SlideShare a Scribd company logo
1 of 10
Download to read offline
International Journal of Ambient Systems and Applications (IJASA) Vol.1, No.4,December 2013

SELECTING VOTES FOR ENERGY EFFICIENCY IN
PROBABILISTIC VOTING-BASED FILTERING IN
WIRELESS SENSOR NETWORKS USING FUZZY
LOGIC
Su Man Nam and Tae Ho Cho
College of Information and Communication Engineering, Sungkyunkwan University,
Suwon, 440-746, Republic of Korea

ABSTRACT
Wireless sensor networks are easily compromised by an adversary, such as fabricated with false votes
attacks and false votes on real reports attacks. These attacks generate false data to drain the energy
resource of sensors and interrupt the inflow of a real report. PVFS was proposed to detect them by
verifying votes in the real report. When a real event occurs, a cluster head collects all of the votes from its
neighboring nodes and selects the votes up to a defined number of votes. In this paper, our proposed
method decides the number of votes based on a fuzzy rule-based system to improve energy savings as
compared to PVFS. We evaluated the effectiveness of the proposal as two attacks occur simultaneously in
the sensor network. The experimental results show that our method saves energy resources and maintains
the security level against these multiple attacks.

KEYWORDS
Wireless sensor network, Probabilistic voting-based filtering scheme, Fuzzy System

1. INTRODUCTION
Wireless sensor networks (WSNs) operate without the intervention of an administrator in a huge
area [1]. These Sensor networks enable low-cost and low-power development in open
environments [2]. However, the sensor network has restrictions on the resource utilization side,
such as the energy of sensor nodes, computational capacity, and bandwidth [3]. In addition,
network adversaries can easily compromise the sensor nodes [4-5].

1
International Journal of Ambient Systems and Applications (IJASA) Vol.1, No.4,December 2013

Figure 1.Multiple Attacks

Figure 1 shows a fabricated report with false votes attack (FRA) [6], and a false vote on real
reports attack (FVA) [7], in the sensor network. Two compromised nodes inject the fabricated
report and false votes, to destroy the sensor network. In an FRA, a compromised node generates a
false report about a non-existent event, to drain the energy resource of intermediate nodes, and
causes false alarms when the false report arrives in the base station. In an FVA, a compromised
node injects a false vote in a legitimate report, to be intentionally dropped in an intermediate node,
when a real event occurs. These attacks should be dropped, for reasons of information removal,
and needless energy consumption.
A probabilistic voting-based filtering scheme (PVFS) [7] was proposed, to detect multiple attacks
in intermediate nodes when FRA and FVA simultaneously occur in the sensor network. Before all
of the sensors are deployed, factors, such as the required number of votes for a report, the
threshold of verified true votes in the report, and the threshold of verified false votes in the report,
are defined to operate the sensor network, and detect the multiple attacks. This method selects
verification cluster-head nodes (CHs) with a probability to detect the attacks, before forwarding a
report.
In this paper, we propose a method to effectively select a required number of votes for a
legitimate report, based on a fuzzy rule-based system [8], before forwarding the report. Our
proposed method decides the required number of votes through the energy level, hops from the
report generation CH to the base station, and the forwarded report count. Therefore, the proposed
method saves energy resources of each node, while maintaining security level against FRA and
FVA, as compared to PVFS.
The remainder of this paper is arranged as follows: the background and motivation are described
in Section 2, the proposed method is introduced in Section 3, the experimental results are
discussed in Section 4, and the conclusions are made and future work is discussed in Section 5.
2
International Journal of Ambient Systems and Applications (IJASA) Vol.1, No.4,December 2013

2. BACKGROUND
FRA and FVA are generated in the application layer of a sensor network, to consume unnecessary
energy of sensor nodes, and to obstruct the delivery of a legitimate report. These attacks should
be minimized, through early detection. We will discuss PVFS against FRA and FVIA in Section
2.1, and explain the motivation for our proposed method in Section 2.2.

2.1. PVFS
PVFS was proposed to achieve better resilience against compromised nodes, and offer protection
for both FRA and FVA. PVFS executes five phases.
Before a sensor network is operated by using PVFS, every factor is defied such as the number of
nodes, a global key pool in the base station, the required number of votes for a legitimate report
(s), threshold of verified false votes to drop a report (Tf), etc. Before deploying sensor nodes,
cluster-header node (CH) assigns keys from a partition of a global key pool and randomly
distributes the keys to its normal nodes within a cluster. When a real event occurs within the
cluster region, CH detects it and broadcasts its neighbors. After collecting all the votes of the
neighboring nodes, the CH randomly selects the votes as s=5. The CH attaches the votes to a
report noticed to the base station. The CH (d0) selects intermediate CH (di) to be a verification CH
⁄ . The report is verified in the verification CH while passing
with probability
intermediate CHs to detect both FRA and FVA. We will discussion phases of the report
generation, verification CH selection, and en-route filtering.

Figure 2.An example of PVFS.

Figure 3 shows the report generation, verification CH selection, and en-route filtering phases to
detect both FRA and FVA. In Figure 3-a, a cluster has a CH and five neighbors, including two
compromised nodes. When a real event occurs in the cluster, CH0 collects all the votes from all
its neighboring nodes, and randomly selects the votes with i=1, 2, 3, 4, as s=4. The votes,
including two false votes, are attached in a report, to be transmitted to the base station. Before
forwarding the report, verification CHs are decided with probability, and CH1 and CH2 get keys
K. When the report arrives in CH1, the false vote2 is detected through key 2. The report is then
transmitted to the next intermediate CH, due to
. The report is dropped in CH2 with
recognizing FRA, because the false vote4 is detected through key 4 as
. On the other hand,
if CH0 selects the votes with i=1, 3, 4, 5, as s=4, one vote is included in a report. After choosing
3
International Journal of Ambient Systems and Applications (IJASA) Vol.1, No.4,December 2013

verification CHs, the report arrives in CH1. When CH1 verifies the votes of the report, CH2 sends
it to CH2, after confirming vote1 and vote5. When the report arrives in CH2, it detects a false
vote in the report. CH2 then transmits it to CH3 without dropping it, because of recognizing FVA.
Therefore, PVFS generates reports attaching votes as s, detecting both FRA and FVA, by using
the threshold value (Tf) in the sensor network.

2.2. Motivation
In the sensor network, PVFS should be operated, to simultaneously detect multiple attacks, such
as FRA and FVA. PVFS defines input parameters, such as the required number of votes for a
legitimate report (s), before deploying the sensor nodes in the field. If an input parameter is
unsuitable in the network, it causes a reduction of the network lifetime, due to unnecessary energy
consumption. For example, if a high number of votes for attaching a legitimate report are defined,
the report causes much energy consumption, while passing through intermediate CHs. On the
other hand, if a low number of votes are defined, the probability of detecting false votes decreases
in verification CHs. Thus, our proposed method considers the condition of the sensor network,
and decides the number of votes for a legitimate report, based on fuzzy logic.
In this paper, we define the required number of votes for attaching a legitimate report in the
sensor network, based on the fuzzy system, instead of the definition of the operator. In our
proposed method, a CH runs a fuzzy rule-based system, to effectively decide the required number
of votes before sending a report. Therefore, our proposal improves the energy resource of each
node, through the required number of votes, based on the fuzzy system. In the next section, we
will further discuss our proposed method.

3. PROPOSED METHOD
3.1. Assumptions
We assume the sensor nodes are fixed, after they are deployed. The sensor network is composes
composed of a base station and a number of sensor nodes, e.g. the Berkeley MICAz motes [9],
initial paths are established through directed diffusion [10], and minimum cost forwarding
algorithms [11]. We choose the cluster-based model [1] to organize the sensor nodes. In a cluster,
one node is elected to be a CH.
It is further assumed that every node forwards reports into the base station along their path. A
compromised node generates false reports in a path. The generated false reports are forwarded
from a compromised node toward the base station, before being filtered out.

3.2. Overview
Our method decides the verification CHs by using three input factors of an intermediate CH: a)
the energy level, b) distance level, and c) number of detected false votes.

Figure 3.The core of the proposed method.

4
International Journal of Ambient Systems and Applications (IJASA) Vol.1, No.4,December 2013

Figure 4 shows the phase of the report generation in a CH, by applying the three input factors,
after collecting votes for its neighbors. Our proposed method considers that the required number
of votes for attaching a legitimate report is decided through the energy level, hops, and forwarded
report count. It is important to decide the number of votes in the report, because the energy
consumption and the detection of false votes are affected in intermediate CHs. Thus, the proposed
method effectively detects both FRA and FVA, by using the fuzzy rule-based system to choose
the required number of votes.

3.3. Fuzzy Logic in the proposed method
This section discusses the factors that are used for fuzzy inference.


Energy level: This factor indicates how much energy remains in each CH. The
valuespecifiesthe energy level of each CH between 1 and 100. If the value is close to 100,
the energy level of the CH is full.



Hops: This factor indicates the hops count from the base station to a source CH. When
the CH forwards a report, the factor influences the security level with energy
consumption, through a high probability. For instance, if a CH in high hops forwards a
report, the report passes through many intermediate CHs, with much energy
consumption.The value specifies the hops of each CH from between 0 and 12. If this
factor is small, the intermediate CH is close to the base station.



Forwarded report count: This value indicates how many real events occur, for generating
reports in the sensor network. A compromised node also forwards reports to inject false
information into the base station. If a specific CH generates many reports, that CH is
suspicious, because many false reports may be included. The value specifies the
forwarded report count between 0 and 40. If the value exceeds 40, it keeps 40.

The input factors energy level (ENG), hops (HOP), andforwarded report count (FRC), to decide
the required number of votes for attaching a report, by using the fuzzy rule-based system.
We tune membership functions as the best rule, with lots of experimentation. The input factors of
the fuzzy variables are represented as:


Energy Level (ENG) = {Insufficient (IN), Medium (MD), Sufficient (SF)}



Hops (HOP) = {Very Short (VS), Short (SH), Medium (MD), Long (LN), Very Long
(VL)}



Forwarded report count (FRC) = {Low (LW), Middle (MD), High (HG)}

The output factors of the fuzzy variables are represented as:


Number (NUM) = {Two (TW), Three (TR), Four (FR), Five(FV), Six (SX)}

3.4. Fuzzy Membership Functions and Rules
This section discusses fuzzy membership functions and rules.

5
International Journal of Ambient Systems and Applications (IJASA) Vol.1, No.4,December 2013
IN

1.0

0

MD

30

40

SF

60

100

Figure 4.Input factor of energy level (ENG).

Figure 5 shows an input factor of energy level in a CH with three conditions: Insufficient (IN),
Medium (MD), and Sufficient (SF).
1.0

SH MD LN

VS

0 3

6

9

12

VL

15 18

Figure 5.Input factor of hops (HOP).

Figure 6shows an input factor of hops in a CH with five conditions: Very Short (VS), Short (SH),
Medium (MD), Long (LN), and Very Long (VL).
1.0

0

LW

10

MD

20

HG

30

40

Figure 6.Input factor of the forwarded reportcount (FRC).

Figure 7shows an input factor of the forwarded report count in a CH with three conditions: Low
(LW), Middle (MD), and High (HG).

6
International Journal of Ambient Systems and Applications (IJASA) Vol.1, No.4,December 2013

1.0

TW TR

2

3

FR

FV

SX

4

5

6

Figure 7.Output factor of the number (NUM).

Figure 8shows an output factor of the result for attaching votes to a report with five conditions:
Two (TW), Three (TR), Four (FR), Five (FV), and Six (SX).
Table 1.Fuzzy if-then rules.

Input (if)

Output (then)

Rule
No.

ENG

HOP

FRC

NUM

1

SM

NR

SM

FV

15

SM

VF

LG

SX

23

MD

MD

MD

FR

31

LG

NR

SM

TW

45

LG

VF

LG

TH

Table 1 shows representative rules that frequently occur among the fuzzy if-then rules. For
example, if ERL is SM, HOP is NR, and NFR is SM, then a CH attaches five (FV) votes in a
report, such as Rule 1. If ERL is SM, HOP is VF, and NFR is SM, then a CH attaches six (SX)
votes in a report, due to the strong security level, such as Rule 15. If ERL is MD, HOP is MD,
and NFR is MD, then a report has four (FR) votes, such as Rule 23. If ERL is LG, HOP is NR,
and NFR is SM, then a report has two (TW) votes, due to the energy saving. If ERL is LG, HOP
is VF, and NFR is LG, then a CH generates three votes (TH) for forwarding a report. Therefore,
our proposed method dynamically decides the required number of votes in a report, to use a
strong security level, and energy saving, in the entire network.

4. EXPERIMENTAL RESULTS
We performed an experiment for comparison of our proposed method and PVFS. A sensor
network has a base station and 500 total nodes in the simulation environment. The simulation
environment is 1,000×1,000 m2, which is composed of 50 clusters, and 10 nodes in a cluster. We
arranged 20 compromised nodes in clusters of 11 hops. The compromised nodes inject FRA and
FVA, to consume unnecessary energy, and false votes to drop legitimate reports, in verification
CHs. The size of a report is 24 bytes, and the size of a vote is 1 byte. Each node uses 16.25 µJ to
transmit per byte, 12.5 µJ to receive per byte, and 15 µJ to generate a vote per byte [15]. We
randomly generate 300 events in clusters, and the ratio of false reports is 20% of the events. We
randomly generate 250 events in clusters, and the ratio of false reports and false votes is 20% of
the events.

7
International Journal of Ambient Systems and Applications (IJASA) Vol.1, No.4,December 2013

Figure 8.Energy consumption per hops.

Figure 9 shows the energy consumption of nodes per hops in the sensor network. FRA and FVA
are randomly generated, by using compromised nodes in clusters of 11 hops. Two attacks forward
false reports and votes with generating 20% toward the base station. PVFS consumes much more
energy resources than the proposed method, due to the fixed number of votes in a report; while
our proposal forwards a report with the selected number of votes in a CH, considering the
condition of the network, based on the fuzzy rules. The proposal saves unnecessary energy
resources, due to the decision of the vote number. In addition, when a particular CH injects many
reports, the proposed method reasons FRA, and increases the number of votes for filtering them
early. Therefore, our proposal reduces needless energy, through dynamically selecting the number
of votes based on the fuzzy system, more than PVFS.

Figure 9. The number of filtered FRA her hops

8
International Journal of Ambient Systems and Applications (IJASA) Vol.1, No.4,December 2013

Figure 10.The number of filtered FVA her hops.

Figure 10 and Figure 11 show the number of filtered FRA and FVA per hops in the sensor
network. They are generated and injected by compromised nodes of 11 hops. PVFS and the
proposed method are almost similar to the number of detected votes in verification CHs. The
proposed method maintains the security level of the two attacks, by using the fuzzy system, as
compared to PVFS. Thus, our proposed method approximates the detection power of PFVS, with
using the dynamic decision of the number.

5. CONCLUSIONS AND FUTURE WORKS
In a sensor network, FRA and FVA can be generated to drain energy resources of the sensor
nodes, and block the inflow of a legitimate report [16]. PVFS was proposed to detect these attacks,
by verifying votes of the report in verification CHs with a probability. The required number of
votes for the report is defined, before deploying the sensors. In this paper, our proposed method
decides the number of votes in the report, based on a fuzzy rule-based system. Our proposal
improves energy savings of the sensor nodes, while maintaining the security level of two attacks.
Therefore, our proposed method effectively saves energy resources, and maintains the detection
power of false votes. In addition, in future work we will apply various attacks of the sensor
network, to discuss further optimal solutions.

ACKNOWLEDGEMENTS
This research was supported by Basic Science Research Program through the National
Research Foundation of Korea (NRF) funded by the Ministry of Education, Science and
Technology (No. 2013R1A2A2A01013971).

9
International Journal of Ambient Systems and Applications (IJASA) Vol.1, No.4,December 2013

REFERENCES
[1]
[2]
[3]
[4]

[5]
[6]

[7]

[8]
[9]
[10]
[11]

[12]
[13]

[14]
[15]

[16]

Akyildiz, I.F., Weilian Su, Sankarasubramaniam, Y. and Cayirci, E., “A survey on sensor networks,”
Communications Magazine IEEE, Vol. 40. 2002, pp. 102-114.
Przydatek, D. Song and A. perrig, “SIA: Secure information aggregation in sensor networks,” Proc.
Of CCNC, Vol. 23. 2004, pp. 63-98.
Kemal A. and Mohamed Y., “A survey on routing protocols for wireless sensor networks,” Ad hoc
Network. Vol. 3, May 2005, pp. 325–349.
Karlof, C. and Wagner, D., "Secure routing in wireless sensor networks: attacks and countermeasures
Sensor Network Protocols and Applications," 2006 8th International Conference Advanced
Communication Technology (2006), Vol. 1, 2006, pp. 314-318.
Xiaojiang D., and Hsiao-Hwa C, “Security in Wireless Sensor Networks” IEEE Wireless
Commununications, Vol. 15, Aug. 2008, pp. 60-66.
Fan Ye; Luo,H., Songwu Lu and Lixia Zhang, “Statistical en-route filtering of injected false data in
sensor networks,” Selected Areas in Communications, IEEE Journal on, Vol. 23, Apr. 2005, pp. 839850.
Li, Feng, Srinivasan, Avinash, Wu and Jie, "PVFS: A Probabilistic Voting-based Filtering Scheme in
Wireless Sensor Networks," International Journal of Security and Network, Vol. 3, No. 3, 2008, pp.
173-182.
L. A. Zadeh, “Fuzzy Logic,” 2011, http://en.wikipedia.org/wiki/Fuzzy_logic
Crossbox Wireless Sensor Networks, http://www.xbox.com/
C. Intanagonwiwat, R. Govindan, D. Estrin, Directed diffusion: A scalable and robust communication
paradigm for sensor networks. In Proc. of MobiCOM ’00, 2000, pp. 56-67.
F. Ye, A. Chen, S. Lu, L. Zhang, A scalable solution to minimum cost forwarding in large sensor
networks. Computer Communications and Networks, 2001. Proceedings. Tenth International
Conference on, 2001, pp. 304-309.
Kemal A. and Mohamed Y., “A survey on routing protocols for wireless sensor networks,” Ad hoc
Network. Vol. 3, May 2005, pp. 325–349.
Sencun Zhu, Setia, S., Jajodia, S. and PengNing, “An interleaved hop-by-hop authentication scheme
for filtering of injected false data in sensor networks,” Security and Privacy, 2004. Proceedings. 2004
IEEE Symposium on.,May 2004, pp.259-271.
Xiaojiang D., and Hsiao-Hwa C, “Security in Wireless Sensor Networks” IEEE Wireless
Commununications, Vol. 15, Aug. 2008, pp. 60-66.
Fan Ye, Luo,H., Songwu Lu, and Lixia Zhang, "Statistical en-route filtering of injected false data in
sensor networks," Selected Areas in Communications, IEEE Journal on, Vol. 23, No. 4, 2005, pp.
839-850.
H yun Woo Lee, Su Man Nam and Tae Ho Cho, "A Key Level Selection Within Hash Chains for the
Efficient Energy Consumption in WSNs," International Journal of Ambient Systems and Applications
(IJASA), Vol. 1, No. 3, Sep. 2013, pp. 1-14.

Authors
Su Man Nam received his B.S. degree in computer information from Hanseo
university, Korea, in February 2009 and M.S degree in in Electrical and Computer
Engineering from Sungkyunkwan University in 2013, respectively. He is currently a
doctoral student in the College of Information and Communication Engineering at
Sungkyunkwan University, Korea. His research interests include wireless sensor
network, security in wireless sensor networks, and modelling & simulation.
Tae Ho Choreceived the Ph.D. degree in Electrical and Computer Engineering from
the University of Arizona, USA, in 1993, and the B.S. and M.S. degrees in Electrical
Engineering from Sungkyunkwan University, Republic of Korea, and the University of
Alabama, USA, respectively. He is currently a Professor in the College of Information
and Communication Engineering, Sungkyunkwan University, Korea. His research
interests are in the areas of wireless sensor network, intelligent systems, modeling &
simulation, and enterprise resource planning.
10

More Related Content

What's hot

An Assessment of Security Mechanisms Against Reactive Jammer Attack In Wirele...
An Assessment of Security Mechanisms Against Reactive Jammer Attack In Wirele...An Assessment of Security Mechanisms Against Reactive Jammer Attack In Wirele...
An Assessment of Security Mechanisms Against Reactive Jammer Attack In Wirele...ijfcstjournal
 
Researchpaper a survey-on-de-registration-schemes-in-pcs-network
Researchpaper a survey-on-de-registration-schemes-in-pcs-networkResearchpaper a survey-on-de-registration-schemes-in-pcs-network
Researchpaper a survey-on-de-registration-schemes-in-pcs-networkRajeev Ranjan
 
Improving QoS-based Routing by Limiting Interference in Lossy Wireless Sensor...
Improving QoS-based Routing by Limiting Interference in Lossy Wireless Sensor...Improving QoS-based Routing by Limiting Interference in Lossy Wireless Sensor...
Improving QoS-based Routing by Limiting Interference in Lossy Wireless Sensor...ijwmn
 
Monitoramento transmissao hacje2014 03-07 00-50-27-_8.1
Monitoramento transmissao hacje2014 03-07 00-50-27-_8.1Monitoramento transmissao hacje2014 03-07 00-50-27-_8.1
Monitoramento transmissao hacje2014 03-07 00-50-27-_8.1Suemi Iarussi
 
A_Fair_Multiple-Slot_Assignment_Protocol_for_Sched
A_Fair_Multiple-Slot_Assignment_Protocol_for_SchedA_Fair_Multiple-Slot_Assignment_Protocol_for_Sched
A_Fair_Multiple-Slot_Assignment_Protocol_for_SchedDebesh Sadhukhan
 
A Method of Improving Energy Efficiency Through Geofencing and False Data Blo...
A Method of Improving Energy Efficiency Through Geofencing and False Data Blo...A Method of Improving Energy Efficiency Through Geofencing and False Data Blo...
A Method of Improving Energy Efficiency Through Geofencing and False Data Blo...IJCNCJournal
 
Anomaly Detection of IP Header Threats
Anomaly Detection of IP Header ThreatsAnomaly Detection of IP Header Threats
Anomaly Detection of IP Header ThreatsCSCJournals
 
Monitoring of traffic over the victim under tcp syn flood in a lan
Monitoring of traffic over the victim under tcp syn flood in a lanMonitoring of traffic over the victim under tcp syn flood in a lan
Monitoring of traffic over the victim under tcp syn flood in a laneSAT Publishing House
 
Adhoc and Sensor Networks - Chapter 04
Adhoc and Sensor Networks - Chapter 04Adhoc and Sensor Networks - Chapter 04
Adhoc and Sensor Networks - Chapter 04Ali Habeeb
 
CS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKSCS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKSKathirvel Ayyaswamy
 
THE FIGHT AGAINST IP SPOOFING ATTACKS: NETWORK INGRESS FILTERING VERSUS FIRST...
THE FIGHT AGAINST IP SPOOFING ATTACKS: NETWORK INGRESS FILTERING VERSUS FIRST...THE FIGHT AGAINST IP SPOOFING ATTACKS: NETWORK INGRESS FILTERING VERSUS FIRST...
THE FIGHT AGAINST IP SPOOFING ATTACKS: NETWORK INGRESS FILTERING VERSUS FIRST...ijsptm
 
SECURITY ISSUES IN THE OPTIMIZED LINK STATE ROUTING PROTOCOL VERSION 2 (OLSRV2)
SECURITY ISSUES IN THE OPTIMIZED LINK STATE ROUTING PROTOCOL VERSION 2 (OLSRV2)SECURITY ISSUES IN THE OPTIMIZED LINK STATE ROUTING PROTOCOL VERSION 2 (OLSRV2)
SECURITY ISSUES IN THE OPTIMIZED LINK STATE ROUTING PROTOCOL VERSION 2 (OLSRV2)IJNSA Journal
 
Performance Evaluation of DSDV & OLSR Proactive Protocols in MANET
Performance Evaluation of DSDV & OLSR Proactive Protocols in MANETPerformance Evaluation of DSDV & OLSR Proactive Protocols in MANET
Performance Evaluation of DSDV & OLSR Proactive Protocols in MANETijsrd.com
 
A HYBRID APPROACH COMBINING RULE-BASED AND ANOMALY-BASED DETECTION AGAINST DD...
A HYBRID APPROACH COMBINING RULE-BASED AND ANOMALY-BASED DETECTION AGAINST DD...A HYBRID APPROACH COMBINING RULE-BASED AND ANOMALY-BASED DETECTION AGAINST DD...
A HYBRID APPROACH COMBINING RULE-BASED AND ANOMALY-BASED DETECTION AGAINST DD...IJNSA Journal
 
Live Streaming With Receiver-Based P2P Multiplexing for Future IPTV Network
Live Streaming With Receiver-Based P2P Multiplexing for Future IPTV NetworkLive Streaming With Receiver-Based P2P Multiplexing for Future IPTV Network
Live Streaming With Receiver-Based P2P Multiplexing for Future IPTV NetworkIJMER
 
Introduction To Cellular And Wireless Networks
Introduction To Cellular And Wireless NetworksIntroduction To Cellular And Wireless Networks
Introduction To Cellular And Wireless NetworksYoram Orzach
 
透视消费者.ppt
透视消费者.ppt透视消费者.ppt
透视消费者.pptwei mingyang
 

What's hot (17)

An Assessment of Security Mechanisms Against Reactive Jammer Attack In Wirele...
An Assessment of Security Mechanisms Against Reactive Jammer Attack In Wirele...An Assessment of Security Mechanisms Against Reactive Jammer Attack In Wirele...
An Assessment of Security Mechanisms Against Reactive Jammer Attack In Wirele...
 
Researchpaper a survey-on-de-registration-schemes-in-pcs-network
Researchpaper a survey-on-de-registration-schemes-in-pcs-networkResearchpaper a survey-on-de-registration-schemes-in-pcs-network
Researchpaper a survey-on-de-registration-schemes-in-pcs-network
 
Improving QoS-based Routing by Limiting Interference in Lossy Wireless Sensor...
Improving QoS-based Routing by Limiting Interference in Lossy Wireless Sensor...Improving QoS-based Routing by Limiting Interference in Lossy Wireless Sensor...
Improving QoS-based Routing by Limiting Interference in Lossy Wireless Sensor...
 
Monitoramento transmissao hacje2014 03-07 00-50-27-_8.1
Monitoramento transmissao hacje2014 03-07 00-50-27-_8.1Monitoramento transmissao hacje2014 03-07 00-50-27-_8.1
Monitoramento transmissao hacje2014 03-07 00-50-27-_8.1
 
A_Fair_Multiple-Slot_Assignment_Protocol_for_Sched
A_Fair_Multiple-Slot_Assignment_Protocol_for_SchedA_Fair_Multiple-Slot_Assignment_Protocol_for_Sched
A_Fair_Multiple-Slot_Assignment_Protocol_for_Sched
 
A Method of Improving Energy Efficiency Through Geofencing and False Data Blo...
A Method of Improving Energy Efficiency Through Geofencing and False Data Blo...A Method of Improving Energy Efficiency Through Geofencing and False Data Blo...
A Method of Improving Energy Efficiency Through Geofencing and False Data Blo...
 
Anomaly Detection of IP Header Threats
Anomaly Detection of IP Header ThreatsAnomaly Detection of IP Header Threats
Anomaly Detection of IP Header Threats
 
Monitoring of traffic over the victim under tcp syn flood in a lan
Monitoring of traffic over the victim under tcp syn flood in a lanMonitoring of traffic over the victim under tcp syn flood in a lan
Monitoring of traffic over the victim under tcp syn flood in a lan
 
Adhoc and Sensor Networks - Chapter 04
Adhoc and Sensor Networks - Chapter 04Adhoc and Sensor Networks - Chapter 04
Adhoc and Sensor Networks - Chapter 04
 
CS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKSCS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKS
 
THE FIGHT AGAINST IP SPOOFING ATTACKS: NETWORK INGRESS FILTERING VERSUS FIRST...
THE FIGHT AGAINST IP SPOOFING ATTACKS: NETWORK INGRESS FILTERING VERSUS FIRST...THE FIGHT AGAINST IP SPOOFING ATTACKS: NETWORK INGRESS FILTERING VERSUS FIRST...
THE FIGHT AGAINST IP SPOOFING ATTACKS: NETWORK INGRESS FILTERING VERSUS FIRST...
 
SECURITY ISSUES IN THE OPTIMIZED LINK STATE ROUTING PROTOCOL VERSION 2 (OLSRV2)
SECURITY ISSUES IN THE OPTIMIZED LINK STATE ROUTING PROTOCOL VERSION 2 (OLSRV2)SECURITY ISSUES IN THE OPTIMIZED LINK STATE ROUTING PROTOCOL VERSION 2 (OLSRV2)
SECURITY ISSUES IN THE OPTIMIZED LINK STATE ROUTING PROTOCOL VERSION 2 (OLSRV2)
 
Performance Evaluation of DSDV & OLSR Proactive Protocols in MANET
Performance Evaluation of DSDV & OLSR Proactive Protocols in MANETPerformance Evaluation of DSDV & OLSR Proactive Protocols in MANET
Performance Evaluation of DSDV & OLSR Proactive Protocols in MANET
 
A HYBRID APPROACH COMBINING RULE-BASED AND ANOMALY-BASED DETECTION AGAINST DD...
A HYBRID APPROACH COMBINING RULE-BASED AND ANOMALY-BASED DETECTION AGAINST DD...A HYBRID APPROACH COMBINING RULE-BASED AND ANOMALY-BASED DETECTION AGAINST DD...
A HYBRID APPROACH COMBINING RULE-BASED AND ANOMALY-BASED DETECTION AGAINST DD...
 
Live Streaming With Receiver-Based P2P Multiplexing for Future IPTV Network
Live Streaming With Receiver-Based P2P Multiplexing for Future IPTV NetworkLive Streaming With Receiver-Based P2P Multiplexing for Future IPTV Network
Live Streaming With Receiver-Based P2P Multiplexing for Future IPTV Network
 
Introduction To Cellular And Wireless Networks
Introduction To Cellular And Wireless NetworksIntroduction To Cellular And Wireless Networks
Introduction To Cellular And Wireless Networks
 
透视消费者.ppt
透视消费者.ppt透视消费者.ppt
透视消费者.ppt
 

Similar to SELECTING VOTES FOR ENERGY EFFICIENCY IN PROBABILISTIC VOTING-BASED FILTERING IN WIRELESS SENSOR NETWORKS USING FUZZY LOGIC

FUZZY-BASED ENERGY EFFICIENT METHOD FOR MULTIPLE ATTACKS IN SENSOR NETWORKS: ...
FUZZY-BASED ENERGY EFFICIENT METHOD FOR MULTIPLE ATTACKS IN SENSOR NETWORKS: ...FUZZY-BASED ENERGY EFFICIENT METHOD FOR MULTIPLE ATTACKS IN SENSOR NETWORKS: ...
FUZZY-BASED ENERGY EFFICIENT METHOD FOR MULTIPLE ATTACKS IN SENSOR NETWORKS: ...IJCI JOURNAL
 
Fuzzy-Based Multiple Path Selection Method for Improving Energy Efficiency in...
Fuzzy-Based Multiple Path Selection Method for Improving Energy Efficiency in...Fuzzy-Based Multiple Path Selection Method for Improving Energy Efficiency in...
Fuzzy-Based Multiple Path Selection Method for Improving Energy Efficiency in...aciijournal
 
WSN Lifetime Extension Using GA Optimised Fuzzy Logic
WSN Lifetime Extension Using GA Optimised Fuzzy LogicWSN Lifetime Extension Using GA Optimised Fuzzy Logic
WSN Lifetime Extension Using GA Optimised Fuzzy LogicAIRCC Publishing Corporation
 
WSN LIFETIME EXTENSION USING GA OPTIMISED FUZZY LOGIC
WSN LIFETIME EXTENSION USING GA OPTIMISED FUZZY LOGICWSN LIFETIME EXTENSION USING GA OPTIMISED FUZZY LOGIC
WSN LIFETIME EXTENSION USING GA OPTIMISED FUZZY LOGICijcsit
 
WSN LIFETIME EXTENSION USING GA OPTIMISED FUZZY LOGIC
WSN LIFETIME EXTENSION USING GA OPTIMISED FUZZY LOGICWSN LIFETIME EXTENSION USING GA OPTIMISED FUZZY LOGIC
WSN LIFETIME EXTENSION USING GA OPTIMISED FUZZY LOGICAIRCC Publishing Corporation
 
Ensf energy efficient next-hop selection
Ensf energy efficient next-hop selectionEnsf energy efficient next-hop selection
Ensf energy efficient next-hop selectionijasa
 
A KEY LEVEL SELECTION WITHIN HASH CHAINS FOR THE EFFICIENT ENERGY CONSUMPTION...
A KEY LEVEL SELECTION WITHIN HASH CHAINS FOR THE EFFICIENT ENERGY CONSUMPTION...A KEY LEVEL SELECTION WITHIN HASH CHAINS FOR THE EFFICIENT ENERGY CONSUMPTION...
A KEY LEVEL SELECTION WITHIN HASH CHAINS FOR THE EFFICIENT ENERGY CONSUMPTION...ijasa
 
NUMBER OF NEIGHBOUR NODES BASED NEXT FORWARDING NODES DETERMINATION SCHEME FO...
NUMBER OF NEIGHBOUR NODES BASED NEXT FORWARDING NODES DETERMINATION SCHEME FO...NUMBER OF NEIGHBOUR NODES BASED NEXT FORWARDING NODES DETERMINATION SCHEME FO...
NUMBER OF NEIGHBOUR NODES BASED NEXT FORWARDING NODES DETERMINATION SCHEME FO...ijcsity
 
Selecting number of forwarding reports
Selecting number of forwarding reportsSelecting number of forwarding reports
Selecting number of forwarding reportsijasa
 
Prevention Method of False Report Generation in Cluser Heads for Dynamic En-R...
Prevention Method of False Report Generation in Cluser Heads for Dynamic En-R...Prevention Method of False Report Generation in Cluser Heads for Dynamic En-R...
Prevention Method of False Report Generation in Cluser Heads for Dynamic En-R...AIRCC Publishing Corporation
 
PREVENTION METHOD OF FALSE REPORT GENERATION IN CLUSTER HEADS FOR DYNAMIC E...
PREVENTION METHOD OF FALSE REPORT  GENERATION IN CLUSTER HEADS FOR DYNAMIC  E...PREVENTION METHOD OF FALSE REPORT  GENERATION IN CLUSTER HEADS FOR DYNAMIC  E...
PREVENTION METHOD OF FALSE REPORT GENERATION IN CLUSTER HEADS FOR DYNAMIC E...AIRCC Publishing Corporation
 
Iaetsd a survey on enroute filtering scheme in
Iaetsd a survey on enroute filtering scheme inIaetsd a survey on enroute filtering scheme in
Iaetsd a survey on enroute filtering scheme inIaetsd Iaetsd
 
BLACKLIST MANAGEMENT USING A VERIFICATION REPORT TO IMPROVE THE ENERGY EFFICI...
BLACKLIST MANAGEMENT USING A VERIFICATION REPORT TO IMPROVE THE ENERGY EFFICI...BLACKLIST MANAGEMENT USING A VERIFICATION REPORT TO IMPROVE THE ENERGY EFFICI...
BLACKLIST MANAGEMENT USING A VERIFICATION REPORT TO IMPROVE THE ENERGY EFFICI...ijwmn
 
E NERGY - E FFICIENT P ATH C ONFIGURATION M ETHOD FOR DEF IN WSN S
E NERGY - E FFICIENT  P ATH  C ONFIGURATION  M ETHOD FOR  DEF IN  WSN SE NERGY - E FFICIENT  P ATH  C ONFIGURATION  M ETHOD FOR  DEF IN  WSN S
E NERGY - E FFICIENT P ATH C ONFIGURATION M ETHOD FOR DEF IN WSN Sijitjournal
 
FUZZY LOGIC-BASED EFFICIENT MESSAGE ROUTE SELECTION METHOD TO PROLONG THE NET...
FUZZY LOGIC-BASED EFFICIENT MESSAGE ROUTE SELECTION METHOD TO PROLONG THE NET...FUZZY LOGIC-BASED EFFICIENT MESSAGE ROUTE SELECTION METHOD TO PROLONG THE NET...
FUZZY LOGIC-BASED EFFICIENT MESSAGE ROUTE SELECTION METHOD TO PROLONG THE NET...IJCNCJournal
 
Fuzzy Logic-based Efficient Message Route Selection Method to Prolong the Net...
Fuzzy Logic-based Efficient Message Route Selection Method to Prolong the Net...Fuzzy Logic-based Efficient Message Route Selection Method to Prolong the Net...
Fuzzy Logic-based Efficient Message Route Selection Method to Prolong the Net...IJCNCJournal
 
LOAD BALANCING MANAGEMENT USING FUZZY LOGIC TO IMPROVE THE REPORT TRANSFER SU...
LOAD BALANCING MANAGEMENT USING FUZZY LOGIC TO IMPROVE THE REPORT TRANSFER SU...LOAD BALANCING MANAGEMENT USING FUZZY LOGIC TO IMPROVE THE REPORT TRANSFER SU...
LOAD BALANCING MANAGEMENT USING FUZZY LOGIC TO IMPROVE THE REPORT TRANSFER SU...cscpconf
 
An Enhanced Detection and Energy-Efficient En-Route Filtering Scheme in Wirel...
An Enhanced Detection and Energy-Efficient En-Route Filtering Scheme in Wirel...An Enhanced Detection and Energy-Efficient En-Route Filtering Scheme in Wirel...
An Enhanced Detection and Energy-Efficient En-Route Filtering Scheme in Wirel...ieijjournal
 
AN ENHANCED DETECTION AND ENERGYEFFICIENT EN-ROUTE FILTERING SCHEME IN WIRELE...
AN ENHANCED DETECTION AND ENERGYEFFICIENT EN-ROUTE FILTERING SCHEME IN WIRELE...AN ENHANCED DETECTION AND ENERGYEFFICIENT EN-ROUTE FILTERING SCHEME IN WIRELE...
AN ENHANCED DETECTION AND ENERGYEFFICIENT EN-ROUTE FILTERING SCHEME IN WIRELE...ieijjournal
 
GEOGRAPHIC INFORMATION-BASED ROUTING OPTIMIZATION USING GA FOR CLUSTER-BASED ...
GEOGRAPHIC INFORMATION-BASED ROUTING OPTIMIZATION USING GA FOR CLUSTER-BASED ...GEOGRAPHIC INFORMATION-BASED ROUTING OPTIMIZATION USING GA FOR CLUSTER-BASED ...
GEOGRAPHIC INFORMATION-BASED ROUTING OPTIMIZATION USING GA FOR CLUSTER-BASED ...ijwmn
 

Similar to SELECTING VOTES FOR ENERGY EFFICIENCY IN PROBABILISTIC VOTING-BASED FILTERING IN WIRELESS SENSOR NETWORKS USING FUZZY LOGIC (20)

FUZZY-BASED ENERGY EFFICIENT METHOD FOR MULTIPLE ATTACKS IN SENSOR NETWORKS: ...
FUZZY-BASED ENERGY EFFICIENT METHOD FOR MULTIPLE ATTACKS IN SENSOR NETWORKS: ...FUZZY-BASED ENERGY EFFICIENT METHOD FOR MULTIPLE ATTACKS IN SENSOR NETWORKS: ...
FUZZY-BASED ENERGY EFFICIENT METHOD FOR MULTIPLE ATTACKS IN SENSOR NETWORKS: ...
 
Fuzzy-Based Multiple Path Selection Method for Improving Energy Efficiency in...
Fuzzy-Based Multiple Path Selection Method for Improving Energy Efficiency in...Fuzzy-Based Multiple Path Selection Method for Improving Energy Efficiency in...
Fuzzy-Based Multiple Path Selection Method for Improving Energy Efficiency in...
 
WSN Lifetime Extension Using GA Optimised Fuzzy Logic
WSN Lifetime Extension Using GA Optimised Fuzzy LogicWSN Lifetime Extension Using GA Optimised Fuzzy Logic
WSN Lifetime Extension Using GA Optimised Fuzzy Logic
 
WSN LIFETIME EXTENSION USING GA OPTIMISED FUZZY LOGIC
WSN LIFETIME EXTENSION USING GA OPTIMISED FUZZY LOGICWSN LIFETIME EXTENSION USING GA OPTIMISED FUZZY LOGIC
WSN LIFETIME EXTENSION USING GA OPTIMISED FUZZY LOGIC
 
WSN LIFETIME EXTENSION USING GA OPTIMISED FUZZY LOGIC
WSN LIFETIME EXTENSION USING GA OPTIMISED FUZZY LOGICWSN LIFETIME EXTENSION USING GA OPTIMISED FUZZY LOGIC
WSN LIFETIME EXTENSION USING GA OPTIMISED FUZZY LOGIC
 
Ensf energy efficient next-hop selection
Ensf energy efficient next-hop selectionEnsf energy efficient next-hop selection
Ensf energy efficient next-hop selection
 
A KEY LEVEL SELECTION WITHIN HASH CHAINS FOR THE EFFICIENT ENERGY CONSUMPTION...
A KEY LEVEL SELECTION WITHIN HASH CHAINS FOR THE EFFICIENT ENERGY CONSUMPTION...A KEY LEVEL SELECTION WITHIN HASH CHAINS FOR THE EFFICIENT ENERGY CONSUMPTION...
A KEY LEVEL SELECTION WITHIN HASH CHAINS FOR THE EFFICIENT ENERGY CONSUMPTION...
 
NUMBER OF NEIGHBOUR NODES BASED NEXT FORWARDING NODES DETERMINATION SCHEME FO...
NUMBER OF NEIGHBOUR NODES BASED NEXT FORWARDING NODES DETERMINATION SCHEME FO...NUMBER OF NEIGHBOUR NODES BASED NEXT FORWARDING NODES DETERMINATION SCHEME FO...
NUMBER OF NEIGHBOUR NODES BASED NEXT FORWARDING NODES DETERMINATION SCHEME FO...
 
Selecting number of forwarding reports
Selecting number of forwarding reportsSelecting number of forwarding reports
Selecting number of forwarding reports
 
Prevention Method of False Report Generation in Cluser Heads for Dynamic En-R...
Prevention Method of False Report Generation in Cluser Heads for Dynamic En-R...Prevention Method of False Report Generation in Cluser Heads for Dynamic En-R...
Prevention Method of False Report Generation in Cluser Heads for Dynamic En-R...
 
PREVENTION METHOD OF FALSE REPORT GENERATION IN CLUSTER HEADS FOR DYNAMIC E...
PREVENTION METHOD OF FALSE REPORT  GENERATION IN CLUSTER HEADS FOR DYNAMIC  E...PREVENTION METHOD OF FALSE REPORT  GENERATION IN CLUSTER HEADS FOR DYNAMIC  E...
PREVENTION METHOD OF FALSE REPORT GENERATION IN CLUSTER HEADS FOR DYNAMIC E...
 
Iaetsd a survey on enroute filtering scheme in
Iaetsd a survey on enroute filtering scheme inIaetsd a survey on enroute filtering scheme in
Iaetsd a survey on enroute filtering scheme in
 
BLACKLIST MANAGEMENT USING A VERIFICATION REPORT TO IMPROVE THE ENERGY EFFICI...
BLACKLIST MANAGEMENT USING A VERIFICATION REPORT TO IMPROVE THE ENERGY EFFICI...BLACKLIST MANAGEMENT USING A VERIFICATION REPORT TO IMPROVE THE ENERGY EFFICI...
BLACKLIST MANAGEMENT USING A VERIFICATION REPORT TO IMPROVE THE ENERGY EFFICI...
 
E NERGY - E FFICIENT P ATH C ONFIGURATION M ETHOD FOR DEF IN WSN S
E NERGY - E FFICIENT  P ATH  C ONFIGURATION  M ETHOD FOR  DEF IN  WSN SE NERGY - E FFICIENT  P ATH  C ONFIGURATION  M ETHOD FOR  DEF IN  WSN S
E NERGY - E FFICIENT P ATH C ONFIGURATION M ETHOD FOR DEF IN WSN S
 
FUZZY LOGIC-BASED EFFICIENT MESSAGE ROUTE SELECTION METHOD TO PROLONG THE NET...
FUZZY LOGIC-BASED EFFICIENT MESSAGE ROUTE SELECTION METHOD TO PROLONG THE NET...FUZZY LOGIC-BASED EFFICIENT MESSAGE ROUTE SELECTION METHOD TO PROLONG THE NET...
FUZZY LOGIC-BASED EFFICIENT MESSAGE ROUTE SELECTION METHOD TO PROLONG THE NET...
 
Fuzzy Logic-based Efficient Message Route Selection Method to Prolong the Net...
Fuzzy Logic-based Efficient Message Route Selection Method to Prolong the Net...Fuzzy Logic-based Efficient Message Route Selection Method to Prolong the Net...
Fuzzy Logic-based Efficient Message Route Selection Method to Prolong the Net...
 
LOAD BALANCING MANAGEMENT USING FUZZY LOGIC TO IMPROVE THE REPORT TRANSFER SU...
LOAD BALANCING MANAGEMENT USING FUZZY LOGIC TO IMPROVE THE REPORT TRANSFER SU...LOAD BALANCING MANAGEMENT USING FUZZY LOGIC TO IMPROVE THE REPORT TRANSFER SU...
LOAD BALANCING MANAGEMENT USING FUZZY LOGIC TO IMPROVE THE REPORT TRANSFER SU...
 
An Enhanced Detection and Energy-Efficient En-Route Filtering Scheme in Wirel...
An Enhanced Detection and Energy-Efficient En-Route Filtering Scheme in Wirel...An Enhanced Detection and Energy-Efficient En-Route Filtering Scheme in Wirel...
An Enhanced Detection and Energy-Efficient En-Route Filtering Scheme in Wirel...
 
AN ENHANCED DETECTION AND ENERGYEFFICIENT EN-ROUTE FILTERING SCHEME IN WIRELE...
AN ENHANCED DETECTION AND ENERGYEFFICIENT EN-ROUTE FILTERING SCHEME IN WIRELE...AN ENHANCED DETECTION AND ENERGYEFFICIENT EN-ROUTE FILTERING SCHEME IN WIRELE...
AN ENHANCED DETECTION AND ENERGYEFFICIENT EN-ROUTE FILTERING SCHEME IN WIRELE...
 
GEOGRAPHIC INFORMATION-BASED ROUTING OPTIMIZATION USING GA FOR CLUSTER-BASED ...
GEOGRAPHIC INFORMATION-BASED ROUTING OPTIMIZATION USING GA FOR CLUSTER-BASED ...GEOGRAPHIC INFORMATION-BASED ROUTING OPTIMIZATION USING GA FOR CLUSTER-BASED ...
GEOGRAPHIC INFORMATION-BASED ROUTING OPTIMIZATION USING GA FOR CLUSTER-BASED ...
 

More from ijasa

A CONCEPTUAL FRAMEWORK OF A DETECTIVE MODEL FOR SOCIAL BOT CLASSIFICATION
A CONCEPTUAL FRAMEWORK OF A DETECTIVE MODEL FOR SOCIAL BOT CLASSIFICATIONA CONCEPTUAL FRAMEWORK OF A DETECTIVE MODEL FOR SOCIAL BOT CLASSIFICATION
A CONCEPTUAL FRAMEWORK OF A DETECTIVE MODEL FOR SOCIAL BOT CLASSIFICATIONijasa
 
DESIGN OF A MINIATURE RECTANGULAR PATCH ANTENNA FOR KU BAND APPLICATIONS
DESIGN OF A MINIATURE RECTANGULAR PATCH ANTENNA FOR KU BAND APPLICATIONSDESIGN OF A MINIATURE RECTANGULAR PATCH ANTENNA FOR KU BAND APPLICATIONS
DESIGN OF A MINIATURE RECTANGULAR PATCH ANTENNA FOR KU BAND APPLICATIONSijasa
 
SMART SOUND SYSTEM APPLIED FOR THE EXTENSIVE CARE OF PEOPLE WITH HEARING IMPA...
SMART SOUND SYSTEM APPLIED FOR THE EXTENSIVE CARE OF PEOPLE WITH HEARING IMPA...SMART SOUND SYSTEM APPLIED FOR THE EXTENSIVE CARE OF PEOPLE WITH HEARING IMPA...
SMART SOUND SYSTEM APPLIED FOR THE EXTENSIVE CARE OF PEOPLE WITH HEARING IMPA...ijasa
 
AN INTELLIGENT AND DATA-DRIVEN MOBILE VOLUNTEER EVENT MANAGEMENT PLATFORM USI...
AN INTELLIGENT AND DATA-DRIVEN MOBILE VOLUNTEER EVENT MANAGEMENT PLATFORM USI...AN INTELLIGENT AND DATA-DRIVEN MOBILE VOLUNTEER EVENT MANAGEMENT PLATFORM USI...
AN INTELLIGENT AND DATA-DRIVEN MOBILE VOLUNTEER EVENT MANAGEMENT PLATFORM USI...ijasa
 
A STUDY OF IOT BASED REAL-TIME SOLAR POWER REMOTE MONITORING SYSTEM
A STUDY OF IOT BASED REAL-TIME SOLAR POWER REMOTE MONITORING SYSTEMA STUDY OF IOT BASED REAL-TIME SOLAR POWER REMOTE MONITORING SYSTEM
A STUDY OF IOT BASED REAL-TIME SOLAR POWER REMOTE MONITORING SYSTEMijasa
 
SENSOR BASED SMART IRRIGATION SYSTEM WITH MONITORING AND CONTROLLING USING IN...
SENSOR BASED SMART IRRIGATION SYSTEM WITH MONITORING AND CONTROLLING USING IN...SENSOR BASED SMART IRRIGATION SYSTEM WITH MONITORING AND CONTROLLING USING IN...
SENSOR BASED SMART IRRIGATION SYSTEM WITH MONITORING AND CONTROLLING USING IN...ijasa
 
COMPARISON OF BIT ERROR RATE PERFORMANCE OF VARIOUS DIGITAL MODULATION SCHEME...
COMPARISON OF BIT ERROR RATE PERFORMANCE OF VARIOUS DIGITAL MODULATION SCHEME...COMPARISON OF BIT ERROR RATE PERFORMANCE OF VARIOUS DIGITAL MODULATION SCHEME...
COMPARISON OF BIT ERROR RATE PERFORMANCE OF VARIOUS DIGITAL MODULATION SCHEME...ijasa
 
PERFORMANCE OF CONVOLUTION AND CRC CHANNEL ENCODED V-BLAST 4×4 MIMO MCCDMA WI...
PERFORMANCE OF CONVOLUTION AND CRC CHANNEL ENCODED V-BLAST 4×4 MIMO MCCDMA WI...PERFORMANCE OF CONVOLUTION AND CRC CHANNEL ENCODED V-BLAST 4×4 MIMO MCCDMA WI...
PERFORMANCE OF CONVOLUTION AND CRC CHANNEL ENCODED V-BLAST 4×4 MIMO MCCDMA WI...ijasa
 
A SCRUTINY TO ATTACK ISSUES AND SECURITY CHALLENGES IN CLOUD COMPUTING
A SCRUTINY TO ATTACK ISSUES AND SECURITY CHALLENGES IN CLOUD COMPUTINGA SCRUTINY TO ATTACK ISSUES AND SECURITY CHALLENGES IN CLOUD COMPUTING
A SCRUTINY TO ATTACK ISSUES AND SECURITY CHALLENGES IN CLOUD COMPUTINGijasa
 
The International Journal of Ambient Systems and Applications (IJASA)
The International Journal of Ambient Systems and Applications (IJASA) The International Journal of Ambient Systems and Applications (IJASA)
The International Journal of Ambient Systems and Applications (IJASA) ijasa
 
A SCRUTINY TO ATTACK ISSUES AND SECURITY CHALLENGES IN CLOUD COMPUTING
A SCRUTINY TO ATTACK ISSUES AND SECURITY CHALLENGES IN CLOUD COMPUTINGA SCRUTINY TO ATTACK ISSUES AND SECURITY CHALLENGES IN CLOUD COMPUTING
A SCRUTINY TO ATTACK ISSUES AND SECURITY CHALLENGES IN CLOUD COMPUTINGijasa
 
TOWARD ORGANIC COMPUTING APPROACH FOR CYBERNETIC RESPONSIVE ENVIRONMENT
TOWARD ORGANIC COMPUTING APPROACH FOR CYBERNETIC RESPONSIVE ENVIRONMENTTOWARD ORGANIC COMPUTING APPROACH FOR CYBERNETIC RESPONSIVE ENVIRONMENT
TOWARD ORGANIC COMPUTING APPROACH FOR CYBERNETIC RESPONSIVE ENVIRONMENTijasa
 
A STUDY ON DEVELOPING A SMART ENVIRONMENT IN AGRICULTURAL IRRIGATION TECHNIQUE
A STUDY ON DEVELOPING A SMART ENVIRONMENT IN AGRICULTURAL IRRIGATION TECHNIQUEA STUDY ON DEVELOPING A SMART ENVIRONMENT IN AGRICULTURAL IRRIGATION TECHNIQUE
A STUDY ON DEVELOPING A SMART ENVIRONMENT IN AGRICULTURAL IRRIGATION TECHNIQUEijasa
 
A REVIEW ON DDOS PREVENTION AND DETECTION METHODOLOGY
A REVIEW ON DDOS PREVENTION AND DETECTION METHODOLOGYA REVIEW ON DDOS PREVENTION AND DETECTION METHODOLOGY
A REVIEW ON DDOS PREVENTION AND DETECTION METHODOLOGYijasa
 
Android based security and home
Android based security and homeAndroid based security and home
Android based security and homeijasa
 
An imperative focus on semantic
An imperative focus on semanticAn imperative focus on semantic
An imperative focus on semanticijasa
 
Review on classification based on artificial
Review on classification based on artificialReview on classification based on artificial
Review on classification based on artificialijasa
 
Intelligent soft computing based
Intelligent soft computing basedIntelligent soft computing based
Intelligent soft computing basedijasa
 
A novel approach for preventing black hole
A novel approach for preventing black holeA novel approach for preventing black hole
A novel approach for preventing black holeijasa
 
Improving performance of routing protocols using mrp framework
Improving performance of routing protocols using mrp frameworkImproving performance of routing protocols using mrp framework
Improving performance of routing protocols using mrp frameworkijasa
 

More from ijasa (20)

A CONCEPTUAL FRAMEWORK OF A DETECTIVE MODEL FOR SOCIAL BOT CLASSIFICATION
A CONCEPTUAL FRAMEWORK OF A DETECTIVE MODEL FOR SOCIAL BOT CLASSIFICATIONA CONCEPTUAL FRAMEWORK OF A DETECTIVE MODEL FOR SOCIAL BOT CLASSIFICATION
A CONCEPTUAL FRAMEWORK OF A DETECTIVE MODEL FOR SOCIAL BOT CLASSIFICATION
 
DESIGN OF A MINIATURE RECTANGULAR PATCH ANTENNA FOR KU BAND APPLICATIONS
DESIGN OF A MINIATURE RECTANGULAR PATCH ANTENNA FOR KU BAND APPLICATIONSDESIGN OF A MINIATURE RECTANGULAR PATCH ANTENNA FOR KU BAND APPLICATIONS
DESIGN OF A MINIATURE RECTANGULAR PATCH ANTENNA FOR KU BAND APPLICATIONS
 
SMART SOUND SYSTEM APPLIED FOR THE EXTENSIVE CARE OF PEOPLE WITH HEARING IMPA...
SMART SOUND SYSTEM APPLIED FOR THE EXTENSIVE CARE OF PEOPLE WITH HEARING IMPA...SMART SOUND SYSTEM APPLIED FOR THE EXTENSIVE CARE OF PEOPLE WITH HEARING IMPA...
SMART SOUND SYSTEM APPLIED FOR THE EXTENSIVE CARE OF PEOPLE WITH HEARING IMPA...
 
AN INTELLIGENT AND DATA-DRIVEN MOBILE VOLUNTEER EVENT MANAGEMENT PLATFORM USI...
AN INTELLIGENT AND DATA-DRIVEN MOBILE VOLUNTEER EVENT MANAGEMENT PLATFORM USI...AN INTELLIGENT AND DATA-DRIVEN MOBILE VOLUNTEER EVENT MANAGEMENT PLATFORM USI...
AN INTELLIGENT AND DATA-DRIVEN MOBILE VOLUNTEER EVENT MANAGEMENT PLATFORM USI...
 
A STUDY OF IOT BASED REAL-TIME SOLAR POWER REMOTE MONITORING SYSTEM
A STUDY OF IOT BASED REAL-TIME SOLAR POWER REMOTE MONITORING SYSTEMA STUDY OF IOT BASED REAL-TIME SOLAR POWER REMOTE MONITORING SYSTEM
A STUDY OF IOT BASED REAL-TIME SOLAR POWER REMOTE MONITORING SYSTEM
 
SENSOR BASED SMART IRRIGATION SYSTEM WITH MONITORING AND CONTROLLING USING IN...
SENSOR BASED SMART IRRIGATION SYSTEM WITH MONITORING AND CONTROLLING USING IN...SENSOR BASED SMART IRRIGATION SYSTEM WITH MONITORING AND CONTROLLING USING IN...
SENSOR BASED SMART IRRIGATION SYSTEM WITH MONITORING AND CONTROLLING USING IN...
 
COMPARISON OF BIT ERROR RATE PERFORMANCE OF VARIOUS DIGITAL MODULATION SCHEME...
COMPARISON OF BIT ERROR RATE PERFORMANCE OF VARIOUS DIGITAL MODULATION SCHEME...COMPARISON OF BIT ERROR RATE PERFORMANCE OF VARIOUS DIGITAL MODULATION SCHEME...
COMPARISON OF BIT ERROR RATE PERFORMANCE OF VARIOUS DIGITAL MODULATION SCHEME...
 
PERFORMANCE OF CONVOLUTION AND CRC CHANNEL ENCODED V-BLAST 4×4 MIMO MCCDMA WI...
PERFORMANCE OF CONVOLUTION AND CRC CHANNEL ENCODED V-BLAST 4×4 MIMO MCCDMA WI...PERFORMANCE OF CONVOLUTION AND CRC CHANNEL ENCODED V-BLAST 4×4 MIMO MCCDMA WI...
PERFORMANCE OF CONVOLUTION AND CRC CHANNEL ENCODED V-BLAST 4×4 MIMO MCCDMA WI...
 
A SCRUTINY TO ATTACK ISSUES AND SECURITY CHALLENGES IN CLOUD COMPUTING
A SCRUTINY TO ATTACK ISSUES AND SECURITY CHALLENGES IN CLOUD COMPUTINGA SCRUTINY TO ATTACK ISSUES AND SECURITY CHALLENGES IN CLOUD COMPUTING
A SCRUTINY TO ATTACK ISSUES AND SECURITY CHALLENGES IN CLOUD COMPUTING
 
The International Journal of Ambient Systems and Applications (IJASA)
The International Journal of Ambient Systems and Applications (IJASA) The International Journal of Ambient Systems and Applications (IJASA)
The International Journal of Ambient Systems and Applications (IJASA)
 
A SCRUTINY TO ATTACK ISSUES AND SECURITY CHALLENGES IN CLOUD COMPUTING
A SCRUTINY TO ATTACK ISSUES AND SECURITY CHALLENGES IN CLOUD COMPUTINGA SCRUTINY TO ATTACK ISSUES AND SECURITY CHALLENGES IN CLOUD COMPUTING
A SCRUTINY TO ATTACK ISSUES AND SECURITY CHALLENGES IN CLOUD COMPUTING
 
TOWARD ORGANIC COMPUTING APPROACH FOR CYBERNETIC RESPONSIVE ENVIRONMENT
TOWARD ORGANIC COMPUTING APPROACH FOR CYBERNETIC RESPONSIVE ENVIRONMENTTOWARD ORGANIC COMPUTING APPROACH FOR CYBERNETIC RESPONSIVE ENVIRONMENT
TOWARD ORGANIC COMPUTING APPROACH FOR CYBERNETIC RESPONSIVE ENVIRONMENT
 
A STUDY ON DEVELOPING A SMART ENVIRONMENT IN AGRICULTURAL IRRIGATION TECHNIQUE
A STUDY ON DEVELOPING A SMART ENVIRONMENT IN AGRICULTURAL IRRIGATION TECHNIQUEA STUDY ON DEVELOPING A SMART ENVIRONMENT IN AGRICULTURAL IRRIGATION TECHNIQUE
A STUDY ON DEVELOPING A SMART ENVIRONMENT IN AGRICULTURAL IRRIGATION TECHNIQUE
 
A REVIEW ON DDOS PREVENTION AND DETECTION METHODOLOGY
A REVIEW ON DDOS PREVENTION AND DETECTION METHODOLOGYA REVIEW ON DDOS PREVENTION AND DETECTION METHODOLOGY
A REVIEW ON DDOS PREVENTION AND DETECTION METHODOLOGY
 
Android based security and home
Android based security and homeAndroid based security and home
Android based security and home
 
An imperative focus on semantic
An imperative focus on semanticAn imperative focus on semantic
An imperative focus on semantic
 
Review on classification based on artificial
Review on classification based on artificialReview on classification based on artificial
Review on classification based on artificial
 
Intelligent soft computing based
Intelligent soft computing basedIntelligent soft computing based
Intelligent soft computing based
 
A novel approach for preventing black hole
A novel approach for preventing black holeA novel approach for preventing black hole
A novel approach for preventing black hole
 
Improving performance of routing protocols using mrp framework
Improving performance of routing protocols using mrp frameworkImproving performance of routing protocols using mrp framework
Improving performance of routing protocols using mrp framework
 

Recently uploaded

New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 

Recently uploaded (20)

New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 

SELECTING VOTES FOR ENERGY EFFICIENCY IN PROBABILISTIC VOTING-BASED FILTERING IN WIRELESS SENSOR NETWORKS USING FUZZY LOGIC

  • 1. International Journal of Ambient Systems and Applications (IJASA) Vol.1, No.4,December 2013 SELECTING VOTES FOR ENERGY EFFICIENCY IN PROBABILISTIC VOTING-BASED FILTERING IN WIRELESS SENSOR NETWORKS USING FUZZY LOGIC Su Man Nam and Tae Ho Cho College of Information and Communication Engineering, Sungkyunkwan University, Suwon, 440-746, Republic of Korea ABSTRACT Wireless sensor networks are easily compromised by an adversary, such as fabricated with false votes attacks and false votes on real reports attacks. These attacks generate false data to drain the energy resource of sensors and interrupt the inflow of a real report. PVFS was proposed to detect them by verifying votes in the real report. When a real event occurs, a cluster head collects all of the votes from its neighboring nodes and selects the votes up to a defined number of votes. In this paper, our proposed method decides the number of votes based on a fuzzy rule-based system to improve energy savings as compared to PVFS. We evaluated the effectiveness of the proposal as two attacks occur simultaneously in the sensor network. The experimental results show that our method saves energy resources and maintains the security level against these multiple attacks. KEYWORDS Wireless sensor network, Probabilistic voting-based filtering scheme, Fuzzy System 1. INTRODUCTION Wireless sensor networks (WSNs) operate without the intervention of an administrator in a huge area [1]. These Sensor networks enable low-cost and low-power development in open environments [2]. However, the sensor network has restrictions on the resource utilization side, such as the energy of sensor nodes, computational capacity, and bandwidth [3]. In addition, network adversaries can easily compromise the sensor nodes [4-5]. 1
  • 2. International Journal of Ambient Systems and Applications (IJASA) Vol.1, No.4,December 2013 Figure 1.Multiple Attacks Figure 1 shows a fabricated report with false votes attack (FRA) [6], and a false vote on real reports attack (FVA) [7], in the sensor network. Two compromised nodes inject the fabricated report and false votes, to destroy the sensor network. In an FRA, a compromised node generates a false report about a non-existent event, to drain the energy resource of intermediate nodes, and causes false alarms when the false report arrives in the base station. In an FVA, a compromised node injects a false vote in a legitimate report, to be intentionally dropped in an intermediate node, when a real event occurs. These attacks should be dropped, for reasons of information removal, and needless energy consumption. A probabilistic voting-based filtering scheme (PVFS) [7] was proposed, to detect multiple attacks in intermediate nodes when FRA and FVA simultaneously occur in the sensor network. Before all of the sensors are deployed, factors, such as the required number of votes for a report, the threshold of verified true votes in the report, and the threshold of verified false votes in the report, are defined to operate the sensor network, and detect the multiple attacks. This method selects verification cluster-head nodes (CHs) with a probability to detect the attacks, before forwarding a report. In this paper, we propose a method to effectively select a required number of votes for a legitimate report, based on a fuzzy rule-based system [8], before forwarding the report. Our proposed method decides the required number of votes through the energy level, hops from the report generation CH to the base station, and the forwarded report count. Therefore, the proposed method saves energy resources of each node, while maintaining security level against FRA and FVA, as compared to PVFS. The remainder of this paper is arranged as follows: the background and motivation are described in Section 2, the proposed method is introduced in Section 3, the experimental results are discussed in Section 4, and the conclusions are made and future work is discussed in Section 5. 2
  • 3. International Journal of Ambient Systems and Applications (IJASA) Vol.1, No.4,December 2013 2. BACKGROUND FRA and FVA are generated in the application layer of a sensor network, to consume unnecessary energy of sensor nodes, and to obstruct the delivery of a legitimate report. These attacks should be minimized, through early detection. We will discuss PVFS against FRA and FVIA in Section 2.1, and explain the motivation for our proposed method in Section 2.2. 2.1. PVFS PVFS was proposed to achieve better resilience against compromised nodes, and offer protection for both FRA and FVA. PVFS executes five phases. Before a sensor network is operated by using PVFS, every factor is defied such as the number of nodes, a global key pool in the base station, the required number of votes for a legitimate report (s), threshold of verified false votes to drop a report (Tf), etc. Before deploying sensor nodes, cluster-header node (CH) assigns keys from a partition of a global key pool and randomly distributes the keys to its normal nodes within a cluster. When a real event occurs within the cluster region, CH detects it and broadcasts its neighbors. After collecting all the votes of the neighboring nodes, the CH randomly selects the votes as s=5. The CH attaches the votes to a report noticed to the base station. The CH (d0) selects intermediate CH (di) to be a verification CH ⁄ . The report is verified in the verification CH while passing with probability intermediate CHs to detect both FRA and FVA. We will discussion phases of the report generation, verification CH selection, and en-route filtering. Figure 2.An example of PVFS. Figure 3 shows the report generation, verification CH selection, and en-route filtering phases to detect both FRA and FVA. In Figure 3-a, a cluster has a CH and five neighbors, including two compromised nodes. When a real event occurs in the cluster, CH0 collects all the votes from all its neighboring nodes, and randomly selects the votes with i=1, 2, 3, 4, as s=4. The votes, including two false votes, are attached in a report, to be transmitted to the base station. Before forwarding the report, verification CHs are decided with probability, and CH1 and CH2 get keys K. When the report arrives in CH1, the false vote2 is detected through key 2. The report is then transmitted to the next intermediate CH, due to . The report is dropped in CH2 with recognizing FRA, because the false vote4 is detected through key 4 as . On the other hand, if CH0 selects the votes with i=1, 3, 4, 5, as s=4, one vote is included in a report. After choosing 3
  • 4. International Journal of Ambient Systems and Applications (IJASA) Vol.1, No.4,December 2013 verification CHs, the report arrives in CH1. When CH1 verifies the votes of the report, CH2 sends it to CH2, after confirming vote1 and vote5. When the report arrives in CH2, it detects a false vote in the report. CH2 then transmits it to CH3 without dropping it, because of recognizing FVA. Therefore, PVFS generates reports attaching votes as s, detecting both FRA and FVA, by using the threshold value (Tf) in the sensor network. 2.2. Motivation In the sensor network, PVFS should be operated, to simultaneously detect multiple attacks, such as FRA and FVA. PVFS defines input parameters, such as the required number of votes for a legitimate report (s), before deploying the sensor nodes in the field. If an input parameter is unsuitable in the network, it causes a reduction of the network lifetime, due to unnecessary energy consumption. For example, if a high number of votes for attaching a legitimate report are defined, the report causes much energy consumption, while passing through intermediate CHs. On the other hand, if a low number of votes are defined, the probability of detecting false votes decreases in verification CHs. Thus, our proposed method considers the condition of the sensor network, and decides the number of votes for a legitimate report, based on fuzzy logic. In this paper, we define the required number of votes for attaching a legitimate report in the sensor network, based on the fuzzy system, instead of the definition of the operator. In our proposed method, a CH runs a fuzzy rule-based system, to effectively decide the required number of votes before sending a report. Therefore, our proposal improves the energy resource of each node, through the required number of votes, based on the fuzzy system. In the next section, we will further discuss our proposed method. 3. PROPOSED METHOD 3.1. Assumptions We assume the sensor nodes are fixed, after they are deployed. The sensor network is composes composed of a base station and a number of sensor nodes, e.g. the Berkeley MICAz motes [9], initial paths are established through directed diffusion [10], and minimum cost forwarding algorithms [11]. We choose the cluster-based model [1] to organize the sensor nodes. In a cluster, one node is elected to be a CH. It is further assumed that every node forwards reports into the base station along their path. A compromised node generates false reports in a path. The generated false reports are forwarded from a compromised node toward the base station, before being filtered out. 3.2. Overview Our method decides the verification CHs by using three input factors of an intermediate CH: a) the energy level, b) distance level, and c) number of detected false votes. Figure 3.The core of the proposed method. 4
  • 5. International Journal of Ambient Systems and Applications (IJASA) Vol.1, No.4,December 2013 Figure 4 shows the phase of the report generation in a CH, by applying the three input factors, after collecting votes for its neighbors. Our proposed method considers that the required number of votes for attaching a legitimate report is decided through the energy level, hops, and forwarded report count. It is important to decide the number of votes in the report, because the energy consumption and the detection of false votes are affected in intermediate CHs. Thus, the proposed method effectively detects both FRA and FVA, by using the fuzzy rule-based system to choose the required number of votes. 3.3. Fuzzy Logic in the proposed method This section discusses the factors that are used for fuzzy inference.  Energy level: This factor indicates how much energy remains in each CH. The valuespecifiesthe energy level of each CH between 1 and 100. If the value is close to 100, the energy level of the CH is full.  Hops: This factor indicates the hops count from the base station to a source CH. When the CH forwards a report, the factor influences the security level with energy consumption, through a high probability. For instance, if a CH in high hops forwards a report, the report passes through many intermediate CHs, with much energy consumption.The value specifies the hops of each CH from between 0 and 12. If this factor is small, the intermediate CH is close to the base station.  Forwarded report count: This value indicates how many real events occur, for generating reports in the sensor network. A compromised node also forwards reports to inject false information into the base station. If a specific CH generates many reports, that CH is suspicious, because many false reports may be included. The value specifies the forwarded report count between 0 and 40. If the value exceeds 40, it keeps 40. The input factors energy level (ENG), hops (HOP), andforwarded report count (FRC), to decide the required number of votes for attaching a report, by using the fuzzy rule-based system. We tune membership functions as the best rule, with lots of experimentation. The input factors of the fuzzy variables are represented as:  Energy Level (ENG) = {Insufficient (IN), Medium (MD), Sufficient (SF)}  Hops (HOP) = {Very Short (VS), Short (SH), Medium (MD), Long (LN), Very Long (VL)}  Forwarded report count (FRC) = {Low (LW), Middle (MD), High (HG)} The output factors of the fuzzy variables are represented as:  Number (NUM) = {Two (TW), Three (TR), Four (FR), Five(FV), Six (SX)} 3.4. Fuzzy Membership Functions and Rules This section discusses fuzzy membership functions and rules. 5
  • 6. International Journal of Ambient Systems and Applications (IJASA) Vol.1, No.4,December 2013 IN 1.0 0 MD 30 40 SF 60 100 Figure 4.Input factor of energy level (ENG). Figure 5 shows an input factor of energy level in a CH with three conditions: Insufficient (IN), Medium (MD), and Sufficient (SF). 1.0 SH MD LN VS 0 3 6 9 12 VL 15 18 Figure 5.Input factor of hops (HOP). Figure 6shows an input factor of hops in a CH with five conditions: Very Short (VS), Short (SH), Medium (MD), Long (LN), and Very Long (VL). 1.0 0 LW 10 MD 20 HG 30 40 Figure 6.Input factor of the forwarded reportcount (FRC). Figure 7shows an input factor of the forwarded report count in a CH with three conditions: Low (LW), Middle (MD), and High (HG). 6
  • 7. International Journal of Ambient Systems and Applications (IJASA) Vol.1, No.4,December 2013 1.0 TW TR 2 3 FR FV SX 4 5 6 Figure 7.Output factor of the number (NUM). Figure 8shows an output factor of the result for attaching votes to a report with five conditions: Two (TW), Three (TR), Four (FR), Five (FV), and Six (SX). Table 1.Fuzzy if-then rules. Input (if) Output (then) Rule No. ENG HOP FRC NUM 1 SM NR SM FV 15 SM VF LG SX 23 MD MD MD FR 31 LG NR SM TW 45 LG VF LG TH Table 1 shows representative rules that frequently occur among the fuzzy if-then rules. For example, if ERL is SM, HOP is NR, and NFR is SM, then a CH attaches five (FV) votes in a report, such as Rule 1. If ERL is SM, HOP is VF, and NFR is SM, then a CH attaches six (SX) votes in a report, due to the strong security level, such as Rule 15. If ERL is MD, HOP is MD, and NFR is MD, then a report has four (FR) votes, such as Rule 23. If ERL is LG, HOP is NR, and NFR is SM, then a report has two (TW) votes, due to the energy saving. If ERL is LG, HOP is VF, and NFR is LG, then a CH generates three votes (TH) for forwarding a report. Therefore, our proposed method dynamically decides the required number of votes in a report, to use a strong security level, and energy saving, in the entire network. 4. EXPERIMENTAL RESULTS We performed an experiment for comparison of our proposed method and PVFS. A sensor network has a base station and 500 total nodes in the simulation environment. The simulation environment is 1,000×1,000 m2, which is composed of 50 clusters, and 10 nodes in a cluster. We arranged 20 compromised nodes in clusters of 11 hops. The compromised nodes inject FRA and FVA, to consume unnecessary energy, and false votes to drop legitimate reports, in verification CHs. The size of a report is 24 bytes, and the size of a vote is 1 byte. Each node uses 16.25 µJ to transmit per byte, 12.5 µJ to receive per byte, and 15 µJ to generate a vote per byte [15]. We randomly generate 300 events in clusters, and the ratio of false reports is 20% of the events. We randomly generate 250 events in clusters, and the ratio of false reports and false votes is 20% of the events. 7
  • 8. International Journal of Ambient Systems and Applications (IJASA) Vol.1, No.4,December 2013 Figure 8.Energy consumption per hops. Figure 9 shows the energy consumption of nodes per hops in the sensor network. FRA and FVA are randomly generated, by using compromised nodes in clusters of 11 hops. Two attacks forward false reports and votes with generating 20% toward the base station. PVFS consumes much more energy resources than the proposed method, due to the fixed number of votes in a report; while our proposal forwards a report with the selected number of votes in a CH, considering the condition of the network, based on the fuzzy rules. The proposal saves unnecessary energy resources, due to the decision of the vote number. In addition, when a particular CH injects many reports, the proposed method reasons FRA, and increases the number of votes for filtering them early. Therefore, our proposal reduces needless energy, through dynamically selecting the number of votes based on the fuzzy system, more than PVFS. Figure 9. The number of filtered FRA her hops 8
  • 9. International Journal of Ambient Systems and Applications (IJASA) Vol.1, No.4,December 2013 Figure 10.The number of filtered FVA her hops. Figure 10 and Figure 11 show the number of filtered FRA and FVA per hops in the sensor network. They are generated and injected by compromised nodes of 11 hops. PVFS and the proposed method are almost similar to the number of detected votes in verification CHs. The proposed method maintains the security level of the two attacks, by using the fuzzy system, as compared to PVFS. Thus, our proposed method approximates the detection power of PFVS, with using the dynamic decision of the number. 5. CONCLUSIONS AND FUTURE WORKS In a sensor network, FRA and FVA can be generated to drain energy resources of the sensor nodes, and block the inflow of a legitimate report [16]. PVFS was proposed to detect these attacks, by verifying votes of the report in verification CHs with a probability. The required number of votes for the report is defined, before deploying the sensors. In this paper, our proposed method decides the number of votes in the report, based on a fuzzy rule-based system. Our proposal improves energy savings of the sensor nodes, while maintaining the security level of two attacks. Therefore, our proposed method effectively saves energy resources, and maintains the detection power of false votes. In addition, in future work we will apply various attacks of the sensor network, to discuss further optimal solutions. ACKNOWLEDGEMENTS This research was supported by Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education, Science and Technology (No. 2013R1A2A2A01013971). 9
  • 10. International Journal of Ambient Systems and Applications (IJASA) Vol.1, No.4,December 2013 REFERENCES [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [11] [12] [13] [14] [15] [16] Akyildiz, I.F., Weilian Su, Sankarasubramaniam, Y. and Cayirci, E., “A survey on sensor networks,” Communications Magazine IEEE, Vol. 40. 2002, pp. 102-114. Przydatek, D. Song and A. perrig, “SIA: Secure information aggregation in sensor networks,” Proc. Of CCNC, Vol. 23. 2004, pp. 63-98. Kemal A. and Mohamed Y., “A survey on routing protocols for wireless sensor networks,” Ad hoc Network. Vol. 3, May 2005, pp. 325–349. Karlof, C. and Wagner, D., "Secure routing in wireless sensor networks: attacks and countermeasures Sensor Network Protocols and Applications," 2006 8th International Conference Advanced Communication Technology (2006), Vol. 1, 2006, pp. 314-318. Xiaojiang D., and Hsiao-Hwa C, “Security in Wireless Sensor Networks” IEEE Wireless Commununications, Vol. 15, Aug. 2008, pp. 60-66. Fan Ye; Luo,H., Songwu Lu and Lixia Zhang, “Statistical en-route filtering of injected false data in sensor networks,” Selected Areas in Communications, IEEE Journal on, Vol. 23, Apr. 2005, pp. 839850. Li, Feng, Srinivasan, Avinash, Wu and Jie, "PVFS: A Probabilistic Voting-based Filtering Scheme in Wireless Sensor Networks," International Journal of Security and Network, Vol. 3, No. 3, 2008, pp. 173-182. L. A. Zadeh, “Fuzzy Logic,” 2011, http://en.wikipedia.org/wiki/Fuzzy_logic Crossbox Wireless Sensor Networks, http://www.xbox.com/ C. Intanagonwiwat, R. Govindan, D. Estrin, Directed diffusion: A scalable and robust communication paradigm for sensor networks. In Proc. of MobiCOM ’00, 2000, pp. 56-67. F. Ye, A. Chen, S. Lu, L. Zhang, A scalable solution to minimum cost forwarding in large sensor networks. Computer Communications and Networks, 2001. Proceedings. Tenth International Conference on, 2001, pp. 304-309. Kemal A. and Mohamed Y., “A survey on routing protocols for wireless sensor networks,” Ad hoc Network. Vol. 3, May 2005, pp. 325–349. Sencun Zhu, Setia, S., Jajodia, S. and PengNing, “An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks,” Security and Privacy, 2004. Proceedings. 2004 IEEE Symposium on.,May 2004, pp.259-271. Xiaojiang D., and Hsiao-Hwa C, “Security in Wireless Sensor Networks” IEEE Wireless Commununications, Vol. 15, Aug. 2008, pp. 60-66. Fan Ye, Luo,H., Songwu Lu, and Lixia Zhang, "Statistical en-route filtering of injected false data in sensor networks," Selected Areas in Communications, IEEE Journal on, Vol. 23, No. 4, 2005, pp. 839-850. H yun Woo Lee, Su Man Nam and Tae Ho Cho, "A Key Level Selection Within Hash Chains for the Efficient Energy Consumption in WSNs," International Journal of Ambient Systems and Applications (IJASA), Vol. 1, No. 3, Sep. 2013, pp. 1-14. Authors Su Man Nam received his B.S. degree in computer information from Hanseo university, Korea, in February 2009 and M.S degree in in Electrical and Computer Engineering from Sungkyunkwan University in 2013, respectively. He is currently a doctoral student in the College of Information and Communication Engineering at Sungkyunkwan University, Korea. His research interests include wireless sensor network, security in wireless sensor networks, and modelling & simulation. Tae Ho Choreceived the Ph.D. degree in Electrical and Computer Engineering from the University of Arizona, USA, in 1993, and the B.S. and M.S. degrees in Electrical Engineering from Sungkyunkwan University, Republic of Korea, and the University of Alabama, USA, respectively. He is currently a Professor in the College of Information and Communication Engineering, Sungkyunkwan University, Korea. His research interests are in the areas of wireless sensor network, intelligent systems, modeling & simulation, and enterprise resource planning. 10