{"title":"基于模糊逻辑和交换密码的传感器网络自适应假数据滤波方法","authors":"H. Lee, S. Moon, T. Cho","doi":"10.1109/ICCEE.2008.95","DOIUrl":null,"url":null,"abstract":"Wireless sensor networks are vulnerable to false data injection attacks in which attackers inject false reports into the networks through compromised nodes with the goal of deceiving sinks or depleting the resources of the relaying nodes. This paper presents an adaptive false data filtering method, which is based on the commutative cipher-based probabilistic filtering scheme. A security parameter, which determines the required number of participating nodes in each report generation, is controlled by a fuzzy rule-based system with the consideration of the factors that reflect the network status. The proposed method can be more energy-efficient than the base scheme in both legitimate and false traffic. The effectiveness of the proposed method is shown at the end of the paper with simulation results.","PeriodicalId":365473,"journal":{"name":"2008 International Conference on Computer and Electrical Engineering","volume":"39 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Adaptive False Data Filtering Method for Sensor Networks Based on Fuzzy Logic and Commutative Cipher\",\"authors\":\"H. Lee, S. Moon, T. Cho\",\"doi\":\"10.1109/ICCEE.2008.95\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Wireless sensor networks are vulnerable to false data injection attacks in which attackers inject false reports into the networks through compromised nodes with the goal of deceiving sinks or depleting the resources of the relaying nodes. This paper presents an adaptive false data filtering method, which is based on the commutative cipher-based probabilistic filtering scheme. A security parameter, which determines the required number of participating nodes in each report generation, is controlled by a fuzzy rule-based system with the consideration of the factors that reflect the network status. The proposed method can be more energy-efficient than the base scheme in both legitimate and false traffic. The effectiveness of the proposed method is shown at the end of the paper with simulation results.\",\"PeriodicalId\":365473,\"journal\":{\"name\":\"2008 International Conference on Computer and Electrical Engineering\",\"volume\":\"39 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2008-12-20\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2008 International Conference on Computer and Electrical Engineering\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCEE.2008.95\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 International Conference on Computer and Electrical Engineering","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCEE.2008.95","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Adaptive False Data Filtering Method for Sensor Networks Based on Fuzzy Logic and Commutative Cipher
Wireless sensor networks are vulnerable to false data injection attacks in which attackers inject false reports into the networks through compromised nodes with the goal of deceiving sinks or depleting the resources of the relaying nodes. This paper presents an adaptive false data filtering method, which is based on the commutative cipher-based probabilistic filtering scheme. A security parameter, which determines the required number of participating nodes in each report generation, is controlled by a fuzzy rule-based system with the consideration of the factors that reflect the network status. The proposed method can be more energy-efficient than the base scheme in both legitimate and false traffic. The effectiveness of the proposed method is shown at the end of the paper with simulation results.