Published January 18, 2021
| Version v1
Journal article
Open
Detecting a False Report using Temporal Logic and a Rank Algorithm in WSNs
Description
Wireless sensor networks (WSNs) self-organize clusters via communication between multiple sensor nodes that are deployed across a large field and an open environment. Therefore, nodes can be easily compromised, and attackers can launch false report injection attacks through compromised nodes. Several security protocols based on a message authentication code (MAC), such as the Probability Voting based Filtering Scheme, have been proposed to prevent application-layer attacks. MAC-based protocols remain vulnerable to high-level attacks where all MACs have false event values. We propose a temporal logic-based security model that allows the base station to defend against false report attacks by executing report authenticity detection using a temporal logic rule.
Files
detecting-a-false-report-using-temporal-logic-and-a-rank-algorithm-in-wsns-IJERTV10IS010073.pdf
Files
(826.4 kB)
| Name | Size | Download all |
|---|---|---|
|
md5:6cdd15c79872d196db3985ccdcd2a171
|
826.4 kB | Preview Download |
Additional details
Related works
- Is identical to
- Journal article: https://www.ijert.org/detecting-a-false-report-using-temporal-logic-and-a-rank-algorithm-in-wsns (URL)