Advertisement

Energy Efficient Filtering Nodes Assignment Method for Sensor Networks Using Fuzzy Logic

  • Soo Young Moon
  • Tae Ho Cho
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7389)

Abstract

Wireless Sensor Network (WSN) can enable context-aware services through sensing, processing, and reporting event information. Due to limited resources WSNs are vulnerable to various malicious attacks. In one of these attacks false event reports are generated to compromise the integrity of the sensor data. In most filtering schemes every sensor node on a path from an event source to a sink node operates as a filtering node which verifies received reports and determine whether they are valid or false. Hence, even the valid reports are verified multiple times as they are forwarded toward the sink node, causing unnecessary energy consumption. In this paper we propose a filtering nodes assignment method to reduce the energy consumption while verifying the event reports. The proposed method partitions the network into several areas and assigns filtering nodes for each area according to a fuzzy output value derived from the three inputs - the number of valid event reports received from the area, the elapsed time since the last valid event report received from the area, and the average hop count from the nodes in the area to the sink node. The experimental results show that the proposed method conserves sensor nodes’ energy and increases the network lifetime with similar security level.

Keywords

false report injection attacks filtering scheme SEF fuzzy logic 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: A Survey on Sensor Networks. IEEE Communications Magazine 40(8), 102–116 (2002)CrossRefGoogle Scholar
  2. 2.
    Al-Karaki, J.N., Kamal, A.E.: Routing Techniques in Wireless Sensor Networks: a Survey. IEEE Wireless Communication Magazine 11(6), 6–28 (2004)CrossRefGoogle Scholar
  3. 3.
    Djenouri, D., Khelladi, L., Badache, N.: A Survey of Security Issues in Mobile Ad-Hoc and Sensor Networks. IEEE Communications Surveys (2005)Google Scholar
  4. 4.
    Karlof, C., Wagner, D.: Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures. Elsevier’s Ad Hoc Networks Journal, Special Issue on Sensor Network Protocols and Applications 1(2-3), 293–315 (2003)Google Scholar
  5. 5.
    Ye, F., Luo, H., Lu, S., Zhang, L.: Statistical En-route Filtering of Injected False Data in Sensor Networks. IEEE JSAC 23(4), 839–850 (2005)Google Scholar
  6. 6.
    Lee, H.Y., Cho, T.H.: Key Inheritance-Based False Data Filtering Scheme in Wireless Sensor Networks. In: Madria, S.K., Claypool, K.T., Kannan, R., Uppuluri, P., Gore, M.M. (eds.) ICDCIT 2006. LNCS, vol. 4317, pp. 116–127. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  7. 7.
    Nghiem, P.T., Cho, T.H.: A Fuzzy-based Interleaved Multi-hop Authentication Scheme in Wireless Sensor Networks. Journal of Parallel and Distributed Computing 69(5), 441–450 (2009)CrossRefGoogle Scholar
  8. 8.
    Xbow Sensor Networks, http://www.xbow.com
  9. 9.
    Perrig, A., Szewczyk, R., Tygar, J.D., Wen, V., Culler, D.E.: SPINS: Security Protocols for Sensor Networks. Wireless Networks 8(5), 521–534 (2002)zbMATHCrossRefGoogle Scholar
  10. 10.
    Yen, J., Langari, R.: Fuzzy Logic. Prentice Hall (1999) Google Scholar
  11. 11.
    Intanagonwiwat, C., Govindan, R., Estrin, D.: Directed Diffusion: A Scalable and Robust Communication Paradigm for Sensor Networks. In: Proc. of MOBICOM, pp. 56–67. ACM (2000)Google Scholar
  12. 12.

Copyright information

© Springer-Verlag Berlin Heidelberg 2012

Authors and Affiliations

  • Soo Young Moon
    • 1
  • Tae Ho Cho
    • 1
  1. 1.College of Information and Communication EngineeringSungkyunkwan UniversitySuwonRepublic of Korea

Personalised recommendations