To see the other types of publications on this topic, follow the link: Statistical En-route Filtering.

Journal articles on the topic 'Statistical En-route Filtering'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 17 journal articles for your research on the topic 'Statistical En-route Filtering.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Akram, Muhammad, Muhammad Ashraf, and Tae Ho Cho. "Enhancing the Statistical Filtering Scheme to Detect False Negative Attacks in Sensor Networks." Sukkur IBA Journal of Computing and Mathematical Sciences 1, no. 1 (2017): 52. http://dx.doi.org/10.30537/sjcms.v1i1.7.

Full text
Abstract:
In this paper, we present a technique that detects both false positive and false negative attacks in statistical filtering-based wireless sensor networks. In statistical filtering scheme, legitimate reports are repeatedly verified en route before they reach the base station, which causes heavy energy consumption. While the original statistical filtering scheme detects only false reports, our proposed method promises to detect both attacks.
APA, Harvard, Vancouver, ISO, and other styles
2

Fan Ye, H. Luo, Songwu Lu, and Lixia Zhang. "Statistical en-route filtering of injected false data in sensor networks." IEEE Journal on Selected Areas in Communications 23, no. 4 (2005): 839–50. http://dx.doi.org/10.1109/jsac.2005.843561.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Tae-Ho, Cho, and Ahn Jung-Sub. "METHOD FOR THE PERIOD DETERMINATION OF SECURITY LEVEL UPDATE IN STATISTICAL EN-ROUTE FILTERING." International Journal of Research - Granthaalayah 5, no. 11 (2017): 158–67. https://doi.org/10.5281/zenodo.1069419.

Full text
Abstract:
Energy management of WSN is one of the major issues. Many kind of attacks in WSN paralyze the network by exhausting node energy. Especially false report insertion attack, which is one of the several WSN attacks, is to inform users of false alarms as well as unnecessary energy consumption. F. Ye et al. proposed statistical en-route filtering to prevent false report injection attacks. In order to effectively use their scheme, techniques for determining thresholds using fuzzy logic have been studied. To effectively apply these techniques to the network, an appropriate security level period update should be set according to the network environments. In this paper, we propose a security period update method using fuzzy logic in order to improve the lifetime of the network in the statistical en-route filtering approach based on a wireless sensor network of the cluster environment. Normally SEF thresholds should be changed by a user according to the network environment. Our proposed method allows automatically setting the effective threshold for the environment by fuzzy logic. The experimental results show that the energy efficiency increased by 26.5%.
APA, Harvard, Vancouver, ISO, and other styles
4

Cho, Tae-Ho, and Jung-Sub Ahn. "METHOD FOR THE PERIOD DETERMINATION OF SECURITY LEVEL UPDATE IN STATISTICAL EN-ROUTE FILTERING." International Journal of Research -GRANTHAALAYAH 5, no. 11 (2017): 158–67. http://dx.doi.org/10.29121/granthaalayah.v5.i11.2017.2340.

Full text
Abstract:
Energy management of WSN is one of the major issues. Many kind of attacks in WSN paralyze the network by exhausting node energy. Especially false report insertion attack, which is one of the several WSN attacks, is to inform users of false alarms as well as unnecessary energy consumption. F. Ye et al. proposed statistical en-route filtering to prevent false report injection attacks. In order to effectively use their scheme, techniques for determining thresholds using fuzzy logic have been studied. To effectively apply these techniques to the network, an appropriate security level period update should be set according to the network environments. In this paper, we propose a security period update method using fuzzy logic in order to improve the lifetime of the network in the statistical en-route filtering approach based on a wireless sensor network of the cluster environment. Normally SEF thresholds should be changed by a user according to the network environment. Our proposed method allows automatically setting the effective threshold for the environment by fuzzy logic. The experimental results show that the energy efficiency increased by 26.5%.
APA, Harvard, Vancouver, ISO, and other styles
5

Watanabe, Yuji. "Performance evaluation of immunity-based statistical en-route filtering in wireless sensor networks." Artificial Life and Robotics 16, no. 3 (2011): 422–25. http://dx.doi.org/10.1007/s10015-011-0969-x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Ahn, Jung-Sub, and Tae-Ho Cho. "A CORRELATION ANALYSIS OF THE MAC LENGTH IN STATISTICAL EN-ROUTE FILTERING BASED WSNS." International Journal of Advanced Research 4, no. 8 (2016): 1844–50. http://dx.doi.org/10.21474/ijar01/1399.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Nam, SuMan, and TaeHo Cho. "CONTEXT-AWARE ARCHITECTURE FOR STATISTICAL EN-ROUTE FILTERING TO IDENTIFY COMPROMISED NODES IN WIRELESS SENSOR NETWORKS." International Journal of Advanced Research 4, no. 8 (2016): 1662–68. http://dx.doi.org/10.21474/ijar01/1377.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Nam, Su-Man, Chung-Il Sun, and Tae-Ho Cho. "The Secure Path Cycle Selection Method for Improving Energy Efficiency in Statistical En-route Filtering Based WSNs." Journal of the Korea Society for Simulation 20, no. 4 (2011): 31–40. http://dx.doi.org/10.9709/jkss.2011.20.4.031.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Su, Man Nam, and Ho Cho Tae. "A METHOD FOR DETECTING FALSE POSITIVE AND FALSE NEGATIVE ATTACKS USING SIMULATION MODELS IN STATISTICAL ENROUTE FILTERING BASED WSNS." Advances in Vision Computing: An International Journal (AVC) 3, no. 3 (2016): 09–16. https://doi.org/10.5281/zenodo.3518809.

Full text
Abstract:
In wireless sensor networks, adversaries compromise sensor nodes to damage the network though potential threats such as false positive and false negative attacks. The false positive attacks cause energy drain and false alarms, and false negative attacks generate information loss. To address the false positive attacks in the sensor network, a statistical en-route filtering (SEF) detects the false report in intermediate nodes. Even though the scheme detects the false report against the false positive attack, it is difficult to detect false MACs in a legitimate report against the false negative attack in the SEF-based WSN. Our proposed method effectively detects the false positive and false negative attacks in the sensor network through a simulation model. The experimental results indicate that the proposed method increase detection power while maintaining the energy consumption of the network against the false positive and false negative attacks.
APA, Harvard, Vancouver, ISO, and other styles
10

Su, Man Nam, and Ho Cho Tae. "A METHOD FOR DETECTING FALSE POSITIVE AND FALSE NEGATIVE ATTACKS USING SIMULATION MODELS IN STATISTICAL ENROUTE FILTERING BASED WSNS." Advances in Vision Computing: An International Journal (AVC) 3, no. 3 (2016): 09–16. https://doi.org/10.5281/zenodo.3689099.

Full text
Abstract:
In wireless sensor networks, adversaries compromise sensor nodes to damage the network though potential threats such as false positive and false negative attacks. The false positive attacks cause energy drain and false alarms, and false negative attacks generate information loss. To address the false positive attacks in the sensor network, a statistical en-route filtering (SEF) detects the false report in intermediate nodes. Even though the scheme detects the false report against the false positive attack, it is difficult to detect false MACs in a legitimate report against the false negative attack in the SEF-based WSN. Our proposed method effectively detects the false positive and false negative attacks in the sensor network through a simulation model. The experimental results indicate that the proposed method increase detection power while maintaining the energy consumption of the network against the false positive and false negative attacks.
APA, Harvard, Vancouver, ISO, and other styles
11

An, Ga-Hyeon, and Tae-Ho Cho. "Wormhole Detection Using Encrypted Node IDs and Hop Counts in the Event Report of Statistical En-Route Filtering." International Journal of Computer Networks and Applications 8, no. 4 (2021): 390. http://dx.doi.org/10.22247/ijcna/2021/209705.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Nam, Su Man, Chung Il Sun, and Tae Ho Cho. "Secure Path Cycle Selection Method Using Fuzzy Logic System for Improving Energy Efficiency in Statistical En-Route Filtering Based WSNs." Wireless Sensor Network 03, no. 11 (2011): 357–61. http://dx.doi.org/10.4236/wsn.2011.311041.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Hae, Young Lee, and Ho Cho Tae. "Fuzzy based Security Threshold Determining for the Statistical En-Route Filtering in Sensor Networks." February 22, 2008. https://doi.org/10.5281/zenodo.1060785.

Full text
Abstract:
In many sensor network applications, sensor nodes are deployed in open environments, and hence are vulnerable to physical attacks, potentially compromising the node's cryptographic keys. False sensing report can be injected through compromised nodes, which can lead to not only false alarms but also the depletion of limited energy resource in battery powered networks. Ye et al. proposed a statistical en-route filtering scheme (SEF) to detect such false reports during the forwarding process. In this scheme, the choice of a security threshold value is important since it trades off detection power and overhead. In this paper, we propose a fuzzy logic for determining a security threshold value in the SEF based sensor networks. The fuzzy logic determines a security threshold by considering the number of partitions in a global key pool, the number of compromised partitions, and the energy level of nodes. The fuzzy based threshold value can conserve energy, while it provides sufficient detection power.
APA, Harvard, Vancouver, ISO, and other styles
14

Hong, Taek Ho. "A Method for Detecting False Positive and False Negative Attacks Using Simulation Models in Statistical Enroute Filtering Based WSNs." Advances in Vision Computing: An International Journal (AVC) 3, no. 3 (2016). https://doi.org/10.5281/zenodo.14227407.

Full text
Abstract:
In wireless sensor networks, adversaries compromise sensor nodes to damage the network though potential threats such as false positive and false negative attacks. The false positive attacks cause energy drain and false alarms, and false negative attacks generate information loss. To address the false positive attacks in the sensor network, a statistical en route filtering (SEF) detects the false report in intermediate nodes.
APA, Harvard, Vancouver, ISO, and other styles
15

Su, Man Nam, and Ho Cho Tae. "A METHOD FOR DETECTING FALSE POSITIVE AND FALSE NEGATIVE ATTACKS USING SIMULATION MODELS IN STATISTICAL ENROUTE FILTERING BASED WSNS." September 30, 2016. https://doi.org/10.5121/avc.2016.3302.

Full text
Abstract:
In wireless sensor networks, adversaries compromise sensor nodes to damage the network though potential threats such as false positive and false negative attacks. The false positive attacks cause energy drain and false alarms, and false negative attacks generate information loss. To address the false positive attacks in the sensor network, a statistical en-route filtering (SEF) detects the false report in intermediate nodes. Even though the scheme detects the false report against the false positive attack, it is difficult to detect false MACs in a legitimate report against the false negative attack in the SEF-based WSN. Our proposed method effectively detects the false positive and false negative attacks in the sensor network through a simulation model. The experimental results indicate that the proposed method increase detection power while maintaining the energy consumption of the network against the false positive and false negative attacks.
APA, Harvard, Vancouver, ISO, and other styles
16

"Node Burden-based Load-balancing Management Method for Extended Network Lifetimes of WSNs." International Journal of Engineering and Advanced Technology 9, no. 1 (2019): 5602–7. http://dx.doi.org/10.35940/ijeat.a2248.109119.

Full text
Abstract:
The sensor nodes of a wireless sensor networks (WSNs) are difficult to replace when they fails after deployment. Sensor nodes are small and low-cost due to limited resources and are vulnerable to several types of application attacks. To solve this problem, many security protocols have been meticulously researched considering the energy efficiency and network attacks. The statistical en-route filtering (SEF) scheme has been proposed to detect bogus data and false report injection attacks that reduce network life. SEF performs early filtering of modulated data using the en-route technique. Deployed nodes transmit a report to the sink node through hop-by-hop communication, and as a result nodes close to the sink node have a relatively high burden. Although many studies have been proposed to improve the energy efficiency of each node based on the SEF scheme, these studies are not considered the Burden of the cluster. A cluster with a high burden exhausts the node energy faster than another cluster with low burden. If a cluster in the upper stream is depleted, it will not be able to receive reports from many regions in the lower stream. Therefore, the SEF should be used to determine proper routing while considering the node density to increase the lifetime of the network. In this paper, we propose a method to control the load balancing of nodes considering the burden ratio and density of nodes. The cluster head node controls the route path using additional cluster information in the proposed scheme. The experimental results show that the proposed scheme prolongs the network lifetime efficiency by 35.645% compared to the existing scheme
APA, Harvard, Vancouver, ISO, and other styles
17

CHONG, CHONG TaeKeum. "A Method for Detecting False Positive and False Negative Attacks Using Simulation Models in Statistical Enroute Filtering Based WSNs." Advances in Vision Computing: An International Journal (AVC) 3, no. 3 (2016). https://doi.org/10.5281/zenodo.14044857.

Full text
Abstract:
In wireless sensor networks, adversaries compromise sensor nodes to damage the network though potential threats such as false positive and false negative attacks. The false positive attacks cause energy drain and false alarms, and false negative attacks generate information loss. To address the false positive attacks in the sensor network, a statistical en route filtering (SEF) detects the false report in intermediate nodes. Even though the scheme detects the false report against the false positive attack, it is difficult to detect false MACs in a legitimate report against the false negative attack in the SEF-based WSN. Our proposed method effectively detects the false positive and false negative attacks in the sensor network through a simulation model. The experimental results indicate that the proposed method increase detection power while maintaining the energy consumption of the network against the false positive and false negative attack
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography