Abstract
In wireless sensor network, statistical en-route filtering (SEF) schemes can detect and eliminate false data injection attacks. However, SEF does not deal with the detection of the compromised nodes which are injecting false reports. In our previous studies, we have proposed an immunity-based SEF (ImSEF) to identify compromised nodes and achieve earlier detection of false reports. In ImSEF, each node assigns credibility to its neighboring nodes and updates the credibility based on the success or failure of filtering and communication. And then each node can use the updated credibility as the probability of the next communication. Preliminary simulation results against only one compromised node showed that ImSEF outperformed the original SEF. However, we have not yet analyzed the performance of ImSEF in detail. In this paper, we examine various attack scenarios and parameters settings for ImSEF. By the parameters analyses, some phase transitions can be interestingly observed. We also analyze and reconfirm the performance of ImSEF mathematically.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.