Skip to main content

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 5226))

Included in the following conference series:

  • 1207 Accesses

Abstract

Sensor nodes, that have a limited battery power, are deployed in open and unattended environments in many sensor network applications. An adversary can compromise the deployed sensor nodes and easily inject fabricated reports into the sensor network through the compromised nodes. Filtering-based secure methods have been proposed to detect and drop the injected fabricated reports. In this scheme, the number of key partitions is important, since a correct report should have to an efficient number of different message authentication codes made by each difference key partition. We propose a selective sensor node selection method to create suitable clusters and enhance the detection power of the filtering scheme. We use a fuzzy system to enhance cluster fitness. The proposed method demonstrates sufficient resilience and energy efficiency based on the simulation results.

This research was supported by the MKE (Ministry of Knowledge Economy), Korea, under the ITRC (Information Technology Research Center) support program supervised by the IITA (Institute of Information Technology Advancement). (IITA-2008-C1090-0801-0028).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 189.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Al-Karaki, J.N., Kamal, A.E.: Routing techniques in wireless sensor networks: a survey. IEE Wirel. Commun. 11(6), 6–28 (2004)

    Article  Google Scholar 

  2. Li, F., Wu, J.: A Probabilistic Voting-Based Filtering Scheme in Wireless Sensor Networks. In: The International Wireless Communications and Mobile Computing Conference, pp. 27–32 (2006)

    Google Scholar 

  3. Yang, H., Lu, S.: Commutative Cipher Based En-Route Filtering in Wireless Sensor Networks. In: The IEEE Vehicular Technology Conference, pp. 1223–1227 (2003)

    Google Scholar 

  4. Ye, F., Luo, H., Lu, S.: Statistical En-Route Filtering of Injected False Data in Sensor Networks. IEEE J. Sel. Area Comm. 23(4), 839–850 (2005)

    Article  Google Scholar 

  5. Zhu, S., Setia, S., Jajodia, S., Ning, P.: An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks. In: The IEEE Symposium on Security and Privacy, pp. 259–271 (2004)

    Google Scholar 

  6. Lee, H.Y., Cho, T.H.: Key Inheritance-Based False Data Filtering Scheme in Wireless Sensor Networks. In: Madria, S.K., Claypool, K.T., Kannan, R., Uppuluri, P., Gore, M.M. (eds.) ICDCIT 2006. LNCS, vol. 4317, pp. 116–127. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  7. Lee, H.Y., Cho, T.H.: Fuzzy Adaptive Selection of Filtering Schemes for Energy Saving in Sensor Networks. IEICE Trans. Commun. E90–B(12), 3346–3353 (2007)

    Article  Google Scholar 

  8. Yu, Z., Guan, Y.: A Dynamic En-route Scheme for Filtering False Data Injection in Wireless Sensor Networks. In: Proc. Of SenSys., pp. 294–295 (2005)

    Google Scholar 

  9. Zhang, W., Cao, G.: Group Rekeying for Filtering False Data in Sensor Networks: A Predistribution and Local Collaboration-Based Approach. In: INFOCOM 2005, pp. 503–514 (2005)

    Google Scholar 

  10. Huang, C.C., Guo, M.H.: Weight-Based Clustering Multicast Routing Protocol for Mobile Ad Hoc Networks. Internet Protocol Tec. 1(1), 10–18 (2003)

    Article  Google Scholar 

  11. Ossama, Y., Sonia, F.: HEED: A Hybrid, Energy-Efficient, Distributed Clustering Approach for Ad Hoc Sensor Networks. IEEE Trans. Mobile Com. 3(4), 366–379 (2004)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kim, B., HoCho, T. (2008). Selective Sensor Node Selection Method for Making Suitable Cluster in Filtering-Based Sensor Networks. In: Huang, DS., Wunsch, D.C., Levine, D.S., Jo, KH. (eds) Advanced Intelligent Computing Theories and Applications. With Aspects of Theoretical and Methodological Issues. ICIC 2008. Lecture Notes in Computer Science, vol 5226. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-87442-3_79

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-87442-3_79

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-87440-9

  • Online ISBN: 978-3-540-87442-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics