skip to main content
10.1145/2030376.2030393acmotherconferencesArticle/Chapter ViewAbstractPublication PagesceasConference Proceedingsconference-collections
research-article

Trusted data fusion by using cellular automata in wireless sensor networks

Published: 01 September 2011 Publication History

Abstract

In this paper, we introduce a new protocol, named TDFCA (Trusted Data Fusion by using Cellular Automata) in Wireless sensor Networks. TDFCA uses Cellular Automata rules to find the most suitable cluster head, perform data fusion, and find the most trusted neighbors for sending the fusion result to base station. The network is intended for the long-term monitoring of packets produced by jammer nodes. The data flow of the network is mainly toward a cluster head node, which is responsible for collecting data generated by sensor nodes. When the network is first deployed, an initialization algorithm is performed and preliminary clusters and cluster heads are determined. Since the network nodes are battery powered, one of the important measures of effectiveness is power efficiency. Therefore, TDFCA tries not only to increase the trust value of the fusion result, but also to maximize the network's lifetime. Finally, simulation results are presented.

References

[1]
Chan, H. and Perring, A.2003. Security and Privacy for Sensor Network. IEEE Computer (Oct. 2003), 103--105.
[2]
Pirzada, A. and McDonald, C. 2004. Establishing Trust Pure Ad-hoc Networks. 27Th conference computer science (Australian Computer Society, Inc. Darlinghurst, Australia 2004). DOI = http://doi.acm.org/10.1145/283751.283772
[3]
Stojmenovi, I, 2005. Hand Book of Sensor Networks Algorithms and Architectures. JohnWiely and Sanc.
[4]
He, T., M. Blum, B., A. Stankovic, J. and Abdelzaher, T. (2004). AIDA: Adaptive Application Independent Data Aggregation in Wireless Sensor Networks. ACM Transaction on Embedded Computing System (TECS) (May 2004), ACM, New York, NY, 426--457. DOI = http://doi.acm.org/10.1145/993396.993406
[5]
Madden, S., Franklin, M. J., Hellerstein, J. M. and Hong, W.2002. TAG: a Tiny AGgregation Service for Ad-Hoc Sensor Networks. ACM SIGOPS Operating Systems Review -OSDI '02: Proceedings of the 5th symposium on Operating systems design and implementation (Dec 2002), ACM, New York, NY. DOI = http://doi.acm.org/10.1145/332833.332838
[6]
Sharaf, M. A., Beaver, J., Labrinidis, A. and Chrysanthis, P. K. 2003. TINA: A Scheme for Temporal Coherency Aware in Network Aggregation. In Proceedings of the 3rd ACM international workshop on Data engineering for wireless and mobile access (MobiDE03) (Sep 2003), ACM, New York, NY, 69--76. DOI = http://doi.acm.org/10.1145/940923.940937
[7]
Chong, C. and Kumar, S. 2003. Sensor networks: Evolution, opportunities, and challenges. In Proceedings of the IEEE (Aug. 2003), 1247--1256.DOI = http://dx.doi.org/10.1109/Jproc.2003.814918
[8]
Krishnamachari, B., Estrin, D. and Wicker, S. 2002. Impact of data aggregation in wireless sensor networks. the 22nd International Conference on Distributed Computing System (ICDCSW) (Vienna, Austria, July 02--05, 2002), 575--578. DOI= http://doi.ieeecomputersociety.org/10.1109/ICDCSW.2002.1 030829
[9]
Pattem, S., Krishnamachari, B. and Govindan, R. 2004. The impact of spatial correlation on routing with compression in wireless sensor networks. Information Processing in Sensor Networks 2004 (IPSN'04) (April 2004), 28--35. DOI= http://doi.acm.org/10.1145/984622.984627
[10]
Zhang, W. and Cao, G. 2004. Dctc: Dynamic convoy tree-based collaboration for target tracking in sensor networks. IEEE Transactions on Wireless Communication (Sep. 2004), 1685--1701.
[11]
Intanagonwiwat, C., Govindan, R., Estrin, D., Heidemann, J. and Silva, F. 2003. Directed diffusion for wireless sensor networking. IEEE/ACM Transactions on Networking (Feb. 2003), 2--16.
[12]
Cristescu, R., Beferull-Lozano, B. and Vetterli, M. 2004. On network correlated data gathering. INFOCOM 2004(Mar. 2004), 2571--2582. DOI = http://dx.doi.org/10.1109/TNET.2005.863711
[13]
Wang, A., Heinzelman, W. B., Sinha, A. and Chandrakasan, A. P. 2001. Energy-scalable protocols for battery-operated micro sensor networks. Journal of VLSI Signal Processing (Nov. 2001), 483--492. DOI = http://dx.doi.org/10.1023/A:1012235530463
[14]
Carman, D. W., Kruus, P. S. and Matt, B. J.2000. Constraints and approaches for distributed sensor network security. NAI Labs Technical Report 00--010(Sep. 2000).
[15]
Zeng, B., Wei, J. and Hu, T. 2007. An energy-efficient fusion protocol for wireless sensor network. 10 th International Conference on Information Fusion (Quebec, Canada, July 09--12, 2007), ACM, New York, NY, 1--7. DOI= http://doi.acm.org/10.1145/1267070.1267073
[16]
Niazi, M. A. and Hussain, A. 2010. A Novel Agent-Based Simulation Framework for Sensing in Complex Adaptive Environments. Sensor Journal IEEE (Nov. 2010), 404--412. DOI = http://dx.doi.org/10.1109/JSEN. 2010.2068044
[17]
QualNet manual web page available at http://www.scalable-netwoks.com/products/qualnet/, Last access: June 2011.
[18]
Opnet manual webpage available at http://www.opnet.com/, Last access: June 2011.
[19]
NetSim manual webpage available at http://haemgen.haem.cam.ac.uk/netsim/, Last access: June 2011.
[20]
NS manual webpage available at http://www.isi.edu/nsnam/ns/, Last access: June 2010.
[21]
Cheng, Z., Ming-zheng, Z., Jin-sheng, J., Qing, Y. A 2008. Secure Data_Fusion_Algorithm Based on Behavior Trust in Wireless Sensor Networks security. Department of Compute Science &Engineering Anhui University of Technology and Science (Dalian, China, Oct. 12--18, 2008), 1--4. DOI = http://dx.doi.org/10.1109/WiCom.2008.1106
[22]
Sahni, S., Xu, X. 2004. Algorithm for Wireless Sensor Networks. Department of Computer and Information Science and Engineering University of Florida (Sep. 2004).
[23]
Li, L., Dong, Sh., Wen, X. 2006. An Energy Efficient Clustering Routing Algorithm for Wireless Sensor Networks. Journal of China Universities of Posts and Telecommunications (Sep.2006), 71--75. DOI = http://doi.acm.org/10.1016/S1005-8885(07)60015-6
[24]
Zarei, M., Rahmani, A. M., Sasan, A., Teshnehlab, M. 2009. Fuzzy based trust estimation for congestion control in wireless sensor networks. International Conference on Intelligent Networking and Collaborative Systems, 2009. INCOS '09( Barcelona, Spain, Nov. 4--6,2009), 233--236, DOI= http://doi.acm.org/10.1109/INCOS.2009.16
[25]
Zarei, M., Rahmani, A. M., Farazkish, R., Zahirnia, S. 2010. FCCTF: Fairness Congestion Control for a disTrustful wireless sensor network using Fuzzy logic. 10th International I Conference on hybrid intelligent system (Atlanta, GA, Aug. 23--27,2010), 1--6, DOI= http://doi.acm.org/10.1109/HIS.2010.5601071

Cited By

View all
  • (2015)Integration of an IEEE 802.15.4 RFID network with mobile readers with a 802.11 WLANWireless Communications & Mobile Computing10.1002/wcm.231615:1(43-55)Online publication date: 1-Jan-2015

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
CEAS '11: Proceedings of the 8th Annual Collaboration, Electronic messaging, Anti-Abuse and Spam Conference
September 2011
230 pages
ISBN:9781450307888
DOI:10.1145/2030376
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 September 2011

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. cellular automata
  2. clustering
  3. data fusion
  4. trust value
  5. wireless sensor network

Qualifiers

  • Research-article

Conference

CEAS '11

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)1
  • Downloads (Last 6 weeks)0
Reflects downloads up to 03 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2015)Integration of an IEEE 802.15.4 RFID network with mobile readers with a 802.11 WLANWireless Communications & Mobile Computing10.1002/wcm.231615:1(43-55)Online publication date: 1-Jan-2015

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media