{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,6]],"date-time":"2024-07-06T21:53:48Z","timestamp":1720302828981},"reference-count":46,"publisher":"MDPI AG","issue":"18","license":[{"start":{"date-parts":[[2019,9,19]],"date-time":"2019-09-19T00:00:00Z","timestamp":1568851200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100003621","name":"Ministry of Science, ICT and Future Planning","doi-asserted-by":"publisher","award":["NRF-2017R1A2B2012337"],"id":[{"id":"10.13039\/501100003621","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"Static sink-based wireless sensor networks (WSNs) suffer from an energy-hole problem. This incurs as the rate of energy consumption on sensor nodes around sinks and on critical paths is considerably faster. State-of-the-art en-routing filtering schemes save energy by countering false report injection attacks. In addition to their unique limitations, these schemes generally do not examine energy awareness in underlying routing. Mostly, these security methods are based on a fixed filtering capacity, unable to respond to changes in attack intensity. Therefore, these limitations cause network partition(s), exhibiting adverse effects on network lifetime. Extending network lifetime while preserving energy and security thus becomes an interesting challenge. In this article, we address the aforesaid shortcomings with the proposed adaptive en-route filtering (AEF) scheme. In energy-aware routing, the fitness function, which is used to select forwarding nodes, considers residual energy and other factors as opposed to distance only. In pre-deterministic key distribution, keys are distributed based on the consideration of having paths with a different number of verification nodes. This, consequently, permits us to have multiple paths with different security levels that can be exploited to counter different attack intensities. Taken together, the integration of the special fitness function with the new key distribution approach enables the AEF to adapt the underlying dynamic network conditions. The simulation experiments under different settings show significant improvements in network lifetime.<\/jats:p>","DOI":"10.3390\/s19184036","type":"journal-article","created":{"date-parts":[[2019,9,19]],"date-time":"2019-09-19T07:40:06Z","timestamp":1568878806000},"page":"4036","source":"Crossref","is-referenced-by-count":8,"title":["AEF: Adaptive En-Route Filtering to Extend Network Lifetime in Wireless Sensor Networks"],"prefix":"10.3390","volume":"19","author":[{"given":"Muhammad K.","family":"Shahzad","sequence":"first","affiliation":[{"name":"Department of Computing, SEECS, National University of Sciences and Technology, Islamabad 44000, Pakistan"}]},{"ORCID":"http:\/\/orcid.org\/0000-0003-2968-9561","authenticated-orcid":false,"given":"S. M. Riazul","family":"Islam","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Sejong University, Seoul 05006, Korea"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-9559-4352","authenticated-orcid":false,"given":"Kyung-Sup","family":"Kwak","sequence":"additional","affiliation":[{"name":"Department of Information and Communication Engineering, Inha University, Incheon 22212, Korea"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-8871-4299","authenticated-orcid":false,"given":"Lewis","family":"Nkenyereye","sequence":"additional","affiliation":[{"name":"Department of Computer and Information Security, Sejong University, Seoul 05006, Korea"}]}],"member":"1968","published-online":{"date-parts":[[2019,9,19]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Lyshevski, S.E. (2018). Nano-And Micro-Electromechanical Systems: Fundamentals of Nano-And Microengineering, CRC Press.","DOI":"10.1201\/9781315219288"},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Lyshevski, S.E. (2018). MEMS and NEMS: Systems, Devices, and Structures, CRC Press.","DOI":"10.1201\/9781315220246"},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Author1, T. (2010). A dynamic en-route filtering scheme for data reporting in wireless sensor networks. IEEE\/ACM Trans. Netw., 18, 150\u2013163.","DOI":"10.1109\/TNET.2009.2026901"},{"key":"ref_4","unstructured":"Yang, H., and Lu, S. (2004, January 26\u201329). Commutative cipher based en-route filtering in wireless sensor networks. Proceedings of the IEEE 60th Vehicular Technology Conference, Los Angeles, CA, USA."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"839","DOI":"10.1109\/JSAC.2005.843561","article-title":"Statistical en-route filtering of injected false data in sensor networks","volume":"23","author":"Ye","year":"2005","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Kraub, C., Schneider, M., Bayarou, K., and Eckert, C. (2007, January 10\u201313). STEF: A secure ticket-based en-route filtering scheme for wireless sensor networks. Proceedings of the Second International Conference on Availability, Reliability and SecurityARES 2007, Vienna, Austria.","DOI":"10.1109\/ARES.2007.144"},{"key":"ref_7","first-page":"839","article-title":"Interleaved hop-by-hop authentication against false data injection attacks in sensor networks","volume":"23","author":"Zhu","year":"2007","journal-title":"ACM Trans. Sens. Netw."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1109\/TPDS.2011.95","article-title":"BECAN: A bandwidth-efficient cooperative authentication scheme for filtering injected false data in wireless sensor networks","volume":"23","author":"Lu","year":"2012","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Karp, B., and Kung, H.-T. (2000, January 6\u201310). GPSR: Greedy perimeter stateless routing for wireless networks. Proceedings of the 6th Annual International Conference on Mobile Computing and Networking\u2014MobiCom\u201906, Boston, MA, USA.","DOI":"10.1145\/345910.345953"},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Zhou, Y., Yang, H.Y., Hu, Y.H., and Kung, S.-Y. (2019). Cross-Layer Network Lifetime Maximization in Underwater Wireless Sensor Networks. IEEE Syst. J., 1\u201312.","DOI":"10.1109\/JSYST.2019.2920681"},{"key":"ref_11","first-page":"49","article-title":"Comparative study of radio models for data gathering in wireless sensor network","volume":"27","author":"Banerjee","year":"2011","journal-title":"Int. J. Comput. Appl."},{"key":"ref_12","unstructured":"Heinzelman, W.R., Chandrakasan, A., and Balakrishnan, H. (2000, January 7). Energy-efficient communication protocol for wireless microsensor networks. Proceedings of the 33rd Annual Hawaii International Conference on System Sciences, Maui, HI, USA."},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Wang, J., Yin, Y., Kim, J.-U., Lee, S., and Lai, C.-F. (2012, January 27\u201329). A Mobile-Sink Based Energy-Efficient Clustering Algorithm for Wireless Sensor Networks. Proceedings of the 2012 IEEE 12th International Conference on Computer and Information Technology, Chengdu, China.","DOI":"10.1109\/CIT.2012.142"},{"key":"ref_14","unstructured":"Elqusy, A.S., Essa, S.E., and Ayman, E.-S. (2000, January 4\u20137). A Survey of Wireless Sensor Network Attacks. Proceedings of the HICSS-33, Maui, HI, USA."},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Azzabi, T., Farhat, H., and Sahli, N. (2017, January 14\u201317). A survey on wireless sensor networks security issues and military specificitie. Proceedings of the 2017 International Conference on Advanced Systems and Electric Technologies (IC_ASET), Hammamet, Tunisia.","DOI":"10.1109\/ASET.2017.7983668"},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"52","DOI":"10.1049\/iet-wss.2017.0029","article-title":"DDoS attacks in WSNs: Detection and countermeasures","volume":"8","author":"Abidoye","year":"2018","journal-title":"IET Wirel. Sens. Syst."},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Xing, K., Srinivasan, S.S.R., Jose, M., Li, J., and Cheng, X. (2010). Attacks and countermeasures in sensor networks: A survey. Network Security 2010, Springer.","DOI":"10.1007\/978-0-387-73821-5_11"},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"697","DOI":"10.1007\/s11277-017-4197-0","article-title":"En-route filtering techniques in wireless sensor networks: A survey","volume":"96","author":"Kumar","year":"2017","journal-title":"Wirel. Pers. Commun."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"2481","DOI":"10.1007\/s11276-014-0761-7","article-title":"Security of the Internet of Things: Perspectives and challenge","volume":"20","author":"Jing","year":"2014","journal-title":"Wirel. Netw."},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Harb, H., Makhoul, A., and Jaoude, C.A. (2018, January 25\u201329). En-route data filtering technique for maximizing wireless sensor network lifetime. Proceedings of the 2018 14th International Wireless Communications & Mobile Computing Conference (IWCMC), Limassol, Cyprus.","DOI":"10.1109\/IWCMC.2018.8450348"},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"581","DOI":"10.1007\/s11277-012-0709-0","article-title":"Avoiding energy holes to maximize network lifetime in gradient sinking sensor networks","volume":"70","author":"Liu","year":"2017","journal-title":"Wirel. Pers. Commun."},{"key":"ref_22","unstructured":"Crossbow (2018, April 18). Mica2 Datasheet. xbow. Available online: http:\/\/www.xbow.com\/."},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Shahzad, K., Ali, A., and Gohar, N.D. (2008, January 25\u201328). ETSP: An energy-efficient time synchronization protocol for wireless sensor networks. Proceedings of the 22nd International Conference on Advanced Information Networking and Applications\u2014Workshops (Aina Workshops 2008), Okinawa, Japan.","DOI":"10.1109\/WAINA.2008.181"},{"key":"ref_24","first-page":"1795","article-title":"False Data Filtering In Wireless Sensor Networks","volume":"9","author":"Luo","year":"2016","journal-title":"Int. J. Smart Sens. Intell. Syst."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"2807","DOI":"10.1587\/transcom.E95.B.2807","article-title":"Key Index-Based Routing for Filtering False Event Reports in Wireless Sensor Networks","volume":"95","author":"Moon","year":"2012","journal-title":"IEICE Trans. Commun."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1016\/j.comnet.2016.05.022","article-title":"On Maximizing the Lifetime for Data Aggregation in Wireless Sensor Networks using Virtual Data Aggregation Trees","volume":"105","author":"Nguyen","year":"2016","journal-title":"Comput. Netw."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"181","DOI":"10.1049\/iet-wss.2015.0087","article-title":"Energy Efficient Clustering Protocol Based on K-Means (EECPK-Means)-Midpoint Algorithm for Enhanced Network Lifetime in Wireless Sensor Network","volume":"6","author":"Ray","year":"2016","journal-title":"IET Wirel. Sens. Syst."},{"key":"ref_28","first-page":"274","article-title":"An exact approach to extend network lifetime in a general class of wireless sensor networks","volume":"433","author":"Marc","year":"2018","journal-title":"Inf. Sci."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"3332","DOI":"10.1109\/JSEN.2016.2527056","article-title":"Distributed topology control with lifetime extension based on non-cooperative game for wireless sensor networks","volume":"16","author":"Xu","year":"2016","journal-title":"IEEE Sens. J."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1016\/j.dsp.2019.05.004","article-title":"Data censoring with network lifetime constraint in wireless sensor networks","volume":"92","author":"Liu","year":"2019","journal-title":"Digit. Signal Process."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"534","DOI":"10.1109\/LCOMM.2019.2895311","article-title":"Impact of Optimal Hop Distance on the Network Lifetime for Wireless Sensor Networks With QoS Requirements","volume":"23","author":"Ding","year":"2019","journal-title":"IEEE Commun. Lett."},{"key":"ref_32","first-page":"1","article-title":"An energy efficient protocol based on fuzzy logic to extend network lifetime and increase transmission efficiency in wireless sensor networks","volume":"6","author":"Van","year":"2018","journal-title":"J. Intell. Fuzzy Syst."},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"279","DOI":"10.1007\/s10586-015-0526-9","article-title":"An energy-efficient load balancing scheme to extend lifetime in wireless sensor networks","volume":"19","author":"Kim","year":"2016","journal-title":"Clust. Comput."},{"key":"ref_34","unstructured":"Bahl, V., and Anup, B. (2018). Enhanced Energy Efficient Cluster Head Selection Algorithm for Improvement in Network Lifetime for Wireless Sensor Network. Int. J. Inf. Syst. Manag. Sci., forthcoming."},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"551","DOI":"10.1109\/SURV.2012.062612.00084","article-title":"Energy-Efficient Routing Protocols in Wireless Sensor Networks: A Surveys","volume":"15","author":"Pantazis","year":"2013","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"771","DOI":"10.1007\/s11235-015-0111-9","article-title":"A multicast delivery approach with minimum energy consumption for wireless multi-hop networks","volume":"62","author":"Jiang","year":"2016","journal-title":"Telecommun. Syst."},{"key":"ref_37","doi-asserted-by":"crossref","unstructured":"Ai, Z.Y., Zhou, Y.T., and Song, F. (2018). A smart collaborative routing protocol for reliable data diffusion in IoT scenarios. Sensors, 18.","DOI":"10.3390\/s18061926"},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"66","DOI":"10.1016\/j.comnet.2018.01.012","article-title":"Towards minimum-delay and energy-efficient flooding in low-duty-cycle wireless sensor networks","volume":"134","author":"Cheng","year":"2016","journal-title":"Comput. Netw."},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"810","DOI":"10.1109\/TNET.2014.2306592","article-title":"EDAL: An energy-efficient, delay-aware, and lifetime-balancing data collection protocol for heterogeneous wireless sensor network","volume":"23","author":"Yao","year":"2015","journal-title":"IEEE\/ACM Trans. Netw. (TON)"},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"593","DOI":"10.1016\/j.ins.2018.06.002","article-title":"Smart collaborative distribution for privacy enhancement in moving target defense","volume":"479","author":"Song","year":"2019","journal-title":"Inf. Sci."},{"key":"ref_41","doi-asserted-by":"crossref","unstructured":"Wang, L., Hu, Z., and Liu, L. (2019). Privacy-Preserving and Dynamic Spatial Range Aggregation Query Processing in Wireless Sensor Network. International Conference on Database Systems for Advanced Applications, Springer.","DOI":"10.1007\/978-3-030-18590-9_28"},{"key":"ref_42","doi-asserted-by":"crossref","unstructured":"Liu, L., Hu, Z., and Wang, L. (2019). Energy-efficient and privacy-preserving spatial range aggregation query processing in wireless sensor networks. Int. J. Distrib. Sens. Netw., 15.","DOI":"10.1177\/1550147719861005"},{"key":"ref_43","unstructured":"Lou, W., Liu, W., and Fang, Y. (2003, January 13\u201316). SPREAD: Improving network security by multipath routings. Proceedings of the IEEE Military Communications Conference, Boston, MA, USA."},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"1601","DOI":"10.1109\/TMC.2018.2865485","article-title":"LORA: Load-Balanced Opportunistic Routing for Asynchronous Duty-Cycled WSN","volume":"18","author":"Hawbani","year":"2018","journal-title":"IEEE Trans. Mob. Comput."},{"key":"ref_45","doi-asserted-by":"crossref","first-page":"56","DOI":"10.1109\/MCOM.2011.5762798","article-title":"Network localization and navigation via cooperation","volume":"49","author":"Win","year":"2011","journal-title":"IEEE Commun. Mag."},{"key":"ref_46","doi-asserted-by":"crossref","first-page":"233","DOI":"10.1016\/j.pmcj.2006.11.001","article-title":"Analytical modeling and mitigation techniques for the energy hole problem in sensor networks","volume":"3","author":"Li","year":"2007","journal-title":"Pervasive Mob. Comput."}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/19\/18\/4036\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,20]],"date-time":"2024-06-20T17:40:51Z","timestamp":1718905251000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/19\/18\/4036"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,9,19]]},"references-count":46,"journal-issue":{"issue":"18","published-online":{"date-parts":[[2019,9]]}},"alternative-id":["s19184036"],"URL":"https:\/\/doi.org\/10.3390\/s19184036","relation":{},"ISSN":["1424-8220"],"issn-type":[{"value":"1424-8220","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,9,19]]}}}