Enhanced BECAN Based En-Route filtering schemes for injected false data in Wireless Sensor Networks

  IJCTT-book-cover
 
International Journal of Computer Trends and Technology (IJCTT)          
 
© 2016 by IJCTT Journal
Volume-36 Number-2
Year of Publication : 2016
Authors : J.Ghayathri, S.Poornima
DOI :  10.14445/22312803/IJCTT-V36P112

MLA

J.Ghayathri, S.Poornima "Enhanced BECAN Based En-Route filtering schemes for injected false data in Wireless Sensor Networks". International Journal of Computer Trends and Technology (IJCTT) V36(2):71-76, June 2016. ISSN:2231-2803. www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract -
Wireless device networking is an associate rising technology, which supports several rising applications as a result of their low price, tiny size and communication over short distances. False Data call depletes the energy of en-route nodes to the base station. We implements the BECAN (Bandwidth Efficient Co-operative Authentication) theme and will increase the protection by adding Hybrid Authentication Scheme (HAS). LEACH (Low Energy Adaptive Clustering Hierarchy) method is used to lower the energy consumption required to create and maintain clusters in order to improve the life time of a Wireless Sensor Network. The proposed system to impress the performance on energy consumption, data security and the communication cost.

References
[1] F. Ye, H. Luo, S. Lu, and L. Zhang, “Statistical En-Route Detection and Filtering of Injected False Data in Sensor Networks,” IEEE INFOCOM ’04, Mar. 2004.
[2] Rongxing Lu, Xiaodong Lin, Haojin Zhu, Xiaohui Liang, and Xuemin (Sherman) Shen, “BECAN: A Bandwidth-Efficient Cooperative Authentication Scheme for Filtering Injected False Data in Wireless Sensor Networks”, IEEE Transactions on Parallel and Distributed Systems, vol. 23, no. 1, January 2012.
[3] Teenu Liza Thomas and P. Vijayalakshmi “Cooperative Bit- Compressed Authentication Scheme against Compromised Node Attacks in Wireless Sensor Networks” International Journal of Computer Applications (0975 – 8887) Volume 71– No.19, June 2013 .
[4] H. Yang and S. Lu. “Commutative cipher based en-route filtering in wireless sensor networks”. In Vehicular Technology Conference, 2004.VTC2004 Fall.2004 IEEE 60th, volume 2, pages 1223-1227.IEEE, 2004.
[5] C. Kraub, M. Schneider, K. Bayarou, and C. Eckert. “Stef: A secure ticket-based en-route filtering scheme for wireless sensor networks”. In Availability, Reliability and Security, 2007. ARES 2007.The Second International Conference, pages 310-317. IEEE, 2007.
[6] Z. Yu and Y. Guan.” A dynamic en-route filtering scheme for data reporting in wireless sensor network”s. IEEE/ACM Transactions on Networking (ToN), 18(1):150-163, 2010.
[7] K. Ren, W. Lou, and Y. Zhang, “Multi-User Broadcast Authentication in Wireless Sensor Networks,” Proc. IEEE Sensor Ad Hoc Comm. Networks (SECON ’07), June 2007.
[8] Nithya Menon, S.Praveena “BECAN: A Bandwidth Efficient Cooperative Authentication Scheme for Wireless Sensor Networks” International Journal of Innovative Technology and Exploring Engineering (IJITEE) ISSN: 2278-3075, Volume-2, Issue-6, May 2013.
[9] Akylidz.J, Weilian Su,Boyen.X (2003)“A Survey on Wireless Sensor Networks”. IEEE Communication Magazine 2002 , LNCS, Vol.2729, pp. 383399, Springer-Verlag,.
[10] www.ijarcce.com/ “Projective Clustering Approach for the Detection of Outlier and Non- Axis-Aligned Subspaces”.
[11] https://prezi.com/t6aixt0sdx9/
[12] https://en.wikipedia.org/wiki/Link_aggregatin
[13] Dong.J, Chen.Q, and Niu.Z, (2007) “Random Graph Theory Based Connectivity Analysis in Wireless Sensor Networks with Rayleigh Fading Channels,” Proc. Asia-Pacific Conf. Comm. (APCC ’07),pp. 123-126.
[14] Chen.J, Yu.Q, Zhang.Y, Chen.H, and Sun. Y, (2010) “Feedback Based Clock Synchronization in Wireless Sensor Networks: A Control Theoretic Approach,” IEEE Trans. Vehicular Technology, vol.59, no. 6, pp. 2963-2973.
[15] W. Mao, “Modern Cryptography:” Theory and Practice. Prentice Hall PTR, 2003.
[16] Zhu, Zhengjian, Qingping Tan, and Peidong Zhu.“An effective secure routing for false data injection attack in wireless sensor network." In Managing Next Generation Networks and Services,pp.457-465.Springer,2007.
[17] V.M.Sivagami, K.S.Easwara Kumar "False Data Detection Using MAC pairs in Wireless Sensor Networks"International Journal of Computer Trends and Technology (IJCTT),V4(4):539- 545 April Issue 2013 .ISSN 2231-2803.www.ijcttjournal.org. Published by Seventh Sense Research Group.
[18] Mrs.P.Radhadevi, D Gopi Krishna "Clone Attacks Detection In Wireless Sensor Networks"International Journal of Computer Trends and Technology (IJCTT),V4(6):1527-1529 June Issue 2013 .ISSN 2231-2803.www.ijcttjournal.org. Published by Seventh Sense Research Group.

Keywords
False data injection, Wireless Sensor Networks, Hill Climbing Method.