Abstract

Sensor networks include numerous sensor nodes that are vulnerable to physical attacks from the outside because they operate in open environments. The sensor nodes are compromised by an attacker. The compromised nodes generate false reports and inject the reports into sensor networks. The false report injection attacks deplete energy of the sensor nodes. Ye et al. proposed Statistical En-Route Filtering (SEF) to defend sensor nodes against the false report injection attacks. In SEF, sensor nodes verify the event reports based on a fixed probability. Thus, the verification energy of a node is the same whether the report is false or valid. But when there are few false reports, energy for verifying legitimate reports may be wasted. In this paper, we propose a method in which each node controls a probability of attempts at verification of an event report to reduce the wasted energy. The probability is determined through consideration of the number of neighboring nodes, the number of hops from the node to the sink node, and the rate of false reports among the 10 most recent event reports forwarded to a node. We simulated our proposed method to prove its energy efficiency. After the simulation, we confirmed that the proposed method is more efficient than SEF for saving sensor node’s energy.

Highlights

  • Recent Developments in micro-electro-mechanical systems (MEMS) technology and advances in wireless communications have enabled the growth of sensor networks [1]

  • Sensor networks, which are used in open environments, are vulnerable to physical attacks from the outside

  • A false report injection attack is a physical attack in which a node compromised by an attacker forwards many false reports that are not based on real events

Read more

Summary

Introduction

Recent Developments in micro-electro-mechanical systems (MEMS) technology and advances in wireless communications have enabled the growth of sensor networks [1]. The sensor nodes are vulnerable to physical attacks which compromise their cryptographic keys [1] One such attack is false report injection attack. A false report injection attack can result in a reduction of the already limited energy of sensor nodes in a battery powered network and false alarms [3,4,5,6]. To minimize such damages, false reports have to be dropped en-route as soon as possible, while few eluded false reports have to be rejected at the sink node [4].

Key Assignment
Report Generation
En-Route Filtering
Sink Verification
Motivation
Assumption
Operation
Simulation
Findings
Conclusions
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.