Skip to main content

Efficient Key Dissemination Method Using Fuzzy Logic Based Dynamic En-route Filtering

  • Conference paper
Advanced Intelligent Computing Theories and Applications. With Aspects of Artificial Intelligence (ICIC 2010)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 6216))

Included in the following conference series:

Abstract

Sensor nodes are deployed in open and unattended environments in wireless sensor network applications. An adversary can easily compromise sensor nodes due to these features. False reports can be injected through compromised nodes that can lead to false alarms and the depletion of the limited energy resources in a battery powered network. Yu and Guan proposed a dynamic en-route filtering scheme that can detect and drop false reports. Choosing a threshold value is important in this scheme, as it trades off between security and energy consumption. Therefore, we should choose an appropriate threshold value. In this paper, we propose a fuzzy logic based key dissemination method.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirici, E.: A survey on sensor networks. IEEE Communications Magazine 40(8), 102–114 (2002); Culler, D., Estrin, D., Srivastava, M.: Overview of Sensor Networks. IEEE Computer 37(8), 41–49 (2004)

    Google Scholar 

  2. Przydatek, B., Song, D., Perrig, A.: SIA: Secure Information Aggregation in Sensor Networks. In: Proc. of SenSys, pp. 255–265 (2003)

    Google Scholar 

  3. Yang, H., Lu, S.: Commutative Cipher Based En-route Filtering in Wireless Sensor Network. In: Vehicular Technology Conf., vol. 2, pp. 1223–1227 (2004)

    Google Scholar 

  4. Ye, F., Luo, H., Lu, S.: Statistical En-Route Filtering of Injected False Data in Sensor Networks. IEEE J. Sel. Area Comm. 23(4), 839–850 (2005)

    Article  Google Scholar 

  5. Yu, Z., Guan, Y.: A Dynamic En-route Scheme for Filtering False Data Injection in Wireless Sensor Networks. In: Proc. of SenSys, pp. 294–295. ACM, New York

    Google Scholar 

  6. Zhu, S., Setia, S., Jajodia, S., Ning, P.: An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks. In: Proceedings of IEEE Symposium on security and privacy, pp. 259–271 (2004)

    Google Scholar 

  7. Kim, B.H., Lee, H.Y., Cho, T.H.: Fuzzy Key Dissemination Limiting Method for the Dynamic Filtering-Based Sensor Networks. In: Huang, D.-S., Heutte, L., Loog, M. (eds.) ICIC 2007. LNCS, vol. 4681, pp. 263–272. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  8. Lee, H.Y., Cho, T.H.: Fuzzy Logic Based Key Disseminating in Ubiquitous Sensor Networks. In: ICACT 2008, pp. 958–962 (2008)

    Google Scholar 

  9. Yu, Y., Govindan, R., Estrin, D.: Geographical and Energy Aware Routing: A Recursive Data Dissemination Protocol for Wireless Sensor Networks. In: UCLA Computer Science Department Technical Report UCLA/CSD-TR-01-0023 (2001)

    Google Scholar 

  10. Perrig, A., Szewczyk, R., Tygar, J.D., Wen, V., Culler, D.E.: SPINS: Security Protocols for Sensor Networks. Wirel. Netw. 8(5), 521–534 (2002)

    Article  MATH  Google Scholar 

  11. Chi, S.H., Cho, T.H.: Fuzzy Logic Based Propagation Limiting Method for message Routing in Wireless Sensor Networks. In: Gavrilova, M.L., Gervasi, O., Kumar, V., Tan, C.J.K., Taniar, D., Laganá, A., Mun, Y., Choo, H. (eds.) ICCSA 2006. LNCS, vol. 3983, pp. 58–67. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  12. Baeg, S.B., Cho, T.H.: Transmission Relay Method for Balanced Energy Depletion in Wireless Sensor Network using Fuzzy Logic. In: Wang, L., Jin, Y. (eds.) FSKD 2005. LNCS (LNAI), vol. 3614, pp. 998–1007. Springer, Heidelberg (2005)

    Google Scholar 

  13. Karp, B., Kung, H.T.: Gpsr: Greedy perimeter stateless routing for wireless networks. In. Proc. ACM Mobicom, Boston, MA (2000)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kim, J.H., Cho, T.H. (2010). Efficient Key Dissemination Method Using Fuzzy Logic Based Dynamic En-route Filtering. In: Huang, DS., Zhang, X., Reyes García, C.A., Zhang, L. (eds) Advanced Intelligent Computing Theories and Applications. With Aspects of Artificial Intelligence. ICIC 2010. Lecture Notes in Computer Science(), vol 6216. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-14932-0_64

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-14932-0_64

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-14931-3

  • Online ISBN: 978-3-642-14932-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics