Notification: Our email services are now fully restored after a brief, temporary outage caused by a denial-of-service (DoS) attack. If you sent an email on Dec 6 and haven't received a response, please resend your email.
CFP last date
20 December 2024
Reseach Article

Discrete Event Modeling and Simulation of Probabilistic Voting-based Filtering to Find Proper Security Parameters in Wireless Sensor Networks

by Su Man Nam, Tae Ho Cho
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 176 - Number 3
Year of Publication: 2017
Authors: Su Man Nam, Tae Ho Cho
10.5120/ijca2017915556

Su Man Nam, Tae Ho Cho . Discrete Event Modeling and Simulation of Probabilistic Voting-based Filtering to Find Proper Security Parameters in Wireless Sensor Networks. International Journal of Computer Applications. 176, 3 ( Oct 2017), 21-26. DOI=10.5120/ijca2017915556

@article{ 10.5120/ijca2017915556,
author = { Su Man Nam, Tae Ho Cho },
title = { Discrete Event Modeling and Simulation of Probabilistic Voting-based Filtering to Find Proper Security Parameters in Wireless Sensor Networks },
journal = { International Journal of Computer Applications },
issue_date = { Oct 2017 },
volume = { 176 },
number = { 3 },
month = { Oct },
year = { 2017 },
issn = { 0975-8887 },
pages = { 21-26 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume176/number3/28532-2017915556/ },
doi = { 10.5120/ijca2017915556 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:41:32.862009+05:30
%A Su Man Nam
%A Tae Ho Cho
%T Discrete Event Modeling and Simulation of Probabilistic Voting-based Filtering to Find Proper Security Parameters in Wireless Sensor Networks
%J International Journal of Computer Applications
%@ 0975-8887
%V 176
%N 3
%P 21-26
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In wireless sensor networks (WSNs), sensor nodes are vulnerable to false vote and false report injection attacks since they are widely deployed without infrastructure. Although some en-route filtering schemes can effectively detect the two attacks, these schemes need to set up various security factors before deploying the sensors in a sensor field. In this paper, we use a simulation model and find the proper security factors for a security scheme in a real-world simulation environment. We demonstrate that the scheme achieves better energy savings and detection power when the number of required message authentication codes (MACs) in a report is five and the number of detected MACs is two.

References
  1. I. F. Akyildiz, W. Su, Y. Sankarasubramaniam and E. Cayirci, "Wireless sensor networks: a survey," Computer Networks, vol. 38, (4), pp. 393-422, 3/15, 2002.
  2. K. Akkaya and M. Younis, "A survey on routing protocols for wireless sensor networks," Ad Hoc Networks, vol. 3, pp. 325-349, 2005.
  3. J. N. Al-Karaki and A. E. Kamal, "Routing techniques in wireless sensor networks: a survey," Wireless Communications, IEEE, vol. 11, (6), pp. 6-28, 2004, 2004.
  4. S. M. Nam and T. H. Cho, "Modeling and Simulation of Threshold Analysis for PVFS in Wireless Sensor Networks," International Journal of Research -GRANTHAALAYAH (IJRG), vol. 4, (8), pp. 1-10, Aug. 2016.
  5. S. M. Nam and T. H. Cho, "Modeling and simulation of vote length analysis for probabilistic voting-based filtering in wireless sensor networks: Against false report and vote injection attacks," in 2017 International Conference on “International Conference on Research and Innovations in Science” (ICRISET 2017), Anand, India, June 2017, pp. 196-204.
  6. F. Li, A. Srinivasan and J. Wu, "PVFS: A Probabilistic Voting-based Filtering Scheme in Wireless Sensor Networks," International Journal of Security and Network, vol. 3, (3), pp. 173-182, 2008.
  7. M. Akram and T. H. Cho, "Energy efficient fuzzy adaptive selection of verification nodes in wireless sensor networks," Ad Hoc Networks, vol. 47, pp. 16-25, 9/1, 2016.
  8. B. P. Zeigler and H. S. Sarjoughian, "Introduction to devs modeling and simulation with java: Developing component-based simulation models," Technical Document, University of Arizona, 2003.
  9. B. P. Zeigler, Object-Oriented Simulation with Hierarchical, Modular Models: Intelligent Agents and Endomorphic Systems. Academic press, 1990.
  10. F. Ye, H. Luo, S. Lu and L. Zhang, "Statistical en-route filtering of injected false data in sensor networks," Selected Areas in Communications, IEEE Journal On, vol. 23, (4), pp. 839-850, 2005.
Index Terms

Computer Science
Information Sciences

Keywords

WSN Voting-based Filtering Discrete Event Modeling