z-logo
open-access-imgOpen Access
Modeling and Simulation of Vote Length Analysis for Probabilistic Voting-based Filtering in Wireless Sensor Networks: Against False report and vote injection attacks
Author(s) -
Su Man Nam,
Tae Ho Cho
Publication year - 2018
Publication title -
kalpa publications in computing
Language(s) - English
Resource type - Conference proceedings
ISSN - 2515-1762
DOI - 10.29007/xs1j
Subject(s) - computer science , probabilistic logic , wireless sensor network , voting , protocol (science) , computer security , cryptographic protocol , computer network , majority rule , cryptography , artificial intelligence , medicine , alternative medicine , pathology , politics , political science , law
In large-scale wireless sensor networks, sensors are vulnerable to false report and false vote injection attacks since they are deployed in hostile environments. These attacks drain their limited energy resources of forwarding nodes and drops important data. Probabilistic voting-based filtering scheme simultaneously detects both the attacks through vote verification. To effectively detect them, it is important to define the vote length of the reports since the vote length is fixed at the initial phase. We find the effective vote length using a simulation model since it is nearly impossible to evaluate the security protocol performance on the real nodes. We demonstrate that the security protocol, in which the vote length is five, achieves better detection ratio against the two attacks.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here