GAFS: GENETIC ALGORITHM-BASED FILTERING SCHEME FOR IMPROVING DETECTION POWER IN SENSOR NETWORKS
Keywords:Wireless Sensor Networks, Wireless Network Security, Probabilistic Voting-Based Scheme, Genetic Algorithm, False Negative Attacks, False Positive Attacks
Wireless sensor networks (WSNs) have stringent energy and computational requirements. Security has become very crucial issue with the widespread acceptance of the WSNs in numerous decision-critical and hostile environments. Since sensor nodes are left unattended, they can be compromised by adversaries to launch various application layer attacks. Effective countermeasures against these attacks can lead to improved security. A probabilistic voting-based filtering scheme (PVFS) uses probabilistic filtering based on the distance to counter attacks of fabricated reports with false votes and real reports with false votes. Genetic algorithm-based filtering scheme (GAFS) uses a genetic algorithm with a fuzzy rule-based system that considers remaining energy and number of filtered votes in addition to the distance. The analysis results of the current study demonstrate the effectiveness of our scheme against these attacks in comparison with PVFS. The results show increased detection power achieved through effective verification while maintaining energy consumption.
I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, "A survey on sensor networks," Communications Magazine, IEEE, vol.40, no.8, pp.102-114, Aug. DOI: https://doi.org/10.1109/MCOM.2002.1024422
A. Perrig, J. Stankovic, and D. Wagner, "Security in wireless sensor network," Communication of the ACM, vol.47, pp.53-57, 2004. DOI: https://doi.org/10.1145/990680.990707
B. Przydatek, D. Song, and A. Perrig, "SIA: Secure information aggregation in sensor networks,"SenSys '03 Proceedings of the 1st international conference on Embedded networked sensor systems, pp.255-265, 2003. DOI: https://doi.org/10.1145/958491.958521
J. N. Al-Karaki and A. E. Kamal, "Routing techniques in wireless sensor networks: A survey," Wireless Communications, IEEE, vol.11, no.6, pp.6-28, 2004. DOI: https://doi.org/10.1109/MWC.2004.1368893
K. Akkaya and M. Younis, "A survey on routing protocols for wireless sensor networks," Ad Hoc Networks, vol.3, pp.325-349. DOI: https://doi.org/10.1016/j.adhoc.2003.09.010
H. Y. Lee and T. H. Cho, "Fuzzy adaptive selection of filtering schemes for energy saving in sensor networks," IEICE Transactions on Communications, vol.E90-B, no.12, pp.3346-3353. DOI: https://doi.org/10.1093/ietcom/e90-b.12.3346
S. Zhu, S. Setia, and S. Jajodia, "LEAP+: Efficient security mechanisms for large-scale distributed sensor networks," ACM Trans. Sen. Netw., vol.2, no.4, pp.500-528, nov. DOI: https://doi.org/10.1145/1218556.1218559
S. Slijepcevic, M. Potkonjak, V. Tsiatsis, S. Zimbeck, and M. B. Srivastava, "On communication security in wireless ad-hoc sensor networks," Enabling Technologies: Infrastructure for Collaborative Enterprises, 2002. WET ICE 2002. Proceedings. Eleventh IEEE International Workshops on, pp.139-144.
S. Zhu, S. Setia, and S. Jajodia, "LEAP: Efficient security mechanisms for large-scale distributed sensor networks," Proc. of the 10th ACM conf. on Computer and communications security, ACM, pp.62-72.
C. H. Lim, "LEAP++: A robust key establishment scheme for wireless sensor networks," Distributed Computing Systems Workshops, 2008. ICDCS '08. 28th International Conference on, pp.376-381. DOI: https://doi.org/10.1109/ICDCS.Workshops.2008.93
H. Y. Lee and T. H. Cho, "A scheme for adaptively countering application layer security attacks in wireless sensor networks," IEICE Transactions on Communications, vol.E93.B, no.7, pp.1881-1889, 2010.
F. Ye, H. Luo, S. Lu, and L. Zhang, "Statistical en-route filtering of injected false data in sensor networks," Selected Areas in Communications, IEEE Journal on, vol.23, no.4, pp.839-850. DOI: https://doi.org/10.1109/JSAC.2005.843561
F. Li, A. Srinivasan, and J. Wu, "PVFS: A probabilistic voting-based filtering scheme in wireless sensor networks," International Journal of Security and Network, vol.3, no.3, pp.173-182. DOI: https://doi.org/10.1504/IJSN.2008.020091
H. Y. Lee and T. H. Cho, "Optimized fuzzy adaptive filtering for ubiquitous sensor networks," IEICE Transactions on Communications, vol.E94.B, pp.1648-1656, Jun. DOI: https://doi.org/10.1587/transcom.E94.B.1648
T. P. Nghiem and T. H. Cho, "A fuzzy-based interleaved multi-hop authentication scheme in wireless sensor networks," Journal of Parallel and Distributed Computing, vol.69, no.5, pp.441-450, May. DOI: https://doi.org/10.1016/j.jpdc.2009.01.007
H. Krawczyk, M. Bellare, and R. Canetti, "HMAC: Keyed-hashing for message authentication," Internet Engineering Task Force, vol. Request for Comments (RFC) 2104, pp.1-11.
J. W. Kim, Y. K. Moon, and B. P. Zeigler, "Designing fuzzy net controllers using GA optimization," Computer-Aided Control System Design, 1994. Proceedings, IEEE/IFAC Joint Symposium on, pp.83-88.
Z. Michalewicz, Genetic algorithms + data structures = evolution programs (3rd ed.), Springer-Verlag, London, UK, UK, 1996. DOI: https://doi.org/10.1007/978-3-662-03315-9
J. Yen and R. Langari, Fuzzy logic: Intelligence, control, and information, Prentice Hall, 1991.
Crossbow technology Inc., "MICAz," http://www.xbow.com.
C. Intanagonwiwat, R. Govindan, and D. Estrin, "Directed diffusion: A scalable and robust communication paradigm for sensor networks," Proceedings of the 6th annual international conference on Mobile computing and networking, pp.56-67.
Zhen Yu, "A dynamic en-route filtering scheme for data reporting in wireless sensor networks," Networking, IEEE/ACM Transactions on, vol.18, no.1, pp.150-163. DOI: https://doi.org/10.1109/TNET.2009.2026901
T. Blickle and L. Thiele, "A comparison of selection schemes used in evolutionary algorithms," Evol. Comput., vol.4, no.4, pp.361-394, dec. DOI: https://doi.org/10.1162/evco.19184.108.40.2061
S. Zhu, S. Setia, S. Jajodia, and P. Ning, "An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks," Security and Privacy, 2004. Proceedings. 2004 IEEE Symposium on, pp.259-271, May 2004.
H. Y. Lee and T. H. Cho, "Key inheritance-based false data filtering scheme in wireless sensor networks," Lecture Notes in Computer Science, vol.4317, pp.116-127. DOI: https://doi.org/10.1007/11951957_11
P. Manjunatha, A. K. Verma, and A. Srividya, "Fuzzy based optimized routing protocol for wireless sensor networks," Advances in Wireless Sensors and Sensor Networks, vol.64, pp.273-282. DOI: https://doi.org/10.1007/978-3-642-12707-6_12
How to Cite
With the licence CC-BY, authors retain the copyright, allowing anyone to download, reuse, re-print, modify, distribute, and/or copy their contribution. The work must be properly attributed to its author.
It is not necessary to ask for further permission from the author or journal board.
This journal provides immediate open access to its content on the principle that making research freely available to the public supports a greater global exchange of knowledge.