Abstract

Security in sensor networks is a major issue. Sensor networks use symmetric cryptography protocol since sensor nodes have resource constrained hardware. Such netowrks are also deployed in hostile environments. Therefore, an attacker can get all information after any nodes get compromised. The adversary can inject false sensing reports or false Message Authentication Codes into real reports. A probabilistic voting-based filtering scheme is proposed but in several cases it is inefficient in terms of energy consumption and filtering effectiveness. We proposed a new method that uses a decision function regardless of whether each forwarding node executes a verification process. Through performance analysis and simulation, our result shows that the proposed method is much more efficient than the probabilistic voting-based scheme in many cases.

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.