Interleaved Hop-by-Hop Authentication using fuzzy logic to defend against of False Report Injection by Replaying an attack

نویسندگان

  • Jong Hyun Kim
  • Tae Ho Cho
چکیده

The wireless sensor node, being a micro electronic device, can only be equipped with a limited power source ( < 0.5 Ahm 1.2 V). In some application scenarios (which is like military area), replenishment of power resources might be impossible. Sensor node lifetime, therefore, shows a strong dependence on battery lifetime. An adversary may compromise some sensor nodes and use them to inject false sensing reports. False report can lead to not only false alarms but also false depletion of limited energy resource in battery powered networks. The interleaved hop-byhop authentication scheme detects and filters such false reports through interleaved authentication. However an Adversary can make energy spent in nodes as false report injection of replaying attack relaying attack. The aim of adversary is to drain the limited energy in sensor nodes not to send false report to the Base Station. In this paper, we propose a countermeasure from this attack in using fuzzy logic in IHA scheme. Sensor network, IHA, Fuzzy logic

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Low Energy Method for Data Delivery in Ubiquitous Network

Recent advances in wireless sensor networks have led to many routing methods designed for energy-efficiency in wireless sensor networks. Despite that many routing methods have been proposed in USN, a single routing method cannot be energy-efficient if the environment of the ubiquitous sensor network varies. We present the controlling network access to various hosts and the services they offer, ...

متن کامل

A multi-path interleaved hop-by-hop en-route filtering scheme in wireless sensor networks

0140-3664/$ see front matter 2010 Elsevier B.V. A doi:10.1016/j.comcom.2010.03.006 * Corresponding author. Tel.: +82 31 290 7221; fax E-mail addresses: [email protected] (T.P. Ng (T.H. Cho). A compromised node can generate a fabricated report, which results in false alarms, information loss, and a waste of precious network energy. An interleaved hop-by-hop authentication (IHA) scheme has be...

متن کامل

Ensp: Energy Efficient next Hop Selection in a Probabilistic Voting-based Filtering Scheme Using Fuzzy Logic

In wireless sensor networks, sensor nodes are easily compromised due to their restricted hardware resources. These compromised nodes inject fabricated votes into legitimate reports, and generate false report and false vote injection attacks. These attacks deplete energy resources and block report transmission. A probabilistic voting-based filtering scheme was proposed to detect the bogus votes ...

متن کامل

بهبود پروتکل AODV جهت مقابله با حملات کرم‌چاله در شبکه‌های اقتضایی

Mobile Ad hoc Networks (MANET) are vulnerable to both active and passive attacks. The wormhole attack is one of the most severe security attacks in wireless ad hoc networks, an attack that can be mounted on a wide range of wireless network protocols without compromising any cryptographic quantity or network node.  In Wormhole attacks, one malicious node tunnels packets from its location to the ...

متن کامل

Defense Against Packet Injection in Ad Hoc Networks

Wireless ad hoc networks have very limited network resources and are thus susceptible to attacks that focus on resource exhaustion, such as the injection of junk packets. These attacks cause serious denial-of-service via wireless channel contention and network congestion. Although ad hoc network security has been extensively studied, most previous work focuses on secure routing, but cannot prev...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009