An Improved Energy-Efficient Faulty Information Extraction Scheme Using PFDIAES and PFDIF Algorithms

  • P. T. KalaivaaniEmail author
  • Raja Krishnamoorthy
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 1154)


Wireless Sensor Networks (WSNs) comprises tiny sensor nodes which have been used for various applications such as Health Monitoring, Forest Fire Detection, Data Collection, Temperature Sensing, Military Application, and Security applications. Among the applications, Security in WSNs is the most challenging one because faulty information can be easily injected into the network by the intruder/attacker. Faulty information injection at the sink level may reduce the lifetime of the network and also energy wastage due to the difficulty in updating information with Base Station (BS). Two algorithms are proposed to detect and drop the false data such as Prevention of False Data Injection using Advanced Encryption Standard (PFDIAES) and Prevention of False Data Injection with Fuzzy-based method (PFDIF). The proposed improved energy-efficient faulty information extraction using PFDIF and PFDIAES algorithms is used to filter and prevent false data at the destination node. To analyze the performance of the network in critical condition, the gang attack is also considered. From the simulation results, PFDIAES has an average energy efficiency value of 1.7% and PFDIF has 5.5% of energy efficiency than the existing algorithms such as AES and FUZZY-based method.


Base station Energy wastage Faulty information extraction Gang attack PFDIAES PFDIF Security WSNs 


  1. 1.
    Bhattacharyya, D., Kim, T.-H., Pal, S.: A comparative study of wireless sensor networks and their routing protocols. Sensors 10 (2010)Google Scholar
  2. 2.
    Chong, C.-Y., Kumar, S.P.: Sensor networks: evolution, opportunities and challenges. Proc. IEEE 91(8) (2003)Google Scholar
  3. 3.
    Lu, R., Lin, X., Zhu, H., Liang, X.: BECAN: A bandwidth—Efficient cooperative authentication scheme for filtering injected false data in wireless sensor networks. IEEE Trans. Parallel Distrib. Syst. 23(1), 32–43 (2012)Google Scholar
  4. 4.
    Haider, T., Yusuf, M.: A fuzzy approach to energy optimized routing for wireless sensor networks. Int. Arab J. Inf. Technol. 6(2), 179 (2009)Google Scholar
  5. 5.
    Kim, M., Kim, Y., Cho, H.: Design of cryptographic hardware architecture for mobile computing. J. Inf. Process. Syst. 5(4), 187 (2009)CrossRefGoogle Scholar
  6. 6.
    Zhange, Z., Jiang, C.: False data injection—Resilient security routing protocols for wireless sensor networks. J. Netw. 7(12), 2025–2030 (2012)Google Scholar
  7. 7.
    Godbole, V.: Performance analysis of clustering protocol using fuzzy logic for wireless sensor network. IAES Int. J. Artif. Intell. (IJ-AI) 1(3), 103–111 (2012)Google Scholar
  8. 8.
    Shahina, K., Pavithran, A.: Filtering scheme for injected false data in WSN. IOSR J. Comput. Eng. 13(6), 29–31 (2013)Google Scholar
  9. 9.
    Benamar, K., Djilalli, M., Mohammed, F., Abdellah, M.: An efficient key management scheme for hierarchical wireless sensor networks. Wirel. Sens. Netw. 2012(4), 155–16 (2012).
  10. 10.
    Jiang, H., Sun, Y., Sun, R., Xu, H.: Fuzzy-logic-based energy optimized routing for wireless sensor networks. Int. J. Distrib. Sens. Netw. 2013(216561) (2013)Google Scholar
  11. 11.
    Yang, X., Lin, J., Yu, W., Moulema, P.M., Fu, X., Zhao, W.: A novel en-route filtering scheme against false data injection attacks in cyber-physical networked systems. IEEE Trans. Comput. 64(1), 4–18 (2015)Google Scholar
  12. 12.
    Vuran, M.C., Akyildiz, I.F: Spatial correlation—Based collaborative medium access control in wireless sensor networks. IEEE ACM Trans. Netw. 14(2), 316–329 (2006)Google Scholar
  13. 13.
    Lee, H.Y., Cho, T.H.: Fuzzy-based adaptive threshold determining method for the interleaved authentication in sensor networks. In: Proceedings of 5th Mexican International Conference on Artificial Intelligence. Lecture Notes in Computer Science, Advances in Artificial Intelligence, vol. 4293, pp. 112–121 (2006)Google Scholar
  14. 14.
    Moon, S.Y., Cho, T.H.: Key index-based routing for filtering false event reports in wireless sensor networks. IEICE Trans. 95-B(9), 2807–2814 (2012)Google Scholar
  15. 15.
    Gao, Zhipeng, Cheng, Weijing, Qiu, Xuesong, Meng, Luoming: A missing sensor data estimation algorithm based on temporal and spatial correlation. Int. J. Distrib. Sens. Netw. 2015, 1–10 (2015)Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2020

Authors and Affiliations

  1. 1.Department of ECEVivekanandha College of Technology for WomenTiruchengode, NamakkalIndia
  2. 2.Department of ECECMR Engineering CollegeKandlakoya Village, HyderabadIndia

Personalised recommendations