Abstract

A wireless sensor network (WSN) consists of multiple sensor nodes and base stations that collect information from widely deployed sensors. However, the disadvantage is that WSNs are randomly distributed in an open environment, which makes them difficult to manage individually and more easily found and compromised by an attacker. An attacker can execute a false report insertion or invalid vote insertion attack through a compromised node. The Probabilistic Voting Filtering System (PVFS) is a system that prevents these two types of attacks. Before sending a report, the proposed method probabilistically selects a validation node, determines the validity of the report, and filters the report based on the thresholds that have been set. In this paper, the proposed scheme improves the lifetime, detection rate, and report delivery rate of the entire network by increasing the lifetime of the cluster head (CH) by selecting the numbers of message authentication codes (MACs) and verification nodes of the report. Using this system, the event detection rate and the network lifetime are improved by up to 18% and 6%, respectively, relative to the existing PVFS.

Highlights

  • Wireless sensor networks (WSNs) are composed of many sensor nodes and a base station (BS)

  • Based on the data received from each cluster head (CH), the BS computes the relative energy of each CH node and the attack rate on the network and uses this as input for the optimized fuzzy system and the Genetic algorithm (GA)

  • The malfunction ratio refers to the number of CH nodes that cannot operate among all CH nodes

Read more

Summary

INTRODUCTION

Wireless sensor networks (WSNs) are composed of many sensor nodes and a base station (BS). Sensor nodes are vulnerable to attack due to disadvantages such as limited computational ability, limited energy, random distribution in an open environment that operates independently, and individual management difficulties [3, 4]. Attackers exploit these vulnerabilities to attack WSNs by injecting reports containing false information or false votes. A false report injection attack is one that injects a report about a non-existent event through the compromised sensor node The goal of this attack is to exhaust the energy resources of the nodes on the propagation path and generate a false alarm at the BS. An attacker can attempt a false report injection attack and false vote injection attack through a compromised member node

Fuzzy logic
PROPOSED SCHEME
System overview
Fuzzy system
Performance analysis
Experimental results
CONCLUSION AND FUTURE WORK
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.