Skip to main content
Log in

Safety relay selection algorithms based on fuzzy relationship for wireless sensor networks

  • Published:
The Journal of Supercomputing Aims and scope Submit manuscript

Abstract

The remote nodes using a selecting relay algorithm (SRA) transmit its dates on wireless sensor networks (WSNs). The algorithm can enhance the network life cycle. It selects an appropriate cooperation node as a relay node by balancing between power consumption and communication. More recently, scholars have applied a fuzzy theory to SRA and achieved better tradeoffs. This study further simulates the application of four set types of attacks each layer on WSNS. Then, comparing with different fuzzification and defuzzification methods, a fuzzy inference system was built for the security performance. The results show that there are two methods which can improve the algorithm’s safety: one is fuzzification Or-Max connection Method, and the other is defuzzification of Lom and Som methods.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12

Similar content being viewed by others

References

  1. Krishnamachari B (2005) Networking wireless sensors. Cambridge University Press, Cambridge

    Book  Google Scholar 

  2. Katiyar V, Chand N (2010) Recent advances and future trends in wireless sensor networks. Int J Appl Eng Res 1:330–342

    Google Scholar 

  3. He D, Chen C, Chan S, Bu J, Yang LT (2013) Security analysis and improvement of a secure and distributed reprogramming protocol for wireless sensor networks. IEEE Trans Ind Electron 60:5348–5354

    Article  Google Scholar 

  4. Reiter G (2014) Wireless connectivity for the Internet of Things. Texas Instruments, Dallas

    Google Scholar 

  5. Soliman HS, Omari M (2006) Application of synchronous dynamic encryption system (sdes) in wireless sensor networks. Int J Netw Secur 3:160–171

    Google Scholar 

  6. Luo RC, Chen O (2012) Mobile sensor node deployment and asynchronous power management for wireless sensor networks. IEEE Trans Ind Electron 59:2377–2385

    Article  Google Scholar 

  7. He D, Chen C, Chan S, Bu J (2012) SDRP: a secure and distributed reprogramming protocol for wireless sensor networks. IEEE Trans Ind Electron 59:4155–4163

    Article  Google Scholar 

  8. Dohler M, Heath RW, Lozano JA, Papadias CB, Valen-zuela RA (2011) Is the PHY layer dead. IEEE Commun Mag 49:159–165

    Article  Google Scholar 

  9. Faye S, Myoupo JF (2013) Secure and energy-efficient geocast protocol for wireless sensor networks based on a hierarchical clustered structure. Int J Netw Secur 15:151–160

    Google Scholar 

  10. Gutierrez A, Dopico NI, Gonzalez C, Zazo S, Jimenez-Leube J, Raos I (2013) Cattle-powered node experience in a heterogeneous network for localization of herds. IEEE Trans Ind Electron 60:3176–3184

    Article  Google Scholar 

  11. Li P, Wen Y, Jia C, Li X (2011) A magnetoelectric composite energy harvester and power management circuit. IEEE Trans Ind Electron 58:2944–2951

    Article  Google Scholar 

  12. Deverajan GG, Saravanan R (2015) Fuzzy based energy aware routing method with trustworthiness for MANET. Int J Electron Inf Eng 3(2):67–80

    Google Scholar 

  13. Zhai C, Liu J, Zheng L, Xu H, Chen H (2012) Maximise life-time of wireless sensor networks via a distributed cooperative routing algorithm. Trans Emerg Telecommun Technol 23:414–428

    Article  Google Scholar 

  14. Abdulhadi S, Jaseemuddin M, Anpalagan A (2010) A survey of distributed relay selection schemes in cooperative wireless ad hoc networks. Springer Wirel Pers Commun 63:1–19

    Google Scholar 

  15. Yang W, Cai Y, Xu Y (2009) An energy-aware relay selection algorithm based on fuzzy comprehensive evaluation. In: Proceedings of the International Conference on Network Security, Wireless Communication Trusted Computing, pp 144–146

  16. Brante G, Peron GDS, Souza RD, Abrão T (2013) Distributed fuzzy logic-based relay selection algorithm for cooperative wireless sensor networks. IEEE Sens J 13:4375–4386

    Article  Google Scholar 

  17. Rekhis S, Boudriga N (2009) Pattern-based digital investigation of x-hole attacks in wireless adhoc and sensor networks. Ultra Modern Telecommunications and Workshops (ICUMT), pp 1–8

  18. Shah VK, Gharge AP (2012) A Review on Relay Selection Techniques in Cooperative Communication. Int J Eng Innov Technol 2:65–69

    Google Scholar 

  19. Sugeno M (1977) Fuzzy measures and fuzzy integrals: a survey. Fuzzy Autom Decis Process 78(33):89–102

    MathSciNet  Google Scholar 

  20. Mamdani EH (1977) Application of fuzzy logic to approximate reasoning using linguistic synthesis. IEEE Trans Comput 26:1182–1191

    Article  MATH  Google Scholar 

  21. Sugeno M (1985) Industrial applications of fuzzy control. Elsevier, New York

    MATH  Google Scholar 

  22. Mamdani EH, Assilian S (1975) An experiment in linguistic synthesis with a fuzzy logic controller. Int J Man Mach Stud 7:1–13

    Article  MATH  Google Scholar 

  23. Yang W, Cai Y, Xu Y (2009) An energy-aware relay selection algorithm based on fuzzy comprehensive evaluation. In: Proceedings of the International Conference on Network Security, Wireless Communication Trusted Computing, pp 144–146

  24. Heinzelman WR, Chandrakasan A, Balakrishnan H (2000) Energy-efficient communication protocol for wireless microsensor networks. In: Proceedings of the 33rd Hawaii International Conference on System Sciences, pp 1–10

  25. Landstra T, Jagannathan S, Zawodniok M (2009) Energy-efficient hybrid key management protocol for wireless sensor networks. Int J Netw Secur 9:121–134

    Google Scholar 

  26. Asadi M, Zimmerman C, Agah A (2013) A game-theoretic approach to security and power conservation in wireless sensor networks. Int J Netw Secur 15:50–58

    Google Scholar 

  27. Halgamuge MN, Zukerman M, Ramamohanarao K (2009) An estimation of sensor energy consumption. Progr Electromagn Res B 12:259–295

    Article  Google Scholar 

  28. Li WT, Feng TH, Hwang MS (2014) Distributed detecting node replication attacks in wireless sensor networks: a survey. Int J Netw Secur 16:323–330

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Min-Shiang Hwang.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Feng, TH., Shih, NY. & Hwang, MS. Safety relay selection algorithms based on fuzzy relationship for wireless sensor networks. J Supercomput 75, 4601–4616 (2019). https://doi.org/10.1007/s11227-018-2547-7

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11227-018-2547-7

Keywords

Navigation