METHOD FOR THE PERIOD DETERMINATION OF SECURITY LEVEL UPDATE IN STATISTICAL EN-ROUTE FILTERING
DOI:
https://doi.org/10.29121/granthaalayah.v5.i11.2017.2340Keywords:
Network Simulation, Wireless Sensor Network, Statistical En-route Filtering, False Report Injection Attack, Energy EfficiencyAbstract [English]
Energy management of WSN is one of the major issues. Many kind of attacks in WSN paralyze the network by exhausting node energy. Especially false report insertion attack, which is one of the several WSN attacks, is to inform users of false alarms as well as unnecessary energy consumption. F. Ye et al. proposed statistical en-route filtering to prevent false report injection attacks. In order to effectively use their scheme, techniques for determining thresholds using fuzzy logic have been studied. To effectively apply these techniques to the network, an appropriate security level period update should be set according to the network environments. In this paper, we propose a security period update method using fuzzy logic in order to improve the lifetime of the network in the statistical en-route filtering approach based on a wireless sensor network of the cluster environment. Normally SEF thresholds should be changed by a user according to the network environment. Our proposed method allows automatically setting the effective threshold for the environment by fuzzy logic. The experimental results show that the energy efficiency increased by 26.5%.
Downloads
References
Reejamol, K. J., and P. Dhanya Raj. "Hole handling techniques in wireless sensor networks: A survey." Computational Intelligence and Computing Research (ICCIC), 2016 IEEE International Conference on. IEEE, (2016) DOI: https://doi.org/10.1109/ICCIC.2016.7919627
Nam, Su Man, and Tae Ho Cho. "A fuzzy rule-based path configuration method for LEAP in sensor networks." Ad Hoc Networks 31 (2015) DOI: https://doi.org/10.1016/j.adhoc.2015.03.005
Sen, Soumita, Chandreyee Chowdhury, and Sarmistha Neogy. "Design of cluster-chain based WSN for energy efficiency." Applied and Theoretical Computing and Communication Technology (iCATccT), 2016 2nd International Conference on. IEEE, (2016) DOI: https://doi.org/10.1109/ICATCCT.2016.7911982
Winkler, Thomas, and Bernhard Rinner. "Security and privacy protection in visual sensor networks: A survey." ACM Computing Surveys (CSUR) 47.1 (2014) DOI: https://doi.org/10.1145/2545883
Gupta, Pallavi, Vinay Prakash, and Preetam Suman. "Noticeable key points and issues of sensor deployment for large area Wireless Sensor Network: A survey." System Modeling & Advancement in Research Trends (SMART), International Conference. IEEE, (2016) DOI: https://doi.org/10.1109/SYSMART.2016.7894511
Alanwar, Amr, et al. "PrOLoc: resilient localization with private observers using partial homomorphic encryption: demo abstract." Proceedings of the 16th ACM/IEEE International Conference on Information Processing in Sensor Networks. ACM, (2017) DOI: https://doi.org/10.1145/3055031.3055080
F. Ye, H. Luo, S. Lu and L. Zhang, "Statistical en-route filtering of injected false data in sensor networks," Selected Areas in Communications, IEEE Journal on, vol. 23, pp. 839-850, (2005) DOI: https://doi.org/10.1109/JSAC.2005.843561
Kim, Cho. "Determination Method of Security Threshold using Fuzzy Logic for Statistical Filtering based Sensor Networks." Journal of the Korea Society for Simulation 16.2 27-35 (2007)
Ahn, Cho. "A Correlation Analysis of the MAC Length in Statistical En-route Filtering based WSNS." International Journal of Advanced Research(IJAR) 4.8 (2016). DOI: https://doi.org/10.21474/IJAR01/1399
Sahul, Ashwani, Bindiya, and Gursewak "Location Based-Balanced Clustering Algorithm for Wireless Sensor Network." International conference on Signal Processing, Communication, Power and Embedded System (SCOPES) (2016)
Babuška, Robert. "Fuzzy systems, modeling and identification." Delft University of Technology, Department of Electrical Engineering Control Laboratory, Mekelweg 4 (1996).
Quwaider, Muhannad. "Real-time intruder surveillance using low-cost remote wireless sensors." Information and Communication Systems (ICICS), 2017 8th International Conference on. IEEE, (2017) DOI: https://doi.org/10.1109/IACS.2017.7921970
Downloads
Published
How to Cite
Issue
Section
License
With the licence CC-BY, authors retain the copyright, allowing anyone to download, reuse, re-print, modify, distribute, and/or copy their contribution. The work must be properly attributed to its author.
It is not necessary to ask for further permission from the author or journal board.
This journal provides immediate open access to its content on the principle that making research freely available to the public supports a greater global exchange of knowledge.