Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3313991.3314004acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiccaeConference Proceedingsconference-collections
research-article

A Fuzzy System based Approach to Extend Network Lifetime for En-Route Filtering Schemes in WSNs

Published: 23 February 2019 Publication History

Abstract

Wireless sensor networks suffer from false report injection attacks. This results in energy drain over sensor nodes on the event traversal route. Novel en-route filtering schemes counter this problem by filtering these attacks on designated verification nodes. However, these filtering schemes among other limitations inherently are network lifetime inefficient. Generally, report traversal paths and verification nodes are also fixed. In this paper, we cater these limitations in our proposed scheme. Simulation experiments results show that proposed schemes outperforms existing en-route filtering schemes in networks lifetime. We employed a Fuzzy Logic System to select forwarding nodes from candidate nodes based on current network conditions. Proposed scheme gains in network lifetime, and energy-efficiency while having comparable false report filtering efficiency.

References

[1]
Deepak Uttamchandani. 2013. Handbook of Mems for Wireless and Mobile Applications. Woodhead Publishing.
[2]
Zhen Yu, and Yong Guan. 2010. A dynamic en-route filtering scheme for data reporting in wireless sensor networks. IEEE/ACM Transactions on Networking, vol. 18(1), pp.150--163.
[3]
Hao Yang and Songwu Lu. 2004. Commutative cipher based en-route filtering in wireless sensor networks. 60th Vehicular Technology Conference, vol. 2, pp. 1223--1227.
[4]
F. Ye, H. Luo, S. Lu, and L. Zhang. 2004. Statistical en-route filtering of injected false data in sensor networks. In IEEE Proceedings of INFOCOM 2004, pp. 839--850.
[5]
S. Zhu, S. Setia, S. Jajodia, and P. Ning. 2004. An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks. Proceedings of EEE Symposium on Security and Privacy, pp. 259--271.
[6]
Feng Li and Jie Wu. 2006. A probabilistic voting-based filtering scheme in wireless sensor networks. Vancour, Canada, ACM IWCMC, pp. 27--32.
[7]
Muhammad K. Shahzad and Tae Ho Cho, 2017. A Network Density-adaptive Improved CCEF Scheme for Enhanced Network Lifetime, Energy Efficiency, and Filtering in WSNs. Adhoc & Sensor Wireless Networks, vol. 35(1-2), pp. 129--149.
[8]
B. Karp and H. T. Kung. 2000. GPSR: Greedy perimeter stateless routing for wireless networks. ACM MobiCom, pp. 243--254.
[9]
Wang, J., Liu, Z., Zhang, S. and Zhang, X., 2014. Defending collaborative false data injection attacks in wireless sensor networks. Information Sciences, 254, pp.39--53.
[10]
Liu, Tao. 2012. Avoiding energy holes to maximize network lifetime in gradient sinking sensor networks. Wireless Personal Communication. Springer Science + Business Media, LLC, pp. 581--600.
[11]
Muhammad K. Shahzad,. T. Nguyen, V. Zalyubovskiy, and H. Choo., 2018. LNDIR: A lightweight non-increasing delivery-latency interval-based routing for duty-cycled sensor networks. International Journal of Distributed Sensor Networks, 14(4), pages 1--16.
[12]
Swarup Kumar Mitra, Mrinal Kanti Naskar. 2011. Comparative study of radio models for data gathering in wireless sensor network. International Journal of Computer Applications. vol. 27(4), pp. 49--57.
[13]
Crossbow, 2011, http://www.xbow.com/
[14]
María Gabriela Calle Torres. 2006, Measuring Energy Consumption in Wireless Sensor Networks using GSP (Thesis), IEEE 17th International Symposium on Personal, Indoor and Mobile Radio Communications, pp. 1--5.
[15]
Muhammad K. Shahzad, Tae Ho Cho, 2017, An Energy-Aware Routing and Filtering Node (ERF) selection in CCEF to Extend Network Lifetime in WSN, IETE Journal of Research, vol. 62(6), pp. 281--293.
[16]
Qureshi, Nawab Muhammad Faseeh, et al. "An Aggregate MapReduce Data Block Placement Strategy for Wireless IoT Edge Nodes in Smart Grid." Wireless Personal Communications: pp. 1--12.

Cited By

View all
  • (2022)Vampire Attack Mitigation and Network Performance Improvement Using Probabilistic Fuzzy Chain Set with Authentication Routing Protocol and Hybrid Clustering-Based Optimization in Wireless Sensor NetworkMathematical Problems in Engineering10.1155/2022/49481902022(1-11)Online publication date: 14-Jun-2022
  • (2021)En-Route Message Authentication Scheme for Filtering False Data in WSNsSecurity and Communication Networks10.1155/2021/40685072021Online publication date: 1-Jan-2021
  • (2020)GAFOR: Genetic Algorithm Based Fuzzy Optimized Re-Clustering in Wireless Sensor NetworksMathematics10.3390/math90100439:1(43)Online publication date: 28-Dec-2020

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
ICCAE 2019: Proceedings of the 2019 11th International Conference on Computer and Automation Engineering
February 2019
160 pages
ISBN:9781450362870
DOI:10.1145/3313991
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

In-Cooperation

  • The University of Western Australia, Department of Electronic Engineering, University of Western Australia
  • University of Melbourne: University of Melbourne
  • Macquarie University-Sydney

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 23 February 2019

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Energy-efficiency
  2. en-route filtering
  3. filtering capacity
  4. fuzzy logic
  5. network lifetime
  6. re-clustering
  7. sensor networks

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

ICCAE 2019

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)1
  • Downloads (Last 6 weeks)0
Reflects downloads up to 27 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2022)Vampire Attack Mitigation and Network Performance Improvement Using Probabilistic Fuzzy Chain Set with Authentication Routing Protocol and Hybrid Clustering-Based Optimization in Wireless Sensor NetworkMathematical Problems in Engineering10.1155/2022/49481902022(1-11)Online publication date: 14-Jun-2022
  • (2021)En-Route Message Authentication Scheme for Filtering False Data in WSNsSecurity and Communication Networks10.1155/2021/40685072021Online publication date: 1-Jan-2021
  • (2020)GAFOR: Genetic Algorithm Based Fuzzy Optimized Re-Clustering in Wireless Sensor NetworksMathematics10.3390/math90100439:1(43)Online publication date: 28-Dec-2020

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media