Abstract

Wireless sensor networks are supplied with limited energy resources and are usually installed in unattended and unfriendly environments. These networks are also highly exposed to security attacks aimed at draining the energy of the network to render it unresponsive. Adversaries launch counterfeit report injection attacks and false vote injection attacks through compromised sensor nodes. Several filtering solutions have been suggested for detecting and filtering false reports during the multi-hop forwarding process. However, almost all such schemes presuppose a conventional underlying protocol for data routing that do not consider the attack status or energy dissipation on the route. Each design provides approximately the equivalent resilience in terms of protection against compromised node. However, the energy consumption characteristics of each design differ. We propose a fuzzy adaptive path selection to save energy and avoid the emergence of favored paths. Fresh authentication keys are generated periodically, and these are shared with the filtering nodes to restrict compromised intermediate filtering nodes from the verification process. The scheme helps delay the emergence of hotspot problems near the base station and exhibits improved energy conserving behavior in wireless sensor networks. The proposed scheme provides an extended network lifetime and better false data filtering capacity.

Highlights

  • Wireless sensor networks (WSNs) represent a sustainable solution for continuous observation of arbitrary events in the physical sphere and consist of resource-constrained nodes installed in a range of hostile environments [1,2,3,4]

  • In [11], we proposed the Fuzzy Adaptive Selection of Intermediate verification Nodes, which adaptively selects verification nodes based on the attack situation, the energy levels and the distance of the nodes

  • We investigate the energy efficiency problem in WSNs from an entirely different perspective wherein the security against the previously mentioned attacks, the filtering strength of the available intermediate routes are considered while developing a heuristic based solution for path selection that provides the maximum security against the False VoteInjection Attack (FVIA) and FRIA attacks at the same time

Read more

Summary

Introduction

Wireless sensor networks (WSNs) represent a sustainable solution for continuous observation of arbitrary events in the physical sphere and consist of resource-constrained nodes installed in a range of hostile environments [1,2,3,4]. These security techniques prevent forwarding of reports of non-existent events in the cluster and filter false reports during the forwarding process These methods inadvertently make it easier for adversaries to launch FVIA, and all the reports with a single false vote/MAC attached to them are dropped en-route if SEF, DEF, IHA, KIF, or LBRS are used. Cluster head communication facilitates energy efficient and safe routing of data in WSNs. A cluster based trust-aware routing protocol allows cluster member nodes to forward reports through the trusted CHs towards the BS [26]. We propose a fuzzy rule-based route selection coupled FASIN that uses dynamic authentication key dissemination technique to achieve earlier detection of fabricated reports during the filtering process and enhance the energy efficiency of the filtering-based WSNs. The proposed method considers the following three important factors in the sensor network for selecting the fittest routing path: 2.

Background and Rationale
Rationale
False Data Injection and False MAC Injection
Network Portioning Due to Constant Use of Minimum Cost Forwarding Paths
Load Balancing
Fuzzy-Based Selection of Data Forwarding Path
Dynamic Authentication Key Sharing with the Verification Nodes
System Model and Assumptions
Threat Model
Dynamic Authentication Key Sharing
Fuzzy Adaptive Selection of Data Forwarding Routes
En-Route Filtering
Input and Output Variables
Fuzzy Membership Function
Fitness Evaluation and Path Selection
Symmetry
Simulation Results
Filtering
Fabricated
Related Work
Conclusions
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.