METHOD FOR THE PERIOD DETERMINATION OF SECURITY LEVEL UPDATE IN STATISTICAL EN-ROUTE FILTERING

Authors

  • Tae-Ho Cho College of software, Sungkyunkwan University, Republic of Korea
  • Jung-Sub Ahn College of Information and Communication Engineering, Sungkyunkwan University, Republic of Korea

DOI:

https://doi.org/10.29121/granthaalayah.v5.i11.2017.2340

Keywords:

Network Simulation, Wireless Sensor Network, Statistical En-route Filtering, False Report Injection Attack, Energy Efficiency

Abstract [English]

Energy management of WSN is one of the major issues. Many kind of attacks in WSN paralyze the network by exhausting node energy. Especially false report insertion attack, which is one of the several WSN attacks, is to inform users of false alarms as well as unnecessary energy consumption. F. Ye et al. proposed statistical en-route filtering to prevent false report injection attacks. In order to effectively use their scheme, techniques for determining thresholds using fuzzy logic have been studied. To effectively apply these techniques to the network, an appropriate security level period update should be set according to the network environments. In this paper, we propose a security period update method using fuzzy logic in order to improve the lifetime of the network in the statistical en-route filtering approach based on a wireless sensor network of the cluster environment. Normally SEF thresholds should be changed by a user according to the network environment. Our proposed method allows automatically setting the effective threshold for the environment by fuzzy logic. The experimental results show that the energy efficiency increased by 26.5%.

Downloads

Download data is not yet available.

References

Reejamol, K. J., and P. Dhanya Raj. "Hole handling techniques in wireless sensor networks: A survey." Computational Intelligence and Computing Research (ICCIC), 2016 IEEE International Conference on. IEEE, (2016) DOI: https://doi.org/10.1109/ICCIC.2016.7919627

Nam, Su Man, and Tae Ho Cho. "A fuzzy rule-based path configuration method for LEAP in sensor networks." Ad Hoc Networks 31 (2015) DOI: https://doi.org/10.1016/j.adhoc.2015.03.005

Sen, Soumita, Chandreyee Chowdhury, and Sarmistha Neogy. "Design of cluster-chain based WSN for energy efficiency." Applied and Theoretical Computing and Communication Technology (iCATccT), 2016 2nd International Conference on. IEEE, (2016) DOI: https://doi.org/10.1109/ICATCCT.2016.7911982

Winkler, Thomas, and Bernhard Rinner. "Security and privacy protection in visual sensor networks: A survey." ACM Computing Surveys (CSUR) 47.1 (2014) DOI: https://doi.org/10.1145/2545883

Gupta, Pallavi, Vinay Prakash, and Preetam Suman. "Noticeable key points and issues of sensor deployment for large area Wireless Sensor Network: A survey." System Modeling & Advancement in Research Trends (SMART), International Conference. IEEE, (2016) DOI: https://doi.org/10.1109/SYSMART.2016.7894511

Alanwar, Amr, et al. "PrOLoc: resilient localization with private observers using partial homomorphic encryption: demo abstract." Proceedings of the 16th ACM/IEEE International Conference on Information Processing in Sensor Networks. ACM, (2017) DOI: https://doi.org/10.1145/3055031.3055080

F. Ye, H. Luo, S. Lu and L. Zhang, "Statistical en-route filtering of injected false data in sensor networks," Selected Areas in Communications, IEEE Journal on, vol. 23, pp. 839-850, (2005) DOI: https://doi.org/10.1109/JSAC.2005.843561

Kim, Cho. "Determination Method of Security Threshold using Fuzzy Logic for Statistical Filtering based Sensor Networks." Journal of the Korea Society for Simulation 16.2 27-35 (2007)

Ahn, Cho. "A Correlation Analysis of the MAC Length in Statistical En-route Filtering based WSNS." International Journal of Advanced Research(IJAR) 4.8 (2016). DOI: https://doi.org/10.21474/IJAR01/1399

Sahul, Ashwani, Bindiya, and Gursewak "Location Based-Balanced Clustering Algorithm for Wireless Sensor Network." International conference on Signal Processing, Communication, Power and Embedded System (SCOPES) (2016)

Babuška, Robert. "Fuzzy systems, modeling and identification." Delft University of Technology, Department of Electrical Engineering Control Laboratory, Mekelweg 4 (1996).

Quwaider, Muhannad. "Real-time intruder surveillance using low-cost remote wireless sensors." Information and Communication Systems (ICICS), 2017 8th International Conference on. IEEE, (2017) DOI: https://doi.org/10.1109/IACS.2017.7921970

Downloads

Published

2017-11-30

How to Cite

Cho, T.-H., & Ahn, J.-S. (2017). METHOD FOR THE PERIOD DETERMINATION OF SECURITY LEVEL UPDATE IN STATISTICAL EN-ROUTE FILTERING. International Journal of Research -GRANTHAALAYAH, 5(11), 158–167. https://doi.org/10.29121/granthaalayah.v5.i11.2017.2340