Abstract
Wireless sensor networks (WSNs) are composed of nodes with limited resources in open environments. Nodes are placed in an open environment that will eventually be exposed to an adversary. An adversary can easily access security information such as the authentication key using data authentication. An adversary can use compromised sensor nodes to inject false reports to the WSN. If undetected, these false reports are forwarded to the base station. Such attacks by compromised sensor nodes result in false alarms and the depletion of the limited amount of energy in battery powered sensor nodes. The Dynamic En-routing Filtering (DEF) scheme can detect and drop false reports during the forwarding process. In DEF, the authentication key re-distribution period is important to detect false reports and save network energy. In this paper, we present a fuzzy-based authentication key re-distribution period determination method for DEF. The fuzzy-based method can prevent this problem and provide energy savings. We evaluated the performance of the proposed method via simulation.
This research was supported by Basic Science Research Program through the National Research Foundation of Korea(NRF) funded by the Ministry of Education, Science and Technology(No. 2010-0011188).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: A Survey on Sensor Networks. IEEE Commun. Mag., 102–114 (2002)
Al-Karaki, J.N., Kamal, A.E.: Routing Techniques in Wireless Sensor Networks: A Survey. IEEE Wirel. Commun. 11(6), 6–28 (2004)
Pzrydatek, B., Song, D., Perring, A.: SIA: Secure Information Aggregation in Sensor Networks. In: Proc. of SenSys, pp. 255–265 (2003)
Zhu, S., Setia, S., Jajodia, S., Ning, P.: An Interleaved Hop-by-Hop Authentication Scheme for filtering of Injected False Data in Sensor Networks. In: Proc. of S&P, pp. 259–271 (2004)
Li, F., Wu, J.: A Probabilistic Voting-based Filtering Scheme in Wireless Sensor Networks. In: Proc. of IWCMC, pp. 27–327 (2006)
Zhu, S., Setia, S., Jajodia, S., Ning, P.: An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks. In: The IEEE Symposium on Security and Privacy, pp. 259–271 (2004)
Yang, H., Lu, S.: Commutative Cipher Based En-Route Filtering in Wireless Sensor Networks. In: Proc. of VTC, pp. 1223–1227 (2003)
Ye, F., Luo, H., Lu, S.: Statistical En-Route Filtering of Injected False Data in Sensor Networks. IEEE J. Sel. Area Comm. 23(4), 839–850 (2005)
Yu, Z., Guan, Y.: A Dynamic En-route Scheme for Filtering False Data Injection in Wireless Sensor Networks. In: Proc. of SenSys, pp. 294–295 (2005)
Lee, H., Cho, T.: Key Inheritance-Based False Data Filtering Scheme in Wireless Sensor Networks. In: Inoue, K., Satoh, K., Toni, F. (eds.) CLIMA 2006. LNCS (LNAI), vol. 4371, pp. 116–127. Springer, Heidelberg (2007)
Zhang, W., Cao, G.: Group Rekeying for Filtering False Data in Sensor Networks: A Redistribution and Local Collaboration-based Approach. In: Proc. of INFORCOM, pp. 503–514 (2005)
Kim, B., Cho, T.: Condition-based Key Dissemination Period Determining Method in Sensor Networks. In: Proc. of ICACT, pp. 1121–1125 (2006)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Lee, S.H., Cho, T.H. (2010). Fuzzy Based Key Re-distribution Period Determination Method in Wireless Sensor Networks. In: Huang, DS., Zhang, X., Reyes GarcÃa, C.A., Zhang, L. (eds) Advanced Intelligent Computing Theories and Applications. With Aspects of Artificial Intelligence. ICIC 2010. Lecture Notes in Computer Science(), vol 6216. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-14932-0_62
Download citation
DOI: https://doi.org/10.1007/978-3-642-14932-0_62
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-14931-3
Online ISBN: 978-3-642-14932-0
eBook Packages: Computer ScienceComputer Science (R0)