(Publisher of Peer Reviewed Open Access Journals)

International Journal of Advanced Computer Research (IJACR)

ISSN (Print):2249-7277    ISSN (Online):2277-7970
Volume-3 Issue-9 March-2013
Full-Text PDF
Paper Title : A Bandwidth-Efficient Cooperative Authentication and an En-route Filtering Scheme for Filtering Injected False Data in Wireless Sensor Networks
Author Name : T.R. Yashavanth, Ravi S Malashetty, Rashmi C.R
Abstract :

Injecting false data attack is a well-known serious threat to wireless sensor network, for which an adversary reports bogus information to sink causing error decision at upper level and energy waste in en-route nodes. In this paper, we propose a novel bandwidth-efficient cooperative authentication scheme for filtering injected false data. The proposed method of BECAN can save energy by considering the random graph characteristics of deployment of sensor node and a technique for cooperative bit-compressed authentication and this method is done by early detection and filtering most of injected false data at the en-route nodes with minor extra overheads. Further, it is necessary to check at the sink, a very small amount of injected false data which largely helps to reduce burden on the sink. For the proposed method, theoretical and simulation results are given which shows the effectiveness regarding high filtering and energy saving. We propose an EFSP (En-route Filtering Scheme based on Priority) to control the number of votes. The EFSP determines priorities through the fuzzy rule-based system. Base station sends priority to the cluster head and then according to the priority a specified number of votes are attached to the report by the cluster head.

Keywords : Wireless sensor network, injecting false data attack, random graph, EFSP, cooperative bit-compressed authentication.
Cite this article : T.R. Yashavanth, Ravi S Malashetty, Rashmi C.R, " A Bandwidth-Efficient Cooperative Authentication and an En-route Filtering Scheme for Filtering Injected False Data in Wireless Sensor Networks " , International Journal of Advanced Computer Research (IJACR), Volume-3, Issue-9, March-2013 ,pp.92-97.