
Wireless sensor networks (WSNs) self-organize clusters via communication between multiple sensor nodes that are deployed across a large field and an open environment. Therefore, nodes can be easily compromised, and attackers can launch false report injection attacks through compromised nodes. Several security protocols based on a message authentication code (MAC), such as the Probability Voting based Filtering Scheme, have been proposed to prevent application-layer attacks. MAC-based protocols remain vulnerable to high-level attacks where all MACs have false event values. We propose a temporal logic-based security model that allows the base station to defend against false report attacks by executing report authenticity detection using a temporal logic rule.
False Report Detection; Temporal Logic based Inference; Wireless Sensor Networks Security; Intelligence False Report Injection Attack;
False Report Detection; Temporal Logic based Inference; Wireless Sensor Networks Security; Intelligence False Report Injection Attack;
| selected citations These citations are derived from selected sources. This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | 0 | |
| popularity This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network. | Average | |
| influence This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | Average | |
| impulse This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network. | Average |
