Browse > Article
http://dx.doi.org/10.13089/JKIISC.2009.19.4.41

Application of the Recursive Contract Net Protocol for the Threshold Value Determination in Wireless Sensor Networks  

Seo, Hee-Suk (Korea University of Technology and Education)
Abstract
In ubiquitous sensor networks, sensor nodes can be compromised by an adversary since they are deployed in hostile environments. False sensing reports can be injected into the network through these compromised nodes, which may cause not only false alarms but also the depletion of limited energy resource in the network. In the security solutions for the filtering of false reports, the choice of a security threshold value which determines the security level is important. In the existing adaptive solutions, a newly determined threshold value is broadcasted to the whole nodes, so that extra energy resource may be consumed unnecessarily. In this paper, we propose an application of the recursive contract net protocol to determine the threshold value which can provide both energy efficiency and sufficient security level. To manage the network more efficiently, the network is hierarchically grouped, and the contract net protocol is applied to each group. Through the protocol, the threshold value determined by the base station using a fuzzy logic is applied only where the security attack occurs on.
Keywords
Ubiquitous Sensor Networks; Contract Net Protocols; DEVS; Fuzzy Logic; Security;
Citations & Related Records
연도 인용수 순위
  • Reference
1 H.Y. Lee and T.H. Cho, 'Fuzzy Adaptive Selection of Filtering Schemes for Energy Saving in Sensor Networks,' IEICE Transactions on Communications, vol. 90, no. 12, pp. 3346-3353, June 2007
2 S.J. Lee, H.Y. Lee, and T.H. Cho, 'A Threshold Determining Method for the Dynamic Filtering in Wireless Sensor Networks Based on Fuzzy Logic,' International Journal of Computer Science and Network Security, vol. 8, no. 4, pp. 155-159, Apr. 2008
3 S.H. Chi and T.H. Cho, 'Fuzzy Logic based Propagation Limiting Method for Message Routing in Wireless Sensor Networks,' Lecture Notes in Computer Science, vol. 3983, pp. 58-64, May 2006
4 B.P. Zeigler, H. Praehofer, and T.G. Kim, Theory of Modeling and Simulation, ACADEMIC PRESS, pp. 53-89, Jan. 2000
5 I.F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirici. 'A Survey on Sensor Networks,' IEEE Communications Magazine, vol. 40, no. 8, pp. 102-114, Aug. 2002   DOI   ScienceOn
6 H. Yang and S. Lu, 'Commutative Cipher Based En-Route Filtering in Wireless Sensor Networks,' Proc. VTC, pp. 1223-1227, Sep. 2004
7 W. Zhang and G. Cao, 'Group Rekeying for Filtering False Data in Sensor Networks: A Predistribution and Local Collaboration-based Approach,' Proc INFOCOM, pp. 503-514, Mar. 2005
8 Z. Yu and Y. Guan, 'A Dynamic En-route Scheme for Filtering False Data lnjectionin Wireless Sensor Networks,' Proc. SenSys, pp. 294-295, Nov. 2005
9 H.Y. Lee and T.H. Cho, 'Fuzzy Adaptive Threshold Determining in the Key Inheritance Based Sensor Networks,' Lecture Notes in Artificial Intelligence, vol. 4570, pp. 64-73, July 2007
10 H.S. Seo, 'Network Security Agent DEVS Simulation Modeling,' Simulation Modelling Practice and Theory, vol. 14, no. 5, pp. 481-492, Aug. 2005   DOI   ScienceOn
11 F. Ye, H. Luo, and S. Lu, 'Statistical En-Route Filtering of lniected False Data in Sensor Networks,' IEEE Journal on Selected Areas in Communications, vol. 23, no. 4, pp. 839-850, Apr. 2005   DOI   ScienceOn
12 H.Y. Lee and T.H. Cho, 'Key Inheritance-Based False Data Filtering Scheme in Wireless Sensor Networks,' Lecture Notes in Computer Science, vol. 4317, pp. 116-127, Dec. 2006
13 J. Yang, R. Havaldar, V. Honavar, L. Miller, and J. Wong, 'Coordination of Distrbuted Knowledge Networks Using Contract Net Protocol,' Proc. lTC, pp. 71-74, Sep. 1998
14 S.R. Kim and T.H. Cho, 'Application of Fuzzy Logic for Adaptive Filtering in the Statistical Filtering based Sensor Networks,' Proc. NMC, p. 18, Aug. 2006
15 S. Zhu, S. Setia, S. Jajodia, and P. Ning, 'An Interleaved Hop-by-Hop Authentication Scheme for Filtering of lniected False Data in Sensor Networks,' Proc. S&P, pp. 259-271, May 2004