SlideShare a Scribd company logo
International Journal of Ambient Systems and Applications (IJASA) Vol.2, No.4, December 2014
DOI:10.5121/ijasa.2014.2403 19
ENSF: ENERGY-EFFICIENT NEXT-HOP SELECTION
METHOD USING FUZZY LOGIC IN PROBABILISTIC
VOTING-BASED FILTERING SCHEME
Jae Kwan Lee1
and Tae Ho Cho2
1, 2
College of Information and Communication Engineering, Sungkyunkwan University,
Suwon 440-746, Republic of Korea
ABSTRACT
Wireless sensor networks (WSNs) are regularly deployed in harsh and unattended environments, and
sensor nodes are easily exposed to attacks due to the random arrangement of the sensor field. An attacker
can inject fabricated reports from a compromised node with false votes and false vote-based reports. The
false report attacks can waste the energy of the intermediate nodes, shortening the network lifetime.
Furthermore, false votes cause the filtering out of legitimate reports. A probabilistic voting-based filtering
scheme (PVFS) was proposed as a countermeasure against this type of attacks by Li and Wu. PVFS uses a
vote threshold, a security threshold, and a verification node. The scheme does not make additional use
energy or communications resources because the verification node and threshold values are fixed. There
needs to be a verification node selection method that considers the energy resources of the node. In this
paper, we propose a verification path election scheme based on a fuzzy logic system. In the proposed
scheme, one node transmits reports in the node with a strong state through a fuzzy logic system after which
a neighbor is selected out of two from the surroundings. Experimental results show that the proposed
scheme improves energy savings up to maximum 13% relative to the PVFS.
KEYWORDS
Wireless Sensor Networks, Fabricated Report, False Votes, Fuzzy Logic System
1. INTRODUCTION
Wireless sensor networks (WSNs) operate in open environments. WSNs have applications in the
fields of home networking, forest management, logistics management, fire monitoring and
healthcare [1]. The sensor nodes of the WSNs collect contextual information of the surroundings,
and the collected data are transmitted to the users [2-4]. The limitations of the sensor nodes are
the limited memory, and energy. Also the sensor nodes can be easily compromised and destroyed
as a result of their distribution in open environment [5-6]. An attacker can inject fabricated
reports and false votes to a network through a compromised node [7-10], and these attacks
deplete the energy and reduce lifetime of the sensor nodes [11].
International Journal of Ambient Systems and Applications (IJASA) Vol.2, No.4, December 2014
Figure 1.
Figure 1 shows an attack consisting of a fabricated report and the false votes. Figure 1(a) shows a
compromised node, Figure 1(b) shows false votes attached to a fabricated report and Figure 1(c)
shows a false vote attached to a legiti
compromised node, and the attack unnecessarily consumes the energy of the sensor node on
transmission paths. A false vote attack can inject false votes attached to a legitimate report,
filtering out legitimate reports from the intermediate node. Therefore it is desirable to filter out
these attacks as early as possible to avoid wasting energy in processing and forwarding
illegitimate information.
A probabilistic voting-based filtering scheme (PVFS) w
attacks by Li and Wu [12-13]. The scheme distinguishes among two types of attacks with the help
of the threshold (ܶ௙ ൌ 2). The threshold
false report attack. In the case of
station (BS) and does not drop it. In the case of 2, CH drops the report by countering it as a false
report attack. The original scheme uses the voting threshold (‘1’) and secu
fixed manner, where the decision verification nodes are based on pre
selection verification nodes are fixed, which does not comply with the requirements for a
dynamic network.
In this paper, we propose a new Energy
The proposed scheme randomly selected two neighbor nodes before a report is transmitted. The
selected neighbor nodes transmit their current state [State_Ni (R_ENERGY, HOPS, FTR)] using
a fuzzy logic system. The CH evaluates the fitness value of the two received states and transmits
the report to the neighboring node with a state higher value between the two neighbors.
International Journal of Ambient Systems and Applications (IJASA) Vol.2, No.4, December 2014
Figure 1.Fabricated report and false votes attacks
Figure 1 shows an attack consisting of a fabricated report and the false votes. Figure 1(a) shows a
compromised node, Figure 1(b) shows false votes attached to a fabricated report and Figure 1(c)
shows a false vote attached to a legitimate report. The fabricated report is injected through a
compromised node, and the attack unnecessarily consumes the energy of the sensor node on
transmission paths. A false vote attack can inject false votes attached to a legitimate report,
legitimate reports from the intermediate node. Therefore it is desirable to filter out
these attacks as early as possible to avoid wasting energy in processing and forwarding
based filtering scheme (PVFS) was proposed as a countermeasure for
13]. The scheme distinguishes among two types of attacks with the help
). The threshold ܶ௙ = 1 indicates false vote attack, and ܶ௙ = 2 indicates a
In the case of ܶ௙ = 1, the cluster head (CH) forwards the report to the base
station (BS) and does not drop it. In the case of 2, CH drops the report by countering it as a false
report attack. The original scheme uses the voting threshold (‘1’) and security threshold (‘2’) in a
fixed manner, where the decision verification nodes are based on pre-set path. However, the
selection verification nodes are fixed, which does not comply with the requirements for a
ew Energy-efficient Next-hop Selection using Fuzzy-logic (ENSF).
The proposed scheme randomly selected two neighbor nodes before a report is transmitted. The
selected neighbor nodes transmit their current state [State_Ni (R_ENERGY, HOPS, FTR)] using
y logic system. The CH evaluates the fitness value of the two received states and transmits
the report to the neighboring node with a state higher value between the two neighbors.
International Journal of Ambient Systems and Applications (IJASA) Vol.2, No.4, December 2014
20
Figure 1 shows an attack consisting of a fabricated report and the false votes. Figure 1(a) shows a
compromised node, Figure 1(b) shows false votes attached to a fabricated report and Figure 1(c)
mate report. The fabricated report is injected through a
compromised node, and the attack unnecessarily consumes the energy of the sensor node on
transmission paths. A false vote attack can inject false votes attached to a legitimate report,
legitimate reports from the intermediate node. Therefore it is desirable to filter out
these attacks as early as possible to avoid wasting energy in processing and forwarding
as proposed as a countermeasure for
13]. The scheme distinguishes among two types of attacks with the help
= 2 indicates a
= 1, the cluster head (CH) forwards the report to the base
station (BS) and does not drop it. In the case of 2, CH drops the report by countering it as a false
rity threshold (‘2’) in a
set path. However, the
selection verification nodes are fixed, which does not comply with the requirements for a
logic (ENSF).
The proposed scheme randomly selected two neighbor nodes before a report is transmitted. The
selected neighbor nodes transmit their current state [State_Ni (R_ENERGY, HOPS, FTR)] using
y logic system. The CH evaluates the fitness value of the two received states and transmits
the report to the neighboring node with a state higher value between the two neighbors.
International Journal of Ambient Systems and Applications (IJASA) Vol.2, No.4, December 2014
21
The rest of the paper is organized as follows: Section 2, describe several en-route filtering
schemes, specifically PVFS. The design and operation of the proposed scheme is described in
detail in Section 3. In Section 4, the experimental results the analysis of PVFS and ENSF are
presented. The conclusions and future work are given at the end of the paper.
2. BACKGROUND
We review the schemes closely related to our work in Section 2.1, Section 2.2 describes the
background, and the motivation of this paper is presented in Section 2.3.
2.1. Related Works
A statistical en-route filtering scheme (SEF) was proposed to filter out fabricated report injection
attacks [7-8]. SEF verifies a report using a symmetric key and probability in an intermediate
node. If a report fails verification, it is dropped between the intermediate nodes. The interleaved
hop-by-hop authentication scheme (IHA) is a verification or disuse scheme using a pair wise key
during report transmission in the node [6]. Commutative cipher based en-route filtering (CCEF)
uses a commutative cipher to verify the reports with a signature a countermeasure against
fabricated report injection attack [14]. A bandwidth-efficient cooperative authentication scheme
(BECAN) validates report through a private key before they are shared when the source CH
generate the report [15].
These schemes [6-8, 14, 15] have been proposed to reduce unnecessary energy consumption that
results from fabricated report injection attacks. When implemented in WSNs these schemes may
not detect false votes and false report attacks. Therefore, we need an en-route filtering scheme
which can detect both types of attacks at the same time. PVFS was proposed to detect both of
these attacks. However, it is not an energy efficient solution. Our work is closely related to this
last scheme in which we improve detection of the above attacks conserving energy using a fuzzy
logic based system.
International Journal of Ambient Systems and Applications (IJASA) Vol.2, No.4, December 2014
2.2. PVFS
PVFS was proposed by Li and Wu as a countermeasure against false votes and fabricated report
attacks [12]. This scheme uses fixed verification
network dynamics (e.g., the residual energy of a node). There are three phase of PVFS: 1) the key
assignment phase, 2) the report generation phase, and 3) the filtering phase. Figure 2 shows the
key assignment phase.
1) Key Assignment Phase
After the sensor nodes are deployed in the sensor field, the global key pool (GKP) of the base
station (BS) generates symmetric keys and stores them in the (GKP). The keys in the GKP are
grouped into partitions and keys from each partition are sent to the CHs. Each node randomly
selects a symmetric key from the respective GKP partition in the cluster
2) Report Generation Phase
International Journal of Ambient Systems and Applications (IJASA) Vol.2, No.4, December 2014
PVFS was proposed by Li and Wu as a countermeasure against false votes and fabricated report
attacks [12]. This scheme uses fixed verification nodes and thresholds which do not cater to the
network dynamics (e.g., the residual energy of a node). There are three phase of PVFS: 1) the key
assignment phase, 2) the report generation phase, and 3) the filtering phase. Figure 2 shows the
Figure 2.Key assignment phase
After the sensor nodes are deployed in the sensor field, the global key pool (GKP) of the base
station (BS) generates symmetric keys and stores them in the (GKP). The keys in the GKP are
grouped into partitions and keys from each partition are sent to the CHs. Each node randomly
selects a symmetric key from the respective GKP partition in the cluster.
Figure 3.Report generation phase
International Journal of Ambient Systems and Applications (IJASA) Vol.2, No.4, December 2014
22
PVFS was proposed by Li and Wu as a countermeasure against false votes and fabricated report
nodes and thresholds which do not cater to the
network dynamics (e.g., the residual energy of a node). There are three phase of PVFS: 1) the key
assignment phase, 2) the report generation phase, and 3) the filtering phase. Figure 2 shows the
After the sensor nodes are deployed in the sensor field, the global key pool (GKP) of the base
station (BS) generates symmetric keys and stores them in the (GKP). The keys in the GKP are
grouped into partitions and keys from each partition are sent to the CHs. Each node randomly
International Journal of Ambient Systems and Applications (IJASA) Vol.2, No.4, December 2014
Figure 3 describes the report generation phase. If an event occur in the cluster, CH0 receive votes
of the event from each of the normal nodes. CH0 randomly select five votes and attach them to
generate a report. Furthermore, CH0 selects the verification n
path. CH0 decide verification node based on the equation
distance between CH0 and the base station, and
intermediate CH0 and the base station. In
probability of CH1 to be a verification node is P_1=3/4.
3) En-route Filtering Phase
Figure 4 shows the en-route filtering phase. After a report is generated in
the report to CH1. CH1 verifies the votes in the report by using the symmetric key. If CH1
identifies a false vote, CH1 attach the information on the false vote to the report and CH1 check if
ܶ௙ ൌ 2 has been reached. If the security
to CH2. Since CH2 is not a verification node, it transmits the report to CH3. If CH3 detects
another false vote after the report verification by using the symmetric key, CH3 filters out the
report. The reason for this is that the threshold
2.3. Motivation
WSNs are deployed in an open environment without any physical protection, and an attacker can
inject false votes and fabricated report through a compromised node. PVFS has
a countermeasure against false votes and fabricated report injection attacks. When CH or normal
nodes are compromised, the original scheme cannot reset the path. In the case where symmetric
keys and the path are reset, then the BS has to r
(in those clusters) through the old path. Moreover, a new path has to be created. Such overhead
causes a waste in energy and shortens the lifetime of the network. In this paper, we propose a
verification path election scheme based on a fuzzy logic system in order to improve energy
consumption and improve network lifetime.
International Journal of Ambient Systems and Applications (IJASA) Vol.2, No.4, December 2014
Figure 3 describes the report generation phase. If an event occur in the cluster, CH0 receive votes
of the event from each of the normal nodes. CH0 randomly select five votes and attach them to
generate a report. Furthermore, CH0 selects the verification nodes, based on an already preset
path. CH0 decide verification node based on the equation ݀௜, ݀଴ . Where ݀଴ represents the
distance between CH0 and the base station, and ݀௜ represents the distance between an
intermediate CH0 and the base station. In the Fig. 3, ݀଴ = 4 and ݀௜ = 3 based on CH1, and the
probability of CH1 to be a verification node is P_1=3/4.
Figure 4.En-route filtering phase
route filtering phase. After a report is generated in phase 2, CH0 transmits
the report to CH1. CH1 verifies the votes in the report by using the symmetric key. If CH1
identifies a false vote, CH1 attach the information on the false vote to the report and CH1 check if
has been reached. If the security threshold has not been reached, CH1 transmits the report
to CH2. Since CH2 is not a verification node, it transmits the report to CH3. If CH3 detects
another false vote after the report verification by using the symmetric key, CH3 filters out the
he reason for this is that the threshold ܶ௙ ൌ 2 has been reached.
WSNs are deployed in an open environment without any physical protection, and an attacker can
inject false votes and fabricated report through a compromised node. PVFS has been proposed as
a countermeasure against false votes and fabricated report injection attacks. When CH or normal
nodes are compromised, the original scheme cannot reset the path. In the case where symmetric
keys and the path are reset, then the BS has to redistribute symmetric keys on all CHs and nodes
(in those clusters) through the old path. Moreover, a new path has to be created. Such overhead
causes a waste in energy and shortens the lifetime of the network. In this paper, we propose a
election scheme based on a fuzzy logic system in order to improve energy
consumption and improve network lifetime.
International Journal of Ambient Systems and Applications (IJASA) Vol.2, No.4, December 2014
23
Figure 3 describes the report generation phase. If an event occur in the cluster, CH0 receive votes
of the event from each of the normal nodes. CH0 randomly select five votes and attach them to
odes, based on an already preset
represents the
represents the distance between an
= 3 based on CH1, and the
phase 2, CH0 transmits
the report to CH1. CH1 verifies the votes in the report by using the symmetric key. If CH1
identifies a false vote, CH1 attach the information on the false vote to the report and CH1 check if
threshold has not been reached, CH1 transmits the report
to CH2. Since CH2 is not a verification node, it transmits the report to CH3. If CH3 detects
another false vote after the report verification by using the symmetric key, CH3 filters out the
WSNs are deployed in an open environment without any physical protection, and an attacker can
been proposed as
a countermeasure against false votes and fabricated report injection attacks. When CH or normal
nodes are compromised, the original scheme cannot reset the path. In the case where symmetric
edistribute symmetric keys on all CHs and nodes
(in those clusters) through the old path. Moreover, a new path has to be created. Such overhead
causes a waste in energy and shortens the lifetime of the network. In this paper, we propose a
election scheme based on a fuzzy logic system in order to improve energy
International Journal of Ambient Systems and Applications (IJASA) Vol.2, No.4, December 2014
3. PROPOSED SCHEME
In this section, we describe the assumptions of the proposed scheme, the working procedure, the
fuzzy logic system, and the proposed verification path election scheme in Subsections 3.1 to 3.4.
The scheme and fuzzy logic system are presented in 3.4.
3.1. Assumptions
The sensor nodes of the sensor field are grouped into clusters [3]. The sensor nodes are
distributed uniformly in the sensor field grid, and it is further assumed that, sensor nodes are
static. Each node is assumed to be a Mica2 mote [16], with memory of
Each sensor node is aware of its unique ID, location, energy level and the number of hops to the
BS. Each CH manages the routing table of the neighbor nodes within its transmission range. The
BS is assumed to have unlimited resour
manage the GKP. Finally, we assume that the sensor nodes are prone to false votes and fabricated
report attacks.
3.2. Operation Procedure
The sensor nodes receive a unique ID from the user before deplo
can connect to the CH unit through the BS using the internet. Each cluster receives the symmetric
key partition from the BS. When an event occurs in one of the clusters, the CH generates a report,
and the generated report is sent to the next neighbor node based on the verification path election
scheme for verification. The verification path election scheme randomly select one of two of the
neighbor nodes as a source CH. Neighbor nodes transmit the state of their fitness val
a fuzzy logic system to the source CH, and the CH transmits the report to the neighbor node with
high fitness. This neighbor node is used as a verification node to verify the votes on the report
through a symmetric key in the report
3.3. Fuzzy Logic System
Figure
International Journal of Ambient Systems and Applications (IJASA) Vol.2, No.4, December 2014
In this section, we describe the assumptions of the proposed scheme, the working procedure, the
and the proposed verification path election scheme in Subsections 3.1 to 3.4.
The scheme and fuzzy logic system are presented in 3.4.
The sensor nodes of the sensor field are grouped into clusters [3]. The sensor nodes are
distributed uniformly in the sensor field grid, and it is further assumed that, sensor nodes are
static. Each node is assumed to be a Mica2 mote [16], with memory of 512௞௕ and energy of
Each sensor node is aware of its unique ID, location, energy level and the number of hops to the
BS. Each CH manages the routing table of the neighbor nodes within its transmission range. The
BS is assumed to have unlimited resources and the CH also has enough energy to receive and
manage the GKP. Finally, we assume that the sensor nodes are prone to false votes and fabricated
The sensor nodes receive a unique ID from the user before deployment in the sensor field. A user
can connect to the CH unit through the BS using the internet. Each cluster receives the symmetric
key partition from the BS. When an event occurs in one of the clusters, the CH generates a report,
is sent to the next neighbor node based on the verification path election
scheme for verification. The verification path election scheme randomly select one of two of the
neighbor nodes as a source CH. Neighbor nodes transmit the state of their fitness val
a fuzzy logic system to the source CH, and the CH transmits the report to the neighbor node with
high fitness. This neighbor node is used as a verification node to verify the votes on the report
through a symmetric key in the report.
Figure 5.Fuzzy logic system process
International Journal of Ambient Systems and Applications (IJASA) Vol.2, No.4, December 2014
24
In this section, we describe the assumptions of the proposed scheme, the working procedure, the
and the proposed verification path election scheme in Subsections 3.1 to 3.4.
The sensor nodes of the sensor field are grouped into clusters [3]. The sensor nodes are
distributed uniformly in the sensor field grid, and it is further assumed that, sensor nodes are
and energy of 3௃.
Each sensor node is aware of its unique ID, location, energy level and the number of hops to the
BS. Each CH manages the routing table of the neighbor nodes within its transmission range. The
ces and the CH also has enough energy to receive and
manage the GKP. Finally, we assume that the sensor nodes are prone to false votes and fabricated
yment in the sensor field. A user
can connect to the CH unit through the BS using the internet. Each cluster receives the symmetric
key partition from the BS. When an event occurs in one of the clusters, the CH generates a report,
is sent to the next neighbor node based on the verification path election
scheme for verification. The verification path election scheme randomly select one of two of the
neighbor nodes as a source CH. Neighbor nodes transmit the state of their fitness values based on
a fuzzy logic system to the source CH, and the CH transmits the report to the neighbor node with
high fitness. This neighbor node is used as a verification node to verify the votes on the report
International Journal of Ambient Systems and Applications (IJASA) Vol.2, No.4, December 2014
25
Figure 5 shows the operating process of the fuzzy logic system. In the figure, when CH0 selects
the verification path to report the transmission, which is selected as the nodes with high fitness in
the neighboring area, the inference of the fuzzy logic system is the min-max centroid of the
mamdani, and defuzzification uses the centroid technique. Input factors are the residual energy,
hops, and ratio of fabricated reports.
• Input factors
1) Residual Energy = {LOW, HALF, HIGH}
2) Hops = {SHORT, AVERAGE, LONG}
3) Ratio of Fabricated Report = {VERY_LOW, LOW, MEDIUM, HIGH, VERY_HIGH}
1) Residual Energy
The sensor node needs to have efficiency when using the scheme due to the limited energy
available. WSN protocols consider the energy of the sensor nodes. The original scheme could
shorten the network lifetime as well as the unnecessarily high energy consumption of the nodes
because of the fixed threshold verification node. Therefore, the residual energy of the node is very
important information for the fuzzy logic system when verifying node selection.
2) Hops
The number of hops is count of the number of connections of the path from the position of sensor
node until the BS. This path causes energy consumption at the nodes depending on the ratio of
fabricated reports. For example, if there is a case of a legitimate report, intermediate nodes use
resources efficiently, shortening the distance to the BS. Otherwise, sensor nodes use energy
unnecessarily due to the long intermediate distance to the BS.
3) Ratio of Fabricated Report
The ratio of the fabricated reports represents the strength of the attack in the WSN. In a WSN
environment, if there is a high ratio of fabricated reports, sensor nodes are able to save energy of
the sensor nodes as a result of the probabilistic verification of the intermediate node. Otherwise, if
the ratio of the fabricated report is low, the sensor nodes consume energy unnecessarily because
of probabilistic verification of the intermediate node to low since the intermediate node verifies
for duplication in the report. Finally, a probabilistic verification of the intermediate node is
different according to ratio of the fabricated reports.
International Journal of Ambient Systems and Applications (IJASA) Vol.2, No.4, December 2014
• Fuzzy Membership Functions
Figure 6.Membership functions of the input and out parameters.
Rule
No. ENG
0 L
1 L
2 L
3 H
4 H
ㆍㆍㆍ ㆍㆍㆍ
26 U
3.4. Proposed Verification Path Election
After the report generation phase,
on their own. ‫ܪܥ‬଴attaches votes to the report and
nodes (ܰ௥ଵ, ܰ௥ଶ) to verify the votes of the repo
‫ܪܥ‬଴ transmits the reports to the node with high fitness in the neighboring nodes (
verification path election algorithm is as follows:
International Journal of Ambient Systems and Applications (IJASA) Vol.2, No.4, December 2014
Fuzzy Membership Functions
Membership functions of the input and out parameters.
Table 1.Fuzzy if-then rules.
Input Output
ENG HOP FTR FV
L S F VL
L S M L
L S M L
H M F M
H L L H
ㆍㆍㆍ ㆍㆍㆍ ㆍㆍㆍ ㆍㆍㆍ
U S F L
Proposed Verification Path Election Scheme
After the report generation phase, ‫ܪܥ‬଴ receives votes from the normal nodes that are connected
attaches votes to the report and ‫ܪܥ‬଴ transmits the message to the neighboring
) to verify the votes of the report. ܰ௥ଵandܰ௥ଶ transmits their own fitness values to
transmits the reports to the node with high fitness in the neighboring nodes (ܰ
verification path election algorithm is as follows:
International Journal of Ambient Systems and Applications (IJASA) Vol.2, No.4, December 2014
26
Output
ㆍㆍㆍ
receives votes from the normal nodes that are connected
transmits the message to the neighboring
transmits their own fitness values to
ܰ௥ଵ, ܰ௥ଶ). The
International Journal of Ambient Systems and Applications (IJASA) Vol.2, No.4, December 2014
Cluster Head ‫ܪܥ‬଴
Neighbor Node ܰ௥ଵ, ܰ௥ଶ;
‫ܪܥ‬଴receives votes of normal nodes; // normal nodes transmit the vote.
‫ܪܥ‬଴findsneighbor normal nodes; // The neighbor node are CHs.
IF neighbor nodes are NOT NULL AND
fitness (ܰ௥ଵ) > fitness (ܰ௥ଶ) THEN
Send R to ܰ௥ଵ;
ܰ௥ଵ migrates to new ܰ௥௜;
IF fitness (ܰ௥ଶ) > fitness (ܰ௥
Send R to ܰ௥ଶ;
ܰ௥ଶ migrates to new ܰ௥௜;
In the Table 2, ܰ௥ଵ and ܰ௥ଶ are selected randomly by
‫ܪܥ‬଴. Finally, ܰ௥௜ selects the next neighbor nodes
Figure
Figure 7 shows the process of verification of the path election. The original scheme attempts
verification node selection based on a pre
are fixed. Therefore, this scheme needs a solution due the effec
WSNs. In this paper, the proposed scheme fluidly selects the next verification path to use energy
efficiently. In the figure, the source CH randomly selects a neighbor node out of two for report
verification. They transmit their own fitness based on a fuzzy logic system to the source CH. CH
transmits the report to the node with high fitness. The node verifies the votes through a symmetric
key on the report after the report is received. The proposed scheme decreases energy use a
operation overhead through the fuzzy logic system. However, in a WSN environment, if there are
International Journal of Ambient Systems and Applications (IJASA) Vol.2, No.4, December 2014
votes of normal nodes; // normal nodes transmit the vote.
neighbor normal nodes; // The neighbor node are CHs.
IF neighbor nodes are NOT NULL AND
) THEN
௥ଵ) THEN
are selected randomly by ‫ܪܥ‬଴, R is the generated report generated by
selects the next neighbor nodes when ܶ௙ ൌ 2 has been not reached.
Figure 7.Process of verification path election.
Figure 7 shows the process of verification of the path election. The original scheme attempts
verification node selection based on a pre-set path, which uses energy unnecessarily because they
are fixed. Therefore, this scheme needs a solution due the effects on the network lifetime of
WSNs. In this paper, the proposed scheme fluidly selects the next verification path to use energy
efficiently. In the figure, the source CH randomly selects a neighbor node out of two for report
ir own fitness based on a fuzzy logic system to the source CH. CH
transmits the report to the node with high fitness. The node verifies the votes through a symmetric
key on the report after the report is received. The proposed scheme decreases energy use a
operation overhead through the fuzzy logic system. However, in a WSN environment, if there are
International Journal of Ambient Systems and Applications (IJASA) Vol.2, No.4, December 2014
27
, R is the generated report generated by
.
Figure 7 shows the process of verification of the path election. The original scheme attempts
set path, which uses energy unnecessarily because they
ts on the network lifetime of
WSNs. In this paper, the proposed scheme fluidly selects the next verification path to use energy
efficiently. In the figure, the source CH randomly selects a neighbor node out of two for report
ir own fitness based on a fuzzy logic system to the source CH. CH
transmits the report to the node with high fitness. The node verifies the votes through a symmetric
key on the report after the report is received. The proposed scheme decreases energy use and
operation overhead through the fuzzy logic system. However, in a WSN environment, if there are
International Journal of Ambient Systems and Applications (IJASA) Vol.2, No.4, December 2014
many legitimate reports, the sensor nodes will have operational overhead. In the experiment, the
ENSF scheme efficiently used the energy of the sensor nodes
4. EXPERIMENTAL RESULTS
In order to validate the effectiveness of the proposed scheme, we compared it against PVFS via a
simulation. We assume that the sensor field size is of 1500
uniformly distributed. The base station is located at the end of
consumes 16.25/12.5 µJ to transmit/receive a data byte, and each MAC generation consumes 15
µJ [8]. The size of a legitimate report is
consists of ten nodes, and each node can store a symmetric key. We have prepared five graphs
that show a comparison between the proposed scheme and PVFS when implemented in WSNs.
Figure 8 shows the energy consumption with respect to the ratio of attacks. Figure 9 shows the
energy distinction, and Figure 10 shows the ratio of false votes with respect to the ratio of attacks,
Figure 11 is the ratio of filtering, and Figure 12 shows the network life time.
Figure 8 compares the energy efficiency of ENSF to that of PVFS. The proposed scheme shows a
steady and significant energy savings for different FTRs. The reason is that proposed scheme uses
a new verification path election scheme which considers the residual energy of a node before
selecting it as the verification node. On the other hand, in the original scheme, unnecessary
energy is wasted with fixed paths and verification nodes. The proposed scheme can save energy
when subjected to false traffic. Therefore, ENSF scheme consume about 7 percent less energy
than original scheme.
International Journal of Ambient Systems and Applications (IJASA) Vol.2, No.4, December 2014
many legitimate reports, the sensor nodes will have operational overhead. In the experiment, the
ENSF scheme efficiently used the energy of the sensor nodes.
ESULTS
In order to validate the effectiveness of the proposed scheme, we compared it against PVFS via a
simulation. We assume that the sensor field size is of 1500 Ⅹ2000 ݉ଶ
, where 6,000 nodes are
uniformly distributed. The base station is located at the end of the field, and each sensor node
J to transmit/receive a data byte, and each MAC generation consumes 15
J [8]. The size of a legitimate report is 40 bytes and, the size of a MAC is 1byte. Each cluster
consists of ten nodes, and each node can store a symmetric key. We have prepared five graphs
that show a comparison between the proposed scheme and PVFS when implemented in WSNs.
rgy consumption with respect to the ratio of attacks. Figure 9 shows the
energy distinction, and Figure 10 shows the ratio of false votes with respect to the ratio of attacks,
Figure 11 is the ratio of filtering, and Figure 12 shows the network life time.
Figure 8.Energy consumption.
Figure 8 compares the energy efficiency of ENSF to that of PVFS. The proposed scheme shows a
steady and significant energy savings for different FTRs. The reason is that proposed scheme uses
n scheme which considers the residual energy of a node before
selecting it as the verification node. On the other hand, in the original scheme, unnecessary
energy is wasted with fixed paths and verification nodes. The proposed scheme can save energy
ubjected to false traffic. Therefore, ENSF scheme consume about 7 percent less energy
International Journal of Ambient Systems and Applications (IJASA) Vol.2, No.4, December 2014
28
many legitimate reports, the sensor nodes will have operational overhead. In the experiment, the
In order to validate the effectiveness of the proposed scheme, we compared it against PVFS via a
, where 6,000 nodes are
the field, and each sensor node
J to transmit/receive a data byte, and each MAC generation consumes 15
40 bytes and, the size of a MAC is 1byte. Each cluster
consists of ten nodes, and each node can store a symmetric key. We have prepared five graphs
that show a comparison between the proposed scheme and PVFS when implemented in WSNs.
rgy consumption with respect to the ratio of attacks. Figure 9 shows the
energy distinction, and Figure 10 shows the ratio of false votes with respect to the ratio of attacks,
Figure 8 compares the energy efficiency of ENSF to that of PVFS. The proposed scheme shows a
steady and significant energy savings for different FTRs. The reason is that proposed scheme uses
n scheme which considers the residual energy of a node before
selecting it as the verification node. On the other hand, in the original scheme, unnecessary
energy is wasted with fixed paths and verification nodes. The proposed scheme can save energy
ubjected to false traffic. Therefore, ENSF scheme consume about 7 percent less energy
International Journal of Ambient Systems and Applications (IJASA) Vol.2, No.4, December 2014
Figure 9.Percentage of energy saving by ENSF over PVFS.
Figure 9 shows the ratio of energy according to the ratio of attacks. In the figure, the
scheme improves energy savings up to 13% when we have an experiment between 10 and 60
percent false traffic. The reason is that the proposed scheme minimized traffic (operation,
transmission, path distance).
Figure 10 shows the ratio of the false vote detection of the proposed scheme and the original
scheme. In the figure, the proposed scheme has a high ratio of false vote detection relative to the
original scheme when the ratio of attacks is 30, 40, and 60 pe
International Journal of Ambient Systems and Applications (IJASA) Vol.2, No.4, December 2014
Percentage of energy saving by ENSF over PVFS.
Figure 9 shows the ratio of energy according to the ratio of attacks. In the figure, the
scheme improves energy savings up to 13% when we have an experiment between 10 and 60
percent false traffic. The reason is that the proposed scheme minimized traffic (operation,
Figure 10.Numbers of false vote.
Figure 10 shows the ratio of the false vote detection of the proposed scheme and the original
scheme. In the figure, the proposed scheme has a high ratio of false vote detection relative to the
original scheme when the ratio of attacks is 30, 40, and 60 percent.
International Journal of Ambient Systems and Applications (IJASA) Vol.2, No.4, December 2014
29
Figure 9 shows the ratio of energy according to the ratio of attacks. In the figure, the proposed
scheme improves energy savings up to 13% when we have an experiment between 10 and 60
percent false traffic. The reason is that the proposed scheme minimized traffic (operation,
Figure 10 shows the ratio of the false vote detection of the proposed scheme and the original
scheme. In the figure, the proposed scheme has a high ratio of false vote detection relative to the
International Journal of Ambient Systems and Applications (IJASA) Vol.2, No.4, December 2014
Figure 11 shows the filtering number with respect to each hop. In the figure, the proposed scheme
has many filter numbers relative to the original scheme in 5, 9, and 10 of the hops. On average,
the proposed scheme had a low ratio of filtering of the fabricated reports than did the original
scheme, and the energy consumption of the sensors was improved.
Fig. 12 shows the network lifetime of the ENSF and the PVFS. In the
network lifetime is measurement according to the ratio of the attack. The numbers of events for
each is 50. The lifetime of PVFS is 9 rounds and the lifetime of the ENSF is 12 rounds. In the
figure 12, network is disconnected in the P
the ENSF extends to network lifetime compared to the PVFS
International Journal of Ambient Systems and Applications (IJASA) Vol.2, No.4, December 2014
Figure 11.Average of false reports.
Figure 11 shows the filtering number with respect to each hop. In the figure, the proposed scheme
has many filter numbers relative to the original scheme in 5, 9, and 10 of the hops. On average,
cheme had a low ratio of filtering of the fabricated reports than did the original
scheme, and the energy consumption of the sensors was improved.
Figure 12.Network lifetime.
Fig. 12 shows the network lifetime of the ENSF and the PVFS. In the experiments, when the
network lifetime is measurement according to the ratio of the attack. The numbers of events for
each is 50. The lifetime of PVFS is 9 rounds and the lifetime of the ENSF is 12 rounds. In the
figure 12, network is disconnected in the PVFS more quickly compare to the ENSF. Therefore,
the ENSF extends to network lifetime compared to the PVFS.
International Journal of Ambient Systems and Applications (IJASA) Vol.2, No.4, December 2014
30
Figure 11 shows the filtering number with respect to each hop. In the figure, the proposed scheme
has many filter numbers relative to the original scheme in 5, 9, and 10 of the hops. On average,
cheme had a low ratio of filtering of the fabricated reports than did the original
experiments, when the
network lifetime is measurement according to the ratio of the attack. The numbers of events for
each is 50. The lifetime of PVFS is 9 rounds and the lifetime of the ENSF is 12 rounds. In the
VFS more quickly compare to the ENSF. Therefore,
International Journal of Ambient Systems and Applications (IJASA) Vol.2, No.4, December 2014
31
5. CONCLUSION AND FUTURE WORK
PVFS was proposed by Li and Wu as a countermeasure against fabricated reports and false vote
attacks in WSNs. This scheme uses a security threshold to detect attacks about false report and
false vote. The scheme consumes the energy of the sensor nodes because it has a fixed threshold
and verification node. In this paper, we propose a verification path election scheme based on a
fuzzy logic system to efficiently use the energy of the nodes. The scheme compares the state of
neighboring nodes for the report transmission. The input for the neighbor node selection is the
energy, the number of hops, and the ratio of the fabricated report. The proposed scheme considers
the state of the next node when the intermediate node transmits the report to the next node.
Therefore, the proposed scheme can decrease the ratio of the sensor node and the overhead of the
communications because of the selection of the next node is more efficient than that in the
original scheme. In the experiment, the proposed scheme improves energy consumption on
average by 7 percent and a maximum of 13 percent. For future work, some AI algorithms will be
applied in order to find future optimal solutions and security.
ACKNOWLEDGEMENTS
This research was supported by the Basic Science Research Program through the National
Research Foundation of Korea (NRF) funded by the Ministry of Education, Science and
Technology (No. 2013R1A2A2A01013971).
REFERENCES
[1] K. C and W. D, "Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures,"
Elsevier's Ad Hoc Networks Journal, Special Issue on Sensor Network Protocols and Applications,
vol. 1, pp. 293-315, 2003.
[2] I. F. Akyildiz, W. Su, Y. Sankarasubramaniam and E. Cayirci, "A Survey on Sensor Networks," IEEE
Comm. Mag, vol. 40, pp. 102-114, Aug, 2002.
[3] J. N. Al-Karaki Kamal, "Routing techniques in wireless sensor networks: a survey," Wireless
Communications11, 2004.
[4] B. P, D. S and A. P, "SIA: Secure Information Aggregation in Sensor Network*," ACM, pp. 255-265,
2003.
[5] W. Zhang and G. Cao, "Group Rekeying for Filtering False Data in Sensor Network: A
predistribution and Local Collaboration-based Approach," Proc. of INFOCOM, pp. 503-514, 2005.
[6] S. S, J. S and P. N, "An interleaved hop-by-hop authentication scheme for filtering of injected false
data in sensor networks," IEEE, pp. 259-271, May, 2004.
[7] F. Ye, H. Luo, S. Lu and L. Z, "Statistical En-Route Filtering of Injected False Data in Sensor
Networks," IEEE, vol. 4, pp. 2446-2457, Mar, 2004.
[8] F. Ye, H. Luo, S. Lu and L. Zhang, "Statistical En-Route Filtering of Injected False Data in Sensor
Networks," IEEE J. Sel. Area Comm, vol. 23, pp. 839-850, 2005, April, 2005.
[9] J. Zhang and V. Varadharajan, "Wireless sensor network key management survey and taxonomy,"
Journal of Network and Computer Applications, vol. 33, pp. 63-75, 3, 2010.
[10] C. Karlof, N. Sastry and D. Wagner, "TinySec: a link layer security architecture for wireless sensor
networks," ACM, pp. 162-175, 2004.
[11] J. H. Chang, "Maximum Lifetime Routing in Wireless Sensor Networks," IEEE, vol. 12, pp. 609-619,
Aug, 2004.
[12] F. Li and J. Wu, "A Probabilistic voting-based Filtering scheme in wireless sensor networks," Proc.
IWCMC, pp. 27-32, July, 2006.
[13] F. Li and J. Wu, "PVFS: A Probabilistic Voting-based Filtering Scheme in Wireless Sensor
Networks," Inderscience Enterprises Ltd, pp. 173-182, Aug, 2008.
[14] H. Y and S. Lu, "Commutative Cipher Based En-route Filtering in Wireless Sensor Networks," IEEE,
pp. 1223-1227, Sept, 2004.
International Journal of Ambient Systems and Applications (IJASA) Vol.2, No.4, December 2014
32
[15] R. Lu, X. Lin, H. Zhu and X. Li, "BECAN: A Bandwidth-Efficient Cooperative Authentication
Scheme for Filtering Injected False Data in Wireless Sensor Networks," IEEE TRANSACTIONS ON
PARALLEL AND DISTRIBUTED SYSTEMS, vol. 23, pp. 32-43, Jan, 2012.
[16] M. H, M. J.Lyons, D. B and G. Wei, "Survey of Hardware Systems for Wireless Sensor Networks,"
American Scientific Publishers, vol. 4, pp. 1-10, 2008.
Authors
Jae Kwan Lee received his B.S. degrees in computer information from BaekSeok University,
Korea, in February 2013 He is currently a graduate student in the College of Information and
communication Engineering at Sungkyunkwan University, Korea. HiS research interests
include wireless sensor network security, intelligent system and modelling & simulation.
Tae Ho Cho received the Ph.D. degree in Electrical and Computer Engineering from the
University of Arizona, USA, in 1993, and the B.S. and M.S. degrees in Electrical Engineering
from Sungkyunkwan University, Republic of Korea, and the University of Alabama, USA,
respectively. He is currently a Professor in the College of Information and Communication
Engineering, SungkyunkwanUniversity, Korea. His research interests are in the areas of wireless sensor
network, intelligent systems, modeling& simulation, and enterprise resource planning.

More Related Content

What's hot

FUZZY LOGIC-BASED EFFICIENT MESSAGE ROUTE SELECTION METHOD TO PROLONG THE NET...
FUZZY LOGIC-BASED EFFICIENT MESSAGE ROUTE SELECTION METHOD TO PROLONG THE NET...FUZZY LOGIC-BASED EFFICIENT MESSAGE ROUTE SELECTION METHOD TO PROLONG THE NET...
FUZZY LOGIC-BASED EFFICIENT MESSAGE ROUTE SELECTION METHOD TO PROLONG THE NET...
IJCNCJournal
 
Iaetsd a survey on enroute filtering scheme in
Iaetsd a survey on enroute filtering scheme inIaetsd a survey on enroute filtering scheme in
Iaetsd a survey on enroute filtering scheme in
Iaetsd Iaetsd
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
ijceronline
 
Ijetcas14 538
Ijetcas14 538Ijetcas14 538
Ijetcas14 538
Iasir Journals
 
GEOGRAPHIC INFORMATION-BASED ROUTING OPTIMIZATION USING GA FOR CLUSTER-BASED ...
GEOGRAPHIC INFORMATION-BASED ROUTING OPTIMIZATION USING GA FOR CLUSTER-BASED ...GEOGRAPHIC INFORMATION-BASED ROUTING OPTIMIZATION USING GA FOR CLUSTER-BASED ...
GEOGRAPHIC INFORMATION-BASED ROUTING OPTIMIZATION USING GA FOR CLUSTER-BASED ...
ijwmn
 
IMPROVEMENT OF FALSE REPORT DETECTION PERFORMANCE BASED ON INVALID DATA DETEC...
IMPROVEMENT OF FALSE REPORT DETECTION PERFORMANCE BASED ON INVALID DATA DETEC...IMPROVEMENT OF FALSE REPORT DETECTION PERFORMANCE BASED ON INVALID DATA DETEC...
IMPROVEMENT OF FALSE REPORT DETECTION PERFORMANCE BASED ON INVALID DATA DETEC...
IJCNCJournal
 
Detection of PUE Attack by SPARS Model using WSPRT
Detection of PUE Attack by SPARS Model using WSPRTDetection of PUE Attack by SPARS Model using WSPRT
Detection of PUE Attack by SPARS Model using WSPRT
Editor IJCATR
 
Prevention and Detection of Misbehaving Node in WSN Based On the Intrusion De...
Prevention and Detection of Misbehaving Node in WSN Based On the Intrusion De...Prevention and Detection of Misbehaving Node in WSN Based On the Intrusion De...
Prevention and Detection of Misbehaving Node in WSN Based On the Intrusion De...
theijes
 
A Survey of Routing Protocols for Structural Health Monitoring
A Survey of Routing Protocols for Structural Health MonitoringA Survey of Routing Protocols for Structural Health Monitoring
A Survey of Routing Protocols for Structural Health Monitoring
IJEEE
 
AN ENERGY EFFICIENT COUNTERMEASURE AGAINST MULTIPLE ATTACKS OF THE FALSE DATA...
AN ENERGY EFFICIENT COUNTERMEASURE AGAINST MULTIPLE ATTACKS OF THE FALSE DATA...AN ENERGY EFFICIENT COUNTERMEASURE AGAINST MULTIPLE ATTACKS OF THE FALSE DATA...
AN ENERGY EFFICIENT COUNTERMEASURE AGAINST MULTIPLE ATTACKS OF THE FALSE DATA...
ijcsity
 
Filtering Schemes for Injected False Data in Wsn
Filtering Schemes for Injected False Data in WsnFiltering Schemes for Injected False Data in Wsn
Filtering Schemes for Injected False Data in Wsn
IOSR Journals
 
E NERGY - E FFICIENT P ATH C ONFIGURATION M ETHOD FOR DEF IN WSN S
E NERGY - E FFICIENT  P ATH  C ONFIGURATION  M ETHOD FOR  DEF IN  WSN SE NERGY - E FFICIENT  P ATH  C ONFIGURATION  M ETHOD FOR  DEF IN  WSN S
E NERGY - E FFICIENT P ATH C ONFIGURATION M ETHOD FOR DEF IN WSN S
ijitjournal
 
Redundancy Management in Heterogeneous Wireless Sensor Networks
Redundancy Management in Heterogeneous Wireless Sensor NetworksRedundancy Management in Heterogeneous Wireless Sensor Networks
Redundancy Management in Heterogeneous Wireless Sensor Networks
Saeid Hossein Pour
 
paper
paperpaper
Power balancing optimal selective forwarding
Power balancing optimal selective forwardingPower balancing optimal selective forwarding
Power balancing optimal selective forwarding
eSAT Publishing House
 
Bn36386389
Bn36386389Bn36386389
Bn36386389
IJERA Editor
 
Simulation of snooze attack in leach
Simulation of snooze attack in leachSimulation of snooze attack in leach
Simulation of snooze attack in leach
csandit
 

What's hot (17)

FUZZY LOGIC-BASED EFFICIENT MESSAGE ROUTE SELECTION METHOD TO PROLONG THE NET...
FUZZY LOGIC-BASED EFFICIENT MESSAGE ROUTE SELECTION METHOD TO PROLONG THE NET...FUZZY LOGIC-BASED EFFICIENT MESSAGE ROUTE SELECTION METHOD TO PROLONG THE NET...
FUZZY LOGIC-BASED EFFICIENT MESSAGE ROUTE SELECTION METHOD TO PROLONG THE NET...
 
Iaetsd a survey on enroute filtering scheme in
Iaetsd a survey on enroute filtering scheme inIaetsd a survey on enroute filtering scheme in
Iaetsd a survey on enroute filtering scheme in
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Ijetcas14 538
Ijetcas14 538Ijetcas14 538
Ijetcas14 538
 
GEOGRAPHIC INFORMATION-BASED ROUTING OPTIMIZATION USING GA FOR CLUSTER-BASED ...
GEOGRAPHIC INFORMATION-BASED ROUTING OPTIMIZATION USING GA FOR CLUSTER-BASED ...GEOGRAPHIC INFORMATION-BASED ROUTING OPTIMIZATION USING GA FOR CLUSTER-BASED ...
GEOGRAPHIC INFORMATION-BASED ROUTING OPTIMIZATION USING GA FOR CLUSTER-BASED ...
 
IMPROVEMENT OF FALSE REPORT DETECTION PERFORMANCE BASED ON INVALID DATA DETEC...
IMPROVEMENT OF FALSE REPORT DETECTION PERFORMANCE BASED ON INVALID DATA DETEC...IMPROVEMENT OF FALSE REPORT DETECTION PERFORMANCE BASED ON INVALID DATA DETEC...
IMPROVEMENT OF FALSE REPORT DETECTION PERFORMANCE BASED ON INVALID DATA DETEC...
 
Detection of PUE Attack by SPARS Model using WSPRT
Detection of PUE Attack by SPARS Model using WSPRTDetection of PUE Attack by SPARS Model using WSPRT
Detection of PUE Attack by SPARS Model using WSPRT
 
Prevention and Detection of Misbehaving Node in WSN Based On the Intrusion De...
Prevention and Detection of Misbehaving Node in WSN Based On the Intrusion De...Prevention and Detection of Misbehaving Node in WSN Based On the Intrusion De...
Prevention and Detection of Misbehaving Node in WSN Based On the Intrusion De...
 
A Survey of Routing Protocols for Structural Health Monitoring
A Survey of Routing Protocols for Structural Health MonitoringA Survey of Routing Protocols for Structural Health Monitoring
A Survey of Routing Protocols for Structural Health Monitoring
 
AN ENERGY EFFICIENT COUNTERMEASURE AGAINST MULTIPLE ATTACKS OF THE FALSE DATA...
AN ENERGY EFFICIENT COUNTERMEASURE AGAINST MULTIPLE ATTACKS OF THE FALSE DATA...AN ENERGY EFFICIENT COUNTERMEASURE AGAINST MULTIPLE ATTACKS OF THE FALSE DATA...
AN ENERGY EFFICIENT COUNTERMEASURE AGAINST MULTIPLE ATTACKS OF THE FALSE DATA...
 
Filtering Schemes for Injected False Data in Wsn
Filtering Schemes for Injected False Data in WsnFiltering Schemes for Injected False Data in Wsn
Filtering Schemes for Injected False Data in Wsn
 
E NERGY - E FFICIENT P ATH C ONFIGURATION M ETHOD FOR DEF IN WSN S
E NERGY - E FFICIENT  P ATH  C ONFIGURATION  M ETHOD FOR  DEF IN  WSN SE NERGY - E FFICIENT  P ATH  C ONFIGURATION  M ETHOD FOR  DEF IN  WSN S
E NERGY - E FFICIENT P ATH C ONFIGURATION M ETHOD FOR DEF IN WSN S
 
Redundancy Management in Heterogeneous Wireless Sensor Networks
Redundancy Management in Heterogeneous Wireless Sensor NetworksRedundancy Management in Heterogeneous Wireless Sensor Networks
Redundancy Management in Heterogeneous Wireless Sensor Networks
 
paper
paperpaper
paper
 
Power balancing optimal selective forwarding
Power balancing optimal selective forwardingPower balancing optimal selective forwarding
Power balancing optimal selective forwarding
 
Bn36386389
Bn36386389Bn36386389
Bn36386389
 
Simulation of snooze attack in leach
Simulation of snooze attack in leachSimulation of snooze attack in leach
Simulation of snooze attack in leach
 

Similar to Ensf energy efficient next-hop selection

Fuzzy-Based Multiple Path Selection Method for Improving Energy Efficiency in...
Fuzzy-Based Multiple Path Selection Method for Improving Energy Efficiency in...Fuzzy-Based Multiple Path Selection Method for Improving Energy Efficiency in...
Fuzzy-Based Multiple Path Selection Method for Improving Energy Efficiency in...
aciijournal
 
SELECTING VOTES FOR ENERGY EFFICIENCY IN PROBABILISTIC VOTING-BASED FILTERING...
SELECTING VOTES FOR ENERGY EFFICIENCY IN PROBABILISTIC VOTING-BASED FILTERING...SELECTING VOTES FOR ENERGY EFFICIENCY IN PROBABILISTIC VOTING-BASED FILTERING...
SELECTING VOTES FOR ENERGY EFFICIENCY IN PROBABILISTIC VOTING-BASED FILTERING...
ijasa
 
WSN LIFETIME EXTENSION USING GA OPTIMISED FUZZY LOGIC
WSN LIFETIME EXTENSION USING GA OPTIMISED FUZZY LOGICWSN LIFETIME EXTENSION USING GA OPTIMISED FUZZY LOGIC
WSN LIFETIME EXTENSION USING GA OPTIMISED FUZZY LOGIC
AIRCC Publishing Corporation
 
WSN LIFETIME EXTENSION USING GA OPTIMISED FUZZY LOGIC
WSN LIFETIME EXTENSION USING GA OPTIMISED FUZZY LOGICWSN LIFETIME EXTENSION USING GA OPTIMISED FUZZY LOGIC
WSN LIFETIME EXTENSION USING GA OPTIMISED FUZZY LOGIC
ijcsit
 
WSN Lifetime Extension Using GA Optimised Fuzzy Logic
WSN Lifetime Extension Using GA Optimised Fuzzy LogicWSN Lifetime Extension Using GA Optimised Fuzzy Logic
WSN Lifetime Extension Using GA Optimised Fuzzy Logic
AIRCC Publishing Corporation
 
A security method for multiple attacks in sensor networks against the false r...
A security method for multiple attacks in sensor networks against the false r...A security method for multiple attacks in sensor networks against the false r...
A security method for multiple attacks in sensor networks against the false r...
ijitjournal
 
A security method for multiple attacks in sensor networks against false repor...
A security method for multiple attacks in sensor networks against false repor...A security method for multiple attacks in sensor networks against false repor...
A security method for multiple attacks in sensor networks against false repor...
ieijjournal
 
An Enhanced Detection and Energy-Efficient En-Route Filtering Scheme in Wirel...
An Enhanced Detection and Energy-Efficient En-Route Filtering Scheme in Wirel...An Enhanced Detection and Energy-Efficient En-Route Filtering Scheme in Wirel...
An Enhanced Detection and Energy-Efficient En-Route Filtering Scheme in Wirel...
ieijjournal
 
Prevention Method of False Report Generation in Cluser Heads for Dynamic En-R...
Prevention Method of False Report Generation in Cluser Heads for Dynamic En-R...Prevention Method of False Report Generation in Cluser Heads for Dynamic En-R...
Prevention Method of False Report Generation in Cluser Heads for Dynamic En-R...
AIRCC Publishing Corporation
 
PREVENTION METHOD OF FALSE REPORT GENERATION IN CLUSTER HEADS FOR DYNAMIC EN-...
PREVENTION METHOD OF FALSE REPORT GENERATION IN CLUSTER HEADS FOR DYNAMIC EN-...PREVENTION METHOD OF FALSE REPORT GENERATION IN CLUSTER HEADS FOR DYNAMIC EN-...
PREVENTION METHOD OF FALSE REPORT GENERATION IN CLUSTER HEADS FOR DYNAMIC EN-...
ijcsit
 
PREVENTION METHOD OF FALSE REPORT GENERATION IN CLUSTER HEADS FOR DYNAMIC E...
PREVENTION METHOD OF FALSE REPORT  GENERATION IN CLUSTER HEADS FOR DYNAMIC  E...PREVENTION METHOD OF FALSE REPORT  GENERATION IN CLUSTER HEADS FOR DYNAMIC  E...
PREVENTION METHOD OF FALSE REPORT GENERATION IN CLUSTER HEADS FOR DYNAMIC E...
AIRCC Publishing Corporation
 
Fuzzy Logic-based Efficient Message Route Selection Method to Prolong the Net...
Fuzzy Logic-based Efficient Message Route Selection Method to Prolong the Net...Fuzzy Logic-based Efficient Message Route Selection Method to Prolong the Net...
Fuzzy Logic-based Efficient Message Route Selection Method to Prolong the Net...
IJCNCJournal
 
A SECURITY PERIOD UPDATE METHOD USING EVALUATION FUNCTION FOR IMPROVING ENERG...
A SECURITY PERIOD UPDATE METHOD USING EVALUATION FUNCTION FOR IMPROVING ENERG...A SECURITY PERIOD UPDATE METHOD USING EVALUATION FUNCTION FOR IMPROVING ENERG...
A SECURITY PERIOD UPDATE METHOD USING EVALUATION FUNCTION FOR IMPROVING ENERG...
csandit
 
A secure routing process to simultaneously defend against false report and wo...
A secure routing process to simultaneously defend against false report and wo...A secure routing process to simultaneously defend against false report and wo...
A secure routing process to simultaneously defend against false report and wo...
ieijjournal
 
A KEY LEVEL SELECTION WITHIN HASH CHAINS FOR THE EFFICIENT ENERGY CONSUMPTION...
A KEY LEVEL SELECTION WITHIN HASH CHAINS FOR THE EFFICIENT ENERGY CONSUMPTION...A KEY LEVEL SELECTION WITHIN HASH CHAINS FOR THE EFFICIENT ENERGY CONSUMPTION...
A KEY LEVEL SELECTION WITHIN HASH CHAINS FOR THE EFFICIENT ENERGY CONSUMPTION...
ijasa
 
DDoS Attack and Defense Scheme in Wireless Ad hoc Networks
DDoS Attack and Defense Scheme in Wireless Ad hoc NetworksDDoS Attack and Defense Scheme in Wireless Ad hoc Networks
DDoS Attack and Defense Scheme in Wireless Ad hoc Networks
IJNSA Journal
 
A Method of Improving Energy Efficiency Through Geofencing and False Data Blo...
A Method of Improving Energy Efficiency Through Geofencing and False Data Blo...A Method of Improving Energy Efficiency Through Geofencing and False Data Blo...
A Method of Improving Energy Efficiency Through Geofencing and False Data Blo...
IJCNCJournal
 
Derivative threshold actuation for single phase wormhole detection with reduc...
Derivative threshold actuation for single phase wormhole detection with reduc...Derivative threshold actuation for single phase wormhole detection with reduc...
Derivative threshold actuation for single phase wormhole detection with reduc...
ijdpsjournal
 
GEOGRAPHIC INFORMATION-BASED ROUTING OPTIMIZATION USING GA FOR CLUSTER-BASED ...
GEOGRAPHIC INFORMATION-BASED ROUTING OPTIMIZATION USING GA FOR CLUSTER-BASED ...GEOGRAPHIC INFORMATION-BASED ROUTING OPTIMIZATION USING GA FOR CLUSTER-BASED ...
GEOGRAPHIC INFORMATION-BASED ROUTING OPTIMIZATION USING GA FOR CLUSTER-BASED ...
ijwmn
 
THRESHOLD SENSITIVE HETEROGENOUS ROUTING PROTOCOL FOR BETTER ENERGY UTILIZATI...
THRESHOLD SENSITIVE HETEROGENOUS ROUTING PROTOCOL FOR BETTER ENERGY UTILIZATI...THRESHOLD SENSITIVE HETEROGENOUS ROUTING PROTOCOL FOR BETTER ENERGY UTILIZATI...
THRESHOLD SENSITIVE HETEROGENOUS ROUTING PROTOCOL FOR BETTER ENERGY UTILIZATI...
ijassn
 

Similar to Ensf energy efficient next-hop selection (20)

Fuzzy-Based Multiple Path Selection Method for Improving Energy Efficiency in...
Fuzzy-Based Multiple Path Selection Method for Improving Energy Efficiency in...Fuzzy-Based Multiple Path Selection Method for Improving Energy Efficiency in...
Fuzzy-Based Multiple Path Selection Method for Improving Energy Efficiency in...
 
SELECTING VOTES FOR ENERGY EFFICIENCY IN PROBABILISTIC VOTING-BASED FILTERING...
SELECTING VOTES FOR ENERGY EFFICIENCY IN PROBABILISTIC VOTING-BASED FILTERING...SELECTING VOTES FOR ENERGY EFFICIENCY IN PROBABILISTIC VOTING-BASED FILTERING...
SELECTING VOTES FOR ENERGY EFFICIENCY IN PROBABILISTIC VOTING-BASED FILTERING...
 
WSN LIFETIME EXTENSION USING GA OPTIMISED FUZZY LOGIC
WSN LIFETIME EXTENSION USING GA OPTIMISED FUZZY LOGICWSN LIFETIME EXTENSION USING GA OPTIMISED FUZZY LOGIC
WSN LIFETIME EXTENSION USING GA OPTIMISED FUZZY LOGIC
 
WSN LIFETIME EXTENSION USING GA OPTIMISED FUZZY LOGIC
WSN LIFETIME EXTENSION USING GA OPTIMISED FUZZY LOGICWSN LIFETIME EXTENSION USING GA OPTIMISED FUZZY LOGIC
WSN LIFETIME EXTENSION USING GA OPTIMISED FUZZY LOGIC
 
WSN Lifetime Extension Using GA Optimised Fuzzy Logic
WSN Lifetime Extension Using GA Optimised Fuzzy LogicWSN Lifetime Extension Using GA Optimised Fuzzy Logic
WSN Lifetime Extension Using GA Optimised Fuzzy Logic
 
A security method for multiple attacks in sensor networks against the false r...
A security method for multiple attacks in sensor networks against the false r...A security method for multiple attacks in sensor networks against the false r...
A security method for multiple attacks in sensor networks against the false r...
 
A security method for multiple attacks in sensor networks against false repor...
A security method for multiple attacks in sensor networks against false repor...A security method for multiple attacks in sensor networks against false repor...
A security method for multiple attacks in sensor networks against false repor...
 
An Enhanced Detection and Energy-Efficient En-Route Filtering Scheme in Wirel...
An Enhanced Detection and Energy-Efficient En-Route Filtering Scheme in Wirel...An Enhanced Detection and Energy-Efficient En-Route Filtering Scheme in Wirel...
An Enhanced Detection and Energy-Efficient En-Route Filtering Scheme in Wirel...
 
Prevention Method of False Report Generation in Cluser Heads for Dynamic En-R...
Prevention Method of False Report Generation in Cluser Heads for Dynamic En-R...Prevention Method of False Report Generation in Cluser Heads for Dynamic En-R...
Prevention Method of False Report Generation in Cluser Heads for Dynamic En-R...
 
PREVENTION METHOD OF FALSE REPORT GENERATION IN CLUSTER HEADS FOR DYNAMIC EN-...
PREVENTION METHOD OF FALSE REPORT GENERATION IN CLUSTER HEADS FOR DYNAMIC EN-...PREVENTION METHOD OF FALSE REPORT GENERATION IN CLUSTER HEADS FOR DYNAMIC EN-...
PREVENTION METHOD OF FALSE REPORT GENERATION IN CLUSTER HEADS FOR DYNAMIC EN-...
 
PREVENTION METHOD OF FALSE REPORT GENERATION IN CLUSTER HEADS FOR DYNAMIC E...
PREVENTION METHOD OF FALSE REPORT  GENERATION IN CLUSTER HEADS FOR DYNAMIC  E...PREVENTION METHOD OF FALSE REPORT  GENERATION IN CLUSTER HEADS FOR DYNAMIC  E...
PREVENTION METHOD OF FALSE REPORT GENERATION IN CLUSTER HEADS FOR DYNAMIC E...
 
Fuzzy Logic-based Efficient Message Route Selection Method to Prolong the Net...
Fuzzy Logic-based Efficient Message Route Selection Method to Prolong the Net...Fuzzy Logic-based Efficient Message Route Selection Method to Prolong the Net...
Fuzzy Logic-based Efficient Message Route Selection Method to Prolong the Net...
 
A SECURITY PERIOD UPDATE METHOD USING EVALUATION FUNCTION FOR IMPROVING ENERG...
A SECURITY PERIOD UPDATE METHOD USING EVALUATION FUNCTION FOR IMPROVING ENERG...A SECURITY PERIOD UPDATE METHOD USING EVALUATION FUNCTION FOR IMPROVING ENERG...
A SECURITY PERIOD UPDATE METHOD USING EVALUATION FUNCTION FOR IMPROVING ENERG...
 
A secure routing process to simultaneously defend against false report and wo...
A secure routing process to simultaneously defend against false report and wo...A secure routing process to simultaneously defend against false report and wo...
A secure routing process to simultaneously defend against false report and wo...
 
A KEY LEVEL SELECTION WITHIN HASH CHAINS FOR THE EFFICIENT ENERGY CONSUMPTION...
A KEY LEVEL SELECTION WITHIN HASH CHAINS FOR THE EFFICIENT ENERGY CONSUMPTION...A KEY LEVEL SELECTION WITHIN HASH CHAINS FOR THE EFFICIENT ENERGY CONSUMPTION...
A KEY LEVEL SELECTION WITHIN HASH CHAINS FOR THE EFFICIENT ENERGY CONSUMPTION...
 
DDoS Attack and Defense Scheme in Wireless Ad hoc Networks
DDoS Attack and Defense Scheme in Wireless Ad hoc NetworksDDoS Attack and Defense Scheme in Wireless Ad hoc Networks
DDoS Attack and Defense Scheme in Wireless Ad hoc Networks
 
A Method of Improving Energy Efficiency Through Geofencing and False Data Blo...
A Method of Improving Energy Efficiency Through Geofencing and False Data Blo...A Method of Improving Energy Efficiency Through Geofencing and False Data Blo...
A Method of Improving Energy Efficiency Through Geofencing and False Data Blo...
 
Derivative threshold actuation for single phase wormhole detection with reduc...
Derivative threshold actuation for single phase wormhole detection with reduc...Derivative threshold actuation for single phase wormhole detection with reduc...
Derivative threshold actuation for single phase wormhole detection with reduc...
 
GEOGRAPHIC INFORMATION-BASED ROUTING OPTIMIZATION USING GA FOR CLUSTER-BASED ...
GEOGRAPHIC INFORMATION-BASED ROUTING OPTIMIZATION USING GA FOR CLUSTER-BASED ...GEOGRAPHIC INFORMATION-BASED ROUTING OPTIMIZATION USING GA FOR CLUSTER-BASED ...
GEOGRAPHIC INFORMATION-BASED ROUTING OPTIMIZATION USING GA FOR CLUSTER-BASED ...
 
THRESHOLD SENSITIVE HETEROGENOUS ROUTING PROTOCOL FOR BETTER ENERGY UTILIZATI...
THRESHOLD SENSITIVE HETEROGENOUS ROUTING PROTOCOL FOR BETTER ENERGY UTILIZATI...THRESHOLD SENSITIVE HETEROGENOUS ROUTING PROTOCOL FOR BETTER ENERGY UTILIZATI...
THRESHOLD SENSITIVE HETEROGENOUS ROUTING PROTOCOL FOR BETTER ENERGY UTILIZATI...
 

More from ijasa

A CONCEPTUAL FRAMEWORK OF A DETECTIVE MODEL FOR SOCIAL BOT CLASSIFICATION
A CONCEPTUAL FRAMEWORK OF A DETECTIVE MODEL FOR SOCIAL BOT CLASSIFICATIONA CONCEPTUAL FRAMEWORK OF A DETECTIVE MODEL FOR SOCIAL BOT CLASSIFICATION
A CONCEPTUAL FRAMEWORK OF A DETECTIVE MODEL FOR SOCIAL BOT CLASSIFICATION
ijasa
 
DESIGN OF A MINIATURE RECTANGULAR PATCH ANTENNA FOR KU BAND APPLICATIONS
DESIGN OF A MINIATURE RECTANGULAR PATCH ANTENNA FOR KU BAND APPLICATIONSDESIGN OF A MINIATURE RECTANGULAR PATCH ANTENNA FOR KU BAND APPLICATIONS
DESIGN OF A MINIATURE RECTANGULAR PATCH ANTENNA FOR KU BAND APPLICATIONS
ijasa
 
SMART SOUND SYSTEM APPLIED FOR THE EXTENSIVE CARE OF PEOPLE WITH HEARING IMPA...
SMART SOUND SYSTEM APPLIED FOR THE EXTENSIVE CARE OF PEOPLE WITH HEARING IMPA...SMART SOUND SYSTEM APPLIED FOR THE EXTENSIVE CARE OF PEOPLE WITH HEARING IMPA...
SMART SOUND SYSTEM APPLIED FOR THE EXTENSIVE CARE OF PEOPLE WITH HEARING IMPA...
ijasa
 
AN INTELLIGENT AND DATA-DRIVEN MOBILE VOLUNTEER EVENT MANAGEMENT PLATFORM USI...
AN INTELLIGENT AND DATA-DRIVEN MOBILE VOLUNTEER EVENT MANAGEMENT PLATFORM USI...AN INTELLIGENT AND DATA-DRIVEN MOBILE VOLUNTEER EVENT MANAGEMENT PLATFORM USI...
AN INTELLIGENT AND DATA-DRIVEN MOBILE VOLUNTEER EVENT MANAGEMENT PLATFORM USI...
ijasa
 
A STUDY OF IOT BASED REAL-TIME SOLAR POWER REMOTE MONITORING SYSTEM
A STUDY OF IOT BASED REAL-TIME SOLAR POWER REMOTE MONITORING SYSTEMA STUDY OF IOT BASED REAL-TIME SOLAR POWER REMOTE MONITORING SYSTEM
A STUDY OF IOT BASED REAL-TIME SOLAR POWER REMOTE MONITORING SYSTEM
ijasa
 
SENSOR BASED SMART IRRIGATION SYSTEM WITH MONITORING AND CONTROLLING USING IN...
SENSOR BASED SMART IRRIGATION SYSTEM WITH MONITORING AND CONTROLLING USING IN...SENSOR BASED SMART IRRIGATION SYSTEM WITH MONITORING AND CONTROLLING USING IN...
SENSOR BASED SMART IRRIGATION SYSTEM WITH MONITORING AND CONTROLLING USING IN...
ijasa
 
COMPARISON OF BIT ERROR RATE PERFORMANCE OF VARIOUS DIGITAL MODULATION SCHEME...
COMPARISON OF BIT ERROR RATE PERFORMANCE OF VARIOUS DIGITAL MODULATION SCHEME...COMPARISON OF BIT ERROR RATE PERFORMANCE OF VARIOUS DIGITAL MODULATION SCHEME...
COMPARISON OF BIT ERROR RATE PERFORMANCE OF VARIOUS DIGITAL MODULATION SCHEME...
ijasa
 
PERFORMANCE OF CONVOLUTION AND CRC CHANNEL ENCODED V-BLAST 4×4 MIMO MCCDMA WI...
PERFORMANCE OF CONVOLUTION AND CRC CHANNEL ENCODED V-BLAST 4×4 MIMO MCCDMA WI...PERFORMANCE OF CONVOLUTION AND CRC CHANNEL ENCODED V-BLAST 4×4 MIMO MCCDMA WI...
PERFORMANCE OF CONVOLUTION AND CRC CHANNEL ENCODED V-BLAST 4×4 MIMO MCCDMA WI...
ijasa
 
A SCRUTINY TO ATTACK ISSUES AND SECURITY CHALLENGES IN CLOUD COMPUTING
A SCRUTINY TO ATTACK ISSUES AND SECURITY CHALLENGES IN CLOUD COMPUTINGA SCRUTINY TO ATTACK ISSUES AND SECURITY CHALLENGES IN CLOUD COMPUTING
A SCRUTINY TO ATTACK ISSUES AND SECURITY CHALLENGES IN CLOUD COMPUTING
ijasa
 
The International Journal of Ambient Systems and Applications (IJASA)
The International Journal of Ambient Systems and Applications (IJASA) The International Journal of Ambient Systems and Applications (IJASA)
The International Journal of Ambient Systems and Applications (IJASA)
ijasa
 
A SCRUTINY TO ATTACK ISSUES AND SECURITY CHALLENGES IN CLOUD COMPUTING
A SCRUTINY TO ATTACK ISSUES AND SECURITY CHALLENGES IN CLOUD COMPUTINGA SCRUTINY TO ATTACK ISSUES AND SECURITY CHALLENGES IN CLOUD COMPUTING
A SCRUTINY TO ATTACK ISSUES AND SECURITY CHALLENGES IN CLOUD COMPUTING
ijasa
 
TOWARD ORGANIC COMPUTING APPROACH FOR CYBERNETIC RESPONSIVE ENVIRONMENT
TOWARD ORGANIC COMPUTING APPROACH FOR CYBERNETIC RESPONSIVE ENVIRONMENTTOWARD ORGANIC COMPUTING APPROACH FOR CYBERNETIC RESPONSIVE ENVIRONMENT
TOWARD ORGANIC COMPUTING APPROACH FOR CYBERNETIC RESPONSIVE ENVIRONMENT
ijasa
 
A STUDY ON DEVELOPING A SMART ENVIRONMENT IN AGRICULTURAL IRRIGATION TECHNIQUE
A STUDY ON DEVELOPING A SMART ENVIRONMENT IN AGRICULTURAL IRRIGATION TECHNIQUEA STUDY ON DEVELOPING A SMART ENVIRONMENT IN AGRICULTURAL IRRIGATION TECHNIQUE
A STUDY ON DEVELOPING A SMART ENVIRONMENT IN AGRICULTURAL IRRIGATION TECHNIQUE
ijasa
 
A REVIEW ON DDOS PREVENTION AND DETECTION METHODOLOGY
A REVIEW ON DDOS PREVENTION AND DETECTION METHODOLOGYA REVIEW ON DDOS PREVENTION AND DETECTION METHODOLOGY
A REVIEW ON DDOS PREVENTION AND DETECTION METHODOLOGY
ijasa
 
Android based security and home
Android based security and homeAndroid based security and home
Android based security and home
ijasa
 
An imperative focus on semantic
An imperative focus on semanticAn imperative focus on semantic
An imperative focus on semantic
ijasa
 
Review on classification based on artificial
Review on classification based on artificialReview on classification based on artificial
Review on classification based on artificial
ijasa
 
Intelligent soft computing based
Intelligent soft computing basedIntelligent soft computing based
Intelligent soft computing based
ijasa
 
A novel approach for preventing black hole
A novel approach for preventing black holeA novel approach for preventing black hole
A novel approach for preventing black hole
ijasa
 
Improving performance of routing protocols using mrp framework
Improving performance of routing protocols using mrp frameworkImproving performance of routing protocols using mrp framework
Improving performance of routing protocols using mrp framework
ijasa
 

More from ijasa (20)

A CONCEPTUAL FRAMEWORK OF A DETECTIVE MODEL FOR SOCIAL BOT CLASSIFICATION
A CONCEPTUAL FRAMEWORK OF A DETECTIVE MODEL FOR SOCIAL BOT CLASSIFICATIONA CONCEPTUAL FRAMEWORK OF A DETECTIVE MODEL FOR SOCIAL BOT CLASSIFICATION
A CONCEPTUAL FRAMEWORK OF A DETECTIVE MODEL FOR SOCIAL BOT CLASSIFICATION
 
DESIGN OF A MINIATURE RECTANGULAR PATCH ANTENNA FOR KU BAND APPLICATIONS
DESIGN OF A MINIATURE RECTANGULAR PATCH ANTENNA FOR KU BAND APPLICATIONSDESIGN OF A MINIATURE RECTANGULAR PATCH ANTENNA FOR KU BAND APPLICATIONS
DESIGN OF A MINIATURE RECTANGULAR PATCH ANTENNA FOR KU BAND APPLICATIONS
 
SMART SOUND SYSTEM APPLIED FOR THE EXTENSIVE CARE OF PEOPLE WITH HEARING IMPA...
SMART SOUND SYSTEM APPLIED FOR THE EXTENSIVE CARE OF PEOPLE WITH HEARING IMPA...SMART SOUND SYSTEM APPLIED FOR THE EXTENSIVE CARE OF PEOPLE WITH HEARING IMPA...
SMART SOUND SYSTEM APPLIED FOR THE EXTENSIVE CARE OF PEOPLE WITH HEARING IMPA...
 
AN INTELLIGENT AND DATA-DRIVEN MOBILE VOLUNTEER EVENT MANAGEMENT PLATFORM USI...
AN INTELLIGENT AND DATA-DRIVEN MOBILE VOLUNTEER EVENT MANAGEMENT PLATFORM USI...AN INTELLIGENT AND DATA-DRIVEN MOBILE VOLUNTEER EVENT MANAGEMENT PLATFORM USI...
AN INTELLIGENT AND DATA-DRIVEN MOBILE VOLUNTEER EVENT MANAGEMENT PLATFORM USI...
 
A STUDY OF IOT BASED REAL-TIME SOLAR POWER REMOTE MONITORING SYSTEM
A STUDY OF IOT BASED REAL-TIME SOLAR POWER REMOTE MONITORING SYSTEMA STUDY OF IOT BASED REAL-TIME SOLAR POWER REMOTE MONITORING SYSTEM
A STUDY OF IOT BASED REAL-TIME SOLAR POWER REMOTE MONITORING SYSTEM
 
SENSOR BASED SMART IRRIGATION SYSTEM WITH MONITORING AND CONTROLLING USING IN...
SENSOR BASED SMART IRRIGATION SYSTEM WITH MONITORING AND CONTROLLING USING IN...SENSOR BASED SMART IRRIGATION SYSTEM WITH MONITORING AND CONTROLLING USING IN...
SENSOR BASED SMART IRRIGATION SYSTEM WITH MONITORING AND CONTROLLING USING IN...
 
COMPARISON OF BIT ERROR RATE PERFORMANCE OF VARIOUS DIGITAL MODULATION SCHEME...
COMPARISON OF BIT ERROR RATE PERFORMANCE OF VARIOUS DIGITAL MODULATION SCHEME...COMPARISON OF BIT ERROR RATE PERFORMANCE OF VARIOUS DIGITAL MODULATION SCHEME...
COMPARISON OF BIT ERROR RATE PERFORMANCE OF VARIOUS DIGITAL MODULATION SCHEME...
 
PERFORMANCE OF CONVOLUTION AND CRC CHANNEL ENCODED V-BLAST 4×4 MIMO MCCDMA WI...
PERFORMANCE OF CONVOLUTION AND CRC CHANNEL ENCODED V-BLAST 4×4 MIMO MCCDMA WI...PERFORMANCE OF CONVOLUTION AND CRC CHANNEL ENCODED V-BLAST 4×4 MIMO MCCDMA WI...
PERFORMANCE OF CONVOLUTION AND CRC CHANNEL ENCODED V-BLAST 4×4 MIMO MCCDMA WI...
 
A SCRUTINY TO ATTACK ISSUES AND SECURITY CHALLENGES IN CLOUD COMPUTING
A SCRUTINY TO ATTACK ISSUES AND SECURITY CHALLENGES IN CLOUD COMPUTINGA SCRUTINY TO ATTACK ISSUES AND SECURITY CHALLENGES IN CLOUD COMPUTING
A SCRUTINY TO ATTACK ISSUES AND SECURITY CHALLENGES IN CLOUD COMPUTING
 
The International Journal of Ambient Systems and Applications (IJASA)
The International Journal of Ambient Systems and Applications (IJASA) The International Journal of Ambient Systems and Applications (IJASA)
The International Journal of Ambient Systems and Applications (IJASA)
 
A SCRUTINY TO ATTACK ISSUES AND SECURITY CHALLENGES IN CLOUD COMPUTING
A SCRUTINY TO ATTACK ISSUES AND SECURITY CHALLENGES IN CLOUD COMPUTINGA SCRUTINY TO ATTACK ISSUES AND SECURITY CHALLENGES IN CLOUD COMPUTING
A SCRUTINY TO ATTACK ISSUES AND SECURITY CHALLENGES IN CLOUD COMPUTING
 
TOWARD ORGANIC COMPUTING APPROACH FOR CYBERNETIC RESPONSIVE ENVIRONMENT
TOWARD ORGANIC COMPUTING APPROACH FOR CYBERNETIC RESPONSIVE ENVIRONMENTTOWARD ORGANIC COMPUTING APPROACH FOR CYBERNETIC RESPONSIVE ENVIRONMENT
TOWARD ORGANIC COMPUTING APPROACH FOR CYBERNETIC RESPONSIVE ENVIRONMENT
 
A STUDY ON DEVELOPING A SMART ENVIRONMENT IN AGRICULTURAL IRRIGATION TECHNIQUE
A STUDY ON DEVELOPING A SMART ENVIRONMENT IN AGRICULTURAL IRRIGATION TECHNIQUEA STUDY ON DEVELOPING A SMART ENVIRONMENT IN AGRICULTURAL IRRIGATION TECHNIQUE
A STUDY ON DEVELOPING A SMART ENVIRONMENT IN AGRICULTURAL IRRIGATION TECHNIQUE
 
A REVIEW ON DDOS PREVENTION AND DETECTION METHODOLOGY
A REVIEW ON DDOS PREVENTION AND DETECTION METHODOLOGYA REVIEW ON DDOS PREVENTION AND DETECTION METHODOLOGY
A REVIEW ON DDOS PREVENTION AND DETECTION METHODOLOGY
 
Android based security and home
Android based security and homeAndroid based security and home
Android based security and home
 
An imperative focus on semantic
An imperative focus on semanticAn imperative focus on semantic
An imperative focus on semantic
 
Review on classification based on artificial
Review on classification based on artificialReview on classification based on artificial
Review on classification based on artificial
 
Intelligent soft computing based
Intelligent soft computing basedIntelligent soft computing based
Intelligent soft computing based
 
A novel approach for preventing black hole
A novel approach for preventing black holeA novel approach for preventing black hole
A novel approach for preventing black hole
 
Improving performance of routing protocols using mrp framework
Improving performance of routing protocols using mrp frameworkImproving performance of routing protocols using mrp framework
Improving performance of routing protocols using mrp framework
 

Recently uploaded

Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
IJECEIAES
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
Aditya Rajan Patra
 
CSM Cloud Service Management Presentarion
CSM Cloud Service Management PresentarionCSM Cloud Service Management Presentarion
CSM Cloud Service Management Presentarion
rpskprasana
 
Engineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdfEngineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdf
abbyasa1014
 
Recycled Concrete Aggregate in Construction Part II
Recycled Concrete Aggregate in Construction Part IIRecycled Concrete Aggregate in Construction Part II
Recycled Concrete Aggregate in Construction Part II
Aditya Rajan Patra
 
Engine Lubrication performance System.pdf
Engine Lubrication performance System.pdfEngine Lubrication performance System.pdf
Engine Lubrication performance System.pdf
mamamaam477
 
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesHarnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Christina Lin
 
International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...
gerogepatton
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
gerogepatton
 
ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024
Rahul
 
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.pptUnit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
KrishnaveniKrishnara1
 
A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...
nooriasukmaningtyas
 
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMSA SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
IJNSA Journal
 
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
ihlasbinance2003
 
basic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdfbasic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdf
NidhalKahouli2
 
New techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdfNew techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdf
wisnuprabawa3
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
IJECEIAES
 
Casting-Defect-inSlab continuous casting.pdf
Casting-Defect-inSlab continuous casting.pdfCasting-Defect-inSlab continuous casting.pdf
Casting-Defect-inSlab continuous casting.pdf
zubairahmad848137
 
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdfBPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
MIGUELANGEL966976
 
Literature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptxLiterature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptx
Dr Ramhari Poudyal
 

Recently uploaded (20)

Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
 
CSM Cloud Service Management Presentarion
CSM Cloud Service Management PresentarionCSM Cloud Service Management Presentarion
CSM Cloud Service Management Presentarion
 
Engineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdfEngineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdf
 
Recycled Concrete Aggregate in Construction Part II
Recycled Concrete Aggregate in Construction Part IIRecycled Concrete Aggregate in Construction Part II
Recycled Concrete Aggregate in Construction Part II
 
Engine Lubrication performance System.pdf
Engine Lubrication performance System.pdfEngine Lubrication performance System.pdf
Engine Lubrication performance System.pdf
 
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesHarnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
 
International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
 
ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024
 
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.pptUnit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
 
A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...
 
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMSA SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
 
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
 
basic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdfbasic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdf
 
New techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdfNew techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdf
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
 
Casting-Defect-inSlab continuous casting.pdf
Casting-Defect-inSlab continuous casting.pdfCasting-Defect-inSlab continuous casting.pdf
Casting-Defect-inSlab continuous casting.pdf
 
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdfBPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
 
Literature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptxLiterature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptx
 

Ensf energy efficient next-hop selection

  • 1. International Journal of Ambient Systems and Applications (IJASA) Vol.2, No.4, December 2014 DOI:10.5121/ijasa.2014.2403 19 ENSF: ENERGY-EFFICIENT NEXT-HOP SELECTION METHOD USING FUZZY LOGIC IN PROBABILISTIC VOTING-BASED FILTERING SCHEME Jae Kwan Lee1 and Tae Ho Cho2 1, 2 College of Information and Communication Engineering, Sungkyunkwan University, Suwon 440-746, Republic of Korea ABSTRACT Wireless sensor networks (WSNs) are regularly deployed in harsh and unattended environments, and sensor nodes are easily exposed to attacks due to the random arrangement of the sensor field. An attacker can inject fabricated reports from a compromised node with false votes and false vote-based reports. The false report attacks can waste the energy of the intermediate nodes, shortening the network lifetime. Furthermore, false votes cause the filtering out of legitimate reports. A probabilistic voting-based filtering scheme (PVFS) was proposed as a countermeasure against this type of attacks by Li and Wu. PVFS uses a vote threshold, a security threshold, and a verification node. The scheme does not make additional use energy or communications resources because the verification node and threshold values are fixed. There needs to be a verification node selection method that considers the energy resources of the node. In this paper, we propose a verification path election scheme based on a fuzzy logic system. In the proposed scheme, one node transmits reports in the node with a strong state through a fuzzy logic system after which a neighbor is selected out of two from the surroundings. Experimental results show that the proposed scheme improves energy savings up to maximum 13% relative to the PVFS. KEYWORDS Wireless Sensor Networks, Fabricated Report, False Votes, Fuzzy Logic System 1. INTRODUCTION Wireless sensor networks (WSNs) operate in open environments. WSNs have applications in the fields of home networking, forest management, logistics management, fire monitoring and healthcare [1]. The sensor nodes of the WSNs collect contextual information of the surroundings, and the collected data are transmitted to the users [2-4]. The limitations of the sensor nodes are the limited memory, and energy. Also the sensor nodes can be easily compromised and destroyed as a result of their distribution in open environment [5-6]. An attacker can inject fabricated reports and false votes to a network through a compromised node [7-10], and these attacks deplete the energy and reduce lifetime of the sensor nodes [11].
  • 2. International Journal of Ambient Systems and Applications (IJASA) Vol.2, No.4, December 2014 Figure 1. Figure 1 shows an attack consisting of a fabricated report and the false votes. Figure 1(a) shows a compromised node, Figure 1(b) shows false votes attached to a fabricated report and Figure 1(c) shows a false vote attached to a legiti compromised node, and the attack unnecessarily consumes the energy of the sensor node on transmission paths. A false vote attack can inject false votes attached to a legitimate report, filtering out legitimate reports from the intermediate node. Therefore it is desirable to filter out these attacks as early as possible to avoid wasting energy in processing and forwarding illegitimate information. A probabilistic voting-based filtering scheme (PVFS) w attacks by Li and Wu [12-13]. The scheme distinguishes among two types of attacks with the help of the threshold (ܶ௙ ൌ 2). The threshold false report attack. In the case of station (BS) and does not drop it. In the case of 2, CH drops the report by countering it as a false report attack. The original scheme uses the voting threshold (‘1’) and secu fixed manner, where the decision verification nodes are based on pre selection verification nodes are fixed, which does not comply with the requirements for a dynamic network. In this paper, we propose a new Energy The proposed scheme randomly selected two neighbor nodes before a report is transmitted. The selected neighbor nodes transmit their current state [State_Ni (R_ENERGY, HOPS, FTR)] using a fuzzy logic system. The CH evaluates the fitness value of the two received states and transmits the report to the neighboring node with a state higher value between the two neighbors. International Journal of Ambient Systems and Applications (IJASA) Vol.2, No.4, December 2014 Figure 1.Fabricated report and false votes attacks Figure 1 shows an attack consisting of a fabricated report and the false votes. Figure 1(a) shows a compromised node, Figure 1(b) shows false votes attached to a fabricated report and Figure 1(c) shows a false vote attached to a legitimate report. The fabricated report is injected through a compromised node, and the attack unnecessarily consumes the energy of the sensor node on transmission paths. A false vote attack can inject false votes attached to a legitimate report, legitimate reports from the intermediate node. Therefore it is desirable to filter out these attacks as early as possible to avoid wasting energy in processing and forwarding based filtering scheme (PVFS) was proposed as a countermeasure for 13]. The scheme distinguishes among two types of attacks with the help ). The threshold ܶ௙ = 1 indicates false vote attack, and ܶ௙ = 2 indicates a In the case of ܶ௙ = 1, the cluster head (CH) forwards the report to the base station (BS) and does not drop it. In the case of 2, CH drops the report by countering it as a false report attack. The original scheme uses the voting threshold (‘1’) and security threshold (‘2’) in a fixed manner, where the decision verification nodes are based on pre-set path. However, the selection verification nodes are fixed, which does not comply with the requirements for a ew Energy-efficient Next-hop Selection using Fuzzy-logic (ENSF). The proposed scheme randomly selected two neighbor nodes before a report is transmitted. The selected neighbor nodes transmit their current state [State_Ni (R_ENERGY, HOPS, FTR)] using y logic system. The CH evaluates the fitness value of the two received states and transmits the report to the neighboring node with a state higher value between the two neighbors. International Journal of Ambient Systems and Applications (IJASA) Vol.2, No.4, December 2014 20 Figure 1 shows an attack consisting of a fabricated report and the false votes. Figure 1(a) shows a compromised node, Figure 1(b) shows false votes attached to a fabricated report and Figure 1(c) mate report. The fabricated report is injected through a compromised node, and the attack unnecessarily consumes the energy of the sensor node on transmission paths. A false vote attack can inject false votes attached to a legitimate report, legitimate reports from the intermediate node. Therefore it is desirable to filter out these attacks as early as possible to avoid wasting energy in processing and forwarding as proposed as a countermeasure for 13]. The scheme distinguishes among two types of attacks with the help = 2 indicates a = 1, the cluster head (CH) forwards the report to the base station (BS) and does not drop it. In the case of 2, CH drops the report by countering it as a false rity threshold (‘2’) in a set path. However, the selection verification nodes are fixed, which does not comply with the requirements for a logic (ENSF). The proposed scheme randomly selected two neighbor nodes before a report is transmitted. The selected neighbor nodes transmit their current state [State_Ni (R_ENERGY, HOPS, FTR)] using y logic system. The CH evaluates the fitness value of the two received states and transmits the report to the neighboring node with a state higher value between the two neighbors.
  • 3. International Journal of Ambient Systems and Applications (IJASA) Vol.2, No.4, December 2014 21 The rest of the paper is organized as follows: Section 2, describe several en-route filtering schemes, specifically PVFS. The design and operation of the proposed scheme is described in detail in Section 3. In Section 4, the experimental results the analysis of PVFS and ENSF are presented. The conclusions and future work are given at the end of the paper. 2. BACKGROUND We review the schemes closely related to our work in Section 2.1, Section 2.2 describes the background, and the motivation of this paper is presented in Section 2.3. 2.1. Related Works A statistical en-route filtering scheme (SEF) was proposed to filter out fabricated report injection attacks [7-8]. SEF verifies a report using a symmetric key and probability in an intermediate node. If a report fails verification, it is dropped between the intermediate nodes. The interleaved hop-by-hop authentication scheme (IHA) is a verification or disuse scheme using a pair wise key during report transmission in the node [6]. Commutative cipher based en-route filtering (CCEF) uses a commutative cipher to verify the reports with a signature a countermeasure against fabricated report injection attack [14]. A bandwidth-efficient cooperative authentication scheme (BECAN) validates report through a private key before they are shared when the source CH generate the report [15]. These schemes [6-8, 14, 15] have been proposed to reduce unnecessary energy consumption that results from fabricated report injection attacks. When implemented in WSNs these schemes may not detect false votes and false report attacks. Therefore, we need an en-route filtering scheme which can detect both types of attacks at the same time. PVFS was proposed to detect both of these attacks. However, it is not an energy efficient solution. Our work is closely related to this last scheme in which we improve detection of the above attacks conserving energy using a fuzzy logic based system.
  • 4. International Journal of Ambient Systems and Applications (IJASA) Vol.2, No.4, December 2014 2.2. PVFS PVFS was proposed by Li and Wu as a countermeasure against false votes and fabricated report attacks [12]. This scheme uses fixed verification network dynamics (e.g., the residual energy of a node). There are three phase of PVFS: 1) the key assignment phase, 2) the report generation phase, and 3) the filtering phase. Figure 2 shows the key assignment phase. 1) Key Assignment Phase After the sensor nodes are deployed in the sensor field, the global key pool (GKP) of the base station (BS) generates symmetric keys and stores them in the (GKP). The keys in the GKP are grouped into partitions and keys from each partition are sent to the CHs. Each node randomly selects a symmetric key from the respective GKP partition in the cluster 2) Report Generation Phase International Journal of Ambient Systems and Applications (IJASA) Vol.2, No.4, December 2014 PVFS was proposed by Li and Wu as a countermeasure against false votes and fabricated report attacks [12]. This scheme uses fixed verification nodes and thresholds which do not cater to the network dynamics (e.g., the residual energy of a node). There are three phase of PVFS: 1) the key assignment phase, 2) the report generation phase, and 3) the filtering phase. Figure 2 shows the Figure 2.Key assignment phase After the sensor nodes are deployed in the sensor field, the global key pool (GKP) of the base station (BS) generates symmetric keys and stores them in the (GKP). The keys in the GKP are grouped into partitions and keys from each partition are sent to the CHs. Each node randomly selects a symmetric key from the respective GKP partition in the cluster. Figure 3.Report generation phase International Journal of Ambient Systems and Applications (IJASA) Vol.2, No.4, December 2014 22 PVFS was proposed by Li and Wu as a countermeasure against false votes and fabricated report nodes and thresholds which do not cater to the network dynamics (e.g., the residual energy of a node). There are three phase of PVFS: 1) the key assignment phase, 2) the report generation phase, and 3) the filtering phase. Figure 2 shows the After the sensor nodes are deployed in the sensor field, the global key pool (GKP) of the base station (BS) generates symmetric keys and stores them in the (GKP). The keys in the GKP are grouped into partitions and keys from each partition are sent to the CHs. Each node randomly
  • 5. International Journal of Ambient Systems and Applications (IJASA) Vol.2, No.4, December 2014 Figure 3 describes the report generation phase. If an event occur in the cluster, CH0 receive votes of the event from each of the normal nodes. CH0 randomly select five votes and attach them to generate a report. Furthermore, CH0 selects the verification n path. CH0 decide verification node based on the equation distance between CH0 and the base station, and intermediate CH0 and the base station. In probability of CH1 to be a verification node is P_1=3/4. 3) En-route Filtering Phase Figure 4 shows the en-route filtering phase. After a report is generated in the report to CH1. CH1 verifies the votes in the report by using the symmetric key. If CH1 identifies a false vote, CH1 attach the information on the false vote to the report and CH1 check if ܶ௙ ൌ 2 has been reached. If the security to CH2. Since CH2 is not a verification node, it transmits the report to CH3. If CH3 detects another false vote after the report verification by using the symmetric key, CH3 filters out the report. The reason for this is that the threshold 2.3. Motivation WSNs are deployed in an open environment without any physical protection, and an attacker can inject false votes and fabricated report through a compromised node. PVFS has a countermeasure against false votes and fabricated report injection attacks. When CH or normal nodes are compromised, the original scheme cannot reset the path. In the case where symmetric keys and the path are reset, then the BS has to r (in those clusters) through the old path. Moreover, a new path has to be created. Such overhead causes a waste in energy and shortens the lifetime of the network. In this paper, we propose a verification path election scheme based on a fuzzy logic system in order to improve energy consumption and improve network lifetime. International Journal of Ambient Systems and Applications (IJASA) Vol.2, No.4, December 2014 Figure 3 describes the report generation phase. If an event occur in the cluster, CH0 receive votes of the event from each of the normal nodes. CH0 randomly select five votes and attach them to generate a report. Furthermore, CH0 selects the verification nodes, based on an already preset path. CH0 decide verification node based on the equation ݀௜, ݀଴ . Where ݀଴ represents the distance between CH0 and the base station, and ݀௜ represents the distance between an intermediate CH0 and the base station. In the Fig. 3, ݀଴ = 4 and ݀௜ = 3 based on CH1, and the probability of CH1 to be a verification node is P_1=3/4. Figure 4.En-route filtering phase route filtering phase. After a report is generated in phase 2, CH0 transmits the report to CH1. CH1 verifies the votes in the report by using the symmetric key. If CH1 identifies a false vote, CH1 attach the information on the false vote to the report and CH1 check if has been reached. If the security threshold has not been reached, CH1 transmits the report to CH2. Since CH2 is not a verification node, it transmits the report to CH3. If CH3 detects another false vote after the report verification by using the symmetric key, CH3 filters out the he reason for this is that the threshold ܶ௙ ൌ 2 has been reached. WSNs are deployed in an open environment without any physical protection, and an attacker can inject false votes and fabricated report through a compromised node. PVFS has been proposed as a countermeasure against false votes and fabricated report injection attacks. When CH or normal nodes are compromised, the original scheme cannot reset the path. In the case where symmetric keys and the path are reset, then the BS has to redistribute symmetric keys on all CHs and nodes (in those clusters) through the old path. Moreover, a new path has to be created. Such overhead causes a waste in energy and shortens the lifetime of the network. In this paper, we propose a election scheme based on a fuzzy logic system in order to improve energy consumption and improve network lifetime. International Journal of Ambient Systems and Applications (IJASA) Vol.2, No.4, December 2014 23 Figure 3 describes the report generation phase. If an event occur in the cluster, CH0 receive votes of the event from each of the normal nodes. CH0 randomly select five votes and attach them to odes, based on an already preset represents the represents the distance between an = 3 based on CH1, and the phase 2, CH0 transmits the report to CH1. CH1 verifies the votes in the report by using the symmetric key. If CH1 identifies a false vote, CH1 attach the information on the false vote to the report and CH1 check if threshold has not been reached, CH1 transmits the report to CH2. Since CH2 is not a verification node, it transmits the report to CH3. If CH3 detects another false vote after the report verification by using the symmetric key, CH3 filters out the WSNs are deployed in an open environment without any physical protection, and an attacker can been proposed as a countermeasure against false votes and fabricated report injection attacks. When CH or normal nodes are compromised, the original scheme cannot reset the path. In the case where symmetric edistribute symmetric keys on all CHs and nodes (in those clusters) through the old path. Moreover, a new path has to be created. Such overhead causes a waste in energy and shortens the lifetime of the network. In this paper, we propose a election scheme based on a fuzzy logic system in order to improve energy
  • 6. International Journal of Ambient Systems and Applications (IJASA) Vol.2, No.4, December 2014 3. PROPOSED SCHEME In this section, we describe the assumptions of the proposed scheme, the working procedure, the fuzzy logic system, and the proposed verification path election scheme in Subsections 3.1 to 3.4. The scheme and fuzzy logic system are presented in 3.4. 3.1. Assumptions The sensor nodes of the sensor field are grouped into clusters [3]. The sensor nodes are distributed uniformly in the sensor field grid, and it is further assumed that, sensor nodes are static. Each node is assumed to be a Mica2 mote [16], with memory of Each sensor node is aware of its unique ID, location, energy level and the number of hops to the BS. Each CH manages the routing table of the neighbor nodes within its transmission range. The BS is assumed to have unlimited resour manage the GKP. Finally, we assume that the sensor nodes are prone to false votes and fabricated report attacks. 3.2. Operation Procedure The sensor nodes receive a unique ID from the user before deplo can connect to the CH unit through the BS using the internet. Each cluster receives the symmetric key partition from the BS. When an event occurs in one of the clusters, the CH generates a report, and the generated report is sent to the next neighbor node based on the verification path election scheme for verification. The verification path election scheme randomly select one of two of the neighbor nodes as a source CH. Neighbor nodes transmit the state of their fitness val a fuzzy logic system to the source CH, and the CH transmits the report to the neighbor node with high fitness. This neighbor node is used as a verification node to verify the votes on the report through a symmetric key in the report 3.3. Fuzzy Logic System Figure International Journal of Ambient Systems and Applications (IJASA) Vol.2, No.4, December 2014 In this section, we describe the assumptions of the proposed scheme, the working procedure, the and the proposed verification path election scheme in Subsections 3.1 to 3.4. The scheme and fuzzy logic system are presented in 3.4. The sensor nodes of the sensor field are grouped into clusters [3]. The sensor nodes are distributed uniformly in the sensor field grid, and it is further assumed that, sensor nodes are static. Each node is assumed to be a Mica2 mote [16], with memory of 512௞௕ and energy of Each sensor node is aware of its unique ID, location, energy level and the number of hops to the BS. Each CH manages the routing table of the neighbor nodes within its transmission range. The BS is assumed to have unlimited resources and the CH also has enough energy to receive and manage the GKP. Finally, we assume that the sensor nodes are prone to false votes and fabricated The sensor nodes receive a unique ID from the user before deployment in the sensor field. A user can connect to the CH unit through the BS using the internet. Each cluster receives the symmetric key partition from the BS. When an event occurs in one of the clusters, the CH generates a report, is sent to the next neighbor node based on the verification path election scheme for verification. The verification path election scheme randomly select one of two of the neighbor nodes as a source CH. Neighbor nodes transmit the state of their fitness val a fuzzy logic system to the source CH, and the CH transmits the report to the neighbor node with high fitness. This neighbor node is used as a verification node to verify the votes on the report through a symmetric key in the report. Figure 5.Fuzzy logic system process International Journal of Ambient Systems and Applications (IJASA) Vol.2, No.4, December 2014 24 In this section, we describe the assumptions of the proposed scheme, the working procedure, the and the proposed verification path election scheme in Subsections 3.1 to 3.4. The sensor nodes of the sensor field are grouped into clusters [3]. The sensor nodes are distributed uniformly in the sensor field grid, and it is further assumed that, sensor nodes are and energy of 3௃. Each sensor node is aware of its unique ID, location, energy level and the number of hops to the BS. Each CH manages the routing table of the neighbor nodes within its transmission range. The ces and the CH also has enough energy to receive and manage the GKP. Finally, we assume that the sensor nodes are prone to false votes and fabricated yment in the sensor field. A user can connect to the CH unit through the BS using the internet. Each cluster receives the symmetric key partition from the BS. When an event occurs in one of the clusters, the CH generates a report, is sent to the next neighbor node based on the verification path election scheme for verification. The verification path election scheme randomly select one of two of the neighbor nodes as a source CH. Neighbor nodes transmit the state of their fitness values based on a fuzzy logic system to the source CH, and the CH transmits the report to the neighbor node with high fitness. This neighbor node is used as a verification node to verify the votes on the report
  • 7. International Journal of Ambient Systems and Applications (IJASA) Vol.2, No.4, December 2014 25 Figure 5 shows the operating process of the fuzzy logic system. In the figure, when CH0 selects the verification path to report the transmission, which is selected as the nodes with high fitness in the neighboring area, the inference of the fuzzy logic system is the min-max centroid of the mamdani, and defuzzification uses the centroid technique. Input factors are the residual energy, hops, and ratio of fabricated reports. • Input factors 1) Residual Energy = {LOW, HALF, HIGH} 2) Hops = {SHORT, AVERAGE, LONG} 3) Ratio of Fabricated Report = {VERY_LOW, LOW, MEDIUM, HIGH, VERY_HIGH} 1) Residual Energy The sensor node needs to have efficiency when using the scheme due to the limited energy available. WSN protocols consider the energy of the sensor nodes. The original scheme could shorten the network lifetime as well as the unnecessarily high energy consumption of the nodes because of the fixed threshold verification node. Therefore, the residual energy of the node is very important information for the fuzzy logic system when verifying node selection. 2) Hops The number of hops is count of the number of connections of the path from the position of sensor node until the BS. This path causes energy consumption at the nodes depending on the ratio of fabricated reports. For example, if there is a case of a legitimate report, intermediate nodes use resources efficiently, shortening the distance to the BS. Otherwise, sensor nodes use energy unnecessarily due to the long intermediate distance to the BS. 3) Ratio of Fabricated Report The ratio of the fabricated reports represents the strength of the attack in the WSN. In a WSN environment, if there is a high ratio of fabricated reports, sensor nodes are able to save energy of the sensor nodes as a result of the probabilistic verification of the intermediate node. Otherwise, if the ratio of the fabricated report is low, the sensor nodes consume energy unnecessarily because of probabilistic verification of the intermediate node to low since the intermediate node verifies for duplication in the report. Finally, a probabilistic verification of the intermediate node is different according to ratio of the fabricated reports.
  • 8. International Journal of Ambient Systems and Applications (IJASA) Vol.2, No.4, December 2014 • Fuzzy Membership Functions Figure 6.Membership functions of the input and out parameters. Rule No. ENG 0 L 1 L 2 L 3 H 4 H ㆍㆍㆍ ㆍㆍㆍ 26 U 3.4. Proposed Verification Path Election After the report generation phase, on their own. ‫ܪܥ‬଴attaches votes to the report and nodes (ܰ௥ଵ, ܰ௥ଶ) to verify the votes of the repo ‫ܪܥ‬଴ transmits the reports to the node with high fitness in the neighboring nodes ( verification path election algorithm is as follows: International Journal of Ambient Systems and Applications (IJASA) Vol.2, No.4, December 2014 Fuzzy Membership Functions Membership functions of the input and out parameters. Table 1.Fuzzy if-then rules. Input Output ENG HOP FTR FV L S F VL L S M L L S M L H M F M H L L H ㆍㆍㆍ ㆍㆍㆍ ㆍㆍㆍ ㆍㆍㆍ U S F L Proposed Verification Path Election Scheme After the report generation phase, ‫ܪܥ‬଴ receives votes from the normal nodes that are connected attaches votes to the report and ‫ܪܥ‬଴ transmits the message to the neighboring ) to verify the votes of the report. ܰ௥ଵandܰ௥ଶ transmits their own fitness values to transmits the reports to the node with high fitness in the neighboring nodes (ܰ verification path election algorithm is as follows: International Journal of Ambient Systems and Applications (IJASA) Vol.2, No.4, December 2014 26 Output ㆍㆍㆍ receives votes from the normal nodes that are connected transmits the message to the neighboring transmits their own fitness values to ܰ௥ଵ, ܰ௥ଶ). The
  • 9. International Journal of Ambient Systems and Applications (IJASA) Vol.2, No.4, December 2014 Cluster Head ‫ܪܥ‬଴ Neighbor Node ܰ௥ଵ, ܰ௥ଶ; ‫ܪܥ‬଴receives votes of normal nodes; // normal nodes transmit the vote. ‫ܪܥ‬଴findsneighbor normal nodes; // The neighbor node are CHs. IF neighbor nodes are NOT NULL AND fitness (ܰ௥ଵ) > fitness (ܰ௥ଶ) THEN Send R to ܰ௥ଵ; ܰ௥ଵ migrates to new ܰ௥௜; IF fitness (ܰ௥ଶ) > fitness (ܰ௥ Send R to ܰ௥ଶ; ܰ௥ଶ migrates to new ܰ௥௜; In the Table 2, ܰ௥ଵ and ܰ௥ଶ are selected randomly by ‫ܪܥ‬଴. Finally, ܰ௥௜ selects the next neighbor nodes Figure Figure 7 shows the process of verification of the path election. The original scheme attempts verification node selection based on a pre are fixed. Therefore, this scheme needs a solution due the effec WSNs. In this paper, the proposed scheme fluidly selects the next verification path to use energy efficiently. In the figure, the source CH randomly selects a neighbor node out of two for report verification. They transmit their own fitness based on a fuzzy logic system to the source CH. CH transmits the report to the node with high fitness. The node verifies the votes through a symmetric key on the report after the report is received. The proposed scheme decreases energy use a operation overhead through the fuzzy logic system. However, in a WSN environment, if there are International Journal of Ambient Systems and Applications (IJASA) Vol.2, No.4, December 2014 votes of normal nodes; // normal nodes transmit the vote. neighbor normal nodes; // The neighbor node are CHs. IF neighbor nodes are NOT NULL AND ) THEN ௥ଵ) THEN are selected randomly by ‫ܪܥ‬଴, R is the generated report generated by selects the next neighbor nodes when ܶ௙ ൌ 2 has been not reached. Figure 7.Process of verification path election. Figure 7 shows the process of verification of the path election. The original scheme attempts verification node selection based on a pre-set path, which uses energy unnecessarily because they are fixed. Therefore, this scheme needs a solution due the effects on the network lifetime of WSNs. In this paper, the proposed scheme fluidly selects the next verification path to use energy efficiently. In the figure, the source CH randomly selects a neighbor node out of two for report ir own fitness based on a fuzzy logic system to the source CH. CH transmits the report to the node with high fitness. The node verifies the votes through a symmetric key on the report after the report is received. The proposed scheme decreases energy use a operation overhead through the fuzzy logic system. However, in a WSN environment, if there are International Journal of Ambient Systems and Applications (IJASA) Vol.2, No.4, December 2014 27 , R is the generated report generated by . Figure 7 shows the process of verification of the path election. The original scheme attempts set path, which uses energy unnecessarily because they ts on the network lifetime of WSNs. In this paper, the proposed scheme fluidly selects the next verification path to use energy efficiently. In the figure, the source CH randomly selects a neighbor node out of two for report ir own fitness based on a fuzzy logic system to the source CH. CH transmits the report to the node with high fitness. The node verifies the votes through a symmetric key on the report after the report is received. The proposed scheme decreases energy use and operation overhead through the fuzzy logic system. However, in a WSN environment, if there are
  • 10. International Journal of Ambient Systems and Applications (IJASA) Vol.2, No.4, December 2014 many legitimate reports, the sensor nodes will have operational overhead. In the experiment, the ENSF scheme efficiently used the energy of the sensor nodes 4. EXPERIMENTAL RESULTS In order to validate the effectiveness of the proposed scheme, we compared it against PVFS via a simulation. We assume that the sensor field size is of 1500 uniformly distributed. The base station is located at the end of consumes 16.25/12.5 µJ to transmit/receive a data byte, and each MAC generation consumes 15 µJ [8]. The size of a legitimate report is consists of ten nodes, and each node can store a symmetric key. We have prepared five graphs that show a comparison between the proposed scheme and PVFS when implemented in WSNs. Figure 8 shows the energy consumption with respect to the ratio of attacks. Figure 9 shows the energy distinction, and Figure 10 shows the ratio of false votes with respect to the ratio of attacks, Figure 11 is the ratio of filtering, and Figure 12 shows the network life time. Figure 8 compares the energy efficiency of ENSF to that of PVFS. The proposed scheme shows a steady and significant energy savings for different FTRs. The reason is that proposed scheme uses a new verification path election scheme which considers the residual energy of a node before selecting it as the verification node. On the other hand, in the original scheme, unnecessary energy is wasted with fixed paths and verification nodes. The proposed scheme can save energy when subjected to false traffic. Therefore, ENSF scheme consume about 7 percent less energy than original scheme. International Journal of Ambient Systems and Applications (IJASA) Vol.2, No.4, December 2014 many legitimate reports, the sensor nodes will have operational overhead. In the experiment, the ENSF scheme efficiently used the energy of the sensor nodes. ESULTS In order to validate the effectiveness of the proposed scheme, we compared it against PVFS via a simulation. We assume that the sensor field size is of 1500 Ⅹ2000 ݉ଶ , where 6,000 nodes are uniformly distributed. The base station is located at the end of the field, and each sensor node J to transmit/receive a data byte, and each MAC generation consumes 15 J [8]. The size of a legitimate report is 40 bytes and, the size of a MAC is 1byte. Each cluster consists of ten nodes, and each node can store a symmetric key. We have prepared five graphs that show a comparison between the proposed scheme and PVFS when implemented in WSNs. rgy consumption with respect to the ratio of attacks. Figure 9 shows the energy distinction, and Figure 10 shows the ratio of false votes with respect to the ratio of attacks, Figure 11 is the ratio of filtering, and Figure 12 shows the network life time. Figure 8.Energy consumption. Figure 8 compares the energy efficiency of ENSF to that of PVFS. The proposed scheme shows a steady and significant energy savings for different FTRs. The reason is that proposed scheme uses n scheme which considers the residual energy of a node before selecting it as the verification node. On the other hand, in the original scheme, unnecessary energy is wasted with fixed paths and verification nodes. The proposed scheme can save energy ubjected to false traffic. Therefore, ENSF scheme consume about 7 percent less energy International Journal of Ambient Systems and Applications (IJASA) Vol.2, No.4, December 2014 28 many legitimate reports, the sensor nodes will have operational overhead. In the experiment, the In order to validate the effectiveness of the proposed scheme, we compared it against PVFS via a , where 6,000 nodes are the field, and each sensor node J to transmit/receive a data byte, and each MAC generation consumes 15 40 bytes and, the size of a MAC is 1byte. Each cluster consists of ten nodes, and each node can store a symmetric key. We have prepared five graphs that show a comparison between the proposed scheme and PVFS when implemented in WSNs. rgy consumption with respect to the ratio of attacks. Figure 9 shows the energy distinction, and Figure 10 shows the ratio of false votes with respect to the ratio of attacks, Figure 8 compares the energy efficiency of ENSF to that of PVFS. The proposed scheme shows a steady and significant energy savings for different FTRs. The reason is that proposed scheme uses n scheme which considers the residual energy of a node before selecting it as the verification node. On the other hand, in the original scheme, unnecessary energy is wasted with fixed paths and verification nodes. The proposed scheme can save energy ubjected to false traffic. Therefore, ENSF scheme consume about 7 percent less energy
  • 11. International Journal of Ambient Systems and Applications (IJASA) Vol.2, No.4, December 2014 Figure 9.Percentage of energy saving by ENSF over PVFS. Figure 9 shows the ratio of energy according to the ratio of attacks. In the figure, the scheme improves energy savings up to 13% when we have an experiment between 10 and 60 percent false traffic. The reason is that the proposed scheme minimized traffic (operation, transmission, path distance). Figure 10 shows the ratio of the false vote detection of the proposed scheme and the original scheme. In the figure, the proposed scheme has a high ratio of false vote detection relative to the original scheme when the ratio of attacks is 30, 40, and 60 pe International Journal of Ambient Systems and Applications (IJASA) Vol.2, No.4, December 2014 Percentage of energy saving by ENSF over PVFS. Figure 9 shows the ratio of energy according to the ratio of attacks. In the figure, the scheme improves energy savings up to 13% when we have an experiment between 10 and 60 percent false traffic. The reason is that the proposed scheme minimized traffic (operation, Figure 10.Numbers of false vote. Figure 10 shows the ratio of the false vote detection of the proposed scheme and the original scheme. In the figure, the proposed scheme has a high ratio of false vote detection relative to the original scheme when the ratio of attacks is 30, 40, and 60 percent. International Journal of Ambient Systems and Applications (IJASA) Vol.2, No.4, December 2014 29 Figure 9 shows the ratio of energy according to the ratio of attacks. In the figure, the proposed scheme improves energy savings up to 13% when we have an experiment between 10 and 60 percent false traffic. The reason is that the proposed scheme minimized traffic (operation, Figure 10 shows the ratio of the false vote detection of the proposed scheme and the original scheme. In the figure, the proposed scheme has a high ratio of false vote detection relative to the
  • 12. International Journal of Ambient Systems and Applications (IJASA) Vol.2, No.4, December 2014 Figure 11 shows the filtering number with respect to each hop. In the figure, the proposed scheme has many filter numbers relative to the original scheme in 5, 9, and 10 of the hops. On average, the proposed scheme had a low ratio of filtering of the fabricated reports than did the original scheme, and the energy consumption of the sensors was improved. Fig. 12 shows the network lifetime of the ENSF and the PVFS. In the network lifetime is measurement according to the ratio of the attack. The numbers of events for each is 50. The lifetime of PVFS is 9 rounds and the lifetime of the ENSF is 12 rounds. In the figure 12, network is disconnected in the P the ENSF extends to network lifetime compared to the PVFS International Journal of Ambient Systems and Applications (IJASA) Vol.2, No.4, December 2014 Figure 11.Average of false reports. Figure 11 shows the filtering number with respect to each hop. In the figure, the proposed scheme has many filter numbers relative to the original scheme in 5, 9, and 10 of the hops. On average, cheme had a low ratio of filtering of the fabricated reports than did the original scheme, and the energy consumption of the sensors was improved. Figure 12.Network lifetime. Fig. 12 shows the network lifetime of the ENSF and the PVFS. In the experiments, when the network lifetime is measurement according to the ratio of the attack. The numbers of events for each is 50. The lifetime of PVFS is 9 rounds and the lifetime of the ENSF is 12 rounds. In the figure 12, network is disconnected in the PVFS more quickly compare to the ENSF. Therefore, the ENSF extends to network lifetime compared to the PVFS. International Journal of Ambient Systems and Applications (IJASA) Vol.2, No.4, December 2014 30 Figure 11 shows the filtering number with respect to each hop. In the figure, the proposed scheme has many filter numbers relative to the original scheme in 5, 9, and 10 of the hops. On average, cheme had a low ratio of filtering of the fabricated reports than did the original experiments, when the network lifetime is measurement according to the ratio of the attack. The numbers of events for each is 50. The lifetime of PVFS is 9 rounds and the lifetime of the ENSF is 12 rounds. In the VFS more quickly compare to the ENSF. Therefore,
  • 13. International Journal of Ambient Systems and Applications (IJASA) Vol.2, No.4, December 2014 31 5. CONCLUSION AND FUTURE WORK PVFS was proposed by Li and Wu as a countermeasure against fabricated reports and false vote attacks in WSNs. This scheme uses a security threshold to detect attacks about false report and false vote. The scheme consumes the energy of the sensor nodes because it has a fixed threshold and verification node. In this paper, we propose a verification path election scheme based on a fuzzy logic system to efficiently use the energy of the nodes. The scheme compares the state of neighboring nodes for the report transmission. The input for the neighbor node selection is the energy, the number of hops, and the ratio of the fabricated report. The proposed scheme considers the state of the next node when the intermediate node transmits the report to the next node. Therefore, the proposed scheme can decrease the ratio of the sensor node and the overhead of the communications because of the selection of the next node is more efficient than that in the original scheme. In the experiment, the proposed scheme improves energy consumption on average by 7 percent and a maximum of 13 percent. For future work, some AI algorithms will be applied in order to find future optimal solutions and security. ACKNOWLEDGEMENTS This research was supported by the Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education, Science and Technology (No. 2013R1A2A2A01013971). REFERENCES [1] K. C and W. D, "Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures," Elsevier's Ad Hoc Networks Journal, Special Issue on Sensor Network Protocols and Applications, vol. 1, pp. 293-315, 2003. [2] I. F. Akyildiz, W. Su, Y. Sankarasubramaniam and E. Cayirci, "A Survey on Sensor Networks," IEEE Comm. Mag, vol. 40, pp. 102-114, Aug, 2002. [3] J. N. Al-Karaki Kamal, "Routing techniques in wireless sensor networks: a survey," Wireless Communications11, 2004. [4] B. P, D. S and A. P, "SIA: Secure Information Aggregation in Sensor Network*," ACM, pp. 255-265, 2003. [5] W. Zhang and G. Cao, "Group Rekeying for Filtering False Data in Sensor Network: A predistribution and Local Collaboration-based Approach," Proc. of INFOCOM, pp. 503-514, 2005. [6] S. S, J. S and P. N, "An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks," IEEE, pp. 259-271, May, 2004. [7] F. Ye, H. Luo, S. Lu and L. Z, "Statistical En-Route Filtering of Injected False Data in Sensor Networks," IEEE, vol. 4, pp. 2446-2457, Mar, 2004. [8] F. Ye, H. Luo, S. Lu and L. Zhang, "Statistical En-Route Filtering of Injected False Data in Sensor Networks," IEEE J. Sel. Area Comm, vol. 23, pp. 839-850, 2005, April, 2005. [9] J. Zhang and V. Varadharajan, "Wireless sensor network key management survey and taxonomy," Journal of Network and Computer Applications, vol. 33, pp. 63-75, 3, 2010. [10] C. Karlof, N. Sastry and D. Wagner, "TinySec: a link layer security architecture for wireless sensor networks," ACM, pp. 162-175, 2004. [11] J. H. Chang, "Maximum Lifetime Routing in Wireless Sensor Networks," IEEE, vol. 12, pp. 609-619, Aug, 2004. [12] F. Li and J. Wu, "A Probabilistic voting-based Filtering scheme in wireless sensor networks," Proc. IWCMC, pp. 27-32, July, 2006. [13] F. Li and J. Wu, "PVFS: A Probabilistic Voting-based Filtering Scheme in Wireless Sensor Networks," Inderscience Enterprises Ltd, pp. 173-182, Aug, 2008. [14] H. Y and S. Lu, "Commutative Cipher Based En-route Filtering in Wireless Sensor Networks," IEEE, pp. 1223-1227, Sept, 2004.
  • 14. International Journal of Ambient Systems and Applications (IJASA) Vol.2, No.4, December 2014 32 [15] R. Lu, X. Lin, H. Zhu and X. Li, "BECAN: A Bandwidth-Efficient Cooperative Authentication Scheme for Filtering Injected False Data in Wireless Sensor Networks," IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, vol. 23, pp. 32-43, Jan, 2012. [16] M. H, M. J.Lyons, D. B and G. Wei, "Survey of Hardware Systems for Wireless Sensor Networks," American Scientific Publishers, vol. 4, pp. 1-10, 2008. Authors Jae Kwan Lee received his B.S. degrees in computer information from BaekSeok University, Korea, in February 2013 He is currently a graduate student in the College of Information and communication Engineering at Sungkyunkwan University, Korea. HiS research interests include wireless sensor network security, intelligent system and modelling & simulation. Tae Ho Cho received the Ph.D. degree in Electrical and Computer Engineering from the University of Arizona, USA, in 1993, and the B.S. and M.S. degrees in Electrical Engineering from Sungkyunkwan University, Republic of Korea, and the University of Alabama, USA, respectively. He is currently a Professor in the College of Information and Communication Engineering, SungkyunkwanUniversity, Korea. His research interests are in the areas of wireless sensor network, intelligent systems, modeling& simulation, and enterprise resource planning.