Abstract
Sensor nodes, that have a limited battery power, are deployed in open and unattended environments in many sensor network applications. An adversary can compromise the deployed sensor nodes and easily inject fabricated reports into the sensor network through the compromised nodes. Filtering-based secure methods have been proposed to detect and drop the injected fabricated reports. In this scheme, the number of key partitions is important, since a correct report should have to an efficient number of different message authentication codes made by each difference key partition. We propose a selective sensor node selection method to create suitable clusters and enhance the detection power of the filtering scheme. We use a fuzzy system to enhance cluster fitness. The proposed method demonstrates sufficient resilience and energy efficiency based on the simulation results.
This research was supported by the MKE (Ministry of Knowledge Economy), Korea, under the ITRC (Information Technology Research Center) support program supervised by the IITA (Institute of Information Technology Advancement). (IITA-2008-C1090-0801-0028).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Al-Karaki, J.N., Kamal, A.E.: Routing techniques in wireless sensor networks: a survey. IEE Wirel. Commun. 11(6), 6–28 (2004)
Li, F., Wu, J.: A Probabilistic Voting-Based Filtering Scheme in Wireless Sensor Networks. In: The International Wireless Communications and Mobile Computing Conference, pp. 27–32 (2006)
Yang, H., Lu, S.: Commutative Cipher Based En-Route Filtering in Wireless Sensor Networks. In: The IEEE Vehicular Technology Conference, pp. 1223–1227 (2003)
Ye, F., Luo, H., Lu, S.: Statistical En-Route Filtering of Injected False Data in Sensor Networks. IEEE J. Sel. Area Comm. 23(4), 839–850 (2005)
Zhu, S., Setia, S., Jajodia, S., Ning, P.: An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks. In: The IEEE Symposium on Security and Privacy, pp. 259–271 (2004)
Lee, H.Y., Cho, T.H.: Key Inheritance-Based False Data Filtering Scheme in Wireless Sensor Networks. In: Madria, S.K., Claypool, K.T., Kannan, R., Uppuluri, P., Gore, M.M. (eds.) ICDCIT 2006. LNCS, vol. 4317, pp. 116–127. Springer, Heidelberg (2006)
Lee, H.Y., Cho, T.H.: Fuzzy Adaptive Selection of Filtering Schemes for Energy Saving in Sensor Networks. IEICE Trans. Commun. E90–B(12), 3346–3353 (2007)
Yu, Z., Guan, Y.: A Dynamic En-route Scheme for Filtering False Data Injection in Wireless Sensor Networks. In: Proc. Of SenSys., pp. 294–295 (2005)
Zhang, W., Cao, G.: Group Rekeying for Filtering False Data in Sensor Networks: A Predistribution and Local Collaboration-Based Approach. In: INFOCOM 2005, pp. 503–514 (2005)
Huang, C.C., Guo, M.H.: Weight-Based Clustering Multicast Routing Protocol for Mobile Ad Hoc Networks. Internet Protocol Tec. 1(1), 10–18 (2003)
Ossama, Y., Sonia, F.: HEED: A Hybrid, Energy-Efficient, Distributed Clustering Approach for Ad Hoc Sensor Networks. IEEE Trans. Mobile Com. 3(4), 366–379 (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2008 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kim, B., HoCho, T. (2008). Selective Sensor Node Selection Method for Making Suitable Cluster in Filtering-Based Sensor Networks. In: Huang, DS., Wunsch, D.C., Levine, D.S., Jo, KH. (eds) Advanced Intelligent Computing Theories and Applications. With Aspects of Theoretical and Methodological Issues. ICIC 2008. Lecture Notes in Computer Science, vol 5226. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-87442-3_79
Download citation
DOI: https://doi.org/10.1007/978-3-540-87442-3_79
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-87440-9
Online ISBN: 978-3-540-87442-3
eBook Packages: Computer ScienceComputer Science (R0)