Skip to main content

Fuzzy Based Key Re-distribution Period Determination Method in Wireless Sensor Networks

  • Conference paper
Advanced Intelligent Computing Theories and Applications. With Aspects of Artificial Intelligence (ICIC 2010)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 6216))

Included in the following conference series:

Abstract

Wireless sensor networks (WSNs) are composed of nodes with limited resources in open environments. Nodes are placed in an open environment that will eventually be exposed to an adversary. An adversary can easily access security information such as the authentication key using data authentication. An adversary can use compromised sensor nodes to inject false reports to the WSN. If undetected, these false reports are forwarded to the base station. Such attacks by compromised sensor nodes result in false alarms and the depletion of the limited amount of energy in battery powered sensor nodes. The Dynamic En-routing Filtering (DEF) scheme can detect and drop false reports during the forwarding process. In DEF, the authentication key re-distribution period is important to detect false reports and save network energy. In this paper, we present a fuzzy-based authentication key re-distribution period determination method for DEF. The fuzzy-based method can prevent this problem and provide energy savings. We evaluated the performance of the proposed method via simulation.

This research was supported by Basic Science Research Program through the National Research Foundation of Korea(NRF) funded by the Ministry of Education, Science and Technology(No. 2010-0011188).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: A Survey on Sensor Networks. IEEE Commun. Mag., 102–114 (2002)

    Google Scholar 

  2. Al-Karaki, J.N., Kamal, A.E.: Routing Techniques in Wireless Sensor Networks: A Survey. IEEE Wirel. Commun. 11(6), 6–28 (2004)

    Article  Google Scholar 

  3. Pzrydatek, B., Song, D., Perring, A.: SIA: Secure Information Aggregation in Sensor Networks. In: Proc. of SenSys, pp. 255–265 (2003)

    Google Scholar 

  4. Zhu, S., Setia, S., Jajodia, S., Ning, P.: An Interleaved Hop-by-Hop Authentication Scheme for filtering of Injected False Data in Sensor Networks. In: Proc. of S&P, pp. 259–271 (2004)

    Google Scholar 

  5. Li, F., Wu, J.: A Probabilistic Voting-based Filtering Scheme in Wireless Sensor Networks. In: Proc. of IWCMC, pp. 27–327 (2006)

    Google Scholar 

  6. Zhu, S., Setia, S., Jajodia, S., Ning, P.: An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks. In: The IEEE Symposium on Security and Privacy, pp. 259–271 (2004)

    Google Scholar 

  7. Yang, H., Lu, S.: Commutative Cipher Based En-Route Filtering in Wireless Sensor Networks. In: Proc. of VTC, pp. 1223–1227 (2003)

    Google Scholar 

  8. Ye, F., Luo, H., Lu, S.: Statistical En-Route Filtering of Injected False Data in Sensor Networks. IEEE J. Sel. Area Comm. 23(4), 839–850 (2005)

    Article  Google Scholar 

  9. Yu, Z., Guan, Y.: A Dynamic En-route Scheme for Filtering False Data Injection in Wireless Sensor Networks. In: Proc. of SenSys, pp. 294–295 (2005)

    Google Scholar 

  10. Lee, H., Cho, T.: Key Inheritance-Based False Data Filtering Scheme in Wireless Sensor Networks. In: Inoue, K., Satoh, K., Toni, F. (eds.) CLIMA 2006. LNCS (LNAI), vol. 4371, pp. 116–127. Springer, Heidelberg (2007)

    Google Scholar 

  11. Zhang, W., Cao, G.: Group Rekeying for Filtering False Data in Sensor Networks: A Redistribution and Local Collaboration-based Approach. In: Proc. of INFORCOM, pp. 503–514 (2005)

    Google Scholar 

  12. Kim, B., Cho, T.: Condition-based Key Dissemination Period Determining Method in Sensor Networks. In: Proc. of ICACT, pp. 1121–1125 (2006)

    Google Scholar 

  13. http://ffll.sourceforge.net

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Lee, S.H., Cho, T.H. (2010). Fuzzy Based Key Re-distribution Period Determination Method in Wireless Sensor Networks. In: Huang, DS., Zhang, X., Reyes García, C.A., Zhang, L. (eds) Advanced Intelligent Computing Theories and Applications. With Aspects of Artificial Intelligence. ICIC 2010. Lecture Notes in Computer Science(), vol 6216. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-14932-0_62

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-14932-0_62

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-14931-3

  • Online ISBN: 978-3-642-14932-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics