Abstract
In wireless sensor networks (WSNs) individual sensor nodes are subject to security compromises. An adversary can use compromised sensor nodes to inject false reports into the WSN. If undetected, these false reports are forwarded to the base station. Such attacks by compromised sensor nodes can not only result in false alarms but also depletion of the limited amount of energy in battery powered sensor nodes. The statistical en-routing filtering (SEF) scheme can detect and drop false reports during the forwarding process. In SEF, the number of the message authentication codes (MAC length) is important for detecting false reports and saving energy in network. In this paper, we present a fuzzy-based MAC length determination method for SEF. If there are fewer nodes surrounding the occurred event in the field in the network than the MAC length, the node cannot generate a legitimate report in SEF. The fuzzy-based method can prevent this problem and provide energy savings. We evaluated the proposed method’s performance via simulation.
This work was supported by Korea Science and Engineering Foundation(KOSEF) grant funded by the Korean government(MEST). (No. 2009-0076504).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: A Survey on Sensor Networks. IEEE Commun. Mag. 40(8), 102–114 (2002)
Przydatek, B., Song, D., Perrig, A.: SIA: Secure Information Aggregation in Sensor Networks. In: Proc. SenSys, pp. 255–265 (2003)
Ye, F., Luo, H., Lu, S.: Statistical En-Route Filtering of Injected False Data in Sensor Networks. IEEE J. Sel. Area Comm. 23(4), 839–850 (2005)
Yang, H., Lu, S.: Commutative Cipher Based En-Route Filtering in Wireless Sensor Networks. In: Proc. VTC, pp. 1223–1227 (2003)
Al-Karaki, J.N., Kamal, A.E.: Routing techniques in wireless sensor networks: a survey. IEE Wirel. Commun. 11(6), 6–28 (2004)
Yu, Z., Guan, Y.: A Dynamic En-route Scheme for Filtering False Data Injection in Wireless Sensor Networks. In: Proc. of SenSys, pp. 294–295 (2005)
Zhu, S., Setia, S., Jajodia, S., Ning, P.: An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks. In: The IEEE Symposium on Security and Privacy, pp. 259–271 (2004)
Li, F., Wu, J.: A Probabilistic Voting-Based Filtering Scheme in Wireless Sensor Networks. In: The International Wireless Communications and Mobile Computing Conference, pp. 27–32 (2006)
Lee, H.Y., Cho, T.H.: Fuzzy Adaptive Selection of Filtering Schemes for Energy Saving in Sensor Networks. IEICE Trans. Commun. E90–B(12), 3346–3353 (2007)
ButtyĂ¡n, L., DĂ³ra, L., Vajda, I.: Statistical wormhole detection in sensor networks. In: Molva, R., Tsudik, G., Westhoff, D. (eds.) ESAS 2005. LNCS, vol. 3813, pp. 128–141. Springer, Heidelberg (2005)
Lee, H.Y., Cho, T.H.: Key inheritance-based false data filtering scheme in wireless sensor networks. In: Madria, S.K., Claypool, K.T., Kannan, R., Uppuluri, P., Gore, M.M. (eds.) ICDCIT 2006. LNCS, vol. 4317, pp. 116–127. Springer, Heidelberg (2006)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Choi, H.M., Cho, T.H. (2009). Energy Efficient MAC Length Determination Method for Statistical En-Route Filtering Using Fuzzy Logic. In: Huang, DS., Jo, KH., Lee, HH., Kang, HJ., Bevilacqua, V. (eds) Emerging Intelligent Computing Technology and Applications. ICIC 2009. Lecture Notes in Computer Science, vol 5754. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-04070-2_74
Download citation
DOI: https://doi.org/10.1007/978-3-642-04070-2_74
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-04069-6
Online ISBN: 978-3-642-04070-2
eBook Packages: Computer ScienceComputer Science (R0)