Abstract
Wireless Sensor Network (WSN) can enable context-aware services through sensing, processing, and reporting event information. Due to limited resources WSNs are vulnerable to various malicious attacks. In one of these attacks false event reports are generated to compromise the integrity of the sensor data. In most filtering schemes every sensor node on a path from an event source to a sink node operates as a filtering node which verifies received reports and determine whether they are valid or false. Hence, even the valid reports are verified multiple times as they are forwarded toward the sink node, causing unnecessary energy consumption. In this paper we propose a filtering nodes assignment method to reduce the energy consumption while verifying the event reports. The proposed method partitions the network into several areas and assigns filtering nodes for each area according to a fuzzy output value derived from the three inputs - the number of valid event reports received from the area, the elapsed time since the last valid event report received from the area, and the average hop count from the nodes in the area to the sink node. The experimental results show that the proposed method conserves sensor nodes’ energy and increases the network lifetime with similar security level.
This research was supported by Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education, Science and Technology (No. 2012-0002475).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: A Survey on Sensor Networks. IEEE Communications Magazine 40(8), 102–116 (2002)
Al-Karaki, J.N., Kamal, A.E.: Routing Techniques in Wireless Sensor Networks: a Survey. IEEE Wireless Communication Magazine 11(6), 6–28 (2004)
Djenouri, D., Khelladi, L., Badache, N.: A Survey of Security Issues in Mobile Ad-Hoc and Sensor Networks. IEEE Communications Surveys (2005)
Karlof, C., Wagner, D.: Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures. Elsevier’s Ad Hoc Networks Journal, Special Issue on Sensor Network Protocols and Applications 1(2-3), 293–315 (2003)
Ye, F., Luo, H., Lu, S., Zhang, L.: Statistical En-route Filtering of Injected False Data in Sensor Networks. IEEE JSAC 23(4), 839–850 (2005)
Lee, H.Y., Cho, T.H.: Key Inheritance-Based False Data Filtering Scheme in Wireless Sensor Networks. In: Madria, S.K., Claypool, K.T., Kannan, R., Uppuluri, P., Gore, M.M. (eds.) ICDCIT 2006. LNCS, vol. 4317, pp. 116–127. Springer, Heidelberg (2006)
Nghiem, P.T., Cho, T.H.: A Fuzzy-based Interleaved Multi-hop Authentication Scheme in Wireless Sensor Networks. Journal of Parallel and Distributed Computing 69(5), 441–450 (2009)
Xbow Sensor Networks, http://www.xbow.com
Perrig, A., Szewczyk, R., Tygar, J.D., Wen, V., Culler, D.E.: SPINS: Security Protocols for Sensor Networks. Wireless Networks 8(5), 521–534 (2002)
Yen, J., Langari, R.: Fuzzy Logic. Prentice Hall (1999)
Intanagonwiwat, C., Govindan, R., Estrin, D.: Directed Diffusion: A Scalable and Robust Communication Paradigm for Sensor Networks. In: Proc. of MOBICOM, pp. 56–67. ACM (2000)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Moon, S.Y., Cho, T.H. (2012). Energy Efficient Filtering Nodes Assignment Method for Sensor Networks Using Fuzzy Logic. In: Huang, DS., Jiang, C., Bevilacqua, V., Figueroa, J.C. (eds) Intelligent Computing Technology. ICIC 2012. Lecture Notes in Computer Science, vol 7389. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-31588-6_38
Download citation
DOI: https://doi.org/10.1007/978-3-642-31588-6_38
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-31587-9
Online ISBN: 978-3-642-31588-6
eBook Packages: Computer ScienceComputer Science (R0)