Browse > Article
http://dx.doi.org/10.3837/tiis.2018.09.009

Energy Efficiency Enhancement of TICK -based Fuzzy Logic for Selecting Forwarding Nodes in WSNs  

Ashraf, Muhammad (School of Information and Communication Engineering, Sungkyunkwan University)
Cho, Tae Ho (College of Software, Sungkyunkwan University)
Publication Information
KSII Transactions on Internet and Information Systems (TIIS) / v.12, no.9, 2018 , pp. 4271-4294 More about this Journal
Abstract
Communication cost is the most important factor in Wireless Sensor Networks (WSNs), as exchanging control keying messages consumes a large amount of energy from the constituent sensor nodes. Time-based Dynamic Keying and En-Route Filtering (TICK) can reduce the communication costs by utilizing local time values of the en-route nodes to generate one-time dynamic keys that are used to encrypt reports in a manner that further avoids the regular keying or re-keying of messages. Although TICK is more energy efficient, it employs no re-encryption operation strategy that cannot determine whether a healthy report might be considered as malicious if the clock drift between the source node and the forwarding node is too large. Secure SOurce-BAsed Loose Synchronization (SOBAS) employs a selective encryption en-route in which fixed nodes are selected to re-encrypt the data. Therefore, the selection of encryption nodes is non-adaptive, and the dynamic network conditions (i.e., The residual energy of en-route nodes, hop count, and false positive rate) are also not focused in SOBAS. We propose an energy efficient selection of re-encryption nodes based on fuzzy logic. Simulation results indicate that the proposed method achieves better energy conservation at the en-route nodes along the path when compared to TICK and SOBAS.
Keywords
Wireless sensor networks; network security; energy; en-route filtering; fuzzy;
Citations & Related Records
Times Cited By KSCI : 2  (Citation Analysis)
연도 인용수 순위
1 M. Akram and T. H. Cho, "Energy efficient adaptive verification node selection-based path determination in wireless sensor networks," Symmetry, vol. 9, no. 10, pp. 01-25, October, 2017.
2 I. F. Akyildiz, W. Su, Y. Sankarasubramaniam and E. Cayirci, "A survey on sensor networks," IEEE Communications Magazine, vol. 40, no. 08, pp.102-114, Aug, 2002.
3 P. Rawat, K.D. Singh, H. Chaouchi and J.M. Bonnin, "Wireless sensor networks: a survey on recent developments and potential synergies," The Journal of Supercomputing, vol. 68, no. 01, pp.1-48, April, 2014.   DOI
4 A. Guermazi, A. Belghith, M. Abid and S. Gannouni, "KMMR: An efficient and scalable key management protocol to secure multi-hop communications in large scale wireless sensor networks," KSII Transactions on Internet and Information Systems, vol. 11, no. 2, pp. 901-923, February, 2017.   DOI
5 C. Karlof and D. Wagner, "Secure routing in wireless sensor networks: attacks and countermeasures," in Proc. of 1st IEEE International Workshop on Sensor Network Protocols and Applications, vol. 34, no. 04, pp.113-127, May, 2003.
6 Q. Yang, X. Zhu, H. Fu and X. Che, "Survey of security technologies on wireless sensor networks," Journal of Sensors, (pages 09), Dec, 2014.
7 H. Y. Lee and T. H. Cho, "Fuzzy adaptive selection of filtering schemes for energy saving in sensor networks," IEICE Transactions on Communications, vol.E90-B, no.12, pp.3346-3353, Dec, 2007.   DOI
8 T. Kim and H. Lee, "Performance evaluation of the RIX-MAC protocol for wireless sensor networks," KSII Transactions on Internet and Information Systems, vol. 11, no. 2, pp. 746-784, February, 2017.
9 F. Ye, H. Luo, S. Lu and L. Zhang, "Statistical en-route filtering of injected false data in sensor networks," IEEE Journal on Selected Areas in Communications, vol. 23, no. 4, pp.839-850, April, 2005.   DOI
10 Yang, H. Yang and S. Lu, "Commutative cipher based en-route filtering in wireless sensor networks," in Proc. of Vehicular Technology Conference, vol. 2, pp. 1223-1227, October 2004.
11 Z. Yu, and Y. Guan, "A dynamic en-route filtering scheme for data reporting in wireless sensor networks," IEEE/ACM Transactions on Networking, vol. 18, no. 1, pp. 150-163, February, 2010.   DOI
12 S. Zhu, S. Setia, S. Jajodia and P. Ning, "An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks," in Proc. of IEEE Symposium on Security and privacy, pp. 259-271, May, 2004.
13 C. Kraub, M. Schneider, K. Bayarou and C. Eckert, "Stef: A secure ticket-based en-route filtering scheme for wireless sensor networks," in Proc. of 2nd Int. Conf. on Availability, Reliability and Security, pp. 310-317, April, 2007.
14 F. Li, A. Srinivasan and J.Wu, "PVFS: a probabilistic voting-based filtering scheme in wireless sensor networks," International Journal of Security and Networks, vol. 3, no 3, pp.173-182, August, 2008.   DOI
15 R. Lu, X. Lin, H. Zhu, X. Liang, and X. Shen, "Becan: A bandwidth-efficient cooperative authentication scheme for filtering injected false data in wireless sensor networks," IEEE Transactions on Parallel and Distributed Systems, vol. 23, no. 1, pp. 32-43, January, 2012.   DOI
16 P. Nayak and B. Vathasavai, "Energy efficient clustering algorithm for multi- hop wireless sensor network using type-2 of fuzzy logic," IEEE sensor journal, vol. 17, no. 14, July 2017.
17 L. Eschenauer and V.D. Gligor, "A key-management scheme for distributed sensor networks," in Proc. of Proceedings of the 9th ACM Conference on Computer and Communications Security, pp. 41-47, November, 2002.
18 A.S. Uluagac, R. A. Beyah and J. A. Copeland, "Time-based dynamic keying and en-route filtering (TICK) for wireless sensor networks," in Proc. of IEEE Global Telecommunications Conference, pp. 1-6, Dec, 2010.
19 A. S. Uluagac, R. A. Beyah and J. A. Copeland, "Secure source based loose synchronization (SOBAS) for wireless sensor networks," IEEE Transactions on Parallel and Distributed Systems, vol. 24, no. 4, pp. 803-813, April, 2013.   DOI
20 Y. Xiao, V. K. Rayi, B. Sun, X. Du, F. Hu and M. Galloway, "A survey of key management schemes in wireless sensor networks," Computer Communications, vol. 30, no. 11, pp. 2314-2341, September, 2007.   DOI
21 M. Collotta, G. Pau and A. V. Bobovich, "A fuzzy data fusion solution to enhance the QoS and the energy consumption in wireless sensor networks," Wireless Communications and Mobile Computing, pp.10, 2017.
22 Z. Zhang, Z. Hao, S. Zeadally, J. Zhang, B. Han and H. Chao, "Multiple attributes decision fusion for wireless sensor networks based on intuitionistic fuzzy set," IEEE Access, vol. 5, pp. 12798-12809, 2017.   DOI
23 C. Intanagonwiwat, R. Govindan and D. Estrin, "Directed diffusion: A scalable and robust communication paradigm for sensor networks," in Proc. of ACM MOBICOM, pp. 56-67, 2002.
24 S. M. Nam and T.H. Cho, "A fuzzy rule-based path configuration method for LEAP in sensor networks," Ad Hoc Networks, vol. 31, pp. 63-79, August, 2015.   DOI
25 K. Islam, W. Shen and X. Wang, "Wireless sensor network reliability and security in factory automation: a Survey," IEEE Transactions on Systems, MAN and Cybernetics, vol. 42, no. 6, pp. 1243-1256, November, 2012.
26 M. Passing and F. Dressler, "Experimental performance evaluation of cryptographic algorithms on sensor nodes," in Proc. of IEEE International Conference on Mobile Ad Hoc and Sensor Systems, pp. 882-887, October 9-12, 2006.
27 M. Akram and T. H. Cho, "Energy efficient fuzzy adaptive selection of verification nodes in wireless sensor networks," Ad Hoc Networks, Vol. 47, pp. 16-25, September 2016.   DOI
28 P. Nayak and A. Devulapalli, "A fuzzy logic-based clustering algorithm for WSN to extend the network lifetime," IEEE Sensors Journal, vol. 16, no. 1, pp.137-144, January, 2016.   DOI
29 H. Wang, C. Tang, Z. Zhao and H. Tang, "Fuzzy logic based admission control for on-grid energy saving in hybrid energy powered cellular networks," KSII Transactions on Internet and nformation Systems, vol. 10, no. 10, pp. 4724-4747, October, 2016.