Browse > Article
http://dx.doi.org/10.9709/JKSS.2010.19.1.053

Dynamic Threshold Determination Method for Energy Efficient SEF using Fuzzy Logic in Wireless Sensor Networks  

Choi, Hyeon-Myeong (성균관대학교 정보통신공학부)
Lee, Sun-Ho (성균관대학교 정보통신공학부)
Cho, Tae-Ho (성균관대학교 정보통신공학부)
Abstract
In wireless sensor networks(WSNs) individual sensor nodes are subject to security compromises. An adversary can physically capture sensor nodes and obtain the security information. And the adversary injects false reports into the network using compromised nodes. If undetected, these false reports are forwarded to the base station. False reports injection attacks can not only result in false alarms but also depletion of the limited amount of energy in battery powered sensor nodes. To combat these false reports injection attacks, several filtering schemes have been proposed. The statistical en-routing filtering(SEF) scheme can detect and drop false reports during the forwarding process. In SEF, The number of the message authentication codes(threshold) is important for detecting false reports and saving energy. In this paper, we propose a dynamic threshold determination method for energy efficient SEF using fuzzy-logic in wireless sensor networks. The proposed method consider false reports rate and the number of compromised partitions. If low rate of false reports in the networks, the threshold should low. If high rate of false reports in networks, the threshold should high. We evaluated the proposed method’s performance via simulation.
Keywords
WNS; False report injection attack; SEF; Fuzzy-logic;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 F. Li and J. Wu, "A probabilistic voting-based filtering scheme in wireless sensor networks," Proc. IWCMC, pp. 27–32, 2006.
2 H. Yang and S. Lu, "Commutative Cipher Based En-route Filtering in Wireless Sensor Networks," IEEE in Proc. of VTC, pp. 1223-1227, 2004.
3 Przydatek, B., Song, D., and Perrig, A., "SIA: Secure Information Aggregation in Sensor Networks," ACM, in Proc. of SenSys, pp. 255-265, 2003.
4 F. Ye, H. Luo, S. Lu, and L. Zhang, "Statistical En-route Filtering of Injected False Data in Sensor Networks," IEEE Journals on Selected Areas in Communications, vol. 23, no. 4, pp. 839-850, 2005.   DOI
5 I.F. Akyldiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci., "A Survey on Sensor Networks," IEEE Wireless Communication Magazine, vol. 40, no. 8, pp. 102-116, 2002.   DOI   ScienceOn
6 J.N. Al-Karaki and A.E. Kamal., "Routing techniques in wireless sensor networks: a survey," IEEE Wireless Communication Magazine, vol. 11, no. 6, pp. 6-28, 2004.   DOI   ScienceOn
7 Buttyan, L. et al, "Statistical Wormhole Detection in Sensor Networks," Lecture Notes in Computer Science. 3813, 128-141, 2005.
8 Chris Karlof and David Wagner, "Secure routing in wireless sensor networks: attacks and countermeasure," IEEE SPNA, pp. 113-127, 2002.
9 김상률, 조대호, "통계적 여과 기법기반의 센서 네트워크를 위한 퍼지로직을 사용한 보안 경계 값 결정 기법," 한국시뮬레이션학회지, 16(2), pp. 27-35, 2007.   과학기술학회마을
10 H.Y. Lee, T.H. Cho, "Key Inheritance-Based False Data Filtering Scheme in Wireless Sensor Networks," Lect. Notes Comput. Sc. vol. 4317, pp.116-127 , 2006.
11 Perrig, A., Szewczyk, R., Tygar, J., Wen, V. and Culler, D. "SPINS: Security Protocols for Sensor Networks," Wirel. Netw., vol. 8, pp. 521-534, 2002.   DOI   ScienceOn
12 Zhu S, Setia S, Jajodia S, and Ning P, "An Interleaved Hop-by- Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks," In Proc. S&P, pp. 259-271, 2004.
13 Lee, H.Y., Cho, T,H., "Fuzzy Adaptive Selection of Filtering Schemes for Energy Saving in Sensor Networks," IEICE Trans. Commun. E90--B(12), 3346-3353, 2007.
14 Yu Z and Guan Y, "A Dynamic En-route Scheme for Filtering False Data Injection in Wireless Sensor Networks," In Proc. SenSys, pp. 294-295, 2005.