Enhanced BECAN Based En-Route filtering schemes for injected false data in Wireless Sensor Networks
J.Ghayathri, S.Poornima "Enhanced BECAN Based En-Route filtering schemes for injected false data in Wireless Sensor Networks". International Journal of Computer Trends and Technology (IJCTT) V36(2):71-76, June 2016. ISSN:2231-2803. www.ijcttjournal.org. Published by Seventh Sense Research Group.
Abstract -
Wireless device networking is an associate
rising technology, which supports several rising
applications as a result of their low price, tiny size
and communication over short distances. False Data
call depletes the energy of en-route nodes to the
base station. We implements the BECAN (Bandwidth
Efficient Co-operative Authentication) theme and
will increase the protection by adding Hybrid
Authentication Scheme (HAS). LEACH (Low Energy
Adaptive Clustering Hierarchy) method is used to
lower the energy consumption required to create
and maintain clusters in order to improve the life
time of a Wireless Sensor Network. The proposed
system to impress the performance on energy
consumption, data security and the communication
cost.
References
[1] F. Ye, H. Luo, S. Lu, and L. Zhang, “Statistical En-Route
Detection and Filtering of Injected False Data in Sensor
Networks,” IEEE INFOCOM ’04, Mar. 2004.
[2] Rongxing Lu, Xiaodong Lin, Haojin Zhu, Xiaohui Liang, and
Xuemin (Sherman) Shen, “BECAN: A Bandwidth-Efficient
Cooperative Authentication Scheme for Filtering Injected False
Data in Wireless Sensor Networks”, IEEE Transactions on
Parallel and Distributed Systems, vol. 23, no. 1, January 2012.
[3] Teenu Liza Thomas and P. Vijayalakshmi “Cooperative Bit-
Compressed Authentication Scheme against Compromised Node
Attacks in Wireless Sensor Networks” International Journal of
Computer Applications (0975 – 8887) Volume 71– No.19, June
2013 .
[4] H. Yang and S. Lu. “Commutative cipher based en-route
filtering in wireless sensor networks”. In Vehicular Technology
Conference, 2004.VTC2004 Fall.2004 IEEE 60th, volume 2,
pages 1223-1227.IEEE, 2004.
[5] C. Kraub, M. Schneider, K. Bayarou, and C. Eckert. “Stef: A
secure ticket-based en-route filtering scheme for wireless sensor
networks”. In Availability, Reliability and Security, 2007. ARES
2007.The Second International Conference, pages 310-317. IEEE,
2007.
[6] Z. Yu and Y. Guan.” A dynamic en-route filtering scheme for
data reporting in wireless sensor network”s. IEEE/ACM
Transactions on Networking (ToN), 18(1):150-163, 2010.
[7] K. Ren, W. Lou, and Y. Zhang, “Multi-User Broadcast
Authentication in Wireless Sensor Networks,” Proc. IEEE Sensor
Ad Hoc Comm. Networks (SECON ’07), June 2007.
[8] Nithya Menon, S.Praveena “BECAN: A Bandwidth Efficient
Cooperative Authentication Scheme for Wireless Sensor
Networks” International Journal of Innovative Technology and
Exploring Engineering (IJITEE) ISSN: 2278-3075, Volume-2,
Issue-6, May 2013.
[9] Akylidz.J, Weilian Su,Boyen.X (2003)“A Survey on Wireless
Sensor Networks”. IEEE Communication Magazine 2002 , LNCS,
Vol.2729, pp. 383399, Springer-Verlag,.
[10] www.ijarcce.com/ “Projective Clustering Approach for the
Detection of Outlier and Non- Axis-Aligned Subspaces”.
[11] https://prezi.com/t6aixt0sdx9/
[12] https://en.wikipedia.org/wiki/Link_aggregatin
[13] Dong.J, Chen.Q, and Niu.Z, (2007) “Random Graph Theory
Based Connectivity Analysis in Wireless Sensor Networks with
Rayleigh Fading Channels,” Proc. Asia-Pacific Conf. Comm.
(APCC ’07),pp. 123-126.
[14] Chen.J, Yu.Q, Zhang.Y, Chen.H, and Sun. Y, (2010)
“Feedback Based Clock Synchronization in Wireless Sensor
Networks: A Control Theoretic Approach,” IEEE Trans.
Vehicular Technology, vol.59, no. 6, pp. 2963-2973.
[15] W. Mao, “Modern Cryptography:” Theory and Practice.
Prentice Hall PTR, 2003.
[16] Zhu, Zhengjian, Qingping Tan, and Peidong Zhu.“An
effective secure routing for false data injection attack in wireless
sensor network." In Managing Next Generation Networks and
Services,pp.457-465.Springer,2007.
[17] V.M.Sivagami, K.S.Easwara Kumar "False Data Detection
Using MAC pairs in Wireless Sensor Networks"International
Journal of Computer Trends and Technology (IJCTT),V4(4):539-
545 April Issue 2013 .ISSN 2231-2803.www.ijcttjournal.org.
Published by Seventh Sense Research Group.
[18] Mrs.P.Radhadevi, D Gopi Krishna "Clone Attacks Detection
In Wireless Sensor Networks"International Journal of Computer
Trends and Technology (IJCTT),V4(6):1527-1529 June Issue
2013 .ISSN 2231-2803.www.ijcttjournal.org. Published by
Seventh Sense Research Group.
Keywords
False data injection, Wireless Sensor
Networks, Hill Climbing Method.