Tae Kyung Kim and Hee Suk Seo
Simulation using the Recursive Method in USN
1047 - 1050
2008
2
6
International Journal of Electronics and Communication Engineering
https://publications.waset.org/pdf/8708
https://publications.waset.org/vol/18
World Academy of Science, Engineering and Technology
Sensor networks are often deployed in unattended
environments, thus leaving these networks vulnerable to false data
injection attacks in which an adversary injects forged reports into the
network through compromised nodes, with the goal of deceiving the
base station or depleting the resources of forwarding nodes. Several
research solutions have been recently proposed to detect and drop such
forged reports during the forwarding process. Each design can provide
the equivalent resilience in terms of node compromising. However,
their energy consumption characteristics differ from each other. Thus,
employing only a single filtering scheme for a network is not a
recommendable strategy in terms of energy saving. It&039;s very important
the threshold determination for message authentication to identify. We
propose the recursive contract net protocols which less energy level of
terminal node in wireless sensor network.
Open Science Index 18, 2008