Fuzzy-based Energy Efficient Method for Multiple Attacks in Sensor Networks: against False Vote and Report Injection Attacks
نویسندگان
چکیده
An adversary can easily compromise sensor nodes in wireless sensor networks, and generate multiple attacks through compromised nodes, such as false vote injection attacks and false report injection attacks. The false vote injection attack tries to drop legitimate reports in an intermediate node, and the false report injection attack tries to drain the energy consumption of each node. To prevent these attacks, a probabilistic voting-based filtering scheme (PVFS) has been proposed to select verification nodes, and to detect fabricated votes in the reports as they occur simultaneously. In this paper, we propose a method that improves the energy efficiency of each node and the security level of the false report injection attack, while maintaining the detection power of the false vote injection attack. Our proposed method effectively selects verification node with considering the conditions of each node, based on a fuzzy rule-based system. The verification node is decided through the energy remaining level, distance level, and number of detected false votes in the fuzzy system. We evaluated the effectiveness of the proposed method, as compared to PVFS, when two attacks occur simultaneously in the sensor network. The experimental results show that our method saves energy by up to 8%, by improving and maintaining the defence against these multiple attacks.
منابع مشابه
A Security Method for Multiple Attacks in Sensor Networks: against False-report Injection, False-vote Injection, and Wormhole Attacks
In a large-scale wireless sensor network, damage spreads rapidly in the network when under false report injection, false votes injection, or wormhole attacks. These attacks cause finite energy resources to be drained, legitimate reports to be dropped, and data to be intercepted by adversary nodes. A probabilistic voting-based filtering scheme (PVFS) and localized encryption and authentication p...
متن کاملEnsp: Energy Efficient next Hop Selection in a Probabilistic Voting-based Filtering Scheme Using Fuzzy Logic
In wireless sensor networks, sensor nodes are easily compromised due to their restricted hardware resources. These compromised nodes inject fabricated votes into legitimate reports, and generate false report and false vote injection attacks. These attacks deplete energy resources and block report transmission. A probabilistic voting-based filtering scheme was proposed to detect the bogus votes ...
متن کاملEnergy Efficient Fuzzy Adaptive Verification Node Selection-Based Path Determination in Wireless Sensor Networks
Wireless sensor networks are supplied with limited energy resources and are usually installed in unattended and unfriendly environments. These networks are also highly exposed to security attacks aimed at draining the energy of the network to render it unresponsive. Adversaries launch counterfeit report injection attacks and false vote injection attacks through compromised sensor nodes. Several...
متن کاملEnsf: Energy-efficient Next-hop Selection Method Using Fuzzy Logic in Probabilistic Voting-based Filtering Scheme
Wireless sensor networks (WSNs) are regularly deployed in harsh and unattended environments, and sensor nodes are easily exposed to attacks due to the random arrangement of the sensor field. An attacker can inject fabricated reports from a compromised node with false votes and false vote-based reports. The false report attacks can waste the energy of the intermediate nodes, shortening the netwo...
متن کاملA Lightweight Intrusion Detection System Based on Specifications to Improve Security in Wireless Sensor Networks
Due to the prevalence of Wireless Sensor Networks (WSNs) in the many mission-critical applications such as military areas, security has been considered as one of the essential parameters in Quality of Service (QoS), and Intrusion Detection System (IDS) is considered as a fundamental requirement for security in these networks. This paper presents a lightweight Intrusion Detection System to prote...
متن کامل