CFP last date
22 April 2024
Reseach Article

Automatic Threshold Reset Scheme using a Double Fuzzy System for Improvement of Detection Rate in a Probabilistic Voting-based Filtering Scheme of WSNs

by Sang-hyeok Lim, Tae-ho Cho
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 176 - Number 1
Year of Publication: 2017
Authors: Sang-hyeok Lim, Tae-ho Cho
10.5120/ijca2017915513

Sang-hyeok Lim, Tae-ho Cho . Automatic Threshold Reset Scheme using a Double Fuzzy System for Improvement of Detection Rate in a Probabilistic Voting-based Filtering Scheme of WSNs. International Journal of Computer Applications. 176, 1 ( Oct 2017), 38-43. DOI=10.5120/ijca2017915513

@article{ 10.5120/ijca2017915513,
author = { Sang-hyeok Lim, Tae-ho Cho },
title = { Automatic Threshold Reset Scheme using a Double Fuzzy System for Improvement of Detection Rate in a Probabilistic Voting-based Filtering Scheme of WSNs },
journal = { International Journal of Computer Applications },
issue_date = { Oct 2017 },
volume = { 176 },
number = { 1 },
month = { Oct },
year = { 2017 },
issn = { 0975-8887 },
pages = { 38-43 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume176/number1/28520-2017915513/ },
doi = { 10.5120/ijca2017915513 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:41:24.662932+05:30
%A Sang-hyeok Lim
%A Tae-ho Cho
%T Automatic Threshold Reset Scheme using a Double Fuzzy System for Improvement of Detection Rate in a Probabilistic Voting-based Filtering Scheme of WSNs
%J International Journal of Computer Applications
%@ 0975-8887
%V 176
%N 1
%P 38-43
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Wireless sensor networks (WSNs) consist of several sensor nodes and base stations that collect information through sensors located in a large area. However, WSNs have disadvantages in that they are easily damaged by an attacker because of their random and unattended deployment in an open environment, where individual management is difficult. An attacker can execute a false report injection attack or a false vote injection attack through compromised nodes. The probabilistic voting-based filtering scheme (PVFS) is a scheme to prevent these two kinds of attacks. Before sending the report, the proposed method selects the validation node, judges the validity of the report, and filters the set threshold values. Threshold settings determine the security and lifetime of the network, so setting the appropriate security values is important. In this paper, we propose a fuzzy-based PVFS method that detects the aggressiveness of the attacker and sets the appropriate threshold values. This paper confirms that the proposed method improves the energy efficiency and detection ability of the network.

References
  1. Perrig, Adrian, John Stankovic, and David Wagner. "Security in wireless sensor networks." Communications of the ACM 47.6 (2004): 53-57
  2. Zhang, Wensheng, and Guohong Cao. "Group rekeying for filtering false data in sensor networks: A predistribution and local collaboration-based approach." INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings IEEE. Vol. 1. IEEE, 2005.
  3. Al-Karaki, Jamal N., and Ahmed E. Kamal. "Routing techniques in wireless sensor networks: a survey." IEEE wireless communications 11.6 (2004): 6-28.
  4. Perrig, Adrian, John Stankovic, and David Wagner. "Security in wireless sensor networks." Communications of the ACM 47.6.
  5. Li, Feng, and Jie Wu. "A probabilistic voting-based filtering scheme in wireless sensor networks." Proceedings of the 2006 international conference on Wireless communications and mobile computing.ACM, 2006.
  6. Jeba, S. A., and B. Paramasivan. "False data injection attack and its countermeasures in wireless sensor networks." European Journal of Scientific Research 82.2 (2012): 248-257.
  7. Jeba, S. A., and B. Paramasivan. "An evaluation of en-route filtering schemes on wireless sensor networks." International Journal of Computer Engineering & Technology (IJCET) 3 (2012): 62-73.
  8. Yu, Zhen, and Yong Guan. "A dynamic en-route scheme for filtering false data injection in wireless sensor networks." SenSys. Vol. 5. 2005.
  9. Zhu, Sencun, et al. "An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks." Security and privacy, 2004. Proceedings. 2004 IEEE symposium on. IEEE, 2004.
  10. Lu, Rongxing, et al. "BECAN: a bandwidth-efficient cooperative authentication scheme for filtering injected false data in wireless sensor networks." IEEE transactions on parallel and distributed systems 23.1 (2012): 32-43.
  11. Yang, Hao, and Songwu Lu. "Commutative cipher based en-route filtering in wireless sensor networks." Vehicular Technology Conference, 2004. VTC2004-Fall. 2004 IEEE 60th. Vol. 2. IEEE, 2004.
  12. Ye, Fan, et al. "Statistical en-route filtering of injected false data in sensor networks." IEEE Journal on Selected Areas in Communications 23.4 (2005): 839-850.
  13. Zadeh, Lotfi A. "Fuzzy sets." Information and control 8.3 (1965): 338-353.
  14. J. Yen and R. Langari, Fuzzy Logic: Intelligence, Control, and Information. Prentice-Hall, Inc., 1998.
  15. G. Klir and B. Yuan, Fuzzy Sets and Fuzzy Logic. Prentice hall New Jersey, 1995.
  16. R. Babuška, "Fuzzy Systems, Modeling and Identification," Delft University of Technology, Department of Electrical Engineering Control Laboratory, Mekelweg, vol. 4, 1996.
Index Terms

Computer Science
Information Sciences

Keywords

Wireless sensor networks False report injection attack False vote injection attack Secure routing Fuzzy system Interactive authentication.