Fuzzy Based Assignment Method of Filtering Nodes in Wireless Sensor Networks

Abstract

Wireless sensor networks (WSNs) are networked systems that are able to sense various events and report the events to a user to enable appropriate responses. One of security threats to a WSN is false data injection attacks in which an attacker steals some sensor nodes in the network and injects forged event messages into the network through the captured nodes. As a result, the intermediate nodes on the forwarding paths of the false event messages waste their limited energy. Additionally, the network cannot provide the user with correct information. There have been many studies on en-route detection of false event messages for WSNs. Yang et al. proposed the commutative cipher-based en-route filtering scheme (CCEF) which establishes a secure session between a sink node and a cluster head (CH) based on the commutative cipher. In CCEF, each intermediate node on the path between the sink node and the CH receives an event message and verifies the authenticity of the session based on a probability. Due to the probabilistic approach, it is hard to adapt to the change of false traffic ratio in the network and energy inefficiency may occur. We propose a filtering scheme which applies a deterministic approach to assign filtering nodes to a given session. The proposed method consumes less energy than that of CCEF without sacrificing security.

Share and Cite:

S. Moon and T. Cho, "Fuzzy Based Assignment Method of Filtering Nodes in Wireless Sensor Networks," Wireless Sensor Network, Vol. 4 No. 2, 2012, pp. 40-44. doi: 10.4236/wsn.2012.42006.

Conflicts of Interest

The authors declare no conflicts of interest.

References

[1] I. F. Akyldiz, W. Su, Y. Sankarasubramaniam and E. Cayirci, “A Survey on Sensor Networks,” IEEE Wireless Communication Magazine, Vol. 40, No. 8, 2002, pp. 102- 116. doi:10.1109/MCOM.2002.1024422
[2] J. N. Al-Karaki and A. E. Kamal, “Routing Techniques in Wireless Sensor Networks: A Survey,” IEEE Wireless Communication Magazine, Vol. 11, No. 6, 2004, pp. 6-28. doi:10.1109/MWC.2004.1368893
[3] N. Xu, “A Survey of Sensor Network Applications,” University of Southern California, Technical Report, 2002.
[4] C. Karlof and D. Wagner, “Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures,” Ad Hoc Networks Journal, Vol. 1, No. 2-3, 2003, pp. 293-315.
[5] H. Yang and S. Lu., “Commutative Cipher Based En- Route Filtering in Wireless Sensor Networks,” Vehicular Technology Conference, 26-29 September 2004, pp. 1223- 1227.
[6] S. Zhu, S. Setia, S. Jajodia and P. Ning, “An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks,” Proceedings of Security and Privacy, Oakland, 9-12 May 2004, pp. 259- 271.
[7] F. Ye, H. Luo, S. Lu and L. Zhang, “Statistical En-Route Filtering of Injected False Data in Sensor Networks,” IEEE Journals on Selected Areas in Communications, Vol. 23, No. 4, 2005, pp. 839-850. doi:10.1109/JSAC.2005.843561
[8] Z. Yu and Y. Guan, “A Dynamic En-Route Scheme for Filtering False Data Injection in Wireless Sensor Networks,” 25th IEEE International Conference on Computer Communications, Barcelona, Spain, 23-29 April 2005, pp. 294-295.
[9] H. S. Seo, H. Y. Lee, S. J. Lee and D. G Lee, “Fuzzy-Based Filtering Solution Selection Method for Dynamic Sensor Networks,” Intelligent Automation and Soft Computing, Vol. 16, No. 4, 2010, pp. 577-590.
[10] J. M. Kim, H. S. Seo and J. Kwak, “Routing Protocol for Heterogeneous Hierarchical Wireless Multimedia Sensor Networks,” Wireless Personal Communications, Vol. 57, No. 3, 2011, pp. 577-590.
[11] John Yen and Reza Langari, “Fuzzy Logic,” Upper Saddle River, 1999.
[12] Free Fuzzy Logic Library, 2011. http://ffll.sourceforge.net
[13] Moog Crossbow, 2011. http://www.xbow.com/

Copyright © 2024 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.