Interleaved Hop-by-Hop Authentication using fuzzy logic to defend against of False Report Injection by Replaying an attack
نویسندگان
چکیده
The wireless sensor node, being a micro electronic device, can only be equipped with a limited power source ( < 0.5 Ahm 1.2 V). In some application scenarios (which is like military area), replenishment of power resources might be impossible. Sensor node lifetime, therefore, shows a strong dependence on battery lifetime. An adversary may compromise some sensor nodes and use them to inject false sensing reports. False report can lead to not only false alarms but also false depletion of limited energy resource in battery powered networks. The interleaved hop-byhop authentication scheme detects and filters such false reports through interleaved authentication. However an Adversary can make energy spent in nodes as false report injection of replaying attack relaying attack. The aim of adversary is to drain the limited energy in sensor nodes not to send false report to the Base Station. In this paper, we propose a countermeasure from this attack in using fuzzy logic in IHA scheme. Sensor network, IHA, Fuzzy logic
منابع مشابه
Low Energy Method for Data Delivery in Ubiquitous Network
Recent advances in wireless sensor networks have led to many routing methods designed for energy-efficiency in wireless sensor networks. Despite that many routing methods have been proposed in USN, a single routing method cannot be energy-efficient if the environment of the ubiquitous sensor network varies. We present the controlling network access to various hosts and the services they offer, ...
متن کاملA multi-path interleaved hop-by-hop en-route filtering scheme in wireless sensor networks
0140-3664/$ see front matter 2010 Elsevier B.V. A doi:10.1016/j.comcom.2010.03.006 * Corresponding author. Tel.: +82 31 290 7221; fax E-mail addresses: [email protected] (T.P. Ng (T.H. Cho). A compromised node can generate a fabricated report, which results in false alarms, information loss, and a waste of precious network energy. An interleaved hop-by-hop authentication (IHA) scheme has be...
متن کاملEnsp: Energy Efficient next Hop Selection in a Probabilistic Voting-based Filtering Scheme Using Fuzzy Logic
In wireless sensor networks, sensor nodes are easily compromised due to their restricted hardware resources. These compromised nodes inject fabricated votes into legitimate reports, and generate false report and false vote injection attacks. These attacks deplete energy resources and block report transmission. A probabilistic voting-based filtering scheme was proposed to detect the bogus votes ...
متن کاملبهبود پروتکل AODV جهت مقابله با حملات کرمچاله در شبکههای اقتضایی
Mobile Ad hoc Networks (MANET) are vulnerable to both active and passive attacks. The wormhole attack is one of the most severe security attacks in wireless ad hoc networks, an attack that can be mounted on a wide range of wireless network protocols without compromising any cryptographic quantity or network node. In Wormhole attacks, one malicious node tunnels packets from its location to the ...
متن کاملDefense Against Packet Injection in Ad Hoc Networks
Wireless ad hoc networks have very limited network resources and are thus susceptible to attacks that focus on resource exhaustion, such as the injection of junk packets. These attacks cause serious denial-of-service via wireless channel contention and network congestion. Although ad hoc network security has been extensively studied, most previous work focuses on secure routing, but cannot prev...
متن کامل