SlideShare a Scribd company logo
1 of 10
Download to read offline
Advanced Computational Intelligence: An International Journal (ACII), Vol.1, No.2, October 2014
25
FUZZY-BASED MULTIPLE PATH SELECTION
METHOD FOR IMPROVING ENERGY EFFICIENCY IN
BANDWIDTH-EFFICIENT COOPERATIVE
AUTHENTICATIONS OF WSNS
Su Man Nam1
and Tae Ho Cho2
1, 2
College of Information and Communication Engineering, Sungkyunkwan University, Suwon,
440-746, Republic of Korea
ABSTRACT
In wireless sensor networks, adversaries can easily compromise sensors because the sensor resources are
limited. The compromised nodes can inject false data into the network injecting false data attacks. The
injecting false data attack has the goal of consuming unnecessary energy in en-route nodes and causing
false alarms in a sink. A bandwidth-efficient cooperative authentication scheme detects this attack based on
the random graph characteristics of sensor node deployment and a cooperative bit-compressed
authentication technique. Although this scheme maintains a high filtering probability and high reliability in
the sensor network, it wastes energy in en-route nodes due to a multireport solution. In this paper, our
proposed method effectively selects a number of multireports based on the fuzzy rule-based system. We
evaluated the performance in terms of the security level and energy savings in the presence of the injecting
false data attacks. The experimental results indicate that the proposed method improves the energy
efficiency up to 10% while maintaining the same security level as compared to the existing scheme.
KEYWORDS
Wireless sensor network, Network security, bandwidth-efficient cooperative authentication scheme, fuzzy
logic
1. INTRODUCTION
Wireless sensor networks (WSNs) have been applied in ubiquitous computing systems in order to
monitor target environments [1]. A WSN consists of a large number of sensor nodes and a sink in
a sensor field [2]. These sensor nodes detect environmental changes, generate data, and transmit
the data to the sink. The sink collects the data transmitted from the sensor nodes and reports it to
the users. Although the WSN is easily operated without infrastructure, the sensor nodes have the
great disadvantage of possibly being captured and compromised due to their limited hardware
resources (e.g., energy, memory, etc.). In addition, the sensor nodes are exposed to various attack
patterns such as sinkhole [3], sybil [4], and wormhole [5] attacks. Thus, the sensor network is
impractical for monitoring the environment when such attacks are generated.
Advanced Computational Intelligence: An International Journal (ACII), Vol.1, No.2, October 2014
WSNs are very vulnerable to various attacks because
hostile environments. One of the various attacks is the
Figure 1, an adversary compromises several sensor nodes, accesses all
compromised nodes, and then controls
bogus information arrive at the sink,
communicating the false report.
of legitimate reports. Thus, the sensor network suffers a great loss
attack is generated in compromised nodes
In order to detect an injecting false data
(BECAN) was proposed because of its
uses a cooperative neighbors
probability and a multireport solution
source node and its neighbors
authentication code (mac). The source node collects every mac and produces a
The report is forwarded through the multireport solution
routing paths. Although BECAN has high filtering probability and reliability c
previous filtering mechanisms [7
due to the multireport solution.
In this paper, we propose a method to effectively select the number of multireports
fuzzy logic system. When a report
whole network considering three input factors
fuzzy system to every node. The effective numb
energy savings in the sensor network.
improves the energy efficiency by
method more effectively chooses the number of reports
against the injecting false data attack
The rest of this paper is organized as follows. The background and motivation of this study are
described in Section 2. We introduce the details of our proposed method in Section 3. Section 4
provides the analysis and experimental results.
the end of this paper.
Advanced Computational Intelligence: An International Journal (ACII), Vol.1, No.2, October 2014
Figure1. Injecting false data attacks
WSNs are very vulnerable to various attacks because they are often deployed in unattended or
One of the various attacks is the injecting false data attack [6].
ry compromises several sensor nodes, accesses all of the keys stored in these
compromised nodes, and then controls the nodes to inject bogus information. If false reports with
arrive at the sink, the en-route nodes consume unnecessary energy
the false report. In addition, the compromised nodes can interrupt the forwarding
Thus, the sensor network suffers a great loss as the injecting false data
d in compromised nodes.
injecting false data attack, bandwidth-efficient cooperative authentication
because of its high filtering probability and high reliability [6].
neighbors × router-based (CNR) filtering mechanism for high filtering
probability and a multireport solution (i.e., multiple paths) for high reliability. In BECAN,
and its neighbors detect an event, the neighbors each generate
The source node collects every mac and produces a MAC
The report is forwarded through the multireport solution, which is transmitted along
Although BECAN has high filtering probability and reliability c
[7-9], the sensor node energy may be wasted in the en
In this paper, we propose a method to effectively select the number of multireports
fuzzy logic system. When a report is received at a sink, the sink determines the condition of the
whole network considering three input factors using fuzzy logic. It then forwards the
fuzzy system to every node. The effective number of reports influences the high reliability and
in the sensor network. The experimental results show that our proposed method
by effectively selecting the number of reports. Thus, our proposed
chooses the number of reports in order to improve the energy efficiency
against the injecting false data attacks compared to the existing scheme.
The rest of this paper is organized as follows. The background and motivation of this study are
ribed in Section 2. We introduce the details of our proposed method in Section 3. Section 4
provides the analysis and experimental results. The conclusions and future works are discussed at
Advanced Computational Intelligence: An International Journal (ACII), Vol.1, No.2, October 2014
26
unattended or
. As shown in
keys stored in these
alse reports with
route nodes consume unnecessary energy in
the forwarding
the injecting false data
erative authentication
high filtering probability and high reliability [6]. BECAN
filtering mechanism for high filtering
. In BECAN, when a
generate a message
MAC in a report.
which is transmitted along multiple
Although BECAN has high filtering probability and reliability compared to
en-route nodes
In this paper, we propose a method to effectively select the number of multireports based on a
condition of the
the result of the
high reliability and
xperimental results show that our proposed method
. Thus, our proposed
energy efficiency
The rest of this paper is organized as follows. The background and motivation of this study are
ribed in Section 2. We introduce the details of our proposed method in Section 3. Section 4
onclusions and future works are discussed at
Advanced Computational Intelligence: An International Journal (ACII), Vol.1, No.2, October 2014
27
2. BACKGROUND AND MOTIVATION
2.1. Bandwidth-Efficient Cooperative Authentication Scheme (BECAN)
BECAN effectively detects false data that is injected in en-route node data based on the random
graph characteristics of sensor deployment and a cooperative bit-compressed authentication
technique. The random graph characteristics are used to select k neighbors for multireport
solutions. The cooperative bit-compressed authentication technique is used for detecting false
data in the en-route nodes. BECAN consists of four phases: (1) sensor nodes initialization and
deployment, (2) sensed results reporting protocol, (3) en-routing filtering, and (4) sink
verification.
In phase (1), the sensor node initialization and deployment, the sink selects an elliptic curve
E , , and a hash function h(). It then sets the public parameters (params) as follows:
params = {E(, , , ℎ()}
Every sensor node sets TinyECC[10] and params before they are deployed in the sensor field as
follows:
params = {E(, , , ℎ()}
:    , ℎ: {0, 1}
∈ $: % '() '*   '+ ,)ℎ | | = .
Each node is randomly assigned a private key () (where the private key /0 is randomly chosen
from 1
∗
), while all nodes collectively generate the public key 30 (30 = /0 , where i is a node’s
identifier.) Thus, each node has a public key and a private key (30, /0).
In phase (2), the sensed results reporting phase, it is assumed that a source node 45 establishes a
routing path 678
: {69 → 6; → ⋯ → 6= → (.}. When a real event occurs, the source node
obtains a current timestamp T for generating a message m. The source collects the mac (m, T)
from the neighbors and verifies the message m and the timestamp T. The source node then
generates a report including the data (m, T, MAC) and selects k different neighbors to use the
multireport solution to forward the report along multiple routing paths.
In phase (3), en-route filtering, when the en-route nodes receive the report, they determine the
integrity of the message m and the timestamp T. The report (m, T, MAC) is then discarded. If the
timestamp is normal, the en-route nodes verify the MAC in the report using the public key and the
CNR-based MAC verification algorithm. If the report is legitimate, the report is transmitted to the
next hop node.
In phase (4), sink verification, when a sink receives the report, it verifies the message and
timestamp, as well as the MAC. If one report reaches the sink, the legitimate event is successfully
reported.
2.2. Motivation
In an open WSN environment, compromised nodes can generate an injecting false data attack to
generate false reports with bogus information. BECAN achieves both high filtering probability
Advanced Computational Intelligence: An International Journal (ACII), Vol.1, No.2, October 2014
and high reliability against th
authentication technique with a
improve the reliability, this scheme uses multireports
source nodes to be forwarded along their paths to the sink. Although the existing method provid
high filtering probability and high
in the en-route nodes due to the
selects a number of multireports
fuzzy logic system. Thus, the proposed method select
enhance the energy efficiency against attack
3. PROPOSED METHOD
3.1. Assumption
In this paper, a sensor network consist
[11, 12]). The H-sensors’ hardware resources (CPU, memory, storage, etc.) are more powerful
than those of L-sensors. After deploying the sensor nodes in the sensor f
enables H-sensors to serve as cluster heads (
The topology then establishes
minimum cost forwarding algorithm
further assume that a compromised node inject
the sensor network.
3.2. Overview
Figure2. Overview of
Our proposed method detects injecting false data attacks and effectively selects the number of
multireports based on a fuzzy rule
executing the fuzzy rule-based system
field, a source node produces a report to be forwarded to the sink. After the sink receives the
report, the fuzzy system is used
is obtained from the fuzzy system is
neighboring nodes apply the number of multireports as a report is transmitted. Thus, our proposed
method effectively determines
network based on the fuzzy rule-
3.3. Proposed Method using Fuzzy Logic
The input factors of the fuzzy logic system are as follows:
Advanced Computational Intelligence: An International Journal (ACII), Vol.1, No.2, October 2014
and high reliability against those attacks. This scheme uses a cooperative bit
with a high filtering probability to filter out the injected false data. To
improve the reliability, this scheme uses multireports, where multiple reports are generated
along their paths to the sink. Although the existing method provid
high reliability in the sensor network, the sensors may
the multiple reports. In this paper, our proposed method effectively
selects a number of multireports using three factors regarding the network condition based on
fuzzy logic system. Thus, the proposed method selects the effective number of reports in order to
energy efficiency against attacks as compared to BECAN.
paper, a sensor network consists of a sink and sensor nodes (e.g., H-sensors and L
sensors’ hardware resources (CPU, memory, storage, etc.) are more powerful
. After deploying the sensor nodes in the sensor field, the sensor network
cluster heads (CHs) and to clusters around the CHs with L
The topology then establishes the initial routing paths using directed diffusion
minimum cost forwarding algorithm [14]. The CHs discover a routing path toward the sink. We
further assume that a compromised node injects false reports and interrupts legitimate reports in
. Overview of the proposed fuzzy rule-based system
injecting false data attacks and effectively selects the number of
multireports based on a fuzzy rule-based system. Figure 2 shows the proposal’s processes for
based system with three input factors. When an event occurs in a sensor
field, a source node produces a report to be forwarded to the sink. After the sink receives the
used to determine the condition of the sensor network. The
obtained from the fuzzy system is forwarded to every node. Using the result message,
the number of multireports as a report is transmitted. Thus, our proposed
the number of multireports according to the condition of the
-based system.
.3. Proposed Method using Fuzzy Logic
nput factors of the fuzzy logic system are as follows:
Advanced Computational Intelligence: An International Journal (ACII), Vol.1, No.2, October 2014
28
cooperative bit-compressed
tering probability to filter out the injected false data. To
are generated in the
along their paths to the sink. Although the existing method provides
sensors may waste energy
reports. In this paper, our proposed method effectively
the network condition based on a
of reports in order to
sensors and L-sensors
sensors’ hardware resources (CPU, memory, storage, etc.) are more powerful
ield, the sensor network
clusters around the CHs with L-sensors.
initial routing paths using directed diffusion [13] and a
e CHs discover a routing path toward the sink. We
legitimate reports in
injecting false data attacks and effectively selects the number of
Figure 2 shows the proposal’s processes for
event occurs in a sensor
field, a source node produces a report to be forwarded to the sink. After the sink receives the
The result that
sing the result message,
the number of multireports as a report is transmitted. Thus, our proposed
according to the condition of the
Advanced Computational Intelligence: An International Journal (ACII), Vol.1, No.2, October 2014
29
 Remaining energy level (REL): This value is an important factor in reducing needless energy
consumption in the sensor network. If the energy level of the whole network is very low, the
number of transmitted multireports should be reduced in order to decrease unnecessary
energy consumption in the sensor network. The improvement in energy efficiency is
influenced by the number of the reports transmitted.
 Ratio of false data filtered by en-route nodes (RFD): This factor represents the security of the
whole network. If the ratio is high, the network maintains high reliability because the
compromised nodes are injecting much false data. The security level is influenced by the ratio
of filtered false data.
 Average number of hops of source nodes (AHP): This factor describes the hop count, which
is the number of nodes traveled en-route from the source node. With a long distance from the
source to the sink, reports transmitted via multiple hops consume a great deal of the energy of
the en-route nodes. The network’s energy resource is influenced by high numbers of hops in
the en-route nodes.
The output factor is as follows:
 Result (RST): This value determines the number of report transmissions of the source nodes.
If the value is five, the report should be forwarded to five neighboring nodes of the source
node. The effective selection of the value is influenced by three input factors based on the
fuzzy rule-based system.
Figures 3, 4, 5, and 6 show the membership function of the fuzzy logic input and output
parameters. The labels of the input fuzzy variables are as follows:
 REL = {VS (very small), SM (small), MD (medium), MN (many), VM (very many)}
 RFD = {LW (low), MD (moderate), HG (high)}
 AHP = {NR (near), MD (moderate), FR (far)}
The logic output parameter is represented by a label. The label values are as follows:
 RST = {TW (two), TH (three), FR (four), FV (five)}

Figure3. REL of the fuzzy membership function
Advanced Computational Intelligence: An International Journal (ACII), Vol.1, No.2, October 2014
30
Figure 4. RFD of the fuzzy membership function
Figure5. AHP of the fuzzy membership function
Figure 6. RST of the fuzzy membership function
Table 1 shows the 45 (= 5 × 3 × 3) rules of the fuzzy system. If REL is very small, RFD, is low,
and AHS is near, then the number of multireports is two (TW), such as for Rule 0. This case
indicates that there is a normal state to forward the multireports in a source node. In contrast, if
REL is very large, RFD is large, and AHS is far, then the number of multireports is five (FV),
such as for Rule 44. This case indicates that there is an abnormal condition due to injecting false
data attacks. The sensor network needs to effectively select the number of multireports in order to
improve the energy efficiency.
Advanced Computational Intelligence: An International Journal (ACII), Vol.1, No.2, October 2014
31
Table 1. Fuzzy if-then rules
Rule no. IF THEN
REL RFD AHS RST
0 VS SM NR TW
1 VS SM MD TW
2 VS SM FR TW
3 VS MD NR TW
4 VS MD MD TW
5 VS MD FR TH
6 VS LG NR TH
7 VS LG MD TH
8 VS LG FR TH
⋮
43 VL LG MD FV
44 VL LG FR FV
4. EXPERIMENTAL RESULTS
Experiments were performed to determine the effectiveness of the proposed method compared to
BECAN. The sensor network environment is 500×500 m2
and includes a total of 500 nodes (100
CHs and 400 normal nodes) in the sensor field. The nodes are uniformly distributed. A cluster
consists of one cluster node and four normal nodes. In [7], the sensors consume 16.25 µJ to
transmit each byte and 12.5 µJ to receive each byte. They also consume 15 µJ and 75 µJ,
respectively, to generate and verify a MAC. We randomly generated 1,000 events. The message
and report sizes are 1 byte and 24 bytes, respectively. For injecting false data attacks, five sensor
nodes are compromised after deployment in the field. The compromised node injects false reports
by using 5% probability into the network.
Advanced Computational Intelligence: An International Journal (ACII), Vol.1, No.2, October 2014
32
Figure.7 Number of dropped reports in adversary nodes versus number of events
Figure 7 shows the number of dropped false reports in the en-route nodes in terms of the number
of events. As shown in Figure 7, BECAN and the proposed method have the same number of
dropped reports. The compromised nodes drop 217 false reports for both methods when 1,000
events are generated. Therefore, the proposed method maintains the same security level as
BECAN.
Figure 8. Energy consumption of the whole network versus number of events
Figure 8 shows the energy consumption of the whole network in terms of the number of events.
When 200 events occur, a difference in energy consumption exists between BECAN and the
Number
of
Dropped
Reports
in
En-route
Nodes
0
50
100
150
200
250
Number of Events
0 200 400 600 800 1,000 1,200
BECAN
Proposed Method
Energy
Consumption
of
Whole
Network
(mJ)
0
200
400
600
800
1,000
1,200
Number of Events
0 200 400 600 800 1,000
BECAN
Proposed Method
Advanced Computational Intelligence: An International Journal (ACII), Vol.1, No.2, October 2014
33
proposed method. When 1,000 events are generated, BECAN and the proposed method consume
1,010 mJ and 987 mJ, respectively. The reason for this difference is that the effective number of
multireports is selected through the network’s condition based on the fuzzy rule-based system.
The proposed method improves the energy savings up to about 10% compared to BECAN.
Therefore, our proposed method saves energy resources through the effective selection of the
number of multireports and prolongs the sensor network lifetime.
5. CONCLUSIONS AND FUTURE WORKS
In WSNs, sensor nodes are easily compromised by an adversary because their hardware has
limited constraints. The compromised nodes consume unnecessary energy in the sensor network
when injecting false data attacks are generated. In addition, other en-route compromised nodes
can inject bogus information into a legitimate report. BECAN detects this attack based on the
random graph characteristics of sensor node deployment and using a cooperative bit-compressed
authentication technique. This existing scheme maintains both high filtering probability and high
reliability against such attacks. However, BECAN wastes unnecessary energy in en-route nodes
due to the multireport solution. Our proposed method effectively chooses the number of
multireports based on a fuzzy rule-based system. We use three input factors to measure the
network condition and to determine the effective number of multireports. The experimental
results demonstrate that the proposed method saves up to 10% of the energy resources while
maintaining the same security level compared to the existing scheme. Therefore, our proposed
method conserves the energy resources of the whole network and prolongs the network’s lifetime.
In the future, we propose optimization of the fuzzy rule-based system in the proposed method in
order to operate an optimal sensor network.
ACKNOWLEDGEMENTS
This research was supported by Basic Science Research Program through the National Research
Foundation of Korea (NRF) funded by the Ministry of Education, Science and Technology (No.
NRF-2013R1A2A2A01013971).
REFERENCES
[1] I. F. Akyildiz, W. Su, Y. Sankarasubramaniam  E. Cayirci, (2002) A survey on sensor networks,”
Communications Magazine, IEEE, vol. 40, pp. 102-114.
[2] K. Akkaya and M. Younis, (2005) A survey on routing protocols for wireless sensor networks,” Ad
Hoc Networks, vol. 3, pp. 325-349.
[3] E. C. H. Ngai, J. Liu and M. R. Lyu, (2007) An efficient intruder detection algorithm against
sinkhole attacks in wireless sensor networks,” vol. 30, pp. 2353-2364.
[4] Jing Deng, Richard Han and Shivakant Mishra, (2006) INSENS: Intrusion-Tolerant Routing in
Wireless Sensor Networks,” Computer Communications, vol. 29, pp. 216-230.
[5] Ji-Hoon Yun, Il-Hwan Kim, Jae-Han Lim and Seung-Woo Seo, (2006) WODEM: wormhole attack
defense mechanism in wireless sensor networks, ICUCT'06 Proceedings of the 1st International
Conference on Ubiquitous Convergence Technology, pp. 200-209.
[6] Rongxing Lu, Xiaodong Lin, Haojin Zhu, Xiaohui Liang and Xuemin Shen, (2012) BECAN: A
Bandwidth-Efficient Cooperative Authentication Scheme for Filtering Injected False Data in Wireless
Sensor Networks, Parallel and Distributed Systems, IEEE Transactions On, vol. 23, pp. 32-43.
[7] F. Ye, H. Luo, S. Lu and L. Zhang, (2005) Statistical en-route filtering of injected false data in
sensor networks, Selected Areas in Communications, IEEE Journal On, vol. 23, pp. 839-850.
Advanced Computational Intelligence: An International Journal (ACII), Vol.1, No.2, October 2014
34
[8] S. Zhu, S. Setia, S. Jajodia and P. Ning, (2004) An interleaved hop-by-hop authentication scheme for
filtering of injected false data in sensor networks, in Security and Privacy, 2004. Proceedings. 2004
IEEE Symposium On, pp. 259-271.
[9] H. Yang, F. Ye, Y. Yuan, S. Lu and W. Arbaugh, (2005) Toward resilient security in wireless sensor
networks, in Proceedings of the 6th ACM International Symposium on Mobile Ad Hoc Networking
and Computing, Urbana-Champaign, IL, USA, pp. 34-45.
[10] Xiaojiang Du, M. Guizani, Yang Xiao and Hsiao-Hwa Chen, (2007) Two Tier Secure Routing
Protocol for Heterogeneous Sensor Networks, Wireless Communications, IEEE Transactions On,
vol. 6, pp. 3395-3401.
[11] MICAz.,
http://bullseye.xbow.com:81/Products/Product_pdf_files/Wireless_pdf/MICA2_Datasheet.pdf.
[12] C. Intanagonwiwat, R. Govindan and D. Estrin, Directed Diffusion: A scalable and robust
communication paradigm for sensor networks, Proceedings of the 6th Annual International
Conference on Mobile Computing and Networking, pp. 56-67, 2000.
[13] F. Ye, A. Chen, S. Lu and L. Zhang, A scalable solution to minimum cost forwarding in large sensor
networks, in Computer Communications and Networks, 2001. Proceedings. Tenth International
Conference On, 2001, pp. 304-309.
Authors
Su Man Nam received his B.S. degree in Computer Information from Hanseo
University, Korea, in February 2009 and his M.S. degree in Electrical and Computer
Engineering from Sungkyunkwan University in 2013. He is currently a doctoral student
in the College of Information and Communication Engineering at Sungkyunkwan
University, Korea. His research interests include wireless sensor networks, security in
wireless sensor networks, and modeling  simulation.
Tae Ho Cho received a Ph.D. degree in Electrical and Computer Engineering from the
University of Arizona, USA, in 1993, and B.S. and M.S. degrees in Electrical Engineering
from Sungkyunkwan University, Republic of Korea, and the University of Alabama, USA,
respectively. He is currently a Professor in the College of Information and
Communication Engineering, Sungkyunkwan University, Korea. His research interests
are in the areas of wireless sensor networks, intelligent systems, modeling  simulation, and enterprise
resource planning.

More Related Content

Similar to Fuzzy-Based Multiple Path Selection Method for Improving Energy Efficiency in Bandwidth-Efficient Cooperative Authentications of WSNS

A KEY LEVEL SELECTION WITHIN HASH CHAINS FOR THE EFFICIENT ENERGY CONSUMPTION...
A KEY LEVEL SELECTION WITHIN HASH CHAINS FOR THE EFFICIENT ENERGY CONSUMPTION...A KEY LEVEL SELECTION WITHIN HASH CHAINS FOR THE EFFICIENT ENERGY CONSUMPTION...
A KEY LEVEL SELECTION WITHIN HASH CHAINS FOR THE EFFICIENT ENERGY CONSUMPTION...ijasa
 
A security method for multiple attacks in sensor networks against the false r...
A security method for multiple attacks in sensor networks against the false r...A security method for multiple attacks in sensor networks against the false r...
A security method for multiple attacks in sensor networks against the false r...ijitjournal
 
A Method of Improving Energy Efficiency Through Geofencing and False Data Blo...
A Method of Improving Energy Efficiency Through Geofencing and False Data Blo...A Method of Improving Energy Efficiency Through Geofencing and False Data Blo...
A Method of Improving Energy Efficiency Through Geofencing and False Data Blo...IJCNCJournal
 
A secure routing process to simultaneously defend against false report and wo...
A secure routing process to simultaneously defend against false report and wo...A secure routing process to simultaneously defend against false report and wo...
A secure routing process to simultaneously defend against false report and wo...ieijjournal
 
IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...
IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...
IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...IRJET Journal
 
Iaetsd a survey on enroute filtering scheme in
Iaetsd a survey on enroute filtering scheme inIaetsd a survey on enroute filtering scheme in
Iaetsd a survey on enroute filtering scheme inIaetsd Iaetsd
 
WSN LIFETIME EXTENSION USING GA OPTIMISED FUZZY LOGIC
WSN LIFETIME EXTENSION USING GA OPTIMISED FUZZY LOGICWSN LIFETIME EXTENSION USING GA OPTIMISED FUZZY LOGIC
WSN LIFETIME EXTENSION USING GA OPTIMISED FUZZY LOGICAIRCC Publishing Corporation
 
WSN LIFETIME EXTENSION USING GA OPTIMISED FUZZY LOGIC
WSN LIFETIME EXTENSION USING GA OPTIMISED FUZZY LOGICWSN LIFETIME EXTENSION USING GA OPTIMISED FUZZY LOGIC
WSN LIFETIME EXTENSION USING GA OPTIMISED FUZZY LOGICijcsit
 
WSN Lifetime Extension Using GA Optimised Fuzzy Logic
WSN Lifetime Extension Using GA Optimised Fuzzy LogicWSN Lifetime Extension Using GA Optimised Fuzzy Logic
WSN Lifetime Extension Using GA Optimised Fuzzy LogicAIRCC Publishing Corporation
 
A fuzzy based congestion controller for control and balance congestion in gri...
A fuzzy based congestion controller for control and balance congestion in gri...A fuzzy based congestion controller for control and balance congestion in gri...
A fuzzy based congestion controller for control and balance congestion in gri...csandit
 
A FUZZY-BASED CONGESTION CONTROLLER FOR CONTROL AND BALANCE CONGESTION IN GRI...
A FUZZY-BASED CONGESTION CONTROLLER FOR CONTROL AND BALANCE CONGESTION IN GRI...A FUZZY-BASED CONGESTION CONTROLLER FOR CONTROL AND BALANCE CONGESTION IN GRI...
A FUZZY-BASED CONGESTION CONTROLLER FOR CONTROL AND BALANCE CONGESTION IN GRI...cscpconf
 
IMPROVEMENT OF FALSE REPORT DETECTION PERFORMANCE BASED ON INVALID DATA DETEC...
IMPROVEMENT OF FALSE REPORT DETECTION PERFORMANCE BASED ON INVALID DATA DETEC...IMPROVEMENT OF FALSE REPORT DETECTION PERFORMANCE BASED ON INVALID DATA DETEC...
IMPROVEMENT OF FALSE REPORT DETECTION PERFORMANCE BASED ON INVALID DATA DETEC...IJCNCJournal
 
Prevention Method of False Report Generation in Cluser Heads for Dynamic En-R...
Prevention Method of False Report Generation in Cluser Heads for Dynamic En-R...Prevention Method of False Report Generation in Cluser Heads for Dynamic En-R...
Prevention Method of False Report Generation in Cluser Heads for Dynamic En-R...AIRCC Publishing Corporation
 
PREVENTION METHOD OF FALSE REPORT GENERATION IN CLUSTER HEADS FOR DYNAMIC E...
PREVENTION METHOD OF FALSE REPORT  GENERATION IN CLUSTER HEADS FOR DYNAMIC  E...PREVENTION METHOD OF FALSE REPORT  GENERATION IN CLUSTER HEADS FOR DYNAMIC  E...
PREVENTION METHOD OF FALSE REPORT GENERATION IN CLUSTER HEADS FOR DYNAMIC E...AIRCC Publishing Corporation
 
PREVENTION METHOD OF FALSE REPORT GENERATION IN CLUSTER HEADS FOR DYNAMIC EN-...
PREVENTION METHOD OF FALSE REPORT GENERATION IN CLUSTER HEADS FOR DYNAMIC EN-...PREVENTION METHOD OF FALSE REPORT GENERATION IN CLUSTER HEADS FOR DYNAMIC EN-...
PREVENTION METHOD OF FALSE REPORT GENERATION IN CLUSTER HEADS FOR DYNAMIC EN-...ijcsit
 
A fuzzy congestion controller to detect and balance congestion in wsn
A fuzzy congestion controller to detect and balance congestion in wsnA fuzzy congestion controller to detect and balance congestion in wsn
A fuzzy congestion controller to detect and balance congestion in wsnijwmn
 
Filtering Schemes for Injected False Data in Wsn
Filtering Schemes for Injected False Data in WsnFiltering Schemes for Injected False Data in Wsn
Filtering Schemes for Injected False Data in WsnIOSR Journals
 
Derivative threshold actuation for single phase wormhole detection with reduc...
Derivative threshold actuation for single phase wormhole detection with reduc...Derivative threshold actuation for single phase wormhole detection with reduc...
Derivative threshold actuation for single phase wormhole detection with reduc...ijdpsjournal
 
Tqds time stamped quantum digital signature to defend
Tqds time stamped quantum digital signature to defendTqds time stamped quantum digital signature to defend
Tqds time stamped quantum digital signature to defendeSAT Publishing House
 
Secured node detection technique based on artificial neural network for wirel...
Secured node detection technique based on artificial neural network for wirel...Secured node detection technique based on artificial neural network for wirel...
Secured node detection technique based on artificial neural network for wirel...IJECEIAES
 

Similar to Fuzzy-Based Multiple Path Selection Method for Improving Energy Efficiency in Bandwidth-Efficient Cooperative Authentications of WSNS (20)

A KEY LEVEL SELECTION WITHIN HASH CHAINS FOR THE EFFICIENT ENERGY CONSUMPTION...
A KEY LEVEL SELECTION WITHIN HASH CHAINS FOR THE EFFICIENT ENERGY CONSUMPTION...A KEY LEVEL SELECTION WITHIN HASH CHAINS FOR THE EFFICIENT ENERGY CONSUMPTION...
A KEY LEVEL SELECTION WITHIN HASH CHAINS FOR THE EFFICIENT ENERGY CONSUMPTION...
 
A security method for multiple attacks in sensor networks against the false r...
A security method for multiple attacks in sensor networks against the false r...A security method for multiple attacks in sensor networks against the false r...
A security method for multiple attacks in sensor networks against the false r...
 
A Method of Improving Energy Efficiency Through Geofencing and False Data Blo...
A Method of Improving Energy Efficiency Through Geofencing and False Data Blo...A Method of Improving Energy Efficiency Through Geofencing and False Data Blo...
A Method of Improving Energy Efficiency Through Geofencing and False Data Blo...
 
A secure routing process to simultaneously defend against false report and wo...
A secure routing process to simultaneously defend against false report and wo...A secure routing process to simultaneously defend against false report and wo...
A secure routing process to simultaneously defend against false report and wo...
 
IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...
IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...
IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...
 
Iaetsd a survey on enroute filtering scheme in
Iaetsd a survey on enroute filtering scheme inIaetsd a survey on enroute filtering scheme in
Iaetsd a survey on enroute filtering scheme in
 
WSN LIFETIME EXTENSION USING GA OPTIMISED FUZZY LOGIC
WSN LIFETIME EXTENSION USING GA OPTIMISED FUZZY LOGICWSN LIFETIME EXTENSION USING GA OPTIMISED FUZZY LOGIC
WSN LIFETIME EXTENSION USING GA OPTIMISED FUZZY LOGIC
 
WSN LIFETIME EXTENSION USING GA OPTIMISED FUZZY LOGIC
WSN LIFETIME EXTENSION USING GA OPTIMISED FUZZY LOGICWSN LIFETIME EXTENSION USING GA OPTIMISED FUZZY LOGIC
WSN LIFETIME EXTENSION USING GA OPTIMISED FUZZY LOGIC
 
WSN Lifetime Extension Using GA Optimised Fuzzy Logic
WSN Lifetime Extension Using GA Optimised Fuzzy LogicWSN Lifetime Extension Using GA Optimised Fuzzy Logic
WSN Lifetime Extension Using GA Optimised Fuzzy Logic
 
A fuzzy based congestion controller for control and balance congestion in gri...
A fuzzy based congestion controller for control and balance congestion in gri...A fuzzy based congestion controller for control and balance congestion in gri...
A fuzzy based congestion controller for control and balance congestion in gri...
 
A FUZZY-BASED CONGESTION CONTROLLER FOR CONTROL AND BALANCE CONGESTION IN GRI...
A FUZZY-BASED CONGESTION CONTROLLER FOR CONTROL AND BALANCE CONGESTION IN GRI...A FUZZY-BASED CONGESTION CONTROLLER FOR CONTROL AND BALANCE CONGESTION IN GRI...
A FUZZY-BASED CONGESTION CONTROLLER FOR CONTROL AND BALANCE CONGESTION IN GRI...
 
IMPROVEMENT OF FALSE REPORT DETECTION PERFORMANCE BASED ON INVALID DATA DETEC...
IMPROVEMENT OF FALSE REPORT DETECTION PERFORMANCE BASED ON INVALID DATA DETEC...IMPROVEMENT OF FALSE REPORT DETECTION PERFORMANCE BASED ON INVALID DATA DETEC...
IMPROVEMENT OF FALSE REPORT DETECTION PERFORMANCE BASED ON INVALID DATA DETEC...
 
Prevention Method of False Report Generation in Cluser Heads for Dynamic En-R...
Prevention Method of False Report Generation in Cluser Heads for Dynamic En-R...Prevention Method of False Report Generation in Cluser Heads for Dynamic En-R...
Prevention Method of False Report Generation in Cluser Heads for Dynamic En-R...
 
PREVENTION METHOD OF FALSE REPORT GENERATION IN CLUSTER HEADS FOR DYNAMIC E...
PREVENTION METHOD OF FALSE REPORT  GENERATION IN CLUSTER HEADS FOR DYNAMIC  E...PREVENTION METHOD OF FALSE REPORT  GENERATION IN CLUSTER HEADS FOR DYNAMIC  E...
PREVENTION METHOD OF FALSE REPORT GENERATION IN CLUSTER HEADS FOR DYNAMIC E...
 
PREVENTION METHOD OF FALSE REPORT GENERATION IN CLUSTER HEADS FOR DYNAMIC EN-...
PREVENTION METHOD OF FALSE REPORT GENERATION IN CLUSTER HEADS FOR DYNAMIC EN-...PREVENTION METHOD OF FALSE REPORT GENERATION IN CLUSTER HEADS FOR DYNAMIC EN-...
PREVENTION METHOD OF FALSE REPORT GENERATION IN CLUSTER HEADS FOR DYNAMIC EN-...
 
A fuzzy congestion controller to detect and balance congestion in wsn
A fuzzy congestion controller to detect and balance congestion in wsnA fuzzy congestion controller to detect and balance congestion in wsn
A fuzzy congestion controller to detect and balance congestion in wsn
 
Filtering Schemes for Injected False Data in Wsn
Filtering Schemes for Injected False Data in WsnFiltering Schemes for Injected False Data in Wsn
Filtering Schemes for Injected False Data in Wsn
 
Derivative threshold actuation for single phase wormhole detection with reduc...
Derivative threshold actuation for single phase wormhole detection with reduc...Derivative threshold actuation for single phase wormhole detection with reduc...
Derivative threshold actuation for single phase wormhole detection with reduc...
 
Tqds time stamped quantum digital signature to defend
Tqds time stamped quantum digital signature to defendTqds time stamped quantum digital signature to defend
Tqds time stamped quantum digital signature to defend
 
Secured node detection technique based on artificial neural network for wirel...
Secured node detection technique based on artificial neural network for wirel...Secured node detection technique based on artificial neural network for wirel...
Secured node detection technique based on artificial neural network for wirel...
 

Recently uploaded

Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...Call Girls in Nagpur High Profile
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 

Recently uploaded (20)

Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 

Fuzzy-Based Multiple Path Selection Method for Improving Energy Efficiency in Bandwidth-Efficient Cooperative Authentications of WSNS

  • 1. Advanced Computational Intelligence: An International Journal (ACII), Vol.1, No.2, October 2014 25 FUZZY-BASED MULTIPLE PATH SELECTION METHOD FOR IMPROVING ENERGY EFFICIENCY IN BANDWIDTH-EFFICIENT COOPERATIVE AUTHENTICATIONS OF WSNS Su Man Nam1 and Tae Ho Cho2 1, 2 College of Information and Communication Engineering, Sungkyunkwan University, Suwon, 440-746, Republic of Korea ABSTRACT In wireless sensor networks, adversaries can easily compromise sensors because the sensor resources are limited. The compromised nodes can inject false data into the network injecting false data attacks. The injecting false data attack has the goal of consuming unnecessary energy in en-route nodes and causing false alarms in a sink. A bandwidth-efficient cooperative authentication scheme detects this attack based on the random graph characteristics of sensor node deployment and a cooperative bit-compressed authentication technique. Although this scheme maintains a high filtering probability and high reliability in the sensor network, it wastes energy in en-route nodes due to a multireport solution. In this paper, our proposed method effectively selects a number of multireports based on the fuzzy rule-based system. We evaluated the performance in terms of the security level and energy savings in the presence of the injecting false data attacks. The experimental results indicate that the proposed method improves the energy efficiency up to 10% while maintaining the same security level as compared to the existing scheme. KEYWORDS Wireless sensor network, Network security, bandwidth-efficient cooperative authentication scheme, fuzzy logic 1. INTRODUCTION Wireless sensor networks (WSNs) have been applied in ubiquitous computing systems in order to monitor target environments [1]. A WSN consists of a large number of sensor nodes and a sink in a sensor field [2]. These sensor nodes detect environmental changes, generate data, and transmit the data to the sink. The sink collects the data transmitted from the sensor nodes and reports it to the users. Although the WSN is easily operated without infrastructure, the sensor nodes have the great disadvantage of possibly being captured and compromised due to their limited hardware resources (e.g., energy, memory, etc.). In addition, the sensor nodes are exposed to various attack patterns such as sinkhole [3], sybil [4], and wormhole [5] attacks. Thus, the sensor network is impractical for monitoring the environment when such attacks are generated.
  • 2. Advanced Computational Intelligence: An International Journal (ACII), Vol.1, No.2, October 2014 WSNs are very vulnerable to various attacks because hostile environments. One of the various attacks is the Figure 1, an adversary compromises several sensor nodes, accesses all compromised nodes, and then controls bogus information arrive at the sink, communicating the false report. of legitimate reports. Thus, the sensor network suffers a great loss attack is generated in compromised nodes In order to detect an injecting false data (BECAN) was proposed because of its uses a cooperative neighbors probability and a multireport solution source node and its neighbors authentication code (mac). The source node collects every mac and produces a The report is forwarded through the multireport solution routing paths. Although BECAN has high filtering probability and reliability c previous filtering mechanisms [7 due to the multireport solution. In this paper, we propose a method to effectively select the number of multireports fuzzy logic system. When a report whole network considering three input factors fuzzy system to every node. The effective numb energy savings in the sensor network. improves the energy efficiency by method more effectively chooses the number of reports against the injecting false data attack The rest of this paper is organized as follows. The background and motivation of this study are described in Section 2. We introduce the details of our proposed method in Section 3. Section 4 provides the analysis and experimental results. the end of this paper. Advanced Computational Intelligence: An International Journal (ACII), Vol.1, No.2, October 2014 Figure1. Injecting false data attacks WSNs are very vulnerable to various attacks because they are often deployed in unattended or One of the various attacks is the injecting false data attack [6]. ry compromises several sensor nodes, accesses all of the keys stored in these compromised nodes, and then controls the nodes to inject bogus information. If false reports with arrive at the sink, the en-route nodes consume unnecessary energy the false report. In addition, the compromised nodes can interrupt the forwarding Thus, the sensor network suffers a great loss as the injecting false data d in compromised nodes. injecting false data attack, bandwidth-efficient cooperative authentication because of its high filtering probability and high reliability [6]. neighbors × router-based (CNR) filtering mechanism for high filtering probability and a multireport solution (i.e., multiple paths) for high reliability. In BECAN, and its neighbors detect an event, the neighbors each generate The source node collects every mac and produces a MAC The report is forwarded through the multireport solution, which is transmitted along Although BECAN has high filtering probability and reliability c [7-9], the sensor node energy may be wasted in the en In this paper, we propose a method to effectively select the number of multireports fuzzy logic system. When a report is received at a sink, the sink determines the condition of the whole network considering three input factors using fuzzy logic. It then forwards the fuzzy system to every node. The effective number of reports influences the high reliability and in the sensor network. The experimental results show that our proposed method by effectively selecting the number of reports. Thus, our proposed chooses the number of reports in order to improve the energy efficiency against the injecting false data attacks compared to the existing scheme. The rest of this paper is organized as follows. The background and motivation of this study are ribed in Section 2. We introduce the details of our proposed method in Section 3. Section 4 provides the analysis and experimental results. The conclusions and future works are discussed at Advanced Computational Intelligence: An International Journal (ACII), Vol.1, No.2, October 2014 26 unattended or . As shown in keys stored in these alse reports with route nodes consume unnecessary energy in the forwarding the injecting false data erative authentication high filtering probability and high reliability [6]. BECAN filtering mechanism for high filtering . In BECAN, when a generate a message MAC in a report. which is transmitted along multiple Although BECAN has high filtering probability and reliability compared to en-route nodes In this paper, we propose a method to effectively select the number of multireports based on a condition of the the result of the high reliability and xperimental results show that our proposed method . Thus, our proposed energy efficiency The rest of this paper is organized as follows. The background and motivation of this study are ribed in Section 2. We introduce the details of our proposed method in Section 3. Section 4 onclusions and future works are discussed at
  • 3. Advanced Computational Intelligence: An International Journal (ACII), Vol.1, No.2, October 2014 27 2. BACKGROUND AND MOTIVATION 2.1. Bandwidth-Efficient Cooperative Authentication Scheme (BECAN) BECAN effectively detects false data that is injected in en-route node data based on the random graph characteristics of sensor deployment and a cooperative bit-compressed authentication technique. The random graph characteristics are used to select k neighbors for multireport solutions. The cooperative bit-compressed authentication technique is used for detecting false data in the en-route nodes. BECAN consists of four phases: (1) sensor nodes initialization and deployment, (2) sensed results reporting protocol, (3) en-routing filtering, and (4) sink verification. In phase (1), the sensor node initialization and deployment, the sink selects an elliptic curve E , , and a hash function h(). It then sets the public parameters (params) as follows: params = {E(, , , ℎ()} Every sensor node sets TinyECC[10] and params before they are deployed in the sensor field as follows: params = {E(, , , ℎ()} : , ℎ: {0, 1} ∈ $: % '() '* '+ ,)ℎ | | = . Each node is randomly assigned a private key () (where the private key /0 is randomly chosen from 1 ∗ ), while all nodes collectively generate the public key 30 (30 = /0 , where i is a node’s identifier.) Thus, each node has a public key and a private key (30, /0). In phase (2), the sensed results reporting phase, it is assumed that a source node 45 establishes a routing path 678 : {69 → 6; → ⋯ → 6= → (.}. When a real event occurs, the source node obtains a current timestamp T for generating a message m. The source collects the mac (m, T) from the neighbors and verifies the message m and the timestamp T. The source node then generates a report including the data (m, T, MAC) and selects k different neighbors to use the multireport solution to forward the report along multiple routing paths. In phase (3), en-route filtering, when the en-route nodes receive the report, they determine the integrity of the message m and the timestamp T. The report (m, T, MAC) is then discarded. If the timestamp is normal, the en-route nodes verify the MAC in the report using the public key and the CNR-based MAC verification algorithm. If the report is legitimate, the report is transmitted to the next hop node. In phase (4), sink verification, when a sink receives the report, it verifies the message and timestamp, as well as the MAC. If one report reaches the sink, the legitimate event is successfully reported. 2.2. Motivation In an open WSN environment, compromised nodes can generate an injecting false data attack to generate false reports with bogus information. BECAN achieves both high filtering probability
  • 4. Advanced Computational Intelligence: An International Journal (ACII), Vol.1, No.2, October 2014 and high reliability against th authentication technique with a improve the reliability, this scheme uses multireports source nodes to be forwarded along their paths to the sink. Although the existing method provid high filtering probability and high in the en-route nodes due to the selects a number of multireports fuzzy logic system. Thus, the proposed method select enhance the energy efficiency against attack 3. PROPOSED METHOD 3.1. Assumption In this paper, a sensor network consist [11, 12]). The H-sensors’ hardware resources (CPU, memory, storage, etc.) are more powerful than those of L-sensors. After deploying the sensor nodes in the sensor f enables H-sensors to serve as cluster heads ( The topology then establishes minimum cost forwarding algorithm further assume that a compromised node inject the sensor network. 3.2. Overview Figure2. Overview of Our proposed method detects injecting false data attacks and effectively selects the number of multireports based on a fuzzy rule executing the fuzzy rule-based system field, a source node produces a report to be forwarded to the sink. After the sink receives the report, the fuzzy system is used is obtained from the fuzzy system is neighboring nodes apply the number of multireports as a report is transmitted. Thus, our proposed method effectively determines network based on the fuzzy rule- 3.3. Proposed Method using Fuzzy Logic The input factors of the fuzzy logic system are as follows: Advanced Computational Intelligence: An International Journal (ACII), Vol.1, No.2, October 2014 and high reliability against those attacks. This scheme uses a cooperative bit with a high filtering probability to filter out the injected false data. To improve the reliability, this scheme uses multireports, where multiple reports are generated along their paths to the sink. Although the existing method provid high reliability in the sensor network, the sensors may the multiple reports. In this paper, our proposed method effectively selects a number of multireports using three factors regarding the network condition based on fuzzy logic system. Thus, the proposed method selects the effective number of reports in order to energy efficiency against attacks as compared to BECAN. paper, a sensor network consists of a sink and sensor nodes (e.g., H-sensors and L sensors’ hardware resources (CPU, memory, storage, etc.) are more powerful . After deploying the sensor nodes in the sensor field, the sensor network cluster heads (CHs) and to clusters around the CHs with L The topology then establishes the initial routing paths using directed diffusion minimum cost forwarding algorithm [14]. The CHs discover a routing path toward the sink. We further assume that a compromised node injects false reports and interrupts legitimate reports in . Overview of the proposed fuzzy rule-based system injecting false data attacks and effectively selects the number of multireports based on a fuzzy rule-based system. Figure 2 shows the proposal’s processes for based system with three input factors. When an event occurs in a sensor field, a source node produces a report to be forwarded to the sink. After the sink receives the used to determine the condition of the sensor network. The obtained from the fuzzy system is forwarded to every node. Using the result message, the number of multireports as a report is transmitted. Thus, our proposed the number of multireports according to the condition of the -based system. .3. Proposed Method using Fuzzy Logic nput factors of the fuzzy logic system are as follows: Advanced Computational Intelligence: An International Journal (ACII), Vol.1, No.2, October 2014 28 cooperative bit-compressed tering probability to filter out the injected false data. To are generated in the along their paths to the sink. Although the existing method provides sensors may waste energy reports. In this paper, our proposed method effectively the network condition based on a of reports in order to sensors and L-sensors sensors’ hardware resources (CPU, memory, storage, etc.) are more powerful ield, the sensor network clusters around the CHs with L-sensors. initial routing paths using directed diffusion [13] and a e CHs discover a routing path toward the sink. We legitimate reports in injecting false data attacks and effectively selects the number of Figure 2 shows the proposal’s processes for event occurs in a sensor field, a source node produces a report to be forwarded to the sink. After the sink receives the The result that sing the result message, the number of multireports as a report is transmitted. Thus, our proposed according to the condition of the
  • 5. Advanced Computational Intelligence: An International Journal (ACII), Vol.1, No.2, October 2014 29 Remaining energy level (REL): This value is an important factor in reducing needless energy consumption in the sensor network. If the energy level of the whole network is very low, the number of transmitted multireports should be reduced in order to decrease unnecessary energy consumption in the sensor network. The improvement in energy efficiency is influenced by the number of the reports transmitted. Ratio of false data filtered by en-route nodes (RFD): This factor represents the security of the whole network. If the ratio is high, the network maintains high reliability because the compromised nodes are injecting much false data. The security level is influenced by the ratio of filtered false data. Average number of hops of source nodes (AHP): This factor describes the hop count, which is the number of nodes traveled en-route from the source node. With a long distance from the source to the sink, reports transmitted via multiple hops consume a great deal of the energy of the en-route nodes. The network’s energy resource is influenced by high numbers of hops in the en-route nodes. The output factor is as follows: Result (RST): This value determines the number of report transmissions of the source nodes. If the value is five, the report should be forwarded to five neighboring nodes of the source node. The effective selection of the value is influenced by three input factors based on the fuzzy rule-based system. Figures 3, 4, 5, and 6 show the membership function of the fuzzy logic input and output parameters. The labels of the input fuzzy variables are as follows: REL = {VS (very small), SM (small), MD (medium), MN (many), VM (very many)} RFD = {LW (low), MD (moderate), HG (high)} AHP = {NR (near), MD (moderate), FR (far)} The logic output parameter is represented by a label. The label values are as follows: RST = {TW (two), TH (three), FR (four), FV (five)} Figure3. REL of the fuzzy membership function
  • 6. Advanced Computational Intelligence: An International Journal (ACII), Vol.1, No.2, October 2014 30 Figure 4. RFD of the fuzzy membership function Figure5. AHP of the fuzzy membership function Figure 6. RST of the fuzzy membership function Table 1 shows the 45 (= 5 × 3 × 3) rules of the fuzzy system. If REL is very small, RFD, is low, and AHS is near, then the number of multireports is two (TW), such as for Rule 0. This case indicates that there is a normal state to forward the multireports in a source node. In contrast, if REL is very large, RFD is large, and AHS is far, then the number of multireports is five (FV), such as for Rule 44. This case indicates that there is an abnormal condition due to injecting false data attacks. The sensor network needs to effectively select the number of multireports in order to improve the energy efficiency.
  • 7. Advanced Computational Intelligence: An International Journal (ACII), Vol.1, No.2, October 2014 31 Table 1. Fuzzy if-then rules Rule no. IF THEN REL RFD AHS RST 0 VS SM NR TW 1 VS SM MD TW 2 VS SM FR TW 3 VS MD NR TW 4 VS MD MD TW 5 VS MD FR TH 6 VS LG NR TH 7 VS LG MD TH 8 VS LG FR TH ⋮ 43 VL LG MD FV 44 VL LG FR FV 4. EXPERIMENTAL RESULTS Experiments were performed to determine the effectiveness of the proposed method compared to BECAN. The sensor network environment is 500×500 m2 and includes a total of 500 nodes (100 CHs and 400 normal nodes) in the sensor field. The nodes are uniformly distributed. A cluster consists of one cluster node and four normal nodes. In [7], the sensors consume 16.25 µJ to transmit each byte and 12.5 µJ to receive each byte. They also consume 15 µJ and 75 µJ, respectively, to generate and verify a MAC. We randomly generated 1,000 events. The message and report sizes are 1 byte and 24 bytes, respectively. For injecting false data attacks, five sensor nodes are compromised after deployment in the field. The compromised node injects false reports by using 5% probability into the network.
  • 8. Advanced Computational Intelligence: An International Journal (ACII), Vol.1, No.2, October 2014 32 Figure.7 Number of dropped reports in adversary nodes versus number of events Figure 7 shows the number of dropped false reports in the en-route nodes in terms of the number of events. As shown in Figure 7, BECAN and the proposed method have the same number of dropped reports. The compromised nodes drop 217 false reports for both methods when 1,000 events are generated. Therefore, the proposed method maintains the same security level as BECAN. Figure 8. Energy consumption of the whole network versus number of events Figure 8 shows the energy consumption of the whole network in terms of the number of events. When 200 events occur, a difference in energy consumption exists between BECAN and the Number of Dropped Reports in En-route Nodes 0 50 100 150 200 250 Number of Events 0 200 400 600 800 1,000 1,200 BECAN Proposed Method Energy Consumption of Whole Network (mJ) 0 200 400 600 800 1,000 1,200 Number of Events 0 200 400 600 800 1,000 BECAN Proposed Method
  • 9. Advanced Computational Intelligence: An International Journal (ACII), Vol.1, No.2, October 2014 33 proposed method. When 1,000 events are generated, BECAN and the proposed method consume 1,010 mJ and 987 mJ, respectively. The reason for this difference is that the effective number of multireports is selected through the network’s condition based on the fuzzy rule-based system. The proposed method improves the energy savings up to about 10% compared to BECAN. Therefore, our proposed method saves energy resources through the effective selection of the number of multireports and prolongs the sensor network lifetime. 5. CONCLUSIONS AND FUTURE WORKS In WSNs, sensor nodes are easily compromised by an adversary because their hardware has limited constraints. The compromised nodes consume unnecessary energy in the sensor network when injecting false data attacks are generated. In addition, other en-route compromised nodes can inject bogus information into a legitimate report. BECAN detects this attack based on the random graph characteristics of sensor node deployment and using a cooperative bit-compressed authentication technique. This existing scheme maintains both high filtering probability and high reliability against such attacks. However, BECAN wastes unnecessary energy in en-route nodes due to the multireport solution. Our proposed method effectively chooses the number of multireports based on a fuzzy rule-based system. We use three input factors to measure the network condition and to determine the effective number of multireports. The experimental results demonstrate that the proposed method saves up to 10% of the energy resources while maintaining the same security level compared to the existing scheme. Therefore, our proposed method conserves the energy resources of the whole network and prolongs the network’s lifetime. In the future, we propose optimization of the fuzzy rule-based system in the proposed method in order to operate an optimal sensor network. ACKNOWLEDGEMENTS This research was supported by Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education, Science and Technology (No. NRF-2013R1A2A2A01013971). REFERENCES [1] I. F. Akyildiz, W. Su, Y. Sankarasubramaniam E. Cayirci, (2002) A survey on sensor networks,” Communications Magazine, IEEE, vol. 40, pp. 102-114. [2] K. Akkaya and M. Younis, (2005) A survey on routing protocols for wireless sensor networks,” Ad Hoc Networks, vol. 3, pp. 325-349. [3] E. C. H. Ngai, J. Liu and M. R. Lyu, (2007) An efficient intruder detection algorithm against sinkhole attacks in wireless sensor networks,” vol. 30, pp. 2353-2364. [4] Jing Deng, Richard Han and Shivakant Mishra, (2006) INSENS: Intrusion-Tolerant Routing in Wireless Sensor Networks,” Computer Communications, vol. 29, pp. 216-230. [5] Ji-Hoon Yun, Il-Hwan Kim, Jae-Han Lim and Seung-Woo Seo, (2006) WODEM: wormhole attack defense mechanism in wireless sensor networks, ICUCT'06 Proceedings of the 1st International Conference on Ubiquitous Convergence Technology, pp. 200-209. [6] Rongxing Lu, Xiaodong Lin, Haojin Zhu, Xiaohui Liang and Xuemin Shen, (2012) BECAN: A Bandwidth-Efficient Cooperative Authentication Scheme for Filtering Injected False Data in Wireless Sensor Networks, Parallel and Distributed Systems, IEEE Transactions On, vol. 23, pp. 32-43. [7] F. Ye, H. Luo, S. Lu and L. Zhang, (2005) Statistical en-route filtering of injected false data in sensor networks, Selected Areas in Communications, IEEE Journal On, vol. 23, pp. 839-850.
  • 10. Advanced Computational Intelligence: An International Journal (ACII), Vol.1, No.2, October 2014 34 [8] S. Zhu, S. Setia, S. Jajodia and P. Ning, (2004) An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks, in Security and Privacy, 2004. Proceedings. 2004 IEEE Symposium On, pp. 259-271. [9] H. Yang, F. Ye, Y. Yuan, S. Lu and W. Arbaugh, (2005) Toward resilient security in wireless sensor networks, in Proceedings of the 6th ACM International Symposium on Mobile Ad Hoc Networking and Computing, Urbana-Champaign, IL, USA, pp. 34-45. [10] Xiaojiang Du, M. Guizani, Yang Xiao and Hsiao-Hwa Chen, (2007) Two Tier Secure Routing Protocol for Heterogeneous Sensor Networks, Wireless Communications, IEEE Transactions On, vol. 6, pp. 3395-3401. [11] MICAz., http://bullseye.xbow.com:81/Products/Product_pdf_files/Wireless_pdf/MICA2_Datasheet.pdf. [12] C. Intanagonwiwat, R. Govindan and D. Estrin, Directed Diffusion: A scalable and robust communication paradigm for sensor networks, Proceedings of the 6th Annual International Conference on Mobile Computing and Networking, pp. 56-67, 2000. [13] F. Ye, A. Chen, S. Lu and L. Zhang, A scalable solution to minimum cost forwarding in large sensor networks, in Computer Communications and Networks, 2001. Proceedings. Tenth International Conference On, 2001, pp. 304-309. Authors Su Man Nam received his B.S. degree in Computer Information from Hanseo University, Korea, in February 2009 and his M.S. degree in Electrical and Computer Engineering from Sungkyunkwan University in 2013. He is currently a doctoral student in the College of Information and Communication Engineering at Sungkyunkwan University, Korea. His research interests include wireless sensor networks, security in wireless sensor networks, and modeling simulation. Tae Ho Cho received a Ph.D. degree in Electrical and Computer Engineering from the University of Arizona, USA, in 1993, and B.S. and M.S. degrees in Electrical Engineering from Sungkyunkwan University, Republic of Korea, and the University of Alabama, USA, respectively. He is currently a Professor in the College of Information and Communication Engineering, Sungkyunkwan University, Korea. His research interests are in the areas of wireless sensor networks, intelligent systems, modeling simulation, and enterprise resource planning.