromised and destroyed
as a result of their distribution in open environment [5-6]. An attacker can inject fabricated
reports and false votes to a network through a compromised node [7-10], and these attacks
deplete the energy and reduce lifetime of the sensor nodes [11].
2. International Journal of Ambient Systems and Applications (IJASA) Vol.2, No.4, December 2014
Figure 1.
Figure 1 shows an attack consisting of a fabricated report and the false votes. Figure 1(a) shows a
compromised node, Figure 1(b) shows false votes attached to a fabricated report and Figure 1(c)
shows a false vote attached to a legiti
compromised node, and the attack unnecessarily consumes the energy of the sensor node on
transmission paths. A false vote attack can inject false votes attached to a legitimate report,
filtering out legitimate reports from the intermediate node. Therefore it is desirable to filter out
these attacks as early as possible to avoid wasting energy in processing and forwarding
illegitimate information.
A probabilistic voting-based filtering scheme (PVFS) w
attacks by Li and Wu [12-13]. The scheme distinguishes among two types of attacks with the help
of the threshold (ܶ ൌ 2). The threshold
false report attack. In the case of
station (BS) and does not drop it. In the case of 2, CH drops the report by countering it as a false
report attack. The original scheme uses the voting threshold (‘1’) and secu
fixed manner, where the decision verification nodes are based on pre
selection verification nodes are fixed, which does not comply with the requirements for a
dynamic network.
In this paper, we propose a new Energy
The proposed scheme randomly selected two neighbor nodes before a report is transmitted. The
selected neighbor nodes transmit their current state [State_Ni (R_ENERGY, HOPS, FTR)] using
a fuzzy logic system. The CH evaluates the fitness value of the two received states and transmits
the report to the neighboring node with a state higher value between the two neighbors.
International Journal of Ambient Systems and Applications (IJASA) Vol.2, No.4, December 2014
Figure 1.Fabricated report and false votes attacks
Figure 1 shows an attack consisting of a fabricated report and the false votes. Figure 1(a) shows a
compromised node, Figure 1(b) shows false votes attached to a fabricated report and Figure 1(c)
shows a false vote attached to a legitimate report. The fabricated report is injected through a
compromised node, and the attack unnecessarily consumes the energy of the sensor node on
transmission paths. A false vote attack can inject false votes attached to a legitimate report,
legitimate reports from the intermediate node. Therefore it is desirable to filter out
these attacks as early as possible to avoid wasting energy in processing and forwarding
based filtering scheme (PVFS) was proposed as a countermeasure for
13]. The scheme distinguishes among two types of attacks with the help
). The threshold ܶ = 1 indicates false vote attack, and ܶ = 2 indicates a
In the case of ܶ = 1, the cluster head (CH) forwards the report to the base
station (BS) and does not drop it. In the case of 2, CH drops the report by countering it as a false
report attack. The original scheme uses the voting threshold (‘1’) and security threshold (‘2’) in a
fixed manner, where the decision verification nodes are based on pre-set path. However, the
selection verification nodes are fixed, which does not comply with the requirements for a
ew Energy-efficient Next-hop Selection using Fuzzy-logic (ENSF).
The proposed scheme randomly selected two neighbor nodes before a report is transmitted. The
selected neighbor nodes transmit their current state [State_Ni (R_ENERGY, HOPS, FTR)] using
y logic system. The CH evaluates the fitness value of the two received states and transmits
the report to the neighboring node with a state higher value between the two neighbors.
International Journal of Ambient Systems and Applications (IJASA) Vol.2, No.4, December 2014
20
Figure 1 shows an attack consisting of a fabricated report and the false votes. Figure 1(a) shows a
compromised node, Figure 1(b) shows false votes attached to a fabricated report and Figure 1(c)
mate report. The fabricated report is injected through a
compromised node, and the attack unnecessarily consumes the energy of the sensor node on
transmission paths. A false vote attack can inject false votes attached to a legitimate report,
legitimate reports from the intermediate node. Therefore it is desirable to filter out
these attacks as early as possible to avoid wasting energy in processing and forwarding
as proposed as a countermeasure for
13]. The scheme distinguishes among two types of attacks with the help
= 2 indicates a
= 1, the cluster head (CH) forwards the report to the base
station (BS) and does not drop it. In the case of 2, CH drops the report by countering it as a false
rity threshold (‘2’) in a
set path. However, the
selection verification nodes are fixed, which does not comply with the requirements for a
logic (ENSF).
The proposed scheme randomly selected two neighbor nodes before a report is transmitted. The
selected neighbor nodes transmit their current state [State_Ni (R_ENERGY, HOPS, FTR)] using
y logic system. The CH evaluates the fitness value of the two received states and transmits
the report to the neighboring node with a state higher value between the two neighbors.
3. International Journal of Ambient Systems and Applications (IJASA) Vol.2, No.4, December 2014
21
The rest of the paper is organized as follows: Section 2, describe several en-route filtering
schemes, specifically PVFS. The design and operation of the proposed scheme is described in
detail in Section 3. In Section 4, the experimental results the analysis of PVFS and ENSF are
presented. The conclusions and future work are given at the end of the paper.
2. BACKGROUND
We review the schemes closely related to our work in Section 2.1, Section 2.2 describes the
background, and the motivation of this paper is presented in Section 2.3.
2.1. Related Works
A statistical en-route filtering scheme (SEF) was proposed to filter out fabricated report injection
attacks [7-8]. SEF verifies a report using a symmetric key and probability in an intermediate
node. If a report fails verification, it is dropped between the intermediate nodes. The interleaved
hop-by-hop authentication scheme (IHA) is a verification or disuse scheme using a pair wise key
during report transmission in the node [6]. Commutative cipher based en-route filtering (CCEF)
uses a commutative cipher to verify the reports with a signature a countermeasure against
fabricated report injection attack [14]. A bandwidth-efficient cooperative authentication scheme
(BECAN) validates report through a private key before they are shared when the source CH
generate the report [15].
These schemes [6-8, 14, 15] have been proposed to reduce unnecessary energy consumption that
results from fabricated report injection attacks. When implemented in WSNs these schemes may
not detect false votes and false report attacks. Therefore, we need an en-route filtering scheme
which can detect both types of attacks at the same time. PVFS was proposed to detect both of
these attacks. However, it is not an energy efficient solution. Our work is closely related to this
last scheme in which we improve detection of the above attacks conserving energy using a fuzzy
logic based system.
4. International Journal of Ambient Systems and Applications (IJASA) Vol.2, No.4, December 2014
2.2. PVFS
PVFS was proposed by Li and Wu as a countermeasure against false votes and fabricated report
attacks [12]. This scheme uses fixed verification
network dynamics (e.g., the residual energy of a node). There are three phase of PVFS: 1) the key
assignment phase, 2) the report generation phase, and 3) the filtering phase. Figure 2 shows the
key assignment phase.
1) Key Assignment Phase
After the sensor nodes are deployed in the sensor field, the global key pool (GKP) of the base
station (BS) generates symmetric keys and stores them in the (GKP). The keys in the GKP are
grouped into partitions and keys from each partition are sent to the CHs. Each node randomly
selects a symmetric key from the respective GKP partition in the cluster
2) Report Generation Phase
International Journal of Ambient Systems and Applications (IJASA) Vol.2, No.4, December 2014
PVFS was proposed by Li and Wu as a countermeasure against false votes and fabricated report
attacks [12]. This scheme uses fixed verification nodes and thresholds which do not cater to the
network dynamics (e.g., the residual energy of a node). There are three phase of PVFS: 1) the key
assignment phase, 2) the report generation phase, and 3) the filtering phase. Figure 2 shows the
Figure 2.Key assignment phase
After the sensor nodes are deployed in the sensor field, the global key pool (GKP) of the base
station (BS) generates symmetric keys and stores them in the (GKP). The keys in the GKP are
grouped into partitions and keys from each partition are sent to the CHs. Each node randomly
selects a symmetric key from the respective GKP partition in the cluster.
Figure 3.Report generation phase
International Journal of Ambient Systems and Applications (IJASA) Vol.2, No.4, December 2014
22
PVFS was proposed by Li and Wu as a countermeasure against false votes and fabricated report
nodes and thresholds which do not cater to the
network dynamics (e.g., the residual energy of a node). There are three phase of PVFS: 1) the key
assignment phase, 2) the report generation phase, and 3) the filtering phase. Figure 2 shows the
After the sensor nodes are deployed in the sensor field, the global key pool (GKP) of the base
station (BS) generates symmetric keys and stores them in the (GKP). The keys in the GKP are
grouped into partitions and keys from each partition are sent to the CHs. Each node randomly
5. International Journal of Ambient Systems and Applications (IJASA) Vol.2, No.4, December 2014
Figure 3 describes the report generation phase. If an event occur in the cluster, CH0 receive votes
of the event from each of the normal nodes. CH0 randomly select five votes and attach them to
generate a report. Furthermore, CH0 selects the verification n
path. CH0 decide verification node based on the equation
distance between CH0 and the base station, and
intermediate CH0 and the base station. In
probability of CH1 to be a verification node is P_1=3/4.
3) En-route Filtering Phase
Figure 4 shows the en-route filtering phase. After a report is generated in
the report to CH1. CH1 verifies the votes in the report by using the symmetric key. If CH1
identifies a false vote, CH1 attach the information on the false vote to the report and CH1 check if
ܶ ൌ 2 has been reached. If the security
to CH2. Since CH2 is not a verification node, it transmits the report to CH3. If CH3 detects
another false vote after the report verification by using the symmetric key, CH3 filters out the
report. The reason for this is that the threshold
2.3. Motivation
WSNs are deployed in an open environment without any physical protection, and an attacker can
inject false votes and fabricated report through a compromised node. PVFS has
a countermeasure against false votes and fabricated report injection attacks. When CH or normal
nodes are compromised, the original scheme cannot reset the path. In the case where symmetric
keys and the path are reset, then the BS has to r
(in those clusters) through the old path. Moreover, a new path has to be created. Such overhead
causes a waste in energy and shortens the lifetime of the network. In this paper, we propose a
verification path election scheme based on a fuzzy logic system in order to improve energy
consumption and improve network lifetime.
International Journal of Ambient Systems and Applications (IJASA) Vol.2, No.4, December 2014
Figure 3 describes the report generation phase. If an event occur in the cluster, CH0 receive votes
of the event from each of the normal nodes. CH0 randomly select five votes and attach them to
generate a report. Furthermore, CH0 selects the verification nodes, based on an already preset
path. CH0 decide verification node based on the equation ݀, ݀ . Where ݀ represents the
distance between CH0 and the base station, and ݀ represents the distance between an
intermediate CH0 and the base station. In the Fig. 3, ݀ = 4 and ݀ = 3 based on CH1, and the
probability of CH1 to be a verification node is P_1=3/4.
Figure 4.En-route filtering phase
route filtering phase. After a report is generated in phase 2, CH0 transmits
the report to CH1. CH1 verifies the votes in the report by using the symmetric key. If CH1
identifies a false vote, CH1 attach the information on the false vote to the report and CH1 check if
has been reached. If the security threshold has not been reached, CH1 transmits the report
to CH2. Since CH2 is not a verification node, it transmits the report to CH3. If CH3 detects
another false vote after the report verification by using the symmetric key, CH3 filters out the
he reason for this is that the threshold ܶ ൌ 2 has been reached.
WSNs are deployed in an open environment without any physical protection, and an attacker can
inject false votes and fabricated report through a compromised node. PVFS has been proposed as
a countermeasure against false votes and fabricated report injection attacks. When CH or normal
nodes are compromised, the original scheme cannot reset the path. In the case where symmetric
keys and the path are reset, then the BS has to redistribute symmetric keys on all CHs and nodes
(in those clusters) through the old path. Moreover, a new path has to be created. Such overhead
causes a waste in energy and shortens the lifetime of the network. In this paper, we propose a
election scheme based on a fuzzy logic system in order to improve energy
consumption and improve network lifetime.
International Journal of Ambient Systems and Applications (IJASA) Vol.2, No.4, December 2014
23
Figure 3 describes the report generation phase. If an event occur in the cluster, CH0 receive votes
of the event from each of the normal nodes. CH0 randomly select five votes and attach them to
odes, based on an already preset
represents the
represents the distance between an
= 3 based on CH1, and the
phase 2, CH0 transmits
the report to CH1. CH1 verifies the votes in the report by using the symmetric key. If CH1
identifies a false vote, CH1 attach the information on the false vote to the report and CH1 check if
threshold has not been reached, CH1 transmits the report
to CH2. Since CH2 is not a verification node, it transmits the report to CH3. If CH3 detects
another false vote after the report verification by using the symmetric key, CH3 filters out the
WSNs are deployed in an open environment without any physical protection, and an attacker can
been proposed as
a countermeasure against false votes and fabricated report injection attacks. When CH or normal
nodes are compromised, the original scheme cannot reset the path. In the case where symmetric
edistribute symmetric keys on all CHs and nodes
(in those clusters) through the old path. Moreover, a new path has to be created. Such overhead
causes a waste in energy and shortens the lifetime of the network. In this paper, we propose a
election scheme based on a fuzzy logic system in order to improve energy
6. International Journal of Ambient Systems and Applications (IJASA) Vol.2, No.4, December 2014
3. PROPOSED SCHEME
In this section, we describe the assumptions of the proposed scheme, the working procedure, the
fuzzy logic system, and the proposed verification path election scheme in Subsections 3.1 to 3.4.
The scheme and fuzzy logic system are presented in 3.4.
3.1. Assumptions
The sensor nodes of the sensor field are grouped into clusters [3]. The sensor nodes are
distributed uniformly in the sensor field grid, and it is further assumed that, sensor nodes are
static. Each node is assumed to be a Mica2 mote [16], with memory of
Each sensor node is aware of its unique ID, location, energy level and the number of hops to the
BS. Each CH manages the routing table of the neighbor nodes within its transmission range. The
BS is assumed to have unlimited resour
manage the GKP. Finally, we assume that the sensor nodes are prone to false votes and fabricated
report attacks.
3.2. Operation Procedure
The sensor nodes receive a unique ID from the user before deplo
can connect to the CH unit through the BS using the internet. Each cluster receives the symmetric
key partition from the BS. When an event occurs in one of the clusters, the CH generates a report,
and the generated report is sent to the next neighbor node based on the verification path election
scheme for verification. The verification path election scheme randomly select one of two of the
neighbor nodes as a source CH. Neighbor nodes transmit the state of their fitness val
a fuzzy logic system to the source CH, and the CH transmits the report to the neighbor node with
high fitness. This neighbor node is used as a verification node to verify the votes on the report
through a symmetric key in the report
3.3. Fuzzy Logic System
Figure
International Journal of Ambient Systems and Applications (IJASA) Vol.2, No.4, December 2014
In this section, we describe the assumptions of the proposed scheme, the working procedure, the
and the proposed verification path election scheme in Subsections 3.1 to 3.4.
The scheme and fuzzy logic system are presented in 3.4.
The sensor nodes of the sensor field are grouped into clusters [3]. The sensor nodes are
distributed uniformly in the sensor field grid, and it is further assumed that, sensor nodes are
static. Each node is assumed to be a Mica2 mote [16], with memory of 512 and energy of
Each sensor node is aware of its unique ID, location, energy level and the number of hops to the
BS. Each CH manages the routing table of the neighbor nodes within its transmission range. The
BS is assumed to have unlimited resources and the CH also has enough energy to receive and
manage the GKP. Finally, we assume that the sensor nodes are prone to false votes and fabricated
The sensor nodes receive a unique ID from the user before deployment in the sensor field. A user
can connect to the CH unit through the BS using the internet. Each cluster receives the symmetric
key partition from the BS. When an event occurs in one of the clusters, the CH generates a report,
is sent to the next neighbor node based on the verification path election
scheme for verification. The verification path election scheme randomly select one of two of the
neighbor nodes as a source CH. Neighbor nodes transmit the state of their fitness val
a fuzzy logic system to the source CH, and the CH transmits the report to the neighbor node with
high fitness. This neighbor node is used as a verification node to verify the votes on the report
through a symmetric key in the report.
Figure 5.Fuzzy logic system process
International Journal of Ambient Systems and Applications (IJASA) Vol.2, No.4, December 2014
24
In this section, we describe the assumptions of the proposed scheme, the working procedure, the
and the proposed verification path election scheme in Subsections 3.1 to 3.4.
The sensor nodes of the sensor field are grouped into clusters [3]. The sensor nodes are
distributed uniformly in the sensor field grid, and it is further assumed that, sensor nodes are
and energy of 3.
Each sensor node is aware of its unique ID, location, energy level and the number of hops to the
BS. Each CH manages the routing table of the neighbor nodes within its transmission range. The
ces and the CH also has enough energy to receive and
manage the GKP. Finally, we assume that the sensor nodes are prone to false votes and fabricated
yment in the sensor field. A user
can connect to the CH unit through the BS using the internet. Each cluster receives the symmetric
key partition from the BS. When an event occurs in one of the clusters, the CH generates a report,
is sent to the next neighbor node based on the verification path election
scheme for verification. The verification path election scheme randomly select one of two of the
neighbor nodes as a source CH. Neighbor nodes transmit the state of their fitness values based on
a fuzzy logic system to the source CH, and the CH transmits the report to the neighbor node with
high fitness. This neighbor node is used as a verification node to verify the votes on the report
7. International Journal of Ambient Systems and Applications (IJASA) Vol.2, No.4, December 2014
25
Figure 5 shows the operating process of the fuzzy logic system. In the figure, when CH0 selects
the verification path to report the transmission, which is selected as the nodes with high fitness in
the neighboring area, the inference of the fuzzy logic system is the min-max centroid of the
mamdani, and defuzzification uses the centroid technique. Input factors are the residual energy,
hops, and ratio of fabricated reports.
• Input factors
1) Residual Energy = {LOW, HALF, HIGH}
2) Hops = {SHORT, AVERAGE, LONG}
3) Ratio of Fabricated Report = {VERY_LOW, LOW, MEDIUM, HIGH, VERY_HIGH}
1) Residual Energy
The sensor node needs to have efficiency when using the scheme due to the limited energy
available. WSN protocols consider the energy of the sensor nodes. The original scheme could
shorten the network lifetime as well as the unnecessarily high energy consumption of the nodes
because of the fixed threshold verification node. Therefore, the residual energy of the node is very
important information for the fuzzy logic system when verifying node selection.
2) Hops
The number of hops is count of the number of connections of the path from the position of sensor
node until the BS. This path causes energy consumption at the nodes depending on the ratio of
fabricated reports. For example, if there is a case of a legitimate report, intermediate nodes use
resources efficiently, shortening the distance to the BS. Otherwise, sensor nodes use energy
unnecessarily due to the long intermediate distance to the BS.
3) Ratio of Fabricated Report
The ratio of the fabricated reports represents the strength of the attack in the WSN. In a WSN
environment, if there is a high ratio of fabricated reports, sensor nodes are able to save energy of
the sensor nodes as a result of the probabilistic verification of the intermediate node. Otherwise, if
the ratio of the fabricated report is low, the sensor nodes consume energy unnecessarily because
of probabilistic verification of the intermediate node to low since the intermediate node verifies
for duplication in the report. Finally, a probabilistic verification of the intermediate node is
different according to ratio of the fabricated reports.
8. International Journal of Ambient Systems and Applications (IJASA) Vol.2, No.4, December 2014
• Fuzzy Membership Functions
Figure 6.Membership functions of the input and out parameters.
Rule
No. ENG
0 L
1 L
2 L
3 H
4 H
ㆍㆍㆍ ㆍㆍㆍ
26 U
3.4. Proposed Verification Path Election
After the report generation phase,
on their own. ܪܥattaches votes to the report and
nodes (ܰଵ, ܰଶ) to verify the votes of the repo
ܪܥ transmits the reports to the node with high fitness in the neighboring nodes (
verification path election algorithm is as follows:
International Journal of Ambient Systems and Applications (IJASA) Vol.2, No.4, December 2014
Fuzzy Membership Functions
Membership functions of the input and out parameters.
Table 1.Fuzzy if-then rules.
Input Output
ENG HOP FTR FV
L S F VL
L S M L
L S M L
H M F M
H L L H
ㆍㆍㆍ ㆍㆍㆍ ㆍㆍㆍ ㆍㆍㆍ
U S F L
Proposed Verification Path Election Scheme
After the report generation phase, ܪܥ receives votes from the normal nodes that are connected
attaches votes to the report and ܪܥ transmits the message to the neighboring
) to verify the votes of the report. ܰଵandܰଶ transmits their own fitness values to
transmits the reports to the node with high fitness in the neighboring nodes (ܰ
verification path election algorithm is as follows:
International Journal of Ambient Systems and Applications (IJASA) Vol.2, No.4, December 2014
26
Output
ㆍㆍㆍ
receives votes from the normal nodes that are connected
transmits the message to the neighboring
transmits their own fitness values to
ܰଵ, ܰଶ). The
9. International Journal of Ambient Systems and Applications (IJASA) Vol.2, No.4, December 2014
Cluster Head ܪܥ
Neighbor Node ܰଵ, ܰଶ;
ܪܥreceives votes of normal nodes; // normal nodes transmit the vote.
ܪܥfindsneighbor normal nodes; // The neighbor node are CHs.
IF neighbor nodes are NOT NULL AND
fitness (ܰଵ) > fitness (ܰଶ) THEN
Send R to ܰଵ;
ܰଵ migrates to new ܰ;
IF fitness (ܰଶ) > fitness (ܰ
Send R to ܰଶ;
ܰଶ migrates to new ܰ;
In the Table 2, ܰଵ and ܰଶ are selected randomly by
ܪܥ. Finally, ܰ selects the next neighbor nodes
Figure
Figure 7 shows the process of verification of the path election. The original scheme attempts
verification node selection based on a pre
are fixed. Therefore, this scheme needs a solution due the effec
WSNs. In this paper, the proposed scheme fluidly selects the next verification path to use energy
efficiently. In the figure, the source CH randomly selects a neighbor node out of two for report
verification. They transmit their own fitness based on a fuzzy logic system to the source CH. CH
transmits the report to the node with high fitness. The node verifies the votes through a symmetric
key on the report after the report is received. The proposed scheme decreases energy use a
operation overhead through the fuzzy logic system. However, in a WSN environment, if there are
International Journal of Ambient Systems and Applications (IJASA) Vol.2, No.4, December 2014
votes of normal nodes; // normal nodes transmit the vote.
neighbor normal nodes; // The neighbor node are CHs.
IF neighbor nodes are NOT NULL AND
) THEN
ଵ) THEN
are selected randomly by ܪܥ, R is the generated report generated by
selects the next neighbor nodes when ܶ ൌ 2 has been not reached.
Figure 7.Process of verification path election.
Figure 7 shows the process of verification of the path election. The original scheme attempts
verification node selection based on a pre-set path, which uses energy unnecessarily because they
are fixed. Therefore, this scheme needs a solution due the effects on the network lifetime of
WSNs. In this paper, the proposed scheme fluidly selects the next verification path to use energy
efficiently. In the figure, the source CH randomly selects a neighbor node out of two for report
ir own fitness based on a fuzzy logic system to the source CH. CH
transmits the report to the node with high fitness. The node verifies the votes through a symmetric
key on the report after the report is received. The proposed scheme decreases energy use a
operation overhead through the fuzzy logic system. However, in a WSN environment, if there are
International Journal of Ambient Systems and Applications (IJASA) Vol.2, No.4, December 2014
27
, R is the generated report generated by
.
Figure 7 shows the process of verification of the path election. The original scheme attempts
set path, which uses energy unnecessarily because they
ts on the network lifetime of
WSNs. In this paper, the proposed scheme fluidly selects the next verification path to use energy
efficiently. In the figure, the source CH randomly selects a neighbor node out of two for report
ir own fitness based on a fuzzy logic system to the source CH. CH
transmits the report to the node with high fitness. The node verifies the votes through a symmetric
key on the report after the report is received. The proposed scheme decreases energy use and
operation overhead through the fuzzy logic system. However, in a WSN environment, if there are
10. International Journal of Ambient Systems and Applications (IJASA) Vol.2, No.4, December 2014
many legitimate reports, the sensor nodes will have operational overhead. In the experiment, the
ENSF scheme efficiently used the energy of the sensor nodes
4. EXPERIMENTAL RESULTS
In order to validate the effectiveness of the proposed scheme, we compared it against PVFS via a
simulation. We assume that the sensor field size is of 1500
uniformly distributed. The base station is located at the end of
consumes 16.25/12.5 µJ to transmit/receive a data byte, and each MAC generation consumes 15
µJ [8]. The size of a legitimate report is
consists of ten nodes, and each node can store a symmetric key. We have prepared five graphs
that show a comparison between the proposed scheme and PVFS when implemented in WSNs.
Figure 8 shows the energy consumption with respect to the ratio of attacks. Figure 9 shows the
energy distinction, and Figure 10 shows the ratio of false votes with respect to the ratio of attacks,
Figure 11 is the ratio of filtering, and Figure 12 shows the network life time.
Figure 8 compares the energy efficiency of ENSF to that of PVFS. The proposed scheme shows a
steady and significant energy savings for different FTRs. The reason is that proposed scheme uses
a new verification path election scheme which considers the residual energy of a node before
selecting it as the verification node. On the other hand, in the original scheme, unnecessary
energy is wasted with fixed paths and verification nodes. The proposed scheme can save energy
when subjected to false traffic. Therefore, ENSF scheme consume about 7 percent less energy
than original scheme.
International Journal of Ambient Systems and Applications (IJASA) Vol.2, No.4, December 2014
many legitimate reports, the sensor nodes will have operational overhead. In the experiment, the
ENSF scheme efficiently used the energy of the sensor nodes.
ESULTS
In order to validate the effectiveness of the proposed scheme, we compared it against PVFS via a
simulation. We assume that the sensor field size is of 1500 Ⅹ2000 ݉ଶ
, where 6,000 nodes are
uniformly distributed. The base station is located at the end of the field, and each sensor node
J to transmit/receive a data byte, and each MAC generation consumes 15
J [8]. The size of a legitimate report is 40 bytes and, the size of a MAC is 1byte. Each cluster
consists of ten nodes, and each node can store a symmetric key. We have prepared five graphs
that show a comparison between the proposed scheme and PVFS when implemented in WSNs.
rgy consumption with respect to the ratio of attacks. Figure 9 shows the
energy distinction, and Figure 10 shows the ratio of false votes with respect to the ratio of attacks,
Figure 11 is the ratio of filtering, and Figure 12 shows the network life time.
Figure 8.Energy consumption.
Figure 8 compares the energy efficiency of ENSF to that of PVFS. The proposed scheme shows a
steady and significant energy savings for different FTRs. The reason is that proposed scheme uses
n scheme which considers the residual energy of a node before
selecting it as the verification node. On the other hand, in the original scheme, unnecessary
energy is wasted with fixed paths and verification nodes. The proposed scheme can save energy
ubjected to false traffic. Therefore, ENSF scheme consume about 7 percent less energy
International Journal of Ambient Systems and Applications (IJASA) Vol.2, No.4, December 2014
28
many legitimate reports, the sensor nodes will have operational overhead. In the experiment, the
In order to validate the effectiveness of the proposed scheme, we compared it against PVFS via a
, where 6,000 nodes are
the field, and each sensor node
J to transmit/receive a data byte, and each MAC generation consumes 15
40 bytes and, the size of a MAC is 1byte. Each cluster
consists of ten nodes, and each node can store a symmetric key. We have prepared five graphs
that show a comparison between the proposed scheme and PVFS when implemented in WSNs.
rgy consumption with respect to the ratio of attacks. Figure 9 shows the
energy distinction, and Figure 10 shows the ratio of false votes with respect to the ratio of attacks,
Figure 8 compares the energy efficiency of ENSF to that of PVFS. The proposed scheme shows a
steady and significant energy savings for different FTRs. The reason is that proposed scheme uses
n scheme which considers the residual energy of a node before
selecting it as the verification node. On the other hand, in the original scheme, unnecessary
energy is wasted with fixed paths and verification nodes. The proposed scheme can save energy
ubjected to false traffic. Therefore, ENSF scheme consume about 7 percent less energy
11. International Journal of Ambient Systems and Applications (IJASA) Vol.2, No.4, December 2014
Figure 9.Percentage of energy saving by ENSF over PVFS.
Figure 9 shows the ratio of energy according to the ratio of attacks. In the figure, the
scheme improves energy savings up to 13% when we have an experiment between 10 and 60
percent false traffic. The reason is that the proposed scheme minimized traffic (operation,
transmission, path distance).
Figure 10 shows the ratio of the false vote detection of the proposed scheme and the original
scheme. In the figure, the proposed scheme has a high ratio of false vote detection relative to the
original scheme when the ratio of attacks is 30, 40, and 60 pe
International Journal of Ambient Systems and Applications (IJASA) Vol.2, No.4, December 2014
Percentage of energy saving by ENSF over PVFS.
Figure 9 shows the ratio of energy according to the ratio of attacks. In the figure, the
scheme improves energy savings up to 13% when we have an experiment between 10 and 60
percent false traffic. The reason is that the proposed scheme minimized traffic (operation,
Figure 10.Numbers of false vote.
Figure 10 shows the ratio of the false vote detection of the proposed scheme and the original
scheme. In the figure, the proposed scheme has a high ratio of false vote detection relative to the
original scheme when the ratio of attacks is 30, 40, and 60 percent.
International Journal of Ambient Systems and Applications (IJASA) Vol.2, No.4, December 2014
29
Figure 9 shows the ratio of energy according to the ratio of attacks. In the figure, the proposed
scheme improves energy savings up to 13% when we have an experiment between 10 and 60
percent false traffic. The reason is that the proposed scheme minimized traffic (operation,
Figure 10 shows the ratio of the false vote detection of the proposed scheme and the original
scheme. In the figure, the proposed scheme has a high ratio of false vote detection relative to the
12. International Journal of Ambient Systems and Applications (IJASA) Vol.2, No.4, December 2014
Figure 11 shows the filtering number with respect to each hop. In the figure, the proposed scheme
has many filter numbers relative to the original scheme in 5, 9, and 10 of the hops. On average,
the proposed scheme had a low ratio of filtering of the fabricated reports than did the original
scheme, and the energy consumption of the sensors was improved.
Fig. 12 shows the network lifetime of the ENSF and the PVFS. In the
network lifetime is measurement according to the ratio of the attack. The numbers of events for
each is 50. The lifetime of PVFS is 9 rounds and the lifetime of the ENSF is 12 rounds. In the
figure 12, network is disconnected in the P
the ENSF extends to network lifetime compared to the PVFS
International Journal of Ambient Systems and Applications (IJASA) Vol.2, No.4, December 2014
Figure 11.Average of false reports.
Figure 11 shows the filtering number with respect to each hop. In the figure, the proposed scheme
has many filter numbers relative to the original scheme in 5, 9, and 10 of the hops. On average,
cheme had a low ratio of filtering of the fabricated reports than did the original
scheme, and the energy consumption of the sensors was improved.
Figure 12.Network lifetime.
Fig. 12 shows the network lifetime of the ENSF and the PVFS. In the experiments, when the
network lifetime is measurement according to the ratio of the attack. The numbers of events for
each is 50. The lifetime of PVFS is 9 rounds and the lifetime of the ENSF is 12 rounds. In the
figure 12, network is disconnected in the PVFS more quickly compare to the ENSF. Therefore,
the ENSF extends to network lifetime compared to the PVFS.
International Journal of Ambient Systems and Applications (IJASA) Vol.2, No.4, December 2014
30
Figure 11 shows the filtering number with respect to each hop. In the figure, the proposed scheme
has many filter numbers relative to the original scheme in 5, 9, and 10 of the hops. On average,
cheme had a low ratio of filtering of the fabricated reports than did the original
experiments, when the
network lifetime is measurement according to the ratio of the attack. The numbers of events for
each is 50. The lifetime of PVFS is 9 rounds and the lifetime of the ENSF is 12 rounds. In the
VFS more quickly compare to the ENSF. Therefore,
13. International Journal of Ambient Systems and Applications (IJASA) Vol.2, No.4, December 2014
31
5. CONCLUSION AND FUTURE WORK
PVFS was proposed by Li and Wu as a countermeasure against fabricated reports and false vote
attacks in WSNs. This scheme uses a security threshold to detect attacks about false report and
false vote. The scheme consumes the energy of the sensor nodes because it has a fixed threshold
and verification node. In this paper, we propose a verification path election scheme based on a
fuzzy logic system to efficiently use the energy of the nodes. The scheme compares the state of
neighboring nodes for the report transmission. The input for the neighbor node selection is the
energy, the number of hops, and the ratio of the fabricated report. The proposed scheme considers
the state of the next node when the intermediate node transmits the report to the next node.
Therefore, the proposed scheme can decrease the ratio of the sensor node and the overhead of the
communications because of the selection of the next node is more efficient than that in the
original scheme. In the experiment, the proposed scheme improves energy consumption on
average by 7 percent and a maximum of 13 percent. For future work, some AI algorithms will be
applied in order to find future optimal solutions and security.
ACKNOWLEDGEMENTS
This research was supported by the Basic Science Research Program through the National
Research Foundation of Korea (NRF) funded by the Ministry of Education, Science and
Technology (No. 2013R1A2A2A01013971).
REFERENCES
[1] K. C and W. D, "Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures,"
Elsevier's Ad Hoc Networks Journal, Special Issue on Sensor Network Protocols and Applications,
vol. 1, pp. 293-315, 2003.
[2] I. F. Akyildiz, W. Su, Y. Sankarasubramaniam and E. Cayirci, "A Survey on Sensor Networks," IEEE
Comm. Mag, vol. 40, pp. 102-114, Aug, 2002.
[3] J. N. Al-Karaki Kamal, "Routing techniques in wireless sensor networks: a survey," Wireless
Communications11, 2004.
[4] B. P, D. S and A. P, "SIA: Secure Information Aggregation in Sensor Network*," ACM, pp. 255-265,
2003.
[5] W. Zhang and G. Cao, "Group Rekeying for Filtering False Data in Sensor Network: A
predistribution and Local Collaboration-based Approach," Proc. of INFOCOM, pp. 503-514, 2005.
[6] S. S, J. S and P. N, "An interleaved hop-by-hop authentication scheme for filtering of injected false
data in sensor networks," IEEE, pp. 259-271, May, 2004.
[7] F. Ye, H. Luo, S. Lu and L. Z, "Statistical En-Route Filtering of Injected False Data in Sensor
Networks," IEEE, vol. 4, pp. 2446-2457, Mar, 2004.
[8] F. Ye, H. Luo, S. Lu and L. Zhang, "Statistical En-Route Filtering of Injected False Data in Sensor
Networks," IEEE J. Sel. Area Comm, vol. 23, pp. 839-850, 2005, April, 2005.
[9] J. Zhang and V. Varadharajan, "Wireless sensor network key management survey and taxonomy,"
Journal of Network and Computer Applications, vol. 33, pp. 63-75, 3, 2010.
[10] C. Karlof, N. Sastry and D. Wagner, "TinySec: a link layer security architecture for wireless sensor
networks," ACM, pp. 162-175, 2004.
[11] J. H. Chang, "Maximum Lifetime Routing in Wireless Sensor Networks," IEEE, vol. 12, pp. 609-619,
Aug, 2004.
[12] F. Li and J. Wu, "A Probabilistic voting-based Filtering scheme in wireless sensor networks," Proc.
IWCMC, pp. 27-32, July, 2006.
[13] F. Li and J. Wu, "PVFS: A Probabilistic Voting-based Filtering Scheme in Wireless Sensor
Networks," Inderscience Enterprises Ltd, pp. 173-182, Aug, 2008.
[14] H. Y and S. Lu, "Commutative Cipher Based En-route Filtering in Wireless Sensor Networks," IEEE,
pp. 1223-1227, Sept, 2004.
14. International Journal of Ambient Systems and Applications (IJASA) Vol.2, No.4, December 2014
32
[15] R. Lu, X. Lin, H. Zhu and X. Li, "BECAN: A Bandwidth-Efficient Cooperative Authentication
Scheme for Filtering Injected False Data in Wireless Sensor Networks," IEEE TRANSACTIONS ON
PARALLEL AND DISTRIBUTED SYSTEMS, vol. 23, pp. 32-43, Jan, 2012.
[16] M. H, M. J.Lyons, D. B and G. Wei, "Survey of Hardware Systems for Wireless Sensor Networks,"
American Scientific Publishers, vol. 4, pp. 1-10, 2008.
Authors
Jae Kwan Lee received his B.S. degrees in computer information from BaekSeok University,
Korea, in February 2013 He is currently a graduate student in the College of Information and
communication Engineering at Sungkyunkwan University, Korea. HiS research interests
include wireless sensor network security, intelligent system and modelling & simulation.
Tae Ho Cho received the Ph.D. degree in Electrical and Computer Engineering from the
University of Arizona, USA, in 1993, and the B.S. and M.S. degrees in Electrical Engineering
from Sungkyunkwan University, Republic of Korea, and the University of Alabama, USA,
respectively. He is currently a Professor in the College of Information and Communication
Engineering, SungkyunkwanUniversity, Korea. His research interests are in the areas of wireless sensor
network, intelligent systems, modeling& simulation, and enterprise resource planning.