WEKO3
アイテム
False Event Message Detection Robust to Burst Attacks in Wireless Sensor Networks
https://uec.repo.nii.ac.jp/records/10327
https://uec.repo.nii.ac.jp/records/10327f0d57e9e-ab4e-4616-8bd8-36ecc61dcc94
名前 / ファイル | ライセンス | アクション |
---|---|---|
OJCOMS.2022.3208088.pdf (2.3 MB)
|
CC BY 4.0
|
Item type | 学術雑誌論文 / Journal Article(1) | |||||
---|---|---|---|---|---|---|
公開日 | 2023-03-13 | |||||
タイトル | ||||||
タイトル | False Event Message Detection Robust to Burst Attacks in Wireless Sensor Networks | |||||
言語 | en | |||||
言語 | ||||||
言語 | eng | |||||
キーワード | ||||||
言語 | en | |||||
主題Scheme | Other | |||||
主題 | Energy-efficient protocol | |||||
キーワード | ||||||
言語 | en | |||||
主題Scheme | Other | |||||
主題 | false event detection | |||||
キーワード | ||||||
言語 | en | |||||
主題Scheme | Other | |||||
主題 | security | |||||
キーワード | ||||||
言語 | en | |||||
主題Scheme | Other | |||||
主題 | wireless sensor networks | |||||
資源タイプ | ||||||
資源タイプ識別子 | http://purl.org/coar/resource_type/c_6501 | |||||
資源タイプ | journal article | |||||
著者 |
Sei, Yuichi
× Sei, Yuichi× Ohsuga, Akihiko |
|||||
抄録 | ||||||
内容記述タイプ | Abstract | |||||
内容記述 | A sensor device can be used to detect target events at low cost. Moreover, there is a significant risk of sensor nodes being compromised or captured within large wireless sensor networks (WSNs). The transmission of valid event messages to users by a WSN can be hindered by network congestion due to false event messages in a compromised node. Several methods are available for detecting false event messages. However, they rely on long bits of authentication codes and hence do not provide a fundamental solution to prevent network congestion. In the proposed method, various hashing vectors, which are spaceefficient data structures that can determine whether the given data are an element of a set, are created based on the correct combination of authentication codes and placed in each node in advance. An event message contains an XOR of the authentication codes, and each node verifies it based on its hashing vector. If a node is acquired illegally, the information of the hashing vector and the XOR information of the authentication codes assigned to the correct event message is compromised, so we propose an algorithm to update the information securely. Compared to existing research, the number of hops required to detect a false event message increases by only about one hop, but the amount of traffic that a malicious node can generate can be reduced by about 60% or more. In other words, the proposed method effectively reduces the amount of traffic an attacker can generate with false event messages, which also reduces the overall network congestion. | |||||
書誌情報 |
en : IEEE Open Journal of the Communications Society 巻 3, p. 1630-1642, 発行日 2022-09-22 |
|||||
出版者 | ||||||
出版者 | IEEE | |||||
ISSN | ||||||
収録物識別子タイプ | ISSN | |||||
収録物識別子 | 2644125X | |||||
DOI | ||||||
関連タイプ | isIdenticalTo | |||||
識別子タイプ | DOI | |||||
関連識別子 | 10.1109/OJCOMS.2022.3208088 | |||||
権利 | ||||||
権利情報 | (c) 2022 Author(s).This article is distributed under a Creative Commons Attribution (CC BY 4.0) License. | |||||
関連サイト | ||||||
識別子タイプ | DOI | |||||
関連識別子 | https://doi.org/10.1109/OJCOMS.2022.3208088 | |||||
著者版フラグ | ||||||
出版タイプ | VoR | |||||
出版タイプResource | http://purl.org/coar/version/c_970fb48d4fbd8a85 |