Browse > Article
http://dx.doi.org/10.9709/JKSS.2014.23.2.065

Fuzzy Logic based Next Hop Node Selection Method for Energy Efficient PVFS in WSN  

Lee, Jae Kwan (성균관대학교 정보통신공학부)
Nam, Su Man (성균관대학교 정보통신공학부)
Cho, Tae Ho (성균관대학교 정보통신공학부)
Abstract
Sensor nodes are easily compromised by attacker when which are divided in open environment. The attacker may inject false report and false vote attack through compromised sensor node. These attacks interrupt to transmission legitimate report or the energy of sensor node is exhausted. PVFS are proposed by Li and Wu for countermeasure in two attacks. The scheme use inefficiency to energy of sensor node as fixed report threshold and verification node. In this paper, our propose the next neighbor node selection scheme based on fuzzy logic system for energy improvement of PVFS. The parameter of fuzzy logic system are energy, hops, verification success count, CH select high the next neighbor node among neighbor nodes of two as deduction based on fuzzy logic system. In the experimental, our proposed scheme was improvement to energy of about 9% compare to PVFS.
Keywords
Wireless sensor network; Probabilistic voting-based filtering scheme; Fuzzy logic system;
Citations & Related Records
연도 인용수 순위
  • Reference
1 A. I. F, S. W, S. Y and C. E, "A Survey on Sensor Networks", IEEE Communications Magazine, Vol. 40, pp. 102-116, 2002.
2 H. Alemdar and C. Ersoy, "Wireless sensor networks for healthcare: A survey", Computer Networks, Vol. 54, pp. 2688-2710, 10, 2010.   DOI   ScienceOn
3 F. Li and J. Wu, "PVFS: A Probabilistic Voting-based Filtering Scheme in Wireless Sensor Networks", International Journal of Security and Networks, pp. 173-182, August, 27, 2008.
4 F. Ye, H. Luo, S. Lu and L. Zhang, "Statistical En-Route Filtering of Injected False Data in Sesnsor Networks", IEEE J. Sel. Area Comm, Vol. 23, pp. 839-850, 2005, April, 2005.   DOI   ScienceOn
5 S. S, J. S and P. N, "An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks", IEEE, pp. 259-271, May, 2004.
6 H. Y and S. Lu, "Commutative Cipher Based En-route Filtering in Wireless Sensor Networks", IEEE, pp. 1223-1227, Sept, 2004.
7 R. Lu, X. Lin, H. Zhu and X. Li, "BECAN: A Bandwidth-Efficient Cooperative Authentication Scheme for Filtering Injected False Data in Wireless Sensor Networks", IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, Vol. 23, pp. 32-43, Jan, 2012.   DOI   ScienceOn
8 R. Babuska, "Fuzzy Systems, Modeling and Identification", CiteSeerX, Delft University of Technology, 2001.
9 S. H. Chi and T. H. Cho, "Fuzzy Logic Based Propagation Limiting Method for Message Routing in Wireless Sensor Networks", Lect. Notes in Comput. Sci, Vol. 3983, pp. 58-64, 2006.
10 W. Zhang and G. Cao, "Group Rekeying for Filtering False Data in Sensor Network: A predistribution and Local Collaboration-based Approach", Proc. of INFOCOM, pp. 503-514, 2005.
11 A. Varga, "THE OMNET++ discrete event simulation system", In European Simulation Multiconference, pp. 171-180, 2001.
12 S. Kim, M. Lee and I. Yeom, "Simulating IEEE 802.16 Uplink Scheduler Using NS-2", KAIST, 2008.
13 X. Zeng, R. Bagrodia and M. Gerla, "GloModSim: A Library for Parallel Simulation of Large-scale Wireless Networks", IEEE, pp. 154-161, 1998.