Energy-Efficient Security Threshold Determination Method for the Enhancement of Interleaved Hop-By-Hop Authentication

Similar documents
SELECTING VOTES FOR ENERGY EFFICIENCY IN PROBABILISTIC VOTING-BASED FILTERING IN WIRELESS SENSOR NETWORKS USING FUZZY LOGIC

MODELING AND SIMULATION OF THRESHOLD ANALYSIS FOR PVFS IN WIRELESS SENSOR NETWORKS

A METHOD FOR DETECTING FALSE POSITIVE AND FALSE NEGATIVE ATTACKS USING SIMULATION MODELS IN STATISTICAL EN- ROUTE FILTERING BASED WSNS

ENSF: ENERGY-EFFICIENT NEXT-HOP SELECTION METHOD USING FUZZY LOGIC IN PROBABILISTIC VOTING-BASED FILTERING SCHEME

WSN LIFETIME EXTENSION USING GA OPTIMISED FUZZY LOGIC

Sungkyunkwan University, Suwon 16419, Republic of Korea 2 College of Software Sungkyunkwan University Suwon 16419, Republic of Korea

A Fuzzy System based Approach to Extend Network Lifetime for En-Route Filtering Schemes in WSNs

ENERGY-EFFICIENT PATH CONFIGURATION METHOD FOR DEF IN WSNS

A Secure Routing Method for Detecting False Reports and Wormhole Attacks in Wireless Sensor Networks *

TDMA-Based Detection of Packet Modification Attacks in Wireless Sensor Networks 1

An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks

Chapter 55 Elimination of Black Hole and False Data Injection Attacks in Wireless Sensor Networks

Mobile Agent Driven Time Synchronized Energy Efficient WSN

Key establishment in sensor networks

Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures

Impact of Black Hole and Sink Hole Attacks on Routing Protocols for WSN

Catching BlackHole Attacks in Wireless Sensor Networks

Key establishment in sensor networks

Unpredictable Software-based Attestation Solution for Node Compromise Detection in Mobile WSN

Use of Symmetric And Asymmetric Cryptography in False Report Filtering in Sensor Networks

The Design and Evaluation of Interleaved Authentication for Filtering False Reports in Multipath Routing WSNs

Dynamic Key Ring Update Mechanism for Mobile Wireless Sensor Networks

Data gathering using mobile agents for reducing traffic in dense mobile wireless sensor networks

Introducing a Routing Protocol Based on Fuzzy Logic in Wireless Sensor Networks

CFMTL: Clustering Wireless Sensor Network Using Fuzzy Logic and Mobile Sink In Three-Level

Energy Efficient Probabilistic MAC Protocol for Minimizing Node Search Space and Access Time in Dense Wireless Networks

Path Renewal Method in Filtering Based Wireless Sensor Networks

ViTAMin: A Virtual Backbone Tree Algorithm for Minimal Energy Consumption in Wireless Sensor Network Routing

Ms A.Naveena Electronics and Telematics department, GNITS, Hyderabad, India.

Selective Forwarding Attacks Detection in WSNs

Secure Data Collection for Wireless Sensor Networks

NUMBER OF NEIGHBOUR NODES BASED NEXT FORWARDING NODES DETERMINATION SCHEME

Routing Scheme in Energy efficient based Protocols for Wireless Sensor Networks

AN ENHANCED DETECTION AND ENERGY- EFFICIENT EN-ROUTE FILTERING SCHEME IN WIRELESS SENSOR NETWORKS

An Energy Efficient Clustering in Wireless Sensor Networks

Compromised nodes in wireless sensor network 1

DETECTING, DETERMINING AND LOCALIZING MULTIPLE ATTACKS IN WIRELESS SENSOR NETWORK - MALICIOUS NODE DETECTION AND FAULT NODE RECOVERY SYSTEM

Design Issues during Wireless Sensor Networks Deployment

Chapter 6 Route Alteration Based Congestion Avoidance Methodologies For Wireless Sensor Networks

IJREAT International Journal of Research in Engineering & Advanced Technology, Volume 1, Issue 2, April-May, 2013 ISSN:

A Time-Based Key Management Protocol for Wireless Sensor Networks

A New Approach for Key Forwarding Scheme in WSN Using Mobile Sink

An Enhanced General Self-Organized Tree-Based Energy- Balance Routing Protocol (EGSTEB) for Wireless Sensor Network

Performance Analysis of Heterogeneous Wireless Sensor Network in Environmental Attack

Index terms Wireless Mesh networks, Selective forwarding attacks, Route Reply Packet, Fuzzy Logic, Detection threshold.

CASER Protocol Using DCFN Mechanism in Wireless Sensor Network

PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS

False Data Filtering Strategy in Wireless Sensor Network Based on Neighbor Node Monitoring

A Feedback-based Multipath Approach for Secure Data Collection in. Wireless Sensor Network.

Research on the Checkpoint Server Selection Strategy Based on the Mobile Prediction in Autonomous Vehicular Cloud

Random Key Pre-distribution Schemes using Multi-Path in Wireless Sensor Networks

Efficient Cluster Head Selection Method Based On K-means Algorithm to Maximize Energy of Wireless Sensor Networks

Performance Analysis of MANET Routing Protocols OLSR and AODV

Armor-LEACH for Wireless Sensor Network

CROSS LAYER PROTOCOL (APTEEN) USING WSN FOR REAL TIME APPLICATION

CHAPTER 2 WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL

Packet Routing using Optimal Flooding Protocol in Cluster based MANET

A Multipath AODV Reliable Data Transmission Routing Algorithm Based on LQI

LIGHTWEIGHT KEY MANAGEMENT SCHEME FOR HIERARCHICAL WIRELESS SENSOR NETWORKS

Source Anonymous Message Authentication and Source Privacy using ECC in Wireless Sensor Network

Blackhole Attack Detection in Wireless Sensor Networks Using Support Vector Machine

A Simple Sink Mobility Support Algorithm for Routing Protocols in Wireless Sensor Networks

Defending Against Resource Depletion Attacks in Wireless Sensor Networks

Abstract. 1. Introduction

DETECTING SYBIL ATTACK USING HYBRID FUZZY K-MEANS ALGORITHM IN WSN

Mobile Sink to Track Multiple Targets in Wireless Visual Sensor Networks

CSMA based Medium Access Control for Wireless Sensor Network

IMPROVEMENT OF FALSE REPORT DETECTION PERFORMANCE BASED ON INVALID DATA DETECTION USING NEURAL NETWORK IN WSN

Clustering Based Certificate Revocation Scheme for Malicious Nodes in MANET

MultiHop Routing for Delay Minimization in WSN

Detection of Wormhole Attacks in Wireless Sensor Networks

Energy Conservation through Sleep Scheduling in Wireless Sensor Network 1. Sneha M. Patil, Archana B. Kanwade 2

Link-Based Wormhole Detection in Wireless Sensor Networks

Level-By-Level Offset Based Wake up Pattern with Hybrid Data Gathering Protocol in a WSN

An Energy Efficient Data Dissemination Algorithm for Wireless Sensor Networks

WIRELESS sensor networks have received a lot of attention

IMPROVING WIRELESS SENSOR NETWORK LIFESPAN THROUGH ENERGY EFFICIENT ALGORITHMS

Effect of Variable Bit Rate Traffic Models on the Energy Consumption in MANET Routing Protocols

@IJMTER-2016, All rights Reserved ,2 Department of Computer Science, G.H. Raisoni College of Engineering Nagpur, India

A Survey on Underwater Sensor Network Architecture and Protocols

A Location-based Directional Route Discovery (LDRD) Protocol in Mobile Ad-hoc Networks

Enhancing Energy Efficiency in Wireless Sensor Networks via Improving Elliptic Curve Digital Signature Algorithm

Investigation on OLSR Routing Protocol Efficiency

Reliable Broadcast Message Authentication in Wireless Sensor Networks

Sensors & Transducers Published by IFSA Publishing, S. L.,

Analysis of Broadcast Authentication Mechanism in Selected Network Topologies

CSC 774 Advanced Network Security

An Energy Efficient Routing Protocol for extending Lifetime of Wireless Sensor Networks by Transmission Radius Adjustment

Regression Based Cluster Formation for Enhancement of Lifetime of WSN

Secured Routing Protocols for Wireless & ATM Networks : An Analysis

Low-Energy-Consumption Ad Hoc Mesh Network Based on Intermittent Receiver-driven Transmission

Specification-based Intrusion Detection. Michael May CIS-700 Fall 2004

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol

TOWARD PRIVACY PRESERVING AND COLLUSION RESISTANCE IN A LOCATION PROOF UPDATING SYSTEM

Reliable Time Synchronization Protocol for Wireless Sensor Networks

Effective Cluster Based Certificate Revocation with Vindication Capability in MANETS Project Report

A Survey On Attacks, Challenges and Security Mechanisms In Wireless Sensor Network

AN ENHANCED SECURE ROUTING ALGORITHM AGAINST SINKHOLE ATTACK IN WIRELESS SENSOR NETWORKS

Energy Efficient Intrusion Detection System for ZigBee based Wireless Sensor Networks

Issues of Long-Hop and Short-Hop Routing in Mobile Ad Hoc Networks: A Comprehensive Study

Transcription:

Vol. 9, No. 12, 218 Energy-Efficient Security Threshold Determination Method for the Enhancement of Interleaved Hop-By-Hop Authentication Ye Lim Kang 1, Tae Ho Cho *2 Department of Electrical and Computer Engineering Sungkyunkwan University Suwon, Republic of Korea Abstract Wireless sensor networks allow attackers to inject false reports by compromising sensor nodes due to the use of wireless communication, the limited energy resources of the sensor nodes, and deployment in an open environment. The forwarding of false reports causes false alarms at the Base Station and consumes the energy of the sensor nodes unnecessarily. As a defense against false report injection attacks, interleaved hop-by-hop authentication was proposed. In interleaved hop-by-hop authentication, the security threshold is a design parameter that influences the number of Message Authentication Codes; the sensor nodes must verify, based on the security requirements of the application and the node density of the network. However, interleaved hop-by-hop authentication fails to defend against false report injection attacks when the number of compromised sensor nodes exceeds the security threshold. To solve this problem, in this paper we propose a security scheme that adjusts the security threshold according to the network situation using an evaluation function. The proposed scheme minimizes the energy consumption of the sensor nodes and reinforces security. Keywords Component; wireless sensor networks; false report injection attack; network security; interleaved hop-by-hop authentication I. INTRODUCTION Wireless Sensor Networks (WSNs) are densely deployed with many sensor nodes and use wireless communication [1]. WSNs are used in various applications that require real-time observation, such as fire detection and enemy movement detection [2]. For this reason, it is important to transmit accurate information to the Base Station (). Security is an essential consideration in WSNs. WSNs are extremely vulnerable to false report injection attacks, due to their use of wireless communication, their deployment in open environments, and the limited energy resources of the sensor nodes [3-4]. In a false report injection attack, an attacker injects a false report into a WSN by compromising certain sensor nodes. The causes false alarms upon receiving false reports. In addition, the forwarding of false reports unnecessarily consumes the energy of the sensor nodes. Therefore, false reports must be detected early and dropped before they arrive at the. As a defense against false report injection attacks, Z. Sencun, S. Sanjeev, J. Sushil., N. Peng proposed Interleaved Hop-by-hop Authentication (IHA) [5-6]. IHA is a security protocol in which sensor nodes detect and drop false reports during transmission if the number of compromised nodes does not exceed a certain Security Threshold (T). IHA is used when strong security is desired because it involves two-step report verification with one-hop neighbors and T+1-hop neighbors. However, IHA does not defend against false report injection attacks when the number of compromised nodes exceeds T. In this paper, we propose a security scheme that determines a suitable T according to the network situation by means of an evaluation function. The resets T according to the network situation and alters the number of Message Authentication Codes (MACs) to be included in the report. By resetting T, it is possible to defend against false report injection attacks when the number of compromised nodes exceeds T. As a result, the proposed scheme improves the total energy efficiency of the network and reinforces security. The composition of this paper is as follows. In Section 2, false report injection attacks and IHA are described. In Section 3, the proposed scheme is described. Section 4 illustrates the performance of the proposed scheme through experimental results. In Section 5, conclusions are drawn. II. RELATED WORK A. False Report Injection Attacks Fig. 1 depicts a false report injection attack in a WSN. An attacker compromises sensor nodes and obtains an authentication key. Then, the attacker generates a false report about an event that did not occur using the acquired authentication key. This causes a false alarm at the, and the sensor nodes consume energy unnecessarily during the transmission of false reports. There are various security protocols to defend against such attacks, including Dynamic En-route Filtering (DEF) and Probabilistic Voting-based Filtering (PVFS) [7-8]. 145 P a g e

Vol. 9, No. 12, 218 Energy Waste message using pairwise keys shared with the cluster nodes. If the endorsement message is authenticated, the CH generates an event report including the MAC, and transmits it toward the. False Alarm 4) En-route Filtering Fig. 3 depicts en-route filtering in IHA. The node receiving a report from the CH verifies the report using a pairwise key shared with its downstream node. Then, the node checks the number of pairwise MACs within the report. The node verifies the last MAC within the pairwise MAC list of the report using the pairwise key shared with its lower association node. If the verification succeeds, the last MAC is eliminated from the pairwise MAC list. The node generates a MAC using the pairwise key shared with its upper association node and adds it to the beginning of the pairwise MAC list of the report. Then, the report is transmitted to the next node. All forwarding nodes repeat the same process. Fig. 1. False Report Injection Attack T=3 B. IHA 1) Node Initialization and Deployment The key server is located at the and distributes and manages keys. The key server preloads unique integer IDs and individual keys onto all nodes. After node deployment, all the nodes discover one-hop neighbor nodes and establish pairwise keys with them [9-1]. 2) Association Discovery Fig. 2 displays the Association Discovery step, in which all nodes discover the IDs of association nodes. For the initial path setup, there are association discovery steps, such as Hello and Cluster Acknowledgement [11]. The Hello step allows the node to discover an upper association node. The broadcasts a Hello message. The node receiving the Hello message discovers the ID of a T+1-hop upper association node within the path. The Cluster Head (CH) receiving the Hello message allocates T+1 IDs to the cluster nodes. The Cluster Acknowledgement (ACK) step allows the node to discover a lower association node. After the Hello step, the CH transmits ACK toward the. The node receiving ACK discovers the ID of a T+1-hop lower association node. Fig. 2. Association Discovery 3) Report Endorsement If an event occurs, the cluster nodes generate an endorsement message including the MAC, and transmit it toward the CH. The CH authenticates the endorsement T=3 Detected and Dropped Fig. 3. En-route Filtering 5) Verification If a report arrives at the, the verifies the compressed individual MACs [12]. The computes T+1 MACs about the event using the authentication keys of the nodes in the ID list of the report. Then, the determines whether or not these MACs match the individual MACs within the report. If the verification succeeds, the report is authenticated. However, if the verification fails, the report is discarded. III. PROPOSED SCHEME A. Problem Statement IHA is an effective security protocol that defends against false report injection attacks. However, it has several problems. 1) IHA loses en-route filtering during false report injection attacks when the number of compromised nodes exceeds T. The event data of a false report that the number of compromised nodes exceeds T are false, but the report is composed of normal MACs. There are not methods to detect and drop such reports before the receives them. 2) In IHA, if the node receives a report, the node goes through a verification process with its T+1-hop neighbor node in addition to its one-hop neighbor node. IHA has powerful security, but the energy of the sensor nodes is consumed much more than with other security protocols. To solve these problems, we propose the following solutions 146 P a g e

Vol. 9, No. 12, 218 3) The network administrator presets standard range of event data values of a normal report. The judges that a received report is false if it deviates from the standard range of a normal report set by the network administrator. 4) The minimizes the energy consumption of the sensor nodes as much as possible by determining the suitable T according to the network situation. B. Assumptions We assume the energy of the sensor nodes is not limited. We assume the is not compromised. C. Proposed Scheme 1) Factors Considered to Determine T Fig. 4 demonstrates that after the resets T based on the False Traffic Ratio (FTR), Residual Energy of the Node (REN), and Max Hop Count (MHC), it broadcasts T. The evaluation function is executed whenever the number of received reports is 1. The performs the evaluation function considering the cluster in which the FTR is the largest and the REN is the smallest among the clusters in which the false report injection attack has occurred. The evaluation function is not executed if T is changed from the initially set T to a new T. The node detecting the false report deletes the false MAC without discarding the false report, and forwards the false report to the by adding the pairwise MAC of its upper association node. The can determine the number of compromised nodes and their IDs using this received false report. The determines the value to which it should reset T according to the number of compromised nodes. T should be reset to a value equal to the number of compromised nodes or greater than the number of compromised nodes. If all the nodes receive a broadcasting message to reset T from the, all the nodes will stop transmitting false reports after detecting them. Once T is reset, all the nodes operate by detecting and dropping false reports, as in existing IHA. Table 1 displays the output according to the inputs of the evaluation function. If the FTR is -1% and the REN is - 1%, the resets T to a value smaller than the initially set T through the evaluation function. Then, the broadcasts T. At this time, the execution condition of the evaluation function is that the number of compromised nodes is smaller than the initially set T. This minimizes unnecessary energy consumption by the sensor nodes. If the FTR is 11-1% and the REN is -1%, the resets T to a value greater than the initially set T through the evaluation function. Then, the broadcasts T. At this time, the execution condition of the evaluation function should be the situation of a false report injection attack when the number of compromised nodes exceeds the initially set T. In other words, the restores en-route filtering by resetting T to a value greater than the initially set T. Therefore, false reports are dropped before they arrive at the. Thus, it is possible to defend against attacks that cannot be defended against by the existing IHA. Determining the suitable T involves adjusting T differently in various network situations, such as attack situations. ~1 11~1 TABLE I. EVALUATION FUNCTION Input REN(%) ~1 ~1 11~21 11~21 22~1 MHC 22~1 ~1 ~1 11~21 11~21 22~1 22~1 Output T Down 2) Reassociation Setup of Nodes The broadcasts the new T to all the nodes when T is reset as a result of the evaluation function. Fig. 5 depicts the process in which all the nodes reset T+1 association node pairwise keys with the new T. For example, if T is changed from 3 to 4, node resets its upper association node pairwise key from to. Up Input FTR REN MHC Evaluation Function Output T resetting 3 4 T=3 CH Fig. 4. Interleaved Hop-by-hop Authentication Using the Evaluation Function Evaluation function (1) determines whether to reset T based on the FTR, REN, and MHC of Path (P). ( ) ( ) ( ) ( ) ( ) IV. Fig. 5. Reassociation Setup PERFORMANCE EVALUATION A. Experimental Environment The experimental environment is as follows: 2 nodes are randomly deployed in the sensor field, which is 1 x 1 in size, and 2 events are generated. The is positioned at (x, y = 1, 1) of the sensor field. The energy required to transmit 1 byte is 16.25 µj, and the energy required to receive 1 byte is 12.5 µj [13]. The energy required to verify a MAC is 75 µj, and the energy required to generate a 147 P a g e

Energy Consumption(mJ) Improvement(%) Energy Consumption(mJ) Improvement(%) Number of Dropped False Reports (IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 9, No. 12, 218 MAC is 15 µj [14]. The size of a MAC is 1 byte and the size of the original report is 12 bytes. The size of the Hello Message is 3 bytes [15]. The initial energy resource of the nodes is 1 J. B. Experimental Results Fig. 6 displays the total energy consumption of the network according to the FTR in the situation of a false report injection attack when the number of compromised nodes is less than T. To demonstrate the energy efficiency of the proposed scheme, we generated 2 events at random positions and analyzed the total energy consumption of the sensor nodes. As the FTR increases, the total energy consumption decreases. IHA maintains the initially set T. In the proposed scheme, the changes its broadcast value from the initially set T to the reduced T if the FTR is -1% and the REN is -1%. Comparing IHA and the proposed scheme, when the FTR is 1%, the energy efficiency is improved by up to 27.17%, as shown in Fig. 6. Fig. 8 displays the number of dropped false reports according to the FTR in the situation of a false report injection attack when the number of compromised nodes exceeds T. To demonstrate the security of the proposed scheme, we generated 2 events at random positions and analyzed the number of dropped false reports. IHA maintains % en-route filtering, while the proposed scheme progressively improves en-route filtering as the FTR increases. Thus, the security of the proposed scheme is better than that of IHA. 25 2 15 1 5 18 16 14 12 1 8 6 3 25 2 15 1 1 2 3 4 5 6 7 8 9 1 IHA Proposed Scheme Fig. 8. Number of Dropped False Reports versus the FTR 4 2 1 2 3 4 5 6 7 8 9 1 IHA Proposed Scheme Improvement(%) Fig. 6. Energy Consumption versus the FTR when the number of compromised nodes is less than T. Fig. 7 displays the total energy consumption of the network according to the FTR in the situation of a false report injection attack when the number of compromised nodes exceeds T. IHA maintains the initially set T. In the proposed scheme, when the FTR is 11-1% and the REN is -1%, the changes its broadcast value from the initially set T to the increased T. Comparing IHA and the proposed scheme, when the FTR is 9%, the energy efficiency increases by up to 24.18%, as shown in Fig. 7. 3 25 2 15 1 5 1 2 3 4 5 6 7 8 9 1 IHA Proposed Scheme Improvement(%) Fig. 7. Energy Consumption versus the FTR when the number of compromised nodes exceeds T. 5 5 3 25 2 15 1 V. CONCLUSIONS WSNs are vulnerable to false report injection attacks. IHA is an effective security protocol to defend against false reports. However, with IHA, it is impossible to defend against false report injection attacks when the number of compromised nodes exceeds T. In this paper, we proposed a WSN security scheme that adjusts T according to the network environment. When sensor nodes detect a false report that the number of compromised nodes is less than T, the reduces T and prevents unnecessary energy use by the sensor nodes through the evaluation function. The broadcasts an increased value of T when the sensor nodes detect a false report that the number of compromised nodes exceeds T. Therefore, en-route filtering is restored, security is enhanced compared to the existing IHA, and unnecessary energy wasting by the sensor nodes is prevented because false reports are discarded in advance. However, in the node initialization deployment step, all the nodes have many keys, so much of the memory of the sensor nodes is consumed. Therefore, in the proposed scheme, costs increase because expensive sensor nodes must be used. Through this experiment, we have demonstrated the performance improvement of the proposed scheme compared with IHA. ACKNOWLEDGMENT This research was supported by the MISP (Ministry of Science, ICT & Future Planning), Korea, under the National Program for Excellence in SW) (215--914) supervised by the IITP (Institute for Information & communications Technology Promotion)" (215--914) REFERENCES [1] A. Ian F., S. Weilian, S. Yogesh, C. Erdal, "A survey on sensor networks." IEEE communications magazine 4.8 (22): 12-114. 148 P a g e

Vol. 9, No. 12, 218 [2] A. K.Jamal N., and K. AHMED E. "Routing techniques in wireless sensor networks: a survey." IEEE wireless communications 11.6 (24): 6-28. [3] Jeba, S. A., and B. Paramasivan. "False data injection attack and its countermeasures in wireless sensor networks." European Journal of Scientific Research 82.2 (212): 248-257. [4] K. Chris, and W. David. "Secure routing in wireless sensor networks: Attacks and countermeasures." Sensor Network Protocols and Applications, 23. Proceedings of the First IEEE. 23 IEEE International Workshop on. IEEE, 23. [5] Z. Sencun, S. Sanjeev, J. Sushil., N. Peng, "An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks." Security and privacy, 24. Proceedings. 24 IEEE symposium on. IEEE, 24. [6] Z. Sencun, and N. Peng. "Interleaved hop-by-hop authentication against false data injection attacks in sensor networks." ACM Transactions on Sensor Networks (TOSN) 3.3 (27): 14. [7] Y. Zhen, and G. Yong. "A dynamic en-route filtering scheme for data reporting in wireless sensor networks." IEEE/ACM Transactions on Networking (ToN) 18.1 (21): 15-163. [8] L. Feng, S. Avinash and W. Jie. "PVFS: a probabilistic voting-based filtering scheme in wireless sensor networks." International Journal of Security and Networks 3.3 (28): 173-182. [9] Z. Sencun, S. Sanjeev, and J. Sushil. "LEAP+: Efficient security mechanisms for large-scale distributed sensor networks." ACM Transactions on Sensor Networks (TOSN) 2.4 (26): 5-528. [1] B. Carlo, S. Alfredo De, H. Amir, K. Shay, V. Ugo, Y. Moti, "Perfectlysecure key distribution for dynamic conferences." Annual international cryptology conference. Springer, Berlin, Heidelberg, 1992. [11] W. Yong, A. Garhan, and R. Byrav. "A survey of security issues in wireless sensor networks." (26). [12] B. Mihir, G. Roch, and R. Phillip. "XOR MACs: New methods for message authentication using finite pseudorandom functions." Annual International Cryptology Conference. Springer, Berlin, Heidelberg, 1995. [13] P. Dongjin, and C. Taeho. "A Fuzzy Rule-based Key Re-Distribution Decision Scheme of Dynamic Filtering for Energy Saving in Wireless Sensor Networks." International Journal of Information Technology and Computer Science (IJITCS) 9.4 (217): 1-8. [14] Y. Fan, L. Haiyun, L. Songwu, Z. Lixia, "Statistical en-route filtering of injected false data in sensor networks." IEEE Journal on Selected Areas in Communications 23.4 (25): 839-85. [15] R. Sajjad, Q. Hassaan Khaliq, K. Syed Ali, R. Veselin, R. Muttukrishnan, "A1: An energy efficient topology control algorithm for connected area coverage in wireless sensor networks." Journal of Network and Computer Applications 35.2 (212): 597-65.l 149 P a g e