Abstract

ENSP: Energy Efficient Next Hop Selection in A Probabilistic Voting-Based Filtering Scheme Using Fuzzy Logic

Highlights

  • Wireless sensor networks (WSNs) have a large number of sensor nodes to detect events, and base stations (BSs) to collect the sensing data in sensor fields [1,2,3,4]

  • A WSN is vulnerable to attacks such as false report and vote injection attacks

  • The original method filters out the fabricated votes through keys in the verification nodes selected based on their distance

Read more

Summary

Introduction

Wireless sensor networks (WSNs) have a large number of sensor nodes to detect events, and base stations (BSs) to collect the sensing data in sensor fields [1,2,3,4]. When a real event occurs, the node detects it and produces a report to cause its BS to notice it. The nodes are suitable for a random distribution in an open environment, they are compromised due to their hardware resource restrictions. They are exposed to various malicious attacks due to environmental constraints. PVFS Li et al proposed a PVFS to detect false report injection attacks and false vote injection attacks. The PVFS consists of three phases: key assignment, report generation, and en-route filtering. In the report generation phase, a node produces a report with the votes as an event occurs. In the en-route filtering phase, selected verification nodes detect false votes generated by compromised nodes

Methods
Results
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.