Abstract
The remote nodes using a selecting relay algorithm (SRA) transmit its dates on wireless sensor networks (WSNs). The algorithm can enhance the network life cycle. It selects an appropriate cooperation node as a relay node by balancing between power consumption and communication. More recently, scholars have applied a fuzzy theory to SRA and achieved better tradeoffs. This study further simulates the application of four set types of attacks each layer on WSNS. Then, comparing with different fuzzification and defuzzification methods, a fuzzy inference system was built for the security performance. The results show that there are two methods which can improve the algorithm’s safety: one is fuzzification Or-Max connection Method, and the other is defuzzification of Lom and Som methods.












Similar content being viewed by others
Explore related subjects
Discover the latest articles and news from researchers in related subjects, suggested using machine learning.References
Krishnamachari B (2005) Networking wireless sensors. Cambridge University Press, Cambridge
Katiyar V, Chand N (2010) Recent advances and future trends in wireless sensor networks. Int J Appl Eng Res 1:330–342
He D, Chen C, Chan S, Bu J, Yang LT (2013) Security analysis and improvement of a secure and distributed reprogramming protocol for wireless sensor networks. IEEE Trans Ind Electron 60:5348–5354
Reiter G (2014) Wireless connectivity for the Internet of Things. Texas Instruments, Dallas
Soliman HS, Omari M (2006) Application of synchronous dynamic encryption system (sdes) in wireless sensor networks. Int J Netw Secur 3:160–171
Luo RC, Chen O (2012) Mobile sensor node deployment and asynchronous power management for wireless sensor networks. IEEE Trans Ind Electron 59:2377–2385
He D, Chen C, Chan S, Bu J (2012) SDRP: a secure and distributed reprogramming protocol for wireless sensor networks. IEEE Trans Ind Electron 59:4155–4163
Dohler M, Heath RW, Lozano JA, Papadias CB, Valen-zuela RA (2011) Is the PHY layer dead. IEEE Commun Mag 49:159–165
Faye S, Myoupo JF (2013) Secure and energy-efficient geocast protocol for wireless sensor networks based on a hierarchical clustered structure. Int J Netw Secur 15:151–160
Gutierrez A, Dopico NI, Gonzalez C, Zazo S, Jimenez-Leube J, Raos I (2013) Cattle-powered node experience in a heterogeneous network for localization of herds. IEEE Trans Ind Electron 60:3176–3184
Li P, Wen Y, Jia C, Li X (2011) A magnetoelectric composite energy harvester and power management circuit. IEEE Trans Ind Electron 58:2944–2951
Deverajan GG, Saravanan R (2015) Fuzzy based energy aware routing method with trustworthiness for MANET. Int J Electron Inf Eng 3(2):67–80
Zhai C, Liu J, Zheng L, Xu H, Chen H (2012) Maximise life-time of wireless sensor networks via a distributed cooperative routing algorithm. Trans Emerg Telecommun Technol 23:414–428
Abdulhadi S, Jaseemuddin M, Anpalagan A (2010) A survey of distributed relay selection schemes in cooperative wireless ad hoc networks. Springer Wirel Pers Commun 63:1–19
Yang W, Cai Y, Xu Y (2009) An energy-aware relay selection algorithm based on fuzzy comprehensive evaluation. In: Proceedings of the International Conference on Network Security, Wireless Communication Trusted Computing, pp 144–146
Brante G, Peron GDS, Souza RD, Abrão T (2013) Distributed fuzzy logic-based relay selection algorithm for cooperative wireless sensor networks. IEEE Sens J 13:4375–4386
Rekhis S, Boudriga N (2009) Pattern-based digital investigation of x-hole attacks in wireless adhoc and sensor networks. Ultra Modern Telecommunications and Workshops (ICUMT), pp 1–8
Shah VK, Gharge AP (2012) A Review on Relay Selection Techniques in Cooperative Communication. Int J Eng Innov Technol 2:65–69
Sugeno M (1977) Fuzzy measures and fuzzy integrals: a survey. Fuzzy Autom Decis Process 78(33):89–102
Mamdani EH (1977) Application of fuzzy logic to approximate reasoning using linguistic synthesis. IEEE Trans Comput 26:1182–1191
Sugeno M (1985) Industrial applications of fuzzy control. Elsevier, New York
Mamdani EH, Assilian S (1975) An experiment in linguistic synthesis with a fuzzy logic controller. Int J Man Mach Stud 7:1–13
Yang W, Cai Y, Xu Y (2009) An energy-aware relay selection algorithm based on fuzzy comprehensive evaluation. In: Proceedings of the International Conference on Network Security, Wireless Communication Trusted Computing, pp 144–146
Heinzelman WR, Chandrakasan A, Balakrishnan H (2000) Energy-efficient communication protocol for wireless microsensor networks. In: Proceedings of the 33rd Hawaii International Conference on System Sciences, pp 1–10
Landstra T, Jagannathan S, Zawodniok M (2009) Energy-efficient hybrid key management protocol for wireless sensor networks. Int J Netw Secur 9:121–134
Asadi M, Zimmerman C, Agah A (2013) A game-theoretic approach to security and power conservation in wireless sensor networks. Int J Netw Secur 15:50–58
Halgamuge MN, Zukerman M, Ramamohanarao K (2009) An estimation of sensor energy consumption. Progr Electromagn Res B 12:259–295
Li WT, Feng TH, Hwang MS (2014) Distributed detecting node replication attacks in wireless sensor networks: a survey. Int J Netw Secur 16:323–330
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Feng, TH., Shih, NY. & Hwang, MS. Safety relay selection algorithms based on fuzzy relationship for wireless sensor networks. J Supercomput 75, 4601–4616 (2019). https://doi.org/10.1007/s11227-018-2547-7
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11227-018-2547-7