Abstract
Sensor nodes are deployed in open and unattended environments in wireless sensor network applications. An adversary can easily compromise sensor nodes due to these features. False reports can be injected through compromised nodes that can lead to false alarms and the depletion of the limited energy resources in a battery powered network. Yu and Guan proposed a dynamic en-route filtering scheme that can detect and drop false reports. Choosing a threshold value is important in this scheme, as it trades off between security and energy consumption. Therefore, we should choose an appropriate threshold value. In this paper, we propose a fuzzy logic based key dissemination method.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirici, E.: A survey on sensor networks. IEEE Communications Magazine 40(8), 102–114 (2002); Culler, D., Estrin, D., Srivastava, M.: Overview of Sensor Networks. IEEE Computer 37(8), 41–49 (2004)
Przydatek, B., Song, D., Perrig, A.: SIA: Secure Information Aggregation in Sensor Networks. In: Proc. of SenSys, pp. 255–265 (2003)
Yang, H., Lu, S.: Commutative Cipher Based En-route Filtering in Wireless Sensor Network. In: Vehicular Technology Conf., vol. 2, pp. 1223–1227 (2004)
Ye, F., Luo, H., Lu, S.: Statistical En-Route Filtering of Injected False Data in Sensor Networks. IEEE J. Sel. Area Comm. 23(4), 839–850 (2005)
Yu, Z., Guan, Y.: A Dynamic En-route Scheme for Filtering False Data Injection in Wireless Sensor Networks. In: Proc. of SenSys, pp. 294–295. ACM, New York
Zhu, S., Setia, S., Jajodia, S., Ning, P.: An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks. In: Proceedings of IEEE Symposium on security and privacy, pp. 259–271 (2004)
Kim, B.H., Lee, H.Y., Cho, T.H.: Fuzzy Key Dissemination Limiting Method for the Dynamic Filtering-Based Sensor Networks. In: Huang, D.-S., Heutte, L., Loog, M. (eds.) ICIC 2007. LNCS, vol. 4681, pp. 263–272. Springer, Heidelberg (2007)
Lee, H.Y., Cho, T.H.: Fuzzy Logic Based Key Disseminating in Ubiquitous Sensor Networks. In: ICACT 2008, pp. 958–962 (2008)
Yu, Y., Govindan, R., Estrin, D.: Geographical and Energy Aware Routing: A Recursive Data Dissemination Protocol for Wireless Sensor Networks. In: UCLA Computer Science Department Technical Report UCLA/CSD-TR-01-0023 (2001)
Perrig, A., Szewczyk, R., Tygar, J.D., Wen, V., Culler, D.E.: SPINS: Security Protocols for Sensor Networks. Wirel. Netw. 8(5), 521–534 (2002)
Chi, S.H., Cho, T.H.: Fuzzy Logic Based Propagation Limiting Method for message Routing in Wireless Sensor Networks. In: Gavrilova, M.L., Gervasi, O., Kumar, V., Tan, C.J.K., Taniar, D., Laganá, A., Mun, Y., Choo, H. (eds.) ICCSA 2006. LNCS, vol. 3983, pp. 58–67. Springer, Heidelberg (2006)
Baeg, S.B., Cho, T.H.: Transmission Relay Method for Balanced Energy Depletion in Wireless Sensor Network using Fuzzy Logic. In: Wang, L., Jin, Y. (eds.) FSKD 2005. LNCS (LNAI), vol. 3614, pp. 998–1007. Springer, Heidelberg (2005)
Karp, B., Kung, H.T.: Gpsr: Greedy perimeter stateless routing for wireless networks. In. Proc. ACM Mobicom, Boston, MA (2000)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kim, J.H., Cho, T.H. (2010). Efficient Key Dissemination Method Using Fuzzy Logic Based Dynamic En-route Filtering. In: Huang, DS., Zhang, X., Reyes GarcÃa, C.A., Zhang, L. (eds) Advanced Intelligent Computing Theories and Applications. With Aspects of Artificial Intelligence. ICIC 2010. Lecture Notes in Computer Science(), vol 6216. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-14932-0_64
Download citation
DOI: https://doi.org/10.1007/978-3-642-14932-0_64
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-14931-3
Online ISBN: 978-3-642-14932-0
eBook Packages: Computer ScienceComputer Science (R0)