Skip to main content

Energy Efficient Filtering Nodes Assignment Method for Sensor Networks Using Fuzzy Logic

  • Conference paper
Book cover Intelligent Computing Technology (ICIC 2012)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 7389))

Included in the following conference series:

  • 2557 Accesses

Abstract

Wireless Sensor Network (WSN) can enable context-aware services through sensing, processing, and reporting event information. Due to limited resources WSNs are vulnerable to various malicious attacks. In one of these attacks false event reports are generated to compromise the integrity of the sensor data. In most filtering schemes every sensor node on a path from an event source to a sink node operates as a filtering node which verifies received reports and determine whether they are valid or false. Hence, even the valid reports are verified multiple times as they are forwarded toward the sink node, causing unnecessary energy consumption. In this paper we propose a filtering nodes assignment method to reduce the energy consumption while verifying the event reports. The proposed method partitions the network into several areas and assigns filtering nodes for each area according to a fuzzy output value derived from the three inputs - the number of valid event reports received from the area, the elapsed time since the last valid event report received from the area, and the average hop count from the nodes in the area to the sink node. The experimental results show that the proposed method conserves sensor nodes’ energy and increases the network lifetime with similar security level.

This research was supported by Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education, Science and Technology (No. 2012-0002475).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: A Survey on Sensor Networks. IEEE Communications Magazine 40(8), 102–116 (2002)

    Article  Google Scholar 

  2. Al-Karaki, J.N., Kamal, A.E.: Routing Techniques in Wireless Sensor Networks: a Survey. IEEE Wireless Communication Magazine 11(6), 6–28 (2004)

    Article  Google Scholar 

  3. Djenouri, D., Khelladi, L., Badache, N.: A Survey of Security Issues in Mobile Ad-Hoc and Sensor Networks. IEEE Communications Surveys (2005)

    Google Scholar 

  4. Karlof, C., Wagner, D.: Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures. Elsevier’s Ad Hoc Networks Journal, Special Issue on Sensor Network Protocols and Applications 1(2-3), 293–315 (2003)

    Google Scholar 

  5. Ye, F., Luo, H., Lu, S., Zhang, L.: Statistical En-route Filtering of Injected False Data in Sensor Networks. IEEE JSAC 23(4), 839–850 (2005)

    Google Scholar 

  6. Lee, H.Y., Cho, T.H.: Key Inheritance-Based False Data Filtering Scheme in Wireless Sensor Networks. In: Madria, S.K., Claypool, K.T., Kannan, R., Uppuluri, P., Gore, M.M. (eds.) ICDCIT 2006. LNCS, vol. 4317, pp. 116–127. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  7. Nghiem, P.T., Cho, T.H.: A Fuzzy-based Interleaved Multi-hop Authentication Scheme in Wireless Sensor Networks. Journal of Parallel and Distributed Computing 69(5), 441–450 (2009)

    Article  Google Scholar 

  8. Xbow Sensor Networks, http://www.xbow.com

  9. Perrig, A., Szewczyk, R., Tygar, J.D., Wen, V., Culler, D.E.: SPINS: Security Protocols for Sensor Networks. Wireless Networks 8(5), 521–534 (2002)

    Article  MATH  Google Scholar 

  10. Yen, J., Langari, R.: Fuzzy Logic. Prentice Hall (1999)

    Google Scholar 

  11. Intanagonwiwat, C., Govindan, R., Estrin, D.: Directed Diffusion: A Scalable and Robust Communication Paradigm for Sensor Networks. In: Proc. of MOBICOM, pp. 56–67. ACM (2000)

    Google Scholar 

  12. FFLL, http://ffll.sourceforge.net

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Moon, S.Y., Cho, T.H. (2012). Energy Efficient Filtering Nodes Assignment Method for Sensor Networks Using Fuzzy Logic. In: Huang, DS., Jiang, C., Bevilacqua, V., Figueroa, J.C. (eds) Intelligent Computing Technology. ICIC 2012. Lecture Notes in Computer Science, vol 7389. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-31588-6_38

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-31588-6_38

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-31587-9

  • Online ISBN: 978-3-642-31588-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics