• KSII Transactions on Internet and Information Systems
    Monthly Online Journal (eISSN: 1976-7277)

Enhancing Probabilistic Voting-based Filtering Scheme against Injection Attacks

Vol. 19, No. 6, June 30, 2025
10.3837/tiis.2025.06.011, Download Paper (Free):

Abstract

In wireless sensor networks, sensor nodes are deployed in target territory by aircrafts. Sensor nodes in hostile environments are easy to be captured by adversaries physically. By exploiting the captured nodes which are called compromised node, the adversaries can read information and control by re-programming. Using the compromised nodes, adversaries perform false data injection attack. Against the attack, a lot of solutions are researched. In the solutions, en-route filtering schemes provide probabilistically methods for detecting fabricated data. Although these schemes detect fabricated data, they cannot identify the compromised node after detecting attacks. In this paper, we will illustrate the defective and propose a robustness method for detecting and preventing attack in the network. Proposed method detects injection attacks and makes compromised nodes isolated. We also will show the efficiency of our solution through simulations.


Statistics

Show / Hide Statistics

Statistics (Cumulative Counts from December 1st, 2015)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article

[IEEE Style]
J. M. Kim and I. Chun, "Enhancing Probabilistic Voting-based Filtering Scheme against Injection Attacks," KSII Transactions on Internet and Information Systems, vol. 19, no. 6, pp. 1973-1986, 2025. DOI: 10.3837/tiis.2025.06.011.

[ACM Style]
Jin Myoung Kim and Ingeol Chun. 2025. Enhancing Probabilistic Voting-based Filtering Scheme against Injection Attacks. KSII Transactions on Internet and Information Systems, 19, 6, (2025), 1973-1986. DOI: 10.3837/tiis.2025.06.011.

[BibTeX Style]
@article{tiis:102780, title="Enhancing Probabilistic Voting-based Filtering Scheme against Injection Attacks", author="Jin Myoung Kim and Ingeol Chun and ", journal="KSII Transactions on Internet and Information Systems", DOI={10.3837/tiis.2025.06.011}, volume={19}, number={6}, year="2025", month={June}, pages={1973-1986}}