SlideShare a Scribd company logo
International Journal on Information Theory (IJIT),Vol.4, No.2, April 2015
DOI : 10.5121/ijit.2015.4202 9
ENERGY-EFFICIENT PATH CONFIGURATION
METHOD FOR DEF IN WSNS
Jae Kwon Lee1
, Su Man Nam2
and Tae Ho Cho3
1, 2, 3
School of Information and Communication Engineering Sungkyunkwan University, Su-
won, 440-476, Republic of Korea
ABSTRACT
In wireless sensor networks (WSNs), sensor nodes have stringent energy and computation requirements.
Since they are left unattended, an adversary can generate false report attacks through compromised nodes.
This would result in an increased number of verifications to filter these reports, causing waste of scarce
energy resources. In this paper, we propose energy-efficient path configuration method for dynamic en-
route filtering (EDEF), which uses fuzzy logic to select the forwarding node(s). In order to cater to
compromised nodes and to detect and filter the false reports, we create alternative paths. Our proposed
method selects forwarding nodes based on the key content of neighbor nodes, the number of neighbor
nodes, and the residual energy. Auth-keys are distributed randomly from the global key pool. Simulation
results demonstrate the effectiveness of our proposed method with up to 8.2% energy efficiency as
compared to the dynamic en-route filtering (DEF) scheme.
KEYWORDS
Sensor network, en-route filtering, false report attack, fuzzy logic, detection power, next-hop, energy-
efficiency
1. INTRODUCTION
Wireless sensor networks (WSNs) are being used in numerous applications to carry out tasks
without human intervention [1]. However, WSNs suffer energy and computation limitations and
are left unattended for longer periods of time [2, 3]. Sensor nodes can be compromised and used
by an adversary to generate false report attacks. These false report attacks would result in an
increased number of verifications to filter these reports, thereby causing a reduced network-
lifetime [4]. The dynamic en-route filtering (DEF) was proposed by Yu et al. to defend a false
report injection attack [5]. Various schemes as the statistical en-route filtering (SEF),
commutative cipher based en-route filtering (CCEF) and probabilistic voting-based filtering
(PVFS) as well as the DEF were proposed for the same purpose [6-15]. However, the DEF is
capable of performing best in a dynamic network.
The DEF is basically configured as a cluster-based network. The DEF is divided into three major
phases: key pre-distribution, key dissemination, and report forwarding. The key pre-distribution
phase is executed when the sensor network is first set up. The key dissemination phase is
executed whenever the network topology is changed. The report forwarding phase is executed
whenever a report is generated by a cluster-head (CH). The DEF verifies the validity of a report
using a message authentication code (MAC). To select the next-hop forwarding node, the DEF
does not specify the selection criteria which can be changed by applications. In the proposed
method, we use the key content of neighbor nodes, the number of neighbor nodes, and the
residual energy as criteria for the selection of forwarding nodes. The major contributions of our
scheme are as follows:
International Journal on Information Theory (IJIT),Vol.4, No.2, April 2015
10
• Early false report detection power
• Considerable energy improvement over the original scheme
• Fuzzy logic for evaluation of the next-hop
In this paper, in order to use next-hop forwarding nodes, we use the above selection criteria with
fuzzy logic in our implementation. Whenever the network topology changes, criteria for the
selection of forwarding nodes is applied at the key distribution phase. The parameters of the fuzzy
input are as follows: the node with multiple keys, the number of neighbor nodes, and the residual
energy. We determine the next-hop forwarding node through these input values. Any time the
topology of a network is changed, the energy-efficient path configuration method for DEF
(EDEF) executes the key dissemination phase, similar to the DEF for a dynamic network.
Whenever the key dissemination phase is performed, the next-hop node is selected through fuzzy
logic in the EDEF.
The EDEF was organized as a cluster-based sensor network similar to DEF. The cluster-based
network can avoid redundant data transmission [16, 17]. A base station (BS) calculates a fuzzy
value for each node since the sensor network information is handled by the BS. Each CH
determines the forwarding node through the fuzzy values of the neighbor nodes. Using this
information, we demonstrate the EDEF, which results in greater energy efficiency and detection
power in comparison with the DEF.
This paper is organized as follows: in a section 2, we describe the original DEF in detail. In
section 3, we explain the motivation, overview, and the proposed EDEF in detail. Section 4
discusses assumptions and the performance comparison; and the conclusion is given at the end of
the paper.
2. BACKGROUND
In this section, we present related background work.
2.1. Dynamic En-route Filtering Scheme
The DEF was proposed by Yu et al. to defend the false report injection attack in WSNs. The DEF
is composed of a cluster, as in Figure 1, where the nodes v1 ~ v4 represent a sensor node in the
cluster, and a black dot (v3) represents a compromised node. Basically, a CH aggregates the
detected reports of all nodes. The CH then generates a message to forward to the BS. Finally, the
CH sends the message to the BS. Any can be compromised node, including the CH. Additionally,
all nodes can be a forwarding node on a path of the BS.
Figure 1. A simple figure of the DEF
DEF is briefly divided into three phases (key pre-distribution, key dissemination, and report
forwarding) as shown in Figure 2. First, the network is configured and then a key is pre-
International Journal on Information Theory (IJIT),Vol.4, No.2, April 2015
11
distributed. The key pre-distribution phase is executed once when the network is first configured.
Following this, the key dissemination phase of a key distribution occurs, which executes the
report forwarding phase. The key dissemination phase would then be executed again based on the
fixed period that is determined at the cluster. The report forwarding phase could be executed at
every round at the each forwarding node.
Figure 2. Three phases of the DEF
Figure 3. Key deployment of each node
Figure 3 shows that node v_i was loaded with the keys in the key pre-distribution phase. Here, the
auth-key chain is generated using the seed key and a hash function. This auth-key is then the first
of the auth-key chain. The y-key would then be randomly selected as a fixed number in the global
key pool. The z-key is then randomly selected as one key of the global key pool; this key is not
duplicated with any other keys. The auth-keys of the node in a cluster are aggregated with the CH
to generate the message, K(n), as in Figure 4. Then the CH sends the message to q number of
forwarding nodes. In the report forwarding phase, a report is aggregated from a node of the
cluster as in the key dissemination phase, and then the CH sends an aggregating message to the
BS. In the DEF, the report is verified with the MAC. This MAC is generated using the event and
auth-key in each node. The DEF re-executes the key dissemination phase and the report
forwarding phase according to a fixed rule.
International Journal on Information Theory (IJIT),Vol.4, No.2, April 2015
12
Figure 4. Auth-key is sent to the forwarding node.
The report forwarding phase is newly executed by the forwarding node whenever an event is
generated. The report forwarding phase is executed to forward a newly generated event in report
format to the BS. The key dissemination phase is re-executed for key re-dissemination in case of
network topology changes as such changes can change the nodes of the cluster. It is then
necessary to re-disseminate the node information over the changed cluster. Therefore, the key
dissemination phase can be re-executed.
3. PROPOSED METHOD
3.1. Motivation
When we select the next forwarding node, the DEF does not specify some factors because,
according to various applications, the determining factors may be different. The DEF selects the
next node by combining factors such as the available of energy, the link quality, the speed of
energy consumption, and so on. The DEF does not consider the energy-efficiency of the
forwarding node. The network, therefore, can easily consume the energy of the node. Energy
depletion of a node produces a decrease in the network-lifetime. We evaluated the selection of a
forwarding node using fuzzy logic; this scheme shows efficiency up to 5% [18]. However, we
decide that the 5% efficiency is a weak influence. Hence, we changed to new factors and
evaluated these factors. According to this, we can have more efficient than before factor through
new factors.
3.2. Overview
When determining the next forwarding node in the DEF, we select the next node using the fuzzy
logic from the proposed EDEF. We used three input factors in fuzzy logic: 1) key content, 2) the
number of neighbor nodes, and 3) the residual energy of each candidate node. We can calculate
the result using these three input factors. We then determine the next node based on the result. If
the report reaches the BS in every round, the BS calculates the result of the nodes in the entire
network using fuzzy logic. A CH then determines the next forwarding node on a path to the BS.
We can foresee an increase in the efficiency between the EDEF and the DEF through the
Travelled hop count of the false reports.
3.3. Proposed method
The EDEF uses fuzzy logic in the dissemination phase of the DEF. This is more effective for
extending the network-lifetime. The EDEF has three input factors for the fuzzy logic. The three
input factors are as follows: 1) the key content (KN), 2) the number of neighbor node (NN), and
3) the residual energy (RE) of each contender. When we select the next forwarding node, we use
International Journal on Information Theory (IJIT),Vol.4, No.2, April 2015
13
the result from the above three factors. Each input factor is divided into three detailed phases,
allowing 27 different possible results (=3×3×3). We can select the optimum forwarding node
based on 27 different results. The auth-key is disseminated to multiple paths because of the
possibility of 1) data loss, 2) verification, or 3) dynamic topology. The DEF pre-determines the
number of forwarding nodes as „q‟. The DEF then selects q as the forwarding node. In case of 'q
= 2,' two forwarding nodes are selected at the BS. When the q possible forwarding nodes are
selected, the final forwarding node is chosen using fuzzy logic. Fuzzy rule-based system has been
used to approximate reasoning for an imprecision of a data or an uncertainty in reasoning
processes [19].
3.3.1. Further Subsections
The input factor for fuzzy logic and the resulting value are as follows:
KN= {LITTLE, MEDIUM, FULL}
NN= {FEW, MIDDLE, CROWDED}
RE= {LOW, MEDIUM, ENOUGH}
R= {VERY BAD, BAD, NORMAL, GOOD, VERY GOOD}
Each input value is divided into three phases (as shown above), and the resulting value is divided
into five parts. Details of the input factors that are used for the fuzzy logic are as follow.
 The key content of node To begin with, the following is the reason for the key content of
node. When a key is disseminated in the DEF, a CH aggregates the keys belonging to each
node, and forwards the aggregate to the node on a path in a fixed hop count. We use these
keys to verify the forwarded report. At this time, if the node was received in duplicate, the
node has multiple keys that are compared with the others. A node with many keys means that
it can be used in multiple clusters. According to this, when the DEF sends a report, the node
with many keys is more efficient than the others.
 The number of neighbor nodes The number of neighbor nodes is selected as the next input
factor so that the message can be delivered to the zones of many candidate nodes. In order to
broaden the selection range, the zones of many candidate nodes are selected. If there are few
candidate nodes, then the selection pool is reduced. Therefore, we broaden the selection
range, in order to obtain a more efficient node.
 The residual energy In the end, the residual energy is the current usable energy of a
candidate node and is an input factor. When a node with less energy is compared with a node
with a lot of energy, if the node with less energy is selected, the entire network-lifetime is
quickly shortened. According to this, if we select the node with a lot of energy, it can sustain
the network-lifetime. Selecting the node with a lot of energy can then steadily consume the
energy of the whole network. Accordingly, we select it as an input factor for the fuzzy logic.
Figure 5 presents a process in which a CH selects the q forwarding node through a fuzzy rule-
based system. When the q is determined to be '2,' as in the figure, it receives the respective KN,
NN, and RE values of u_1,u_2,〖 and u〗 _3; it then selects a node based on the two highest
ranking results.
International Journal on Information Theory (IJIT),Vol.4, No.2, April 2015
14
Figure 5. Fuzzy rule-based system for node selection
A fuzzy computation is computed at a BS; the BS has information for all nodes. The BS
determines that each CH selects a node using the fuzzy rule-based system. This is re-computed
every cycle in order to forward a message.
Figure 6 presents the membership function of the fuzzy input values and result values.
Figure 6. Fuzzy membership function of input values and the result values.
International Journal on Information Theory (IJIT),Vol.4, No.2, April 2015
15
Some of the rules are shown below.
Table 1. Some of the fuzzy rules.
R1 : IF KN IS LITTLE R5 : IF KN IS LITTLE
AND NN IS FEW AND NN IS FEW
AND RE IS LOW AND RE IS HIGH
THEN R IS VERY BAD THEN R IS BAD
R2 : IF KN IS LITTLE R6 : IF KN IS FULL
AND NN IS MIDDLE AND NN IS MIDDLE
AND RE IS LOW AND RE IS MEDIUM
THEN R IS VERY BAD THEN R IS GOOD
R3 : IF KN IS LITTLE R7 : IF KN IS FULL
AND NN IS CROWDED AND NN IS MEDIUM
AND RE IS LOW AND RE IS LOW
THEN R IS BAD THEN R IS NORMAL
R4 : IF KN IS LITTLE R8 : IF KN IS FULL
AND NN IS FEW AND NN IS MIDDLE
AND RE IS MEDIUM AND RE IS ENOUGH
THEN R IS VERY BAD THEN R IS VERY
GOOD
3.3.2. The base data for the EDEF
Figure 7. Average of the Travelled hop count for 'q=3'
Figure 7 shows an average of the Travelled hop count for „q = 3‟ according to the attack ratio. It
is expected that the EDEF can detect a false report earlier than the original DEF. Therefore, we
experimented further and obtained the following results.
International Journal on Information Theory (IJIT),Vol.4, No.2, April 2015
16
Figure 8. Difference in the total Travelled hops between the EDEF and the DEF.
Figure 9. A filtered report ratio
Figure 8 shows the Travelled hop count without filtering a false report. The following is the
Travelled hop count equation. The hop count is the difference between the value of the Travelled
hop count without filtering using a DEF and the value of the Travelled hop count without filtering
using the proposed method.
Total Travelled hops = Travelled hops in the DEF – Travelled hops in the proposed method
Additionally, Figure 9 presents a graph of the EDEF efficiency against the DEF. As shown in the
figure, greater efficiency is seen with increases in 'q'. According to Figure 8 and 9, the proposed
method is faster than the existing method. Accordingly, we progressed to more detailed
experiments; in the following section, we verify the energy consumption efficiency compared
with the DEF.
4. PERFORMANCE EVALUATION
In this section, we will present the energy-efficiency of the EDEF in comparison with the original
DEF under same environmental setup.
International Journal on Information Theory (IJIT),Vol.4, No.2, April 2015
17
4.1. Experiment setup
We assume that the BS has information of all nodes in the sensor network. Every CH has the
information about the key content, the number of neighbor nodes, and the residual energy of all
nodes in its cluster.
 The sensor field size is 200 x 200 (m2), and the total number of nodes are 1000, consisting of
100 clusters which are randomly distributed where each cluster consists of 10 nodes.
 Each node picks l = 2 y-keys and one z-key, where the size of the y-key and z-key pool
consists of 1000 keys.
 Each node forwards the message K(n) to q selected downstream neighbor nodes, until K(n)
reaches to the BS or has been forwarded by hmax hop. Here, hmax = 10. Hence, we adopted
Hill Climbing method [20] to forwards the message K(n).
 Each aggregated report contains 10 MACs, and there are at most 10 compromised nodes in
each cluster.
 The size of a message is 36 bytes, and 16.25/12.5μJ is consumed for transmitting/receiving a
byte [8].
 Each node has fuzzy result values which are calculated by the BS. The BS then broadcasts
the q and fuzzy result of each node to entire network through authenticated broadcast (e.g.,
using μTESLA [21])
 To simulate a dynamic network, we apply a simple ON/OFF operation node, where each
node is typically switched to ON or OFF mode.
 The DEF and the EDEF adopted a GPSR routing protocol.
4.1. Experiment results
In the above assumption, the announced sensor field size and total number of nodes are the same,
and a CH generates 100 reports during each cycle. Each key pool has 1000 keys. The experiment
was performed with an increasing ratio of false reports and a changing q value. The figure below
shows the efficiency of the proposed method compared with DEF according to the attack ratio.
Figure 10. Total energy efficiency of each „q.‟
International Journal on Information Theory (IJIT),Vol.4, No.2, April 2015
18
The figure above shows the energy-efficiency for each „q‟ against the DEF. Each q shown has
efficiency between 4.84% and 6.12%. The greater the number of q or the more complex the
sensor network, the greater is the efficiency. The reason why the efficiency increases as q
increases is because a large, q has a larger number of cases. Therefore, this demonstrates that
selection using the fuzzy system is more efficient than the DEF.
Figure 11. Energy efficiency versus the attack ratio.
By measuring the value for each q, the results show that greater the value of q, the greater the
efficiency as compared to the DEF. An increasing value of q means that more messages are
created to send to the next forwarding nodes. As can be seen in the above figure, when the value
of q is 5, the efficiency is greater than 8%. The attack rate of the 100 generated reports is the ratio
of false reports. The efficiency ratio of false reports of enemy all the time and when there are
many showed similar performance. However, they showed a difference in the 30% to 70%
section. In fact, a false report injection attack cannot occupy the whole message. The results are
confirmed because they were generated for the above experiment. However, the experiment does
not include the number of cases in a real sensor network. However, if the number of q is changed
according to the environment of the DEF, the proposed method showed greater efficiency through
the above experiment.
The figure above compares the efficiency of the proposed method with the DEF with regard to
the total number of filtered false reports in one hop. This graph compares the number of filtered
reports within one hop in the proposed method with that in the DEF. The figure above shows a
slightly more efficient detection for the proposed method compared with the DEF.
5. CONCLUSIONS
In this study, the aim was to increase energy-efficiency with increased detection power by
considering alternative paths. We have presented EDEF, a fuzzy-based next-hop selection
scheme. In order to select the forwarding nodes in next-hop and to distribute keys, we use fuzzy
logic. Our method can detect more false reports as compared to the DEF scheme. By detecting the
false reports early, our method demonstrated considerable energy improvement without
compromising the security of the original scheme.
International Journal on Information Theory (IJIT),Vol.4, No.2, April 2015
19
In conclusion, the EDEF has excellent detection power compared with the DEF and improves the
energy efficiency in order to sustain the network-lifetime for a long time. In the future, we can
further enhance the performance through a simulation with suitable fuzzy function values.
ACKNOWLEDGEMENTS
This research was supported by Basic Science Research Program through the National Research
Foundation of Korea (NRF) funded by the Ministry of Education, Science and Technology (No.
2013R1A2A2A01013971)
REFERENCES
[1] I. F. Akyildiz, Weilian Su, Y. Sankarasubramaniam, & E. Cayirci, (2002) "A survey on sensor
networks," Communications Magazine, IEEE, Vol.40, No.8, pp.102-114.
[2] Jing Deng, R. Han, and S. Mishra, (2005) "Countermeasures against traffic analysis attacks in
wireless sensor networks," Security and Privacy for Emerging Areas in Communications Networks,
pp.113-126.
[3] Moog Inc., "MICAz data sheet," Moog Crossbow, http://www.xbow.com.
[4] C. Karlof and D. Wagner, (2003)"Secure routing in wireless sensor networks: Attacks and
countermeasures," Sensor Network Protocols and Applications, 2003. Proceedings of the First IEEE.
2003 IEEE International Workshop on, pp.113-127.
[5] Zhen Yu and Y. Guan, (2010) "A dynamic en-route filtering scheme for data reporting in wireless
sensor networks," Networking, IEEE/ACM Transactions on, Vol.18, No.1, pp.150-163.
[6] Hao Yang and Songwu Lu, "Commutative cipher based en-route filtering in wireless sensor
networks," Vehicular Technology Conference, 2004. VTC2004-Fall. 2004 IEEE 60th, pp.1223-1227.
[7] Feng Li, Avinash Srinivasan, and Jie Wu, (2008) "PVFS: A probabilistic voting-based filtering
scheme in wireless sensor networks," International Journal of Security and Networks, Vol.3, No.3,
pp.173-182.
[8] Fan Ye, Haiyun Luo, Songwu Lu, and Lixia Zhang, "Statistical en-route filtering of injected false data
in sensor networks," Selected Areas in Communications, IEEE Journal on, Vol.23, No.4, pp.839-850.
[9] Jianzhong Li, Lei Yu, Hong Gao, and Shuguang Xiong, "Grouping-enhanced resilient probabilistic
en-route filtering of injected false data in WSNs," Parallel and Distributed Systems, IEEE
Transactions on, Vol.23, No.5, pp.881-889.
[10] T. P. Nghiem, Sang Jin Lee, and Tae Ho Cho, (2009) "An energy-aware fuzzy-based en-route filtering
scheme in wireless sensor networks," Future Networks, 2009 International Conference on, pp.28-32.
[11] A. S. Uluagac, R. A. Beyah, and J. A. Copeland, (2010) "Time-based DynamiC keying and en-route
filtering (TICK) for wireless sensor networks," Global Telecommunications Conference
(GLOBECOM 2010), 2010 IEEE, pp.1-6.
[12] Wensheng Zhang and Guohong Cao, (2005) "Group rekeying for filtering false data in sensor
networks: A predistribution and local collaboration-based approach," INFOCOM 2005. 24th Annual
Joint Conference of the IEEE Computer and Communications Societies. Proceedings IEEE, pp.503-
514 vol. 1.
[13] Hae Young Lee and Tae Ho Cho, (2006) "Key inheritance-based false data filtering scheme in
wireless sensor networks," Distributed Computing and Internet Technology, Lecture Notes in
Computer Science, vol.4317, pp.116-127.
[14] Hae Young Lee and Tae Ho Cho, (2008) "Fuzzy logic based key disseminating in ubiquitous sensor
networks," Advanced Communication Technology, 2008. ICACT 2008. 10th International Conference
on, pp.958-962.
International Journal on Information Theory (IJIT),Vol.4, No.2, April 2015
20
[15] Ting Yuan, Shiyong Zhang, Yi-ping Zhong, and Jianqing Ma, (2008) "KAEF: An en-route scheme of
filtering false data in wireless sensor networks," Performance, Computing and Communications
Conference, 2008. IPCCC 2008. IEEE International, pp.193-200.
[16] J. N. Al-Karaki and A. E. Kamal, (2004) "Routing techniques in wireless sensor networks: A survey,"
Wireless Communications, IEEE, vol.11, no.6, pp.6-28.
[17] K. Akkaya and M. Younis, (2005) "A survey on routing protocols for wireless sensor networks," Ad
Hoc Networks, vol.3, no.3, pp.325-349, 5.
[18] Jae Kwon Lee and Tae Ho Cho, (2012) "Selecting next hop nodes for energy efficiency in dynamic
filtering based WSNs using fuzzy system," Information Science and Digital Content Technology
(ICIDT), 2012 8th International Conference on, pp.674-677.
[19] H. S. N. Serrano, (2007) "Landing site selection using fuzzy rule-based reasoning," Proc. ICRA,
pp.4899-4904.
[20] D.B. Skalak, (1994) "Prototype and feature selection by sampling and random mutation hill climbing
algorithms," In Proc. of Eleventh International Machine Learning, pp.293-301, 1994.
[21] Adrian Perrig, Robert Szewczyk, J. D. Tygar, Victor Wen, and David E. Culler, (2002) "SPINS:
Security protocols for sensor networks," Wireless Networks, Vol.8, No.5, pp.521-534.
[22] Lee, S.hyun. & Kim Mi Na, (2008) “This is my paper”, ABC Transactions on ECE, Vol. 10, No. 5,
pp120-122.
[23] Gizem, Aksahya & Ayese, Ozcan (2009) Coomunications & Networks, Network Books, ABC
Publishers.
Authors
Jae Kwon Lee received his B.S. degree in Computer Software Engineering from the
Kumoh National Institute of Technology, Republic of Korea, in 2012, M.S degrees in
Electrical and Computer Engineering from Sungkyunkwan University in 2014,
respectively. His research interests are in the areas of wireless sensor network,
intelligent systems, modelling & simulation, and enterprise resource planning.
Su Man Nam received his B.S. degrees in computer information from Hanseo
University, Korea, in February 2009 and M.S degrees in Electrical and Computer
Engineering from Sungkyunkwan University in 2013, respectively. He is currently a
doctoral student in the College of Information and Communication Engineering at
Sungkyunkwan University, Korea. His research interests include wireless sensor
network, security in wireless sensor networks, and modelling & simulation.
Tae Ho Cho received the Ph.D. degree in Electrical and Computer Engineering from
the University of Arizona, USA, in 1993, and the B.S. and M.S. degrees in Electrical
Engineering from Sungkyunkwan University, Republic of Korea, and the University of
Alabama, USA, respectively. He is currently a Professor in the College of Information
and Communication Engineering, Sungkyunkwan University, Korea. His research
interests are in the areas of wireless sensor network, intelligent systems, modeling &
simulation, and enterprise resource planning.

More Related Content

What's hot

Analysis of data transmission in wireless lan for 802.11 e2 et
Analysis of data transmission in wireless lan for 802.11 e2 etAnalysis of data transmission in wireless lan for 802.11 e2 et
Analysis of data transmission in wireless lan for 802.11 e2 et
eSAT Journals
 
Analysis of data transmission in wireless lan for 802.11
Analysis of data transmission in wireless lan for 802.11Analysis of data transmission in wireless lan for 802.11
Analysis of data transmission in wireless lan for 802.11
eSAT Publishing House
 
Transmission Time and Throughput analysis of EEE LEACH, LEACH and Direct Tran...
Transmission Time and Throughput analysis of EEE LEACH, LEACH and Direct Tran...Transmission Time and Throughput analysis of EEE LEACH, LEACH and Direct Tran...
Transmission Time and Throughput analysis of EEE LEACH, LEACH and Direct Tran...
acijjournal
 
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
ijwmn
 
Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2
Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2
Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2
csandit
 
Optimal scheduling algorithm for throughput maximization in multihop wireless...
Optimal scheduling algorithm for throughput maximization in multihop wireless...Optimal scheduling algorithm for throughput maximization in multihop wireless...
Optimal scheduling algorithm for throughput maximization in multihop wireless...
eSAT Publishing House
 
Data link control notes
Data link control notesData link control notes
Data link control notes
invertis university
 
Wireless sensor network -a zone based approach
Wireless sensor network -a zone based approachWireless sensor network -a zone based approach
Wireless sensor network -a zone based approach
Shubhi Singh chauhan
 
Performance Analysis of Clustering Protocols for Wireless Sensor Network
Performance Analysis of Clustering Protocols for Wireless Sensor NetworkPerformance Analysis of Clustering Protocols for Wireless Sensor Network
Performance Analysis of Clustering Protocols for Wireless Sensor Network
IRJET Journal
 
Physical layer network coding
Physical layer network codingPhysical layer network coding
Physical layer network coding
Nguyen Tan
 
Performance Analysis of Clustering Protocols for Wireless Sensor Network
Performance Analysis of Clustering Protocols for Wireless Sensor NetworkPerformance Analysis of Clustering Protocols for Wireless Sensor Network
Performance Analysis of Clustering Protocols for Wireless Sensor Network
IRJET Journal
 
Et3003 sem2-1314-7 network layers iv (ipv4)
Et3003 sem2-1314-7 network layers iv (ipv4)Et3003 sem2-1314-7 network layers iv (ipv4)
Et3003 sem2-1314-7 network layers iv (ipv4)
Tutun Juhana
 
Towards energy efficient big data gathering
Towards energy efficient big data gatheringTowards energy efficient big data gathering
Towards energy efficient big data gathering
Finalyear Projects
 
Routing protocols of wsn
Routing protocols of wsnRouting protocols of wsn
Routing protocols of wsn
Ayman Adel
 
Path loss exponent estimation
Path loss exponent estimationPath loss exponent estimation
Path loss exponent estimation
Nguyen Minh Thu
 
The Extended Clustering Ad Hoc Routing Protocol (Ecrp)
The Extended Clustering Ad Hoc Routing Protocol (Ecrp)The Extended Clustering Ad Hoc Routing Protocol (Ecrp)
The Extended Clustering Ad Hoc Routing Protocol (Ecrp)
IJCNCJournal
 
Computer Communication Networks-Network Layer
Computer Communication Networks-Network LayerComputer Communication Networks-Network Layer
Computer Communication Networks-Network Layer
Krishna Nanda
 
Network coding
Network codingNetwork coding
Network coding
Hạt Giống Nhập
 
G1063841
G1063841G1063841
G1063841
IJERD Editor
 

What's hot (19)

Analysis of data transmission in wireless lan for 802.11 e2 et
Analysis of data transmission in wireless lan for 802.11 e2 etAnalysis of data transmission in wireless lan for 802.11 e2 et
Analysis of data transmission in wireless lan for 802.11 e2 et
 
Analysis of data transmission in wireless lan for 802.11
Analysis of data transmission in wireless lan for 802.11Analysis of data transmission in wireless lan for 802.11
Analysis of data transmission in wireless lan for 802.11
 
Transmission Time and Throughput analysis of EEE LEACH, LEACH and Direct Tran...
Transmission Time and Throughput analysis of EEE LEACH, LEACH and Direct Tran...Transmission Time and Throughput analysis of EEE LEACH, LEACH and Direct Tran...
Transmission Time and Throughput analysis of EEE LEACH, LEACH and Direct Tran...
 
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
 
Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2
Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2
Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2
 
Optimal scheduling algorithm for throughput maximization in multihop wireless...
Optimal scheduling algorithm for throughput maximization in multihop wireless...Optimal scheduling algorithm for throughput maximization in multihop wireless...
Optimal scheduling algorithm for throughput maximization in multihop wireless...
 
Data link control notes
Data link control notesData link control notes
Data link control notes
 
Wireless sensor network -a zone based approach
Wireless sensor network -a zone based approachWireless sensor network -a zone based approach
Wireless sensor network -a zone based approach
 
Performance Analysis of Clustering Protocols for Wireless Sensor Network
Performance Analysis of Clustering Protocols for Wireless Sensor NetworkPerformance Analysis of Clustering Protocols for Wireless Sensor Network
Performance Analysis of Clustering Protocols for Wireless Sensor Network
 
Physical layer network coding
Physical layer network codingPhysical layer network coding
Physical layer network coding
 
Performance Analysis of Clustering Protocols for Wireless Sensor Network
Performance Analysis of Clustering Protocols for Wireless Sensor NetworkPerformance Analysis of Clustering Protocols for Wireless Sensor Network
Performance Analysis of Clustering Protocols for Wireless Sensor Network
 
Et3003 sem2-1314-7 network layers iv (ipv4)
Et3003 sem2-1314-7 network layers iv (ipv4)Et3003 sem2-1314-7 network layers iv (ipv4)
Et3003 sem2-1314-7 network layers iv (ipv4)
 
Towards energy efficient big data gathering
Towards energy efficient big data gatheringTowards energy efficient big data gathering
Towards energy efficient big data gathering
 
Routing protocols of wsn
Routing protocols of wsnRouting protocols of wsn
Routing protocols of wsn
 
Path loss exponent estimation
Path loss exponent estimationPath loss exponent estimation
Path loss exponent estimation
 
The Extended Clustering Ad Hoc Routing Protocol (Ecrp)
The Extended Clustering Ad Hoc Routing Protocol (Ecrp)The Extended Clustering Ad Hoc Routing Protocol (Ecrp)
The Extended Clustering Ad Hoc Routing Protocol (Ecrp)
 
Computer Communication Networks-Network Layer
Computer Communication Networks-Network LayerComputer Communication Networks-Network Layer
Computer Communication Networks-Network Layer
 
Network coding
Network codingNetwork coding
Network coding
 
G1063841
G1063841G1063841
G1063841
 

Viewers also liked

Games, apps and tools to raise awareness on OSH
Games, apps and tools to raise awareness on OSHGames, apps and tools to raise awareness on OSH
Games, apps and tools to raise awareness on OSH
State Labour Inspectorate
 
перпендикулярные прямые 6 класс
перпендикулярные прямые 6 классперпендикулярные прямые 6 класс
перпендикулярные прямые 6 класс
Germaliona
 
Kekeletso Khanye's CV
Kekeletso Khanye's CVKekeletso Khanye's CV
Kekeletso Khanye's CV
Kekeletso.P.M. Khanye
 
A High Step Up Hybrid Switch Converter Connected With PV Array For High Volt...
A High Step Up Hybrid Switch Converter  Connected With PV Array For High Volt...A High Step Up Hybrid Switch Converter  Connected With PV Array For High Volt...
A High Step Up Hybrid Switch Converter Connected With PV Array For High Volt...
ijitjournal
 
Top 8 site clerk resume samples
Top 8 site clerk resume samplesTop 8 site clerk resume samples
Top 8 site clerk resume samples
martinwilson397
 
Top 8 operations clerk resume samples
Top 8 operations clerk resume samplesTop 8 operations clerk resume samples
Top 8 operations clerk resume samples
martinwilson397
 
Aviones de combate
Aviones de combateAviones de combate
Aviones de combate
tecnopro
 
Entropy Nucleus a nd Use i n Waste Disposal Policies
Entropy Nucleus  a nd Use  i n Waste Disposal  PoliciesEntropy Nucleus  a nd Use  i n Waste Disposal  Policies
Entropy Nucleus a nd Use i n Waste Disposal Policies
ijitjournal
 
Presentatie Sioux (Vincent Ariëns)
Presentatie Sioux (Vincent Ariëns)Presentatie Sioux (Vincent Ariëns)
Presentatie Sioux (Vincent Ariëns)
Seats2meetcom
 
Lehendakariaren hitzaldia - Enpresa Ramondin egindako bisita: 125 urteurrena
Lehendakariaren hitzaldia - Enpresa Ramondin egindako bisita: 125 urteurrena Lehendakariaren hitzaldia - Enpresa Ramondin egindako bisita: 125 urteurrena
Lehendakariaren hitzaldia - Enpresa Ramondin egindako bisita: 125 urteurrena
Irekia - EJGV
 
Top 8 stores clerk resume samples
Top 8 stores clerk resume samplesTop 8 stores clerk resume samples
Top 8 stores clerk resume samples
martinwilson397
 
Top 8 utility clerk resume samples
Top 8 utility clerk resume samplesTop 8 utility clerk resume samples
Top 8 utility clerk resume samples
martinwilson397
 
Top 8 junior clerk resume samples
Top 8 junior clerk resume samplesTop 8 junior clerk resume samples
Top 8 junior clerk resume samples
martinwilson397
 
Un poco de historia del geomagnetismo
Un poco de historia del geomagnetismoUn poco de historia del geomagnetismo
Un poco de historia del geomagnetismo
espedelos
 
Presentation..health and medicine sick role
Presentation..health and medicine sick rolePresentation..health and medicine sick role
Presentation..health and medicine sick role
Noshoo
 
Book - Reinventing you written by Dorie Clark
Book - Reinventing you written by Dorie ClarkBook - Reinventing you written by Dorie Clark
Book - Reinventing you written by Dorie Clark
Mastermind Training & Consultancy Services Pvt Ltd
 

Viewers also liked (16)

Games, apps and tools to raise awareness on OSH
Games, apps and tools to raise awareness on OSHGames, apps and tools to raise awareness on OSH
Games, apps and tools to raise awareness on OSH
 
перпендикулярные прямые 6 класс
перпендикулярные прямые 6 классперпендикулярные прямые 6 класс
перпендикулярные прямые 6 класс
 
Kekeletso Khanye's CV
Kekeletso Khanye's CVKekeletso Khanye's CV
Kekeletso Khanye's CV
 
A High Step Up Hybrid Switch Converter Connected With PV Array For High Volt...
A High Step Up Hybrid Switch Converter  Connected With PV Array For High Volt...A High Step Up Hybrid Switch Converter  Connected With PV Array For High Volt...
A High Step Up Hybrid Switch Converter Connected With PV Array For High Volt...
 
Top 8 site clerk resume samples
Top 8 site clerk resume samplesTop 8 site clerk resume samples
Top 8 site clerk resume samples
 
Top 8 operations clerk resume samples
Top 8 operations clerk resume samplesTop 8 operations clerk resume samples
Top 8 operations clerk resume samples
 
Aviones de combate
Aviones de combateAviones de combate
Aviones de combate
 
Entropy Nucleus a nd Use i n Waste Disposal Policies
Entropy Nucleus  a nd Use  i n Waste Disposal  PoliciesEntropy Nucleus  a nd Use  i n Waste Disposal  Policies
Entropy Nucleus a nd Use i n Waste Disposal Policies
 
Presentatie Sioux (Vincent Ariëns)
Presentatie Sioux (Vincent Ariëns)Presentatie Sioux (Vincent Ariëns)
Presentatie Sioux (Vincent Ariëns)
 
Lehendakariaren hitzaldia - Enpresa Ramondin egindako bisita: 125 urteurrena
Lehendakariaren hitzaldia - Enpresa Ramondin egindako bisita: 125 urteurrena Lehendakariaren hitzaldia - Enpresa Ramondin egindako bisita: 125 urteurrena
Lehendakariaren hitzaldia - Enpresa Ramondin egindako bisita: 125 urteurrena
 
Top 8 stores clerk resume samples
Top 8 stores clerk resume samplesTop 8 stores clerk resume samples
Top 8 stores clerk resume samples
 
Top 8 utility clerk resume samples
Top 8 utility clerk resume samplesTop 8 utility clerk resume samples
Top 8 utility clerk resume samples
 
Top 8 junior clerk resume samples
Top 8 junior clerk resume samplesTop 8 junior clerk resume samples
Top 8 junior clerk resume samples
 
Un poco de historia del geomagnetismo
Un poco de historia del geomagnetismoUn poco de historia del geomagnetismo
Un poco de historia del geomagnetismo
 
Presentation..health and medicine sick role
Presentation..health and medicine sick rolePresentation..health and medicine sick role
Presentation..health and medicine sick role
 
Book - Reinventing you written by Dorie Clark
Book - Reinventing you written by Dorie ClarkBook - Reinventing you written by Dorie Clark
Book - Reinventing you written by Dorie Clark
 

Similar to E NERGY - E FFICIENT P ATH C ONFIGURATION M ETHOD FOR DEF IN WSN S

A SECURITY PERIOD UPDATE METHOD USING EVALUATION FUNCTION FOR IMPROVING ENERG...
A SECURITY PERIOD UPDATE METHOD USING EVALUATION FUNCTION FOR IMPROVING ENERG...A SECURITY PERIOD UPDATE METHOD USING EVALUATION FUNCTION FOR IMPROVING ENERG...
A SECURITY PERIOD UPDATE METHOD USING EVALUATION FUNCTION FOR IMPROVING ENERG...
csandit
 
Fuzzy Logic-based Efficient Message Route Selection Method to Prolong the Net...
Fuzzy Logic-based Efficient Message Route Selection Method to Prolong the Net...Fuzzy Logic-based Efficient Message Route Selection Method to Prolong the Net...
Fuzzy Logic-based Efficient Message Route Selection Method to Prolong the Net...
IJCNCJournal
 
NUMBER OF NEIGHBOUR NODES BASED NEXT FORWARDING NODES DETERMINATION SCHEME FO...
NUMBER OF NEIGHBOUR NODES BASED NEXT FORWARDING NODES DETERMINATION SCHEME FO...NUMBER OF NEIGHBOUR NODES BASED NEXT FORWARDING NODES DETERMINATION SCHEME FO...
NUMBER OF NEIGHBOUR NODES BASED NEXT FORWARDING NODES DETERMINATION SCHEME FO...
ijcsity
 
Wsn ppt
Wsn pptWsn ppt
Wsn ppt
barak422
 
An Enhanced Detection and Energy-Efficient En-Route Filtering Scheme in Wirel...
An Enhanced Detection and Energy-Efficient En-Route Filtering Scheme in Wirel...An Enhanced Detection and Energy-Efficient En-Route Filtering Scheme in Wirel...
An Enhanced Detection and Energy-Efficient En-Route Filtering Scheme in Wirel...
ieijjournal
 
AN ENHANCED DETECTION AND ENERGYEFFICIENT EN-ROUTE FILTERING SCHEME IN WIRELE...
AN ENHANCED DETECTION AND ENERGYEFFICIENT EN-ROUTE FILTERING SCHEME IN WIRELE...AN ENHANCED DETECTION AND ENERGYEFFICIENT EN-ROUTE FILTERING SCHEME IN WIRELE...
AN ENHANCED DETECTION AND ENERGYEFFICIENT EN-ROUTE FILTERING SCHEME IN WIRELE...
ieijjournal
 
Fuzzy-Based Multiple Path Selection Method for Improving Energy Efficiency in...
Fuzzy-Based Multiple Path Selection Method for Improving Energy Efficiency in...Fuzzy-Based Multiple Path Selection Method for Improving Energy Efficiency in...
Fuzzy-Based Multiple Path Selection Method for Improving Energy Efficiency in...
aciijournal
 
M017358794
M017358794M017358794
M017358794
IOSR Journals
 
Enhancement of Routing Performance for Energy Efficiency and Critical Event M...
Enhancement of Routing Performance for Energy Efficiency and Critical Event M...Enhancement of Routing Performance for Energy Efficiency and Critical Event M...
Enhancement of Routing Performance for Energy Efficiency and Critical Event M...
iosrjce
 
Enhanced Leach Protocol
Enhanced Leach ProtocolEnhanced Leach Protocol
Enhanced Leach Protocol
ijceronline
 
Improved Performance of LEACH using Better CH Selection by Weighted Parameters
Improved Performance of LEACH using Better CH Selection by Weighted ParametersImproved Performance of LEACH using Better CH Selection by Weighted Parameters
Improved Performance of LEACH using Better CH Selection by Weighted Parameters
ijsrd.com
 
550 537-546
550 537-546550 537-546
550 537-546
idescitation
 
COMPARISON OF ENERGY EFFICIENT DATA RANSMISSION APPROACHES FOR FLAT WIRELESS ...
COMPARISON OF ENERGY EFFICIENT DATA RANSMISSION APPROACHES FOR FLAT WIRELESS ...COMPARISON OF ENERGY EFFICIENT DATA RANSMISSION APPROACHES FOR FLAT WIRELESS ...
COMPARISON OF ENERGY EFFICIENT DATA RANSMISSION APPROACHES FOR FLAT WIRELESS ...
ijassn
 
LOAD BALANCING MANAGEMENT USING FUZZY LOGIC TO IMPROVE THE REPORT TRANSFER SU...
LOAD BALANCING MANAGEMENT USING FUZZY LOGIC TO IMPROVE THE REPORT TRANSFER SU...LOAD BALANCING MANAGEMENT USING FUZZY LOGIC TO IMPROVE THE REPORT TRANSFER SU...
LOAD BALANCING MANAGEMENT USING FUZZY LOGIC TO IMPROVE THE REPORT TRANSFER SU...
cscpconf
 
J1803056876
J1803056876J1803056876
J1803056876
IOSR Journals
 
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
ijsrd.com
 
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
ijsrd.com
 
BLACKLIST MANAGEMENT USING A VERIFICATION REPORT TO IMPROVE THE ENERGY EFFICI...
BLACKLIST MANAGEMENT USING A VERIFICATION REPORT TO IMPROVE THE ENERGY EFFICI...BLACKLIST MANAGEMENT USING A VERIFICATION REPORT TO IMPROVE THE ENERGY EFFICI...
BLACKLIST MANAGEMENT USING A VERIFICATION REPORT TO IMPROVE THE ENERGY EFFICI...
ijwmn
 
Introducing a novel fault tolerant routing protocol in wireless sensor networ...
Introducing a novel fault tolerant routing protocol in wireless sensor networ...Introducing a novel fault tolerant routing protocol in wireless sensor networ...
Introducing a novel fault tolerant routing protocol in wireless sensor networ...
ijcsit
 
IRJET - Analytical Study of Hierarchical Routing Protocols for Virtual Wi...
IRJET -  	  Analytical Study of Hierarchical Routing Protocols for Virtual Wi...IRJET -  	  Analytical Study of Hierarchical Routing Protocols for Virtual Wi...
IRJET - Analytical Study of Hierarchical Routing Protocols for Virtual Wi...
IRJET Journal
 

Similar to E NERGY - E FFICIENT P ATH C ONFIGURATION M ETHOD FOR DEF IN WSN S (20)

A SECURITY PERIOD UPDATE METHOD USING EVALUATION FUNCTION FOR IMPROVING ENERG...
A SECURITY PERIOD UPDATE METHOD USING EVALUATION FUNCTION FOR IMPROVING ENERG...A SECURITY PERIOD UPDATE METHOD USING EVALUATION FUNCTION FOR IMPROVING ENERG...
A SECURITY PERIOD UPDATE METHOD USING EVALUATION FUNCTION FOR IMPROVING ENERG...
 
Fuzzy Logic-based Efficient Message Route Selection Method to Prolong the Net...
Fuzzy Logic-based Efficient Message Route Selection Method to Prolong the Net...Fuzzy Logic-based Efficient Message Route Selection Method to Prolong the Net...
Fuzzy Logic-based Efficient Message Route Selection Method to Prolong the Net...
 
NUMBER OF NEIGHBOUR NODES BASED NEXT FORWARDING NODES DETERMINATION SCHEME FO...
NUMBER OF NEIGHBOUR NODES BASED NEXT FORWARDING NODES DETERMINATION SCHEME FO...NUMBER OF NEIGHBOUR NODES BASED NEXT FORWARDING NODES DETERMINATION SCHEME FO...
NUMBER OF NEIGHBOUR NODES BASED NEXT FORWARDING NODES DETERMINATION SCHEME FO...
 
Wsn ppt
Wsn pptWsn ppt
Wsn ppt
 
An Enhanced Detection and Energy-Efficient En-Route Filtering Scheme in Wirel...
An Enhanced Detection and Energy-Efficient En-Route Filtering Scheme in Wirel...An Enhanced Detection and Energy-Efficient En-Route Filtering Scheme in Wirel...
An Enhanced Detection and Energy-Efficient En-Route Filtering Scheme in Wirel...
 
AN ENHANCED DETECTION AND ENERGYEFFICIENT EN-ROUTE FILTERING SCHEME IN WIRELE...
AN ENHANCED DETECTION AND ENERGYEFFICIENT EN-ROUTE FILTERING SCHEME IN WIRELE...AN ENHANCED DETECTION AND ENERGYEFFICIENT EN-ROUTE FILTERING SCHEME IN WIRELE...
AN ENHANCED DETECTION AND ENERGYEFFICIENT EN-ROUTE FILTERING SCHEME IN WIRELE...
 
Fuzzy-Based Multiple Path Selection Method for Improving Energy Efficiency in...
Fuzzy-Based Multiple Path Selection Method for Improving Energy Efficiency in...Fuzzy-Based Multiple Path Selection Method for Improving Energy Efficiency in...
Fuzzy-Based Multiple Path Selection Method for Improving Energy Efficiency in...
 
M017358794
M017358794M017358794
M017358794
 
Enhancement of Routing Performance for Energy Efficiency and Critical Event M...
Enhancement of Routing Performance for Energy Efficiency and Critical Event M...Enhancement of Routing Performance for Energy Efficiency and Critical Event M...
Enhancement of Routing Performance for Energy Efficiency and Critical Event M...
 
Enhanced Leach Protocol
Enhanced Leach ProtocolEnhanced Leach Protocol
Enhanced Leach Protocol
 
Improved Performance of LEACH using Better CH Selection by Weighted Parameters
Improved Performance of LEACH using Better CH Selection by Weighted ParametersImproved Performance of LEACH using Better CH Selection by Weighted Parameters
Improved Performance of LEACH using Better CH Selection by Weighted Parameters
 
550 537-546
550 537-546550 537-546
550 537-546
 
COMPARISON OF ENERGY EFFICIENT DATA RANSMISSION APPROACHES FOR FLAT WIRELESS ...
COMPARISON OF ENERGY EFFICIENT DATA RANSMISSION APPROACHES FOR FLAT WIRELESS ...COMPARISON OF ENERGY EFFICIENT DATA RANSMISSION APPROACHES FOR FLAT WIRELESS ...
COMPARISON OF ENERGY EFFICIENT DATA RANSMISSION APPROACHES FOR FLAT WIRELESS ...
 
LOAD BALANCING MANAGEMENT USING FUZZY LOGIC TO IMPROVE THE REPORT TRANSFER SU...
LOAD BALANCING MANAGEMENT USING FUZZY LOGIC TO IMPROVE THE REPORT TRANSFER SU...LOAD BALANCING MANAGEMENT USING FUZZY LOGIC TO IMPROVE THE REPORT TRANSFER SU...
LOAD BALANCING MANAGEMENT USING FUZZY LOGIC TO IMPROVE THE REPORT TRANSFER SU...
 
J1803056876
J1803056876J1803056876
J1803056876
 
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
 
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
 
BLACKLIST MANAGEMENT USING A VERIFICATION REPORT TO IMPROVE THE ENERGY EFFICI...
BLACKLIST MANAGEMENT USING A VERIFICATION REPORT TO IMPROVE THE ENERGY EFFICI...BLACKLIST MANAGEMENT USING A VERIFICATION REPORT TO IMPROVE THE ENERGY EFFICI...
BLACKLIST MANAGEMENT USING A VERIFICATION REPORT TO IMPROVE THE ENERGY EFFICI...
 
Introducing a novel fault tolerant routing protocol in wireless sensor networ...
Introducing a novel fault tolerant routing protocol in wireless sensor networ...Introducing a novel fault tolerant routing protocol in wireless sensor networ...
Introducing a novel fault tolerant routing protocol in wireless sensor networ...
 
IRJET - Analytical Study of Hierarchical Routing Protocols for Virtual Wi...
IRJET -  	  Analytical Study of Hierarchical Routing Protocols for Virtual Wi...IRJET -  	  Analytical Study of Hierarchical Routing Protocols for Virtual Wi...
IRJET - Analytical Study of Hierarchical Routing Protocols for Virtual Wi...
 

Recently uploaded

spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
Madan Karki
 
Swimming pool mechanical components design.pptx
Swimming pool  mechanical components design.pptxSwimming pool  mechanical components design.pptx
Swimming pool mechanical components design.pptx
yokeleetan1
 
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单专业办理
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单专业办理一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单专业办理
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单专业办理
zwunae
 
A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...
nooriasukmaningtyas
 
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdfBPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
MIGUELANGEL966976
 
14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application
SyedAbiiAzazi1
 
sieving analysis and results interpretation
sieving analysis and results interpretationsieving analysis and results interpretation
sieving analysis and results interpretation
ssuser36d3051
 
DfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributionsDfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributions
gestioneergodomus
 
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdfTutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
aqil azizi
 
This is my Environmental physics presentation
This is my Environmental physics presentationThis is my Environmental physics presentation
This is my Environmental physics presentation
ZainabHashmi17
 
一比一原版(UC Berkeley毕业证)加利福尼亚大学|伯克利分校毕业证成绩单专业办理
一比一原版(UC Berkeley毕业证)加利福尼亚大学|伯克利分校毕业证成绩单专业办理一比一原版(UC Berkeley毕业证)加利福尼亚大学|伯克利分校毕业证成绩单专业办理
一比一原版(UC Berkeley毕业证)加利福尼亚大学|伯克利分校毕业证成绩单专业办理
skuxot
 
22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
KrishnaveniKrishnara1
 
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
Mukeshwaran Balu
 
6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)
ClaraZara1
 
Self-Control of Emotions by Slidesgo.pptx
Self-Control of Emotions by Slidesgo.pptxSelf-Control of Emotions by Slidesgo.pptx
Self-Control of Emotions by Slidesgo.pptx
iemerc2024
 
New techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdfNew techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdf
wisnuprabawa3
 
Building Electrical System Design & Installation
Building Electrical System Design & InstallationBuilding Electrical System Design & Installation
Building Electrical System Design & Installation
symbo111
 
introduction to solar energy for engineering.pdf
introduction to solar energy for engineering.pdfintroduction to solar energy for engineering.pdf
introduction to solar energy for engineering.pdf
ravindarpurohit26
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
zwunae
 
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
awadeshbabu
 

Recently uploaded (20)

spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
 
Swimming pool mechanical components design.pptx
Swimming pool  mechanical components design.pptxSwimming pool  mechanical components design.pptx
Swimming pool mechanical components design.pptx
 
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单专业办理
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单专业办理一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单专业办理
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单专业办理
 
A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...
 
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdfBPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
 
14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application
 
sieving analysis and results interpretation
sieving analysis and results interpretationsieving analysis and results interpretation
sieving analysis and results interpretation
 
DfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributionsDfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributions
 
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdfTutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
 
This is my Environmental physics presentation
This is my Environmental physics presentationThis is my Environmental physics presentation
This is my Environmental physics presentation
 
一比一原版(UC Berkeley毕业证)加利福尼亚大学|伯克利分校毕业证成绩单专业办理
一比一原版(UC Berkeley毕业证)加利福尼亚大学|伯克利分校毕业证成绩单专业办理一比一原版(UC Berkeley毕业证)加利福尼亚大学|伯克利分校毕业证成绩单专业办理
一比一原版(UC Berkeley毕业证)加利福尼亚大学|伯克利分校毕业证成绩单专业办理
 
22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
 
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
 
6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)
 
Self-Control of Emotions by Slidesgo.pptx
Self-Control of Emotions by Slidesgo.pptxSelf-Control of Emotions by Slidesgo.pptx
Self-Control of Emotions by Slidesgo.pptx
 
New techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdfNew techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdf
 
Building Electrical System Design & Installation
Building Electrical System Design & InstallationBuilding Electrical System Design & Installation
Building Electrical System Design & Installation
 
introduction to solar energy for engineering.pdf
introduction to solar energy for engineering.pdfintroduction to solar energy for engineering.pdf
introduction to solar energy for engineering.pdf
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
 
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
 

E NERGY - E FFICIENT P ATH C ONFIGURATION M ETHOD FOR DEF IN WSN S

  • 1. International Journal on Information Theory (IJIT),Vol.4, No.2, April 2015 DOI : 10.5121/ijit.2015.4202 9 ENERGY-EFFICIENT PATH CONFIGURATION METHOD FOR DEF IN WSNS Jae Kwon Lee1 , Su Man Nam2 and Tae Ho Cho3 1, 2, 3 School of Information and Communication Engineering Sungkyunkwan University, Su- won, 440-476, Republic of Korea ABSTRACT In wireless sensor networks (WSNs), sensor nodes have stringent energy and computation requirements. Since they are left unattended, an adversary can generate false report attacks through compromised nodes. This would result in an increased number of verifications to filter these reports, causing waste of scarce energy resources. In this paper, we propose energy-efficient path configuration method for dynamic en- route filtering (EDEF), which uses fuzzy logic to select the forwarding node(s). In order to cater to compromised nodes and to detect and filter the false reports, we create alternative paths. Our proposed method selects forwarding nodes based on the key content of neighbor nodes, the number of neighbor nodes, and the residual energy. Auth-keys are distributed randomly from the global key pool. Simulation results demonstrate the effectiveness of our proposed method with up to 8.2% energy efficiency as compared to the dynamic en-route filtering (DEF) scheme. KEYWORDS Sensor network, en-route filtering, false report attack, fuzzy logic, detection power, next-hop, energy- efficiency 1. INTRODUCTION Wireless sensor networks (WSNs) are being used in numerous applications to carry out tasks without human intervention [1]. However, WSNs suffer energy and computation limitations and are left unattended for longer periods of time [2, 3]. Sensor nodes can be compromised and used by an adversary to generate false report attacks. These false report attacks would result in an increased number of verifications to filter these reports, thereby causing a reduced network- lifetime [4]. The dynamic en-route filtering (DEF) was proposed by Yu et al. to defend a false report injection attack [5]. Various schemes as the statistical en-route filtering (SEF), commutative cipher based en-route filtering (CCEF) and probabilistic voting-based filtering (PVFS) as well as the DEF were proposed for the same purpose [6-15]. However, the DEF is capable of performing best in a dynamic network. The DEF is basically configured as a cluster-based network. The DEF is divided into three major phases: key pre-distribution, key dissemination, and report forwarding. The key pre-distribution phase is executed when the sensor network is first set up. The key dissemination phase is executed whenever the network topology is changed. The report forwarding phase is executed whenever a report is generated by a cluster-head (CH). The DEF verifies the validity of a report using a message authentication code (MAC). To select the next-hop forwarding node, the DEF does not specify the selection criteria which can be changed by applications. In the proposed method, we use the key content of neighbor nodes, the number of neighbor nodes, and the residual energy as criteria for the selection of forwarding nodes. The major contributions of our scheme are as follows:
  • 2. International Journal on Information Theory (IJIT),Vol.4, No.2, April 2015 10 • Early false report detection power • Considerable energy improvement over the original scheme • Fuzzy logic for evaluation of the next-hop In this paper, in order to use next-hop forwarding nodes, we use the above selection criteria with fuzzy logic in our implementation. Whenever the network topology changes, criteria for the selection of forwarding nodes is applied at the key distribution phase. The parameters of the fuzzy input are as follows: the node with multiple keys, the number of neighbor nodes, and the residual energy. We determine the next-hop forwarding node through these input values. Any time the topology of a network is changed, the energy-efficient path configuration method for DEF (EDEF) executes the key dissemination phase, similar to the DEF for a dynamic network. Whenever the key dissemination phase is performed, the next-hop node is selected through fuzzy logic in the EDEF. The EDEF was organized as a cluster-based sensor network similar to DEF. The cluster-based network can avoid redundant data transmission [16, 17]. A base station (BS) calculates a fuzzy value for each node since the sensor network information is handled by the BS. Each CH determines the forwarding node through the fuzzy values of the neighbor nodes. Using this information, we demonstrate the EDEF, which results in greater energy efficiency and detection power in comparison with the DEF. This paper is organized as follows: in a section 2, we describe the original DEF in detail. In section 3, we explain the motivation, overview, and the proposed EDEF in detail. Section 4 discusses assumptions and the performance comparison; and the conclusion is given at the end of the paper. 2. BACKGROUND In this section, we present related background work. 2.1. Dynamic En-route Filtering Scheme The DEF was proposed by Yu et al. to defend the false report injection attack in WSNs. The DEF is composed of a cluster, as in Figure 1, where the nodes v1 ~ v4 represent a sensor node in the cluster, and a black dot (v3) represents a compromised node. Basically, a CH aggregates the detected reports of all nodes. The CH then generates a message to forward to the BS. Finally, the CH sends the message to the BS. Any can be compromised node, including the CH. Additionally, all nodes can be a forwarding node on a path of the BS. Figure 1. A simple figure of the DEF DEF is briefly divided into three phases (key pre-distribution, key dissemination, and report forwarding) as shown in Figure 2. First, the network is configured and then a key is pre-
  • 3. International Journal on Information Theory (IJIT),Vol.4, No.2, April 2015 11 distributed. The key pre-distribution phase is executed once when the network is first configured. Following this, the key dissemination phase of a key distribution occurs, which executes the report forwarding phase. The key dissemination phase would then be executed again based on the fixed period that is determined at the cluster. The report forwarding phase could be executed at every round at the each forwarding node. Figure 2. Three phases of the DEF Figure 3. Key deployment of each node Figure 3 shows that node v_i was loaded with the keys in the key pre-distribution phase. Here, the auth-key chain is generated using the seed key and a hash function. This auth-key is then the first of the auth-key chain. The y-key would then be randomly selected as a fixed number in the global key pool. The z-key is then randomly selected as one key of the global key pool; this key is not duplicated with any other keys. The auth-keys of the node in a cluster are aggregated with the CH to generate the message, K(n), as in Figure 4. Then the CH sends the message to q number of forwarding nodes. In the report forwarding phase, a report is aggregated from a node of the cluster as in the key dissemination phase, and then the CH sends an aggregating message to the BS. In the DEF, the report is verified with the MAC. This MAC is generated using the event and auth-key in each node. The DEF re-executes the key dissemination phase and the report forwarding phase according to a fixed rule.
  • 4. International Journal on Information Theory (IJIT),Vol.4, No.2, April 2015 12 Figure 4. Auth-key is sent to the forwarding node. The report forwarding phase is newly executed by the forwarding node whenever an event is generated. The report forwarding phase is executed to forward a newly generated event in report format to the BS. The key dissemination phase is re-executed for key re-dissemination in case of network topology changes as such changes can change the nodes of the cluster. It is then necessary to re-disseminate the node information over the changed cluster. Therefore, the key dissemination phase can be re-executed. 3. PROPOSED METHOD 3.1. Motivation When we select the next forwarding node, the DEF does not specify some factors because, according to various applications, the determining factors may be different. The DEF selects the next node by combining factors such as the available of energy, the link quality, the speed of energy consumption, and so on. The DEF does not consider the energy-efficiency of the forwarding node. The network, therefore, can easily consume the energy of the node. Energy depletion of a node produces a decrease in the network-lifetime. We evaluated the selection of a forwarding node using fuzzy logic; this scheme shows efficiency up to 5% [18]. However, we decide that the 5% efficiency is a weak influence. Hence, we changed to new factors and evaluated these factors. According to this, we can have more efficient than before factor through new factors. 3.2. Overview When determining the next forwarding node in the DEF, we select the next node using the fuzzy logic from the proposed EDEF. We used three input factors in fuzzy logic: 1) key content, 2) the number of neighbor nodes, and 3) the residual energy of each candidate node. We can calculate the result using these three input factors. We then determine the next node based on the result. If the report reaches the BS in every round, the BS calculates the result of the nodes in the entire network using fuzzy logic. A CH then determines the next forwarding node on a path to the BS. We can foresee an increase in the efficiency between the EDEF and the DEF through the Travelled hop count of the false reports. 3.3. Proposed method The EDEF uses fuzzy logic in the dissemination phase of the DEF. This is more effective for extending the network-lifetime. The EDEF has three input factors for the fuzzy logic. The three input factors are as follows: 1) the key content (KN), 2) the number of neighbor node (NN), and 3) the residual energy (RE) of each contender. When we select the next forwarding node, we use
  • 5. International Journal on Information Theory (IJIT),Vol.4, No.2, April 2015 13 the result from the above three factors. Each input factor is divided into three detailed phases, allowing 27 different possible results (=3×3×3). We can select the optimum forwarding node based on 27 different results. The auth-key is disseminated to multiple paths because of the possibility of 1) data loss, 2) verification, or 3) dynamic topology. The DEF pre-determines the number of forwarding nodes as „q‟. The DEF then selects q as the forwarding node. In case of 'q = 2,' two forwarding nodes are selected at the BS. When the q possible forwarding nodes are selected, the final forwarding node is chosen using fuzzy logic. Fuzzy rule-based system has been used to approximate reasoning for an imprecision of a data or an uncertainty in reasoning processes [19]. 3.3.1. Further Subsections The input factor for fuzzy logic and the resulting value are as follows: KN= {LITTLE, MEDIUM, FULL} NN= {FEW, MIDDLE, CROWDED} RE= {LOW, MEDIUM, ENOUGH} R= {VERY BAD, BAD, NORMAL, GOOD, VERY GOOD} Each input value is divided into three phases (as shown above), and the resulting value is divided into five parts. Details of the input factors that are used for the fuzzy logic are as follow.  The key content of node To begin with, the following is the reason for the key content of node. When a key is disseminated in the DEF, a CH aggregates the keys belonging to each node, and forwards the aggregate to the node on a path in a fixed hop count. We use these keys to verify the forwarded report. At this time, if the node was received in duplicate, the node has multiple keys that are compared with the others. A node with many keys means that it can be used in multiple clusters. According to this, when the DEF sends a report, the node with many keys is more efficient than the others.  The number of neighbor nodes The number of neighbor nodes is selected as the next input factor so that the message can be delivered to the zones of many candidate nodes. In order to broaden the selection range, the zones of many candidate nodes are selected. If there are few candidate nodes, then the selection pool is reduced. Therefore, we broaden the selection range, in order to obtain a more efficient node.  The residual energy In the end, the residual energy is the current usable energy of a candidate node and is an input factor. When a node with less energy is compared with a node with a lot of energy, if the node with less energy is selected, the entire network-lifetime is quickly shortened. According to this, if we select the node with a lot of energy, it can sustain the network-lifetime. Selecting the node with a lot of energy can then steadily consume the energy of the whole network. Accordingly, we select it as an input factor for the fuzzy logic. Figure 5 presents a process in which a CH selects the q forwarding node through a fuzzy rule- based system. When the q is determined to be '2,' as in the figure, it receives the respective KN, NN, and RE values of u_1,u_2,〖 and u〗 _3; it then selects a node based on the two highest ranking results.
  • 6. International Journal on Information Theory (IJIT),Vol.4, No.2, April 2015 14 Figure 5. Fuzzy rule-based system for node selection A fuzzy computation is computed at a BS; the BS has information for all nodes. The BS determines that each CH selects a node using the fuzzy rule-based system. This is re-computed every cycle in order to forward a message. Figure 6 presents the membership function of the fuzzy input values and result values. Figure 6. Fuzzy membership function of input values and the result values.
  • 7. International Journal on Information Theory (IJIT),Vol.4, No.2, April 2015 15 Some of the rules are shown below. Table 1. Some of the fuzzy rules. R1 : IF KN IS LITTLE R5 : IF KN IS LITTLE AND NN IS FEW AND NN IS FEW AND RE IS LOW AND RE IS HIGH THEN R IS VERY BAD THEN R IS BAD R2 : IF KN IS LITTLE R6 : IF KN IS FULL AND NN IS MIDDLE AND NN IS MIDDLE AND RE IS LOW AND RE IS MEDIUM THEN R IS VERY BAD THEN R IS GOOD R3 : IF KN IS LITTLE R7 : IF KN IS FULL AND NN IS CROWDED AND NN IS MEDIUM AND RE IS LOW AND RE IS LOW THEN R IS BAD THEN R IS NORMAL R4 : IF KN IS LITTLE R8 : IF KN IS FULL AND NN IS FEW AND NN IS MIDDLE AND RE IS MEDIUM AND RE IS ENOUGH THEN R IS VERY BAD THEN R IS VERY GOOD 3.3.2. The base data for the EDEF Figure 7. Average of the Travelled hop count for 'q=3' Figure 7 shows an average of the Travelled hop count for „q = 3‟ according to the attack ratio. It is expected that the EDEF can detect a false report earlier than the original DEF. Therefore, we experimented further and obtained the following results.
  • 8. International Journal on Information Theory (IJIT),Vol.4, No.2, April 2015 16 Figure 8. Difference in the total Travelled hops between the EDEF and the DEF. Figure 9. A filtered report ratio Figure 8 shows the Travelled hop count without filtering a false report. The following is the Travelled hop count equation. The hop count is the difference between the value of the Travelled hop count without filtering using a DEF and the value of the Travelled hop count without filtering using the proposed method. Total Travelled hops = Travelled hops in the DEF – Travelled hops in the proposed method Additionally, Figure 9 presents a graph of the EDEF efficiency against the DEF. As shown in the figure, greater efficiency is seen with increases in 'q'. According to Figure 8 and 9, the proposed method is faster than the existing method. Accordingly, we progressed to more detailed experiments; in the following section, we verify the energy consumption efficiency compared with the DEF. 4. PERFORMANCE EVALUATION In this section, we will present the energy-efficiency of the EDEF in comparison with the original DEF under same environmental setup.
  • 9. International Journal on Information Theory (IJIT),Vol.4, No.2, April 2015 17 4.1. Experiment setup We assume that the BS has information of all nodes in the sensor network. Every CH has the information about the key content, the number of neighbor nodes, and the residual energy of all nodes in its cluster.  The sensor field size is 200 x 200 (m2), and the total number of nodes are 1000, consisting of 100 clusters which are randomly distributed where each cluster consists of 10 nodes.  Each node picks l = 2 y-keys and one z-key, where the size of the y-key and z-key pool consists of 1000 keys.  Each node forwards the message K(n) to q selected downstream neighbor nodes, until K(n) reaches to the BS or has been forwarded by hmax hop. Here, hmax = 10. Hence, we adopted Hill Climbing method [20] to forwards the message K(n).  Each aggregated report contains 10 MACs, and there are at most 10 compromised nodes in each cluster.  The size of a message is 36 bytes, and 16.25/12.5μJ is consumed for transmitting/receiving a byte [8].  Each node has fuzzy result values which are calculated by the BS. The BS then broadcasts the q and fuzzy result of each node to entire network through authenticated broadcast (e.g., using μTESLA [21])  To simulate a dynamic network, we apply a simple ON/OFF operation node, where each node is typically switched to ON or OFF mode.  The DEF and the EDEF adopted a GPSR routing protocol. 4.1. Experiment results In the above assumption, the announced sensor field size and total number of nodes are the same, and a CH generates 100 reports during each cycle. Each key pool has 1000 keys. The experiment was performed with an increasing ratio of false reports and a changing q value. The figure below shows the efficiency of the proposed method compared with DEF according to the attack ratio. Figure 10. Total energy efficiency of each „q.‟
  • 10. International Journal on Information Theory (IJIT),Vol.4, No.2, April 2015 18 The figure above shows the energy-efficiency for each „q‟ against the DEF. Each q shown has efficiency between 4.84% and 6.12%. The greater the number of q or the more complex the sensor network, the greater is the efficiency. The reason why the efficiency increases as q increases is because a large, q has a larger number of cases. Therefore, this demonstrates that selection using the fuzzy system is more efficient than the DEF. Figure 11. Energy efficiency versus the attack ratio. By measuring the value for each q, the results show that greater the value of q, the greater the efficiency as compared to the DEF. An increasing value of q means that more messages are created to send to the next forwarding nodes. As can be seen in the above figure, when the value of q is 5, the efficiency is greater than 8%. The attack rate of the 100 generated reports is the ratio of false reports. The efficiency ratio of false reports of enemy all the time and when there are many showed similar performance. However, they showed a difference in the 30% to 70% section. In fact, a false report injection attack cannot occupy the whole message. The results are confirmed because they were generated for the above experiment. However, the experiment does not include the number of cases in a real sensor network. However, if the number of q is changed according to the environment of the DEF, the proposed method showed greater efficiency through the above experiment. The figure above compares the efficiency of the proposed method with the DEF with regard to the total number of filtered false reports in one hop. This graph compares the number of filtered reports within one hop in the proposed method with that in the DEF. The figure above shows a slightly more efficient detection for the proposed method compared with the DEF. 5. CONCLUSIONS In this study, the aim was to increase energy-efficiency with increased detection power by considering alternative paths. We have presented EDEF, a fuzzy-based next-hop selection scheme. In order to select the forwarding nodes in next-hop and to distribute keys, we use fuzzy logic. Our method can detect more false reports as compared to the DEF scheme. By detecting the false reports early, our method demonstrated considerable energy improvement without compromising the security of the original scheme.
  • 11. International Journal on Information Theory (IJIT),Vol.4, No.2, April 2015 19 In conclusion, the EDEF has excellent detection power compared with the DEF and improves the energy efficiency in order to sustain the network-lifetime for a long time. In the future, we can further enhance the performance through a simulation with suitable fuzzy function values. ACKNOWLEDGEMENTS This research was supported by Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education, Science and Technology (No. 2013R1A2A2A01013971) REFERENCES [1] I. F. Akyildiz, Weilian Su, Y. Sankarasubramaniam, & E. Cayirci, (2002) "A survey on sensor networks," Communications Magazine, IEEE, Vol.40, No.8, pp.102-114. [2] Jing Deng, R. Han, and S. Mishra, (2005) "Countermeasures against traffic analysis attacks in wireless sensor networks," Security and Privacy for Emerging Areas in Communications Networks, pp.113-126. [3] Moog Inc., "MICAz data sheet," Moog Crossbow, http://www.xbow.com. [4] C. Karlof and D. Wagner, (2003)"Secure routing in wireless sensor networks: Attacks and countermeasures," Sensor Network Protocols and Applications, 2003. Proceedings of the First IEEE. 2003 IEEE International Workshop on, pp.113-127. [5] Zhen Yu and Y. Guan, (2010) "A dynamic en-route filtering scheme for data reporting in wireless sensor networks," Networking, IEEE/ACM Transactions on, Vol.18, No.1, pp.150-163. [6] Hao Yang and Songwu Lu, "Commutative cipher based en-route filtering in wireless sensor networks," Vehicular Technology Conference, 2004. VTC2004-Fall. 2004 IEEE 60th, pp.1223-1227. [7] Feng Li, Avinash Srinivasan, and Jie Wu, (2008) "PVFS: A probabilistic voting-based filtering scheme in wireless sensor networks," International Journal of Security and Networks, Vol.3, No.3, pp.173-182. [8] Fan Ye, Haiyun Luo, Songwu Lu, and Lixia Zhang, "Statistical en-route filtering of injected false data in sensor networks," Selected Areas in Communications, IEEE Journal on, Vol.23, No.4, pp.839-850. [9] Jianzhong Li, Lei Yu, Hong Gao, and Shuguang Xiong, "Grouping-enhanced resilient probabilistic en-route filtering of injected false data in WSNs," Parallel and Distributed Systems, IEEE Transactions on, Vol.23, No.5, pp.881-889. [10] T. P. Nghiem, Sang Jin Lee, and Tae Ho Cho, (2009) "An energy-aware fuzzy-based en-route filtering scheme in wireless sensor networks," Future Networks, 2009 International Conference on, pp.28-32. [11] A. S. Uluagac, R. A. Beyah, and J. A. Copeland, (2010) "Time-based DynamiC keying and en-route filtering (TICK) for wireless sensor networks," Global Telecommunications Conference (GLOBECOM 2010), 2010 IEEE, pp.1-6. [12] Wensheng Zhang and Guohong Cao, (2005) "Group rekeying for filtering false data in sensor networks: A predistribution and local collaboration-based approach," INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings IEEE, pp.503- 514 vol. 1. [13] Hae Young Lee and Tae Ho Cho, (2006) "Key inheritance-based false data filtering scheme in wireless sensor networks," Distributed Computing and Internet Technology, Lecture Notes in Computer Science, vol.4317, pp.116-127. [14] Hae Young Lee and Tae Ho Cho, (2008) "Fuzzy logic based key disseminating in ubiquitous sensor networks," Advanced Communication Technology, 2008. ICACT 2008. 10th International Conference on, pp.958-962.
  • 12. International Journal on Information Theory (IJIT),Vol.4, No.2, April 2015 20 [15] Ting Yuan, Shiyong Zhang, Yi-ping Zhong, and Jianqing Ma, (2008) "KAEF: An en-route scheme of filtering false data in wireless sensor networks," Performance, Computing and Communications Conference, 2008. IPCCC 2008. IEEE International, pp.193-200. [16] J. N. Al-Karaki and A. E. Kamal, (2004) "Routing techniques in wireless sensor networks: A survey," Wireless Communications, IEEE, vol.11, no.6, pp.6-28. [17] K. Akkaya and M. Younis, (2005) "A survey on routing protocols for wireless sensor networks," Ad Hoc Networks, vol.3, no.3, pp.325-349, 5. [18] Jae Kwon Lee and Tae Ho Cho, (2012) "Selecting next hop nodes for energy efficiency in dynamic filtering based WSNs using fuzzy system," Information Science and Digital Content Technology (ICIDT), 2012 8th International Conference on, pp.674-677. [19] H. S. N. Serrano, (2007) "Landing site selection using fuzzy rule-based reasoning," Proc. ICRA, pp.4899-4904. [20] D.B. Skalak, (1994) "Prototype and feature selection by sampling and random mutation hill climbing algorithms," In Proc. of Eleventh International Machine Learning, pp.293-301, 1994. [21] Adrian Perrig, Robert Szewczyk, J. D. Tygar, Victor Wen, and David E. Culler, (2002) "SPINS: Security protocols for sensor networks," Wireless Networks, Vol.8, No.5, pp.521-534. [22] Lee, S.hyun. & Kim Mi Na, (2008) “This is my paper”, ABC Transactions on ECE, Vol. 10, No. 5, pp120-122. [23] Gizem, Aksahya & Ayese, Ozcan (2009) Coomunications & Networks, Network Books, ABC Publishers. Authors Jae Kwon Lee received his B.S. degree in Computer Software Engineering from the Kumoh National Institute of Technology, Republic of Korea, in 2012, M.S degrees in Electrical and Computer Engineering from Sungkyunkwan University in 2014, respectively. His research interests are in the areas of wireless sensor network, intelligent systems, modelling & simulation, and enterprise resource planning. Su Man Nam received his B.S. degrees in computer information from Hanseo University, Korea, in February 2009 and M.S degrees in Electrical and Computer Engineering from Sungkyunkwan University in 2013, respectively. He is currently a doctoral student in the College of Information and Communication Engineering at Sungkyunkwan University, Korea. His research interests include wireless sensor network, security in wireless sensor networks, and modelling & simulation. Tae Ho Cho received the Ph.D. degree in Electrical and Computer Engineering from the University of Arizona, USA, in 1993, and the B.S. and M.S. degrees in Electrical Engineering from Sungkyunkwan University, Republic of Korea, and the University of Alabama, USA, respectively. He is currently a Professor in the College of Information and Communication Engineering, Sungkyunkwan University, Korea. His research interests are in the areas of wireless sensor network, intelligent systems, modeling & simulation, and enterprise resource planning.