An Efficient Billing Scheme for Trusted Nodes Using Fuzzy Logic in Wireless Sensor Networks


Extending the lifetime of the wireless sensor networks (WSNs), where recharging sensors is not always possible, has been a major concern for researchers for the past decade. In this paper, we study the cooperation between nodes in wireless sensor networks in forwarding packets to others, and we propose a new collaboration technique which stimulates intermediate nodes to forward packets toward their destination. Some nodes show selfish behavior by denying the forwarding packets to other nodes in commercial networks in an effort to preserve their own energy. This paper applies a technique which is used to prolong the network lifetime, based on a node’s energy and trust value, and additionally incorporates fuzzy logic, which stimulates nodes to forward packets by rewarding cooperation. According to simulation results, the proposed approach surpasses the Nuglets (virtual currency) approach and the Reputation approach in network energy and thus prolongs the network lifetime. Additionally, our proposed approach demonstrates better results in the number of dropped packets, PDR and forwarded packets to neighboring nodes.

Share and Cite:

Shurman, M. , Alomari, Z. and Mhaidat, K. (2014) An Efficient Billing Scheme for Trusted Nodes Using Fuzzy Logic in Wireless Sensor Networks. Wireless Engineering and Technology, 5, 62-73. doi: 10.4236/wet.2014.53008.

Conflicts of Interest

The authors declare no conflicts of interest.


[1] ANSI/IEEE Standard 802.11 (1999) Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications. IEEE Publication, Part 11.
[2] Sun, J.-Z. (2001) Mobile Ad Hoc Networking: An Essential Technology for Pervasive Computing. Info-Tech and Info-Net, China.
[3] Corson, S., Freebersyser, J. and Sastry, A. (1999) Mobile Networks and Applications (MONET). Special Issue on Mobile Ad Hoc Networking.
[4] Ito, Y., Mineno, H. and Ishihara, S. (2005) A Scheme Encouraging Mobile Nodes to Forward Packets via Multiple Wireless Links Aggregating System between the Internet and Mobile Ad Hoc Networks. Springer-Verlag, Berlin Heidelberg.
[5] Momani, M. and Challa, S. (2010) Survey of Trust Models in Different Network Domains. International Journal of Ad Hoc, Sensor & Ubiquitous Computing, 1.
[6] Walter, J.P., Liang, Z., Shi, W. and Chaudhary, V. (2006) Wireless Sensor Network Security: A Survey. Proceedings of Distributed, Grid, and Pervasive Computing, CRC Press.
[7] McKnight, D.H. and Chervany, N.L. (1996) The Meanings of Trust. MIS Research Center, Carlson School of Management, University of Minnesota.
[8] Christh, R., Edwin, G. and Kusampudi, K. (2013) A Survey on Detecting Selfish Nodes in Wireless Sensor Networks Using Different Trust Methodologies. IJEAT, 2.
[10] Hu, J. (2005) Cooperation in Mobile Ad Hoc Networks. Technical Report, Computer Science Department, Florida State University.
[11] Jaydip, S. (2014) A Survey on Reputation and Trust-Based Systems for Wireless Communication Networks. Embedded Systems Research Group, Tata Consultancy Services, EPIP Industrial Estate, Bangalore, INDI.
[12] Ben Salem, N., Buttyán, L., Hubaux, J.P. and Jakobsson, M. (2003) A Charging and Rewarding Scheme for Packet Forwarding in Multi-Hop Cellular Networks. MobiHoc, USA.
[13] Mohan, M. and Joiner, L. (2004) Solving Billing Issues in Ad Hoc Networks. Proceedings of the 42nd Annual Southeast Regional Conference, USA.
[14] Zhong, S., Chen, J. and Yang, Y.R. (2003) Sprite: A Simple, Cheatproof, Credit-Based System for Mobile Ad Hoc Networks. IEEE Infocom 03, USA.
[15] Buttyan, L. and Hubaux, J.P. (2003) Stimulating Cooperation in Self Organizing Mobile Ad Hoc Networks. Journal of Mobile Networks and Applications, 8, 579-592.
[16] Zhang, J., Ci, S., Sharif, H. and Alahmad, M. (2009) A Battery-Aware Deployment Scheme for Cooperative Wireless Sensor Networks. GLOBECOM, USA.
[17] Gonzalez, J.M., Anwar, M. and Joshi, J.B.D. (2011) Trust-Based Approaches to Solve Routing Issues in Ad-Hoc Wireless Networks: A Survey. IEEE 10th International Conference on Security and Privacy in Computing and Communications, Changsha, 16-18 November 2011, 556-563.
[18] Rezazadeh, J., Moradi, M. and Ismail, A.S. (2011) Efficient Localization via Middle-Node Cooperation in Wireless Sensor Networks. Proceedings of International Conference on Electrical, Control, and Computer Engineering, Malaysia.
[19] Chhillar, P. and Smita, Ms. (2013) Implementation of SCFT Algorithm to Detect and Solve Greedy Nodes in Wireless Sensor Networks. International Journal of Engineering and Computer Science, 2.
[20] Dimokas, N. and Katsaros, D. (2013) Detecting Energy-Efficient Central Nodes for Cooperative Caching in Wireless Sensor Networks. 27th IEEE International Conference on (AINA), USA.
[21] Mainaud, B., Gauthier, V. and Afifi, H. (2008) Cooperative Communication for Wireless Sensors Network: A Mac Protocol Solution. WD 08 1st IFIP, UAE.
[22] Buttyan, L. and Hubaux, J.-P. (2001) Nuglets: A Virtual Currency to Stimulate Cooperation in Self-Organized Ad Hoc Networks. Technical Report DSC/2001/001, Swiss Federal Institute of Technology, Lausanne.
[23] Irfan, A., Peng, M. and Wang, W. (2007) Energy Efficient Cooperative Nodes Selection in Wireless Sensor Networks. International Conference on Parallel Processing Workshops (ICPPW), China.
[24] Pandana, C., Han, Z. and Liu, K.J.R. (2008) Cooperation Enforcement and Learning for Optimizing Packet Forwarding Probability in Autonomous Wireless Networks. IEEE Transactions on Wireless Communications, 7, 3150-3163.
[25] Anderson, D.H. and Hall, L.O. (1999) MR. FIS: Mamdani Rule Style Fuzzy Inference System. IEEE International Conference on Systems, Man, and Cybernetics, Tokyo, 12-15 October 1999, 238-243.

Copyright © 2023 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.