Abstract

In applications of wireless sensor networks, there are many security issues. Attackers can create false reports and transmit the reports to the networks. These false reports can lead not only false alarms, but also the depletion of limited energy resources. In order to filter out such false reports during the forwarding process, Ye et al. proposed the statistical en-route filtering (SEF). Several research efforts to enhance the efficiency of SEF have been made. Especially, the path selection method proposed by Sun et al. can improve the detection power of SEF by considering the information on the filtering keys of and distances of upstream paths. However, such selection mechanism could lead to favored paths in heavy traffic, which would result in unbalanced energy consumption. In this paper, we propose a path renewal method to provide load balancing for sensor networks in terms of energy consumption. In our method, a node renews its upstream path to save energy resources if the remaining energy of and the communication traffic of the node exceed some threshold values. We show the effectiveness of the proposed method in terms of balanced energy consumption and filtering power by providing simulation results.

Highlights

  • Recent advances in wireless communications and electronics have enabled the development of low-cost, low-power and multi-functional sensors that are small in size and communicate over short distances [1]

  • They are vulnerable to false data injection attacks [9] in which an adversary inject false sensing reports into the network, through compromised nodes, with the goal of deceiving the base station or draining the constrained energy of the nodes [10]

  • We propose a path renewal method (PRM) to prolong a network lifetime

Read more

Summary

Introduction

Recent advances in wireless communications and electronics have enabled the development of low-cost, low-power and multi-functional sensors that are small in size and communicate over short distances [1]. They are vulnerable to false data injection attacks [9] in which an adversary inject false sensing reports into the network, through compromised nodes, with the goal of deceiving the base station or draining the constrained energy of the nodes [10]. In order to evaluate the path, each sensor node inserts additional information about filtering keys into a control message Such path selection based on the security power would make the most secure paths undergo heavy traffic so that the nodes along the paths would consume more energy resources.

Related Works and Motivations
Motivations
Network Model
Path Renewal Method
Evaluation Function
Simulation Results
Conclusion and Future Work
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.