@article{(Open Science Index):https://publications.waset.org/pdf/8708, title = {Simulation using the Recursive Method in USN}, author = {Tae Kyung Kim and Hee Suk Seo}, country = {}, institution = {}, abstract = {Sensor networks are often deployed in unattended environments, thus leaving these networks vulnerable to false data injection attacks in which an adversary injects forged reports into the network through compromised nodes, with the goal of deceiving the base station or depleting the resources of forwarding nodes. Several research solutions have been recently proposed to detect and drop such forged reports during the forwarding process. Each design can provide the equivalent resilience in terms of node compromising. However, their energy consumption characteristics differ from each other. Thus, employing only a single filtering scheme for a network is not a recommendable strategy in terms of energy saving. It's very important the threshold determination for message authentication to identify. We propose the recursive contract net protocols which less energy level of terminal node in wireless sensor network.}, journal = {International Journal of Electronics and Communication Engineering}, volume = {2}, number = {6}, year = {2008}, pages = {1047 - 1050}, ee = {https://publications.waset.org/pdf/8708}, url = {https://publications.waset.org/vol/18}, bibsource = {https://publications.waset.org/}, issn = {eISSN: 1307-6892}, publisher = {World Academy of Science, Engineering and Technology}, index = {Open Science Index 18, 2008}, }