Because wireless sensor networks are exposed to various attacks, security protocols are essential. Among the representative attacks and countermeasures, there are a false report injection attacks and a dynamic en-route filtering scheme. Dynamic en-route filtering scheme effectively defends using message authentication code, but there is room for improvement in terms of energy. So, we use a key redistribution algorithm of dynamic en-route filtering to improve energy efficiency. In this paper, we propose a discrete event modeling and simulation of modified dynamic en-route filtering. More accurate measurement is possible through the same system designed as the actual wireless sensor network. The experimental results demonstrate the validity of our scheme, showing an energy efficiency of up to 42.45% and a filtering capacity of up to 18.71% compared to the existing scheme.
…………………………………………………………………………………………………….... Introduction:-Wireless sensor networks (WSNs) have been used in various applications that require real-time monitoring [1][2][3]. WSNs consist of numerous small sensor nodes for detecting an event, as well as a base station (BS) that is used to collect detected event data and send it to a user. Typically, large-scale WSNs are comprised of thousands of sensor nodes. Additionally, several cluster heads (CHs) in a sensor field are divided into cluster units [4]. A CH receives data about an event from member nodes belonging to its own cluster. The event data are then converted into a report and forwarded to the next node.The sensor node of a low-cost product has resource constraints, such as limited processing power, memory capacity, and energy, and it also communicates wirelessly in an open environment [5]. Therefore, the node is easily exposed to various attacks, such as environmental damage, as well as physical capture or false report injection attacks and selective forwarding attacks from malicious attackers. Hence, security research that considers the limited resources of these nodes is needed and has been investigated recently [6][7][8].In a WSN, an attacker can attempt to cause false alarms at the BS by injecting false event data and depleting the limited energy resources of the nodes by forcing them to forward false reports. Therefore, it is very important to detect a false report injection attack as early as possible. To detect such attacks, a dynamic en-route filtering (DEF) scheme was proposed by Yu and Guan [9]. This scheme can detect a false report in the transfer process using the authentication key and secret keys. In DEF, however, when a network is exposed to a continuous attack from adversaries, unnecessary energy loss occurs. DEF has no suitable measures to address this problem because this method does not consider the current attack situation.