skip to main content
10.1145/1516241.1516345acmconferencesArticle/Chapter ViewAbstractPublication PagesicuimcConference Proceedingsconference-collections
research-article

Adaptive threshold determination method for the dynamic filtering in wireless sensor networks using fuzzy logic

Published: 15 February 2009 Publication History

Abstract

Nodes in sensor networks can be easily compromised by an adversary because of hostile environments. An adversary may use compromised nodes to inject false reports into the network. The dynamic en-route scheme can detect and drop such false reports during the forwarding phase. In this scheme, choosing a threshold value is important, as it trades off between security power and energy consumption. Thus, we should choose a threshold value such that it provides sufficient resilience, yet is small enough to conserve energy. This paper presents a fuzzy-based threshold determination method for the dynamic en-route scheme to filter false reports in wireless sensor networks. The base station periodically determines the threshold value using a fuzzy rule-based system. The resilience and energy efficiency of the proposed method against false data injection attacks are shown by simulation.

References

[1]
I. Akyildiz, "A Survey on Sensor Networks," IEEE Commun. Mag., vol. 40, no. 8, pp. 102--114, Aug. 2002.
[2]
J. N. Al-Karaki, and A. E. Kamal, "Routing techniques in wireless sensor networks: a survey", IEEE Wireless Communication Mag., vol. 11, no. 6, pp. 6--28, 2004.
[3]
D. Djenouri and L. Khelladi, "A Survey of Security Issues in Mobile Ad Hoc and Sensor Networks," IEEE Communication Surveys and Tutorials, vol. 7, no. 4, pp. 2--28, December 2005.
[4]
Z. Yu and Y. Guan, "A Dynamic En-route Scheme for Filtering False Data Injection in Wireless Sensor Networks," in Proc. IEEE INFOCOM'06, Apr. 2006.
[5]
Zhu S, Setia S, Jajodia S, Ning P. An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks. In Proc. S&P, 2004, pp.259--271.
[6]
Yang H, Lu S. Commutative Cipher Based En-Route Filtering in Wireless Sensor Networks. In Proc. VTC, 2003, pp.1223--1227.
[7]
Ye F, Luo H, Lu S. Statistical En-Route Filtering of Injected False Data in Sensor Networks. IEEE J. Sel. Area Comm., 2005, 23(4): 839--850.
[8]
F. Li and J. Wu, "A probabilistic voting-based filtering scheme in wireless sensor networks," Proc. IWCMC, pp.27--32, July 2006.
[9]
Perrig A, Szewczyk R, Tygar J D, Wen V, Culler D E. SPINS: Security Protocols for Sensor Networks. Wirel. Netw., 2002, 8(5): 521--534
[10]
S. J. Lee, H. Y. Lee and T. H. Cho, "A Threshold Determining Method for the Dynamic Filtering in Wireless Sensor Networks Based on Fuzzy Logic", International Journal of Computer Science and Network Security, vol. 8, no. 4, pp. 155--159, Apr. 2008.
[11]
H. Y. Lee and T. H. Cho, "Key Inheritance-Based False Data Filtering Scheme in Wireless Sensor Networks", Lect. Notes Comput. Sc., vol.4317, pp.116--127, Dec. 2006.
[12]
B. H. Kim, H. Y. Lee and T. H. Cho, "Fuzzy Key Dissemination Limiting Method for the Dynamic Filering-Based Sensor Networks", Lect. Notes Comput. Sc., vol.4681, pp.261--272, Aug. 2007.
[13]
H. Y. Lee and T. H. Cho, "Fuzzy Adaptive Selection of Filtering Schemes for Energy Saving in Sensor Networks," IEICE Transactions on Communications, vol. E90-B, no. 12, pp. 3346--3353, Dec. 2007
[14]
B. H. Kim and T. H. Cho, "Condition-based Key Dissemination Period Determining Method in Sensor Networks", In Proc. Of ICACT, 2008.

Cited By

View all
  • (2008)A General Framework for Adaptive Filtering in Wireless Sensor Networks Based on Fuzzy LogicAdvanced Intelligent Computing Theories and Applications. With Aspects of Theoretical and Methodological Issues10.1007/978-3-540-87442-3_152(1234-1241)Online publication date: 2008
  1. Adaptive threshold determination method for the dynamic filtering in wireless sensor networks using fuzzy logic

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    ICUIMC '09: Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication
    February 2009
    704 pages
    ISBN:9781605584058
    DOI:10.1145/1516241
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 15 February 2009

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. false data filtering
    2. false data injection attacks
    3. fuzzy system
    4. security
    5. wireless sensor networks

    Qualifiers

    • Research-article

    Funding Sources

    Conference

    ICUIMC '09
    Sponsor:

    Acceptance Rates

    Overall Acceptance Rate 251 of 941 submissions, 27%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)2
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 13 Feb 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2008)A General Framework for Adaptive Filtering in Wireless Sensor Networks Based on Fuzzy LogicAdvanced Intelligent Computing Theories and Applications. With Aspects of Theoretical and Methodological Issues10.1007/978-3-540-87442-3_152(1234-1241)Online publication date: 2008

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media