Call for Paper - December 2017 Edition
IJCA solicits original research papers for the December 2017 Edition. Last date of manuscript submission is November 20, 2017. Read More

Fuzzy Logic based Efficient Route Determination Method for Improving the Energy Efficiency of Sensor Networks in FAP-based WSNs

International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Year of Publication: 2017
Won-jin Chung, Tae-ho Cho

Won-jin Chung and Tae-ho Cho. Fuzzy Logic based Efficient Route Determination Method for Improving the Energy Efficiency of Sensor Networks in FAP-based WSNs. International Journal of Computer Applications 172(5):35-39, August 2017. BibTeX

	author = {Won-jin Chung and Tae-ho Cho},
	title = {Fuzzy Logic based Efficient Route Determination Method for Improving the Energy Efficiency of Sensor Networks in FAP-based WSNs},
	journal = {International Journal of Computer Applications},
	issue_date = {August 2017},
	volume = {172},
	number = {5},
	month = {Aug},
	year = {2017},
	issn = {0975-8887},
	pages = {35-39},
	numpages = {5},
	url = {},
	doi = {10.5120/ijca2017915164},
	publisher = {Foundation of Computer Science (FCS), NY, USA},
	address = {New York, USA}


A flooding attack in a wireless sensor network consumes the energy of the sensor node included in the path in the process of sending a persistent false packet to the base station. If a flooding attack is continuously generated, the sensor node with a low residual energy causes energy depletion and the life of the sensor networks is shortened when the number of sensor nodes having depleted energy is large. To prevent such attacks, a flooding prevention scheme was proposed. However, flooding attack prevention does not consider cases where the residual energy of the sensor node is low. In areas where the sensor node is installed a long time ago, the remaining energy of the sensor nodes remains low. For this reason, when the flooding attack prevention method is used to prevent flooding attack, energy depletion occurs in the detection process in the sensor node with low residual energy. In this paper propose a method to improve the energy efficiency of a sensor node by determining an efficient path during routing by adding message authentication code through fuzzy logic or by using flooding attack prevention when setting a path.


  1. I. F. Akyildiz, W. Su, Y. Sankarasubramaniam and E. Cayirci, "A survey on sensor networks," Communications Magazine, IEEE, vol. 40, pp. 102-114, 2002.
  2. C. Karlof and D. Wagner, "Secure routing in wireless sensor networks: Attacks and countermeasures," Ad Hoc Networks, Vol. 1, No. 2, pp. 293-315, 2003
  3. Y. Ping, H. Yafei, Z. Yiping, Z. Shiyong and D. Zhoulin, “Flooding attack and defence in ad hoc networks,” Journal of Systems Engineering and Electronics, Vol. 17, No.2, pp. 410-416, 2006
  4. C. Perkins, E. Belding-Royer, and S. Das, "Ad hoc on-demand distance vector (AODV) routing," IETF RFC 3561, 2003
  5. N. D. Pham and H. Choo, "Energy efficient expanding ring search for route discovery in MANETs," Communications, 2008
  6. V. C. Gungor, C. Sastry, Z. Song, and R. Integlia, "Resource-aware and link quality based routing metric for wireless sensor and actor networks," Communications, 2007
  7. D. R. Raymond and S. F. Midkiff, “Denial-of-Service in Wireless Sensor Networks: Attacks and Defenses,” IEEE Pervasive Computing, vol. 7, pp. 74-81, 2008
  8. Y. Wang, G. Attebury, and B. Ramamurthy, “A survey of security issues in wireless sensor networks,” IEEE Communications Surveys & Tutorials, vol. 8, pp. 2-23, 2007
  9. J. Deng, R. Han, and S. Mishra, "Defending against path-based DoS attacks in wireless sensor networks," In Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks pp. 89-96, 2005
  10. F. Ye, H. Luo, S. Lu, and L. Zhang, "Statistical en-route filtering of injected false data in sensor networks," IEEE Journal on Selected Areas in Communications, Vol. 23, No. 4, pp. 839-850, 2005


Wireless Sensor Networks, Network Security, Network Lifetime, Flooding Attack Prevention, Fuzzy Logic