Proceedings of the 2019 11th International Conference on Computer and Automation Engineering 2019
DOI: 10.1145/3313991.3314004
|View full text |Cite
|
Sign up to set email alerts
|

A Fuzzy System based Approach to Extend Network Lifetime for En-Route Filtering Schemes in WSNs

Abstract: Wireless sensor networks suffer from false report injection attacks. This results in energy drain over sensor nodes on the event traversal route. Novel en-route filtering schemes counter this problem by filtering these attacks on designated verification nodes. However, these filtering schemes among other limitations inherently are network lifetime inefficient. Generally, report traversal paths and verification nodes are also fixed. In this paper, we cater these limitations in our proposed scheme. Simulation ex… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 10 publications
0
3
0
Order By: Relevance
“…Research works [14][15][16][17] present various attack types and their counter measures in en-route filtering schemes. Some interesting works exist for improving network lifetime [18][19][20][21][22][23][24] and energy efficiency [25][26][27][28][29]. Re-clustering based schemes to increase network lifetime [30][31][32][33][34][35][36] have been found effective in minimizing the hot-spot problem.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Research works [14][15][16][17] present various attack types and their counter measures in en-route filtering schemes. Some interesting works exist for improving network lifetime [18][19][20][21][22][23][24] and energy efficiency [25][26][27][28][29]. Re-clustering based schemes to increase network lifetime [30][31][32][33][34][35][36] have been found effective in minimizing the hot-spot problem.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Because of the hardware limits, security methods must be exceedingly efficient. is is no trivial task [4]. Sensor networks' most valuable resource is energy.…”
Section: Introductionmentioning
confidence: 99%
“…In order to resist false data injection attacks and filter out false data reports as early as possible, scholars have proposed a number of en-route filtering strategies, in which the forwarding nodes verify the data reports and discard the false ones. According to the adopted data encryption technology, the existing en-route filtering strategies can be classified into symmetric cryptography-based strategies [5][6][7][8][9][10][11][12][13][14] and asymmetric cryptography-based strategies [15][16][17][18][19][20][21][22]. Among them, the symmetric cryptography-based strategies attract more attention because of their advantages in communication overhead, computation overhead, and storage overhead.…”
Section: Introductionmentioning
confidence: 99%