An Efficient ID-Based Scheme for Filtering Gang Injected False Data in Wireless Sensor Networks

Wireless sensor networks are usually deployed at aggressive environments which are more vulnerable to various security attacks such as selective forwarding, wormholes and sybil attacks. In such network user authentication is essential in any service-oriented communication network in order to identify and reject any access request of an unauthorized user. Wireless sensor networks focus on injecting false data attack and their mitigation techniques. For an injecting false data attack, an attacker node first compromises the sensor nodes and then accesses all keying materials stored in the compromised nodes and then controls these compromised nodes to inject bogus information and send the false data to the sink to cause upper-level error decision as well as energy depletion in en-route nodes.

Provided by: International Journal of Advanced Research in Computer and Communication Engineering (IJARCCE) Topic: Mobility Date Added: Apr 2013 Format: PDF

Find By Topic