Probability Control for Verification of an Event Report Using Fuzzy System

DOI: 10.4236/wsn.2011.312043   PDF   HTML     4,593 Downloads   6,764 Views  


Sensor networks include numerous sensor nodes that are vulnerable to physical attacks from the outside because they operate in open environments. The sensor nodes are compromised by an attacker. The compromised nodes generate false reports and inject the reports into sensor networks. The false report injection attacks deplete energy of the sensor nodes. Ye et al. proposed Statistical En-Route Filtering (SEF) to defend sensor nodes against the false report injection attacks. In SEF, sensor nodes verify the event reports based on a fixed probability. Thus, the verification energy of a node is the same whether the report is false or valid. But when there are few false reports, energy for verifying legitimate reports may be wasted. In this paper, we propose a method in which each node controls a probability of attempts at verification of an event report to reduce the wasted energy. The probability is determined through consideration of the number of neighboring nodes, the number of hops from the node to the sink node, and the rate of false reports among the 10 most recent event reports forwarded to a node. We simulated our proposed method to prove its energy efficiency. After the simulation, we confirmed that the proposed method is more efficient than SEF for saving sensor node’s energy.

Share and Cite:

H. Lee, S. Moon and T. Cho, "Probability Control for Verification of an Event Report Using Fuzzy System," Wireless Sensor Network, Vol. 3 No. 12, 2011, pp. 371-377. doi: 10.4236/wsn.2011.312043.

Conflicts of Interest

The authors declare no conflicts of interest.


[1] I. F. Akyildiz, W. L. Su, Y. Sankarasubramaniam and E. Cayirci, “A Survey on Sensor Networks,” IEEE Communications Magazine, Vol. 40, No. 8, 2002, pp. 102-114. doi:10.1109/MCOM.2002.1024422
[2] F. Li and J. Wu, “A Probabilistic Voting-Based Filtering Scheme in Wireless Sensor Networks,” Proceedings of the 2006 International Conference on Wireless Communications and Mobile Computing, Vancouver, 3-6 July 2006, pp. 27-32.
[3] B. Przydatek, D. Song and A. Perrig, “SIA: Secure Information Aggregation in Sensor Networks,” Proceedings of the 1st International Conference on Embedded Networked Sensor Systems, Los Angeles, 5-7 November 2003.
[4] F. Ye, H. Y. Luo, S. W. Lu and L. X. Zhang, “Statistical En-Route Filtering of Injected False Data in Sensor Net- works,” 23rd Annual Joint Conference of the IEEE Computer and Communications Societies, Vol. 4, No. 7-11, 2004, pp. 2446-2457.
[5] H. Yang and S. W. Lu, “Commutative Cipher Based En-Route Filtering in Wireless Sensor Networks,” IEEE 60th Vehicular Technology Conference, Vol. 2, Los Angeles, 26-29 September 2004, pp. 1223-1227
[6] C. Karlof and D. Wagner, “Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures,” Proceedings of the First IEEE: 2003 IEEE International Workshop on Sensor Network Protocols and Applications, Anchorage, 11 May 2003, pp. 113-127.

comments powered by Disqus

Copyright © 2020 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.