CFP last date
22 April 2024
Call for Paper
May Edition
IJCA solicits high quality original research papers for the upcoming May edition of the journal. The last date of research paper submission is 22 April 2024

Submit your paper
Know more
Reseach Article

Discrete Event Modeling and Simulation of Probabilistic Voting-based Filtering to Find Proper Security Parameters in Wireless Sensor Networks

by Su Man Nam, Tae Ho Cho
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 176 - Number 3
Year of Publication: 2017
Authors: Su Man Nam, Tae Ho Cho
10.5120/ijca2017915556

Su Man Nam, Tae Ho Cho . Discrete Event Modeling and Simulation of Probabilistic Voting-based Filtering to Find Proper Security Parameters in Wireless Sensor Networks. International Journal of Computer Applications. 176, 3 ( Oct 2017), 21-26. DOI=10.5120/ijca2017915556

@article{ 10.5120/ijca2017915556,
author = { Su Man Nam, Tae Ho Cho },
title = { Discrete Event Modeling and Simulation of Probabilistic Voting-based Filtering to Find Proper Security Parameters in Wireless Sensor Networks },
journal = { International Journal of Computer Applications },
issue_date = { Oct 2017 },
volume = { 176 },
number = { 3 },
month = { Oct },
year = { 2017 },
issn = { 0975-8887 },
pages = { 21-26 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume176/number3/28532-2017915556/ },
doi = { 10.5120/ijca2017915556 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:41:32.862009+05:30
%A Su Man Nam
%A Tae Ho Cho
%T Discrete Event Modeling and Simulation of Probabilistic Voting-based Filtering to Find Proper Security Parameters in Wireless Sensor Networks
%J International Journal of Computer Applications
%@ 0975-8887
%V 176
%N 3
%P 21-26
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In wireless sensor networks (WSNs), sensor nodes are vulnerable to false vote and false report injection attacks since they are widely deployed without infrastructure. Although some en-route filtering schemes can effectively detect the two attacks, these schemes need to set up various security factors before deploying the sensors in a sensor field. In this paper, we use a simulation model and find the proper security factors for a security scheme in a real-world simulation environment. We demonstrate that the scheme achieves better energy savings and detection power when the number of required message authentication codes (MACs) in a report is five and the number of detected MACs is two.

References
  1. I. F. Akyildiz, W. Su, Y. Sankarasubramaniam and E. Cayirci, "Wireless sensor networks: a survey," Computer Networks, vol. 38, (4), pp. 393-422, 3/15, 2002.
  2. K. Akkaya and M. Younis, "A survey on routing protocols for wireless sensor networks," Ad Hoc Networks, vol. 3, pp. 325-349, 2005.
  3. J. N. Al-Karaki and A. E. Kamal, "Routing techniques in wireless sensor networks: a survey," Wireless Communications, IEEE, vol. 11, (6), pp. 6-28, 2004, 2004.
  4. S. M. Nam and T. H. Cho, "Modeling and Simulation of Threshold Analysis for PVFS in Wireless Sensor Networks," International Journal of Research -GRANTHAALAYAH (IJRG), vol. 4, (8), pp. 1-10, Aug. 2016.
  5. S. M. Nam and T. H. Cho, "Modeling and simulation of vote length analysis for probabilistic voting-based filtering in wireless sensor networks: Against false report and vote injection attacks," in 2017 International Conference on “International Conference on Research and Innovations in Science” (ICRISET 2017), Anand, India, June 2017, pp. 196-204.
  6. F. Li, A. Srinivasan and J. Wu, "PVFS: A Probabilistic Voting-based Filtering Scheme in Wireless Sensor Networks," International Journal of Security and Network, vol. 3, (3), pp. 173-182, 2008.
  7. M. Akram and T. H. Cho, "Energy efficient fuzzy adaptive selection of verification nodes in wireless sensor networks," Ad Hoc Networks, vol. 47, pp. 16-25, 9/1, 2016.
  8. B. P. Zeigler and H. S. Sarjoughian, "Introduction to devs modeling and simulation with java: Developing component-based simulation models," Technical Document, University of Arizona, 2003.
  9. B. P. Zeigler, Object-Oriented Simulation with Hierarchical, Modular Models: Intelligent Agents and Endomorphic Systems. Academic press, 1990.
  10. F. Ye, H. Luo, S. Lu and L. Zhang, "Statistical en-route filtering of injected false data in sensor networks," Selected Areas in Communications, IEEE Journal On, vol. 23, (4), pp. 839-850, 2005.
Index Terms

Computer Science
Information Sciences

Keywords

WSN Voting-based Filtering Discrete Event Modeling