Download PDFOpen PDF in browser

Modeling and Simulation of Vote Length Analysis for Probabilistic Voting-based Filtering in Wireless Sensor Networks: Against False report and vote injection attacks

9 pagesPublished: June 12, 2017

Abstract

In large-scale wireless sensor networks, sensors are vulnerable to false report and false vote injection attacks since they are deployed in hostile environments. These attacks drain their limited energy resources of forwarding nodes and drops important data. Probabilistic voting-based filtering scheme simultaneously detects both the attacks through vote verification. To effectively detect them, it is important to define the vote length of the reports since the vote length is fixed at the initial phase. We find the effective vote length using a simulation model since it is nearly impossible to evaluate the security protocol performance on the real nodes. We demonstrate that the security protocol, in which the vote length is five, achieves better detection ratio against the two attacks.

Keyphrases: modeling and simulation, probabilistic voting based filtering, vote length, wireless sensor network

In: Rajkumar Buyya, Rajiv Ranjan, Sumantra Dutta Roy, Mehul Raval, Mukesh Zaveri, Hiren Patel, Amit Ganatra, Darshak G. Thakore, Trupti A. Desai, Zankhana H. Shah, Narendra M. Patel, Mukesh E. Shimpi, Rajiv B. Gandhi, Jagdish M. Rathod, Bhargav C. Goradiya, Mehfuza S. Holia and Dharita K. Patel (editors). ICRISET2017. International Conference on Research and Innovations in Science, Engineering and Technology. Selected Papers in Computing, vol 2, pages 196-204.

BibTeX entry
@inproceedings{ICRISET2017:Modeling_Simulation_Vote_Length,
  author    = {Su Man Nam and Tae Ho Cho},
  title     = {Modeling and Simulation of Vote Length Analysis for Probabilistic Voting-based Filtering in Wireless Sensor Networks: Against False report and vote injection attacks},
  booktitle = {ICRISET2017. International Conference on Research and Innovations in Science, Engineering and Technology. Selected Papers in Computing},
  editor    = {Rajkumar Buyya and Rajiv Ranjan and Sumantra Dutta Roy and Mehul Raval and Mukesh Zaveri and Hiren Patel and Amit Ganatra and Darshak G. Thakore and Trupti A. Desai and Zankhana H. Shah and Narendra M. Patel and Mukesh E. Shimpi and Rajiv B. Gandhi and Jagdish M. Rathod and Bhargav C. Goradiya and Mehfuza S. Holia and Dharita K. Patel},
  series    = {Kalpa Publications in Computing},
  volume    = {2},
  publisher = {EasyChair},
  bibsource = {EasyChair, https://easychair.org},
  issn      = {2515-1762},
  url       = {/publications/paper/jvb},
  doi       = {10.29007/xs1j},
  pages     = {196-204},
  year      = {2017}}
Download PDFOpen PDF in browser