A Fuzzy Rule-based Key Re-Distribution Decision Scheme of Dynamic Filtering for Energy Saving in Wireless Sensor Networks

Full Text (PDF, 729KB), PP.1-8

Views: 0 Downloads: 0

Author(s)

Dongjin Park 1,* Taeho Cho 1

1. College of Software, Sungkyunkwan University, Suwon, 16419, Republic of Korea

* Corresponding author.

DOI: https://doi.org/10.5815/ijitcs.2017.04.01

Received: 11 Jul. 2016 / Revised: 3 Oct. 2016 / Accepted: 17 Dec. 2016 / Published: 8 Apr. 2017

Index Terms

Wireless sensor network, False report injection attack, Dynamic en-route filtering scheme, Fuzzy logic system

Abstract

A wireless sensor network's sensor nodes have scarce resources, are exposed to the open environment, and use wireless communication. These features make the network vulnerable to physical capture and security attacks, therefore adversaries attempt various attacks such as false report injection attacks. A false report injection attack generates a false alarm by forwarding a false report to the base station. It confuses a user and lowers the reliability of the system. In addition, it leads to depletion of the node energy in the process of delivering a false report. A dynamic en-route filtering scheme performs detection in the data transfer process, but it incurs unnecessary energy loss in a continuous attack situation. In this paper, in order to solve this problem, a scheme is proposed for determining whether or not to redistribute keys at execution. The proposed scheme saves energy by detecting false reports at an earlier hop than the existing scheme by using fuzzy logic and the feature of a loaded secret key of each node in the key pre-distribution phase. Furthermore, it improves the detection performance with an appropriate re-distribution of the key. Experimental results show up to 52.33% energy savings and an improved detection performance of up to 18.57% compared to the existing scheme.

Cite This Paper

Dongjin Park, Taeho Cho, "A Fuzzy Rule-based Key Re-Distribution Decision Scheme of Dynamic Filtering for Energy Saving in Wireless Sensor Networks", International Journal of Information Technology and Computer Science(IJITCS), Vol.9, No.4, pp.1-8, 2017. DOI:10.5815/ijitcs.2017.04.01

Reference

[1]Y. Wang, G. Attebury and B. Ramamurthy, "A survey of security issues in wireless sensor networks," 2006.

[2]I. F. Akyildiz, W. Su, Y. Sankarasubramaniam and E. Cayirci, "Wireless sensor networks: a survey," Computer Networks, vol. 38, pp. 393-422, 2002.

[3]I. F. Akyildiz, W. Su, Y. Sankarasubramaniam and E. Cayirci, "A survey on sensor networks," Communications Magazine, IEEE, vol. 40, pp. 102-114, 2002.

[4]K. Romer and F. Mattern, "The design space of wireless sensor networks," IEEE Wireless Communications, vol. 11, pp. 54-61, 2004.

[5]J. Yick, B. Mukherjee and D. Ghosal, "Wireless sensor network survey," Computer Networks, vol. 52, pp. 2292-2330, 2008.

[6]V. C. Gungor and G. P. Hancke, "Industrial wireless sensor networks: Challenges, design principles, and technical approaches," IEEE Trans. Ind. Electron., vol. 56, pp. 4258-4265, 2009.

[7]S. Zhu, S. Setia, S. Jajodia and P. Ning, "An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks," in Security and Privacy, 2004. Proceedings. 2004 IEEE Symposium on, 2004, pp. 259-271.

[8]Y. Huang, H. Li, K. A. Campbell and Z. Han, "Defending false data injection attack on smart grid network using adaptive cusum test," in Information Sciences and Systems (CISS), 2011 45th Annual Conference on, 2011, pp. 1-6.

[9]S. Jeba and B. Paramasivan, "False data injection attack and its countermeasures in wireless sensor networks," European Journal of Scientific Research, vol. 82, pp. 248-257, 2012.

[10]Y. Mo, E. Garone, A. Casavola and B. Sinopoli, "False data injection attacks against state estimation in wireless sensor networks," in 49th IEEE Conference on Decision and Control (CDC), 2010, pp. 5967-5972.

[11]S. A. Jeba and B. Paramasivan, "Energy efficient multipath data transfer scheme to mitigate false data injection attack in wireless sensor networks," Comput. Electr. Eng., vol. 39, pp. 1867-1879, 2013.

[12]Z. Yu and Y. Guan, "A dynamic en-route filtering scheme for data reporting in wireless sensor networks," IEEE/ACM Transactions on Networking (ToN), vol. 18, pp. 150-163, 2010.

[13]C.I. Sun and T.H. Cho, "A Key Redistribution Method for Enhancing Energy Efficiency in Dynamic Filtering based Sensor Networks," The Korea Society for Simulation, vol. 19, No. 1, pp. 125-131, 2010.

[14]J. Yen and R. Langari, Fuzzy Logic: Intelligence, Control, and Information. Prentice-Hall, Inc., 1998.

[15]F. Ye, H. Luo, S. Lu and L. Zhang, "Statistical en-route filtering of injected false data in sensor networks," Selected Areas in Communications, IEEE Journal on, vol. 23, pp. 839-850, 2005.