2021
DOI: 10.1155/2021/4068507
|View full text |Cite
|
Sign up to set email alerts
|

En-Route Message Authentication Scheme for Filtering False Data in WSNs

Abstract: In wireless sensor networks, the adversary can easily control the compromised nodes to inject false data reports. En-route filtering is an effective mechanism to resist such attacks, where the forwarding nodes of the reports can identify and drop the false reports. However, the existing en-route filtering strategies are vulnerable to report disruption attacks and selective forwarding attacks, and the probabilities and efficiencies of en-route filtering false reports are low. To address these problems, a preche… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
11
0

Year Published

2022
2022
2022
2022

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(11 citation statements)
references
References 21 publications
0
11
0
Order By: Relevance
“…En‐route filtering schemes have been an approach usually applied against FDI attacks in WSN 30,32,43,54 . In an earlier study, 30 the authors propose a cooperative authentication scheme to filter false data in WSN that requires that all nodes have a fixed number of neighbors to manage the authentication in a distributed across data routing to the BS.…”
Section: Background and Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…En‐route filtering schemes have been an approach usually applied against FDI attacks in WSN 30,32,43,54 . In an earlier study, 30 the authors propose a cooperative authentication scheme to filter false data in WSN that requires that all nodes have a fixed number of neighbors to manage the authentication in a distributed across data routing to the BS.…”
Section: Background and Related Workmentioning
confidence: 99%
“…Meantime, the solution ignores the issue of data manipulation and demands an additional cost due to the constant exchange of keys between devices. In an earlier research, 32 the authors proposed a new route filtering scheme called EMAS, aiming to improve the probability and efficiency of route filtering through MAC verification. EMAS checks out endorsement nodes identifier and position, the packet preverification, and the monitoring and reporting mechanism in order to know the manipulated packets.…”
Section: Background and Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…En-route filtering schemes have been an approach usually applied against FDI attacks in WSN 30,54,43,32 . In 30 , the authors propose a cooperative authentication scheme to filter false data in Wireless Sensor Network (WSN), that requires that all nodes have a fixed number of neighbors to manage the authentication in a distributed across data routing to the base station.…”
Section: Related Workmentioning
confidence: 99%
“…When applied in dense IIoT various approaches effective against FDI attacks in WSN 30,31,32 , Smart Grids 33,34 or IoT 23,24 usually face difficulties because either they have failed or they are not suitable by requiring high resource consumption, do not verifying data, and having a centralized decision making. Among all approaches, the most commonly used are En-route Filtering Schemes, Collaborative Detection, Machine Learning (ML), and Intrusion Detection Systems (IDS).Schemes of Enroute filtering are usually applied in WSN and take the report of packets verification in intermediate devices between source and destination in order to discard ones with any inconsistency.Although the reports are endorsed to guarantee authenticity, they disregard changes in the sensed data.…”
Section: Introductionmentioning
confidence: 99%