Skip to main content

Novel Filtering-Based Approach Using Fuzzy Logic for Prevention of Adversaries in Sensory Application

  • Conference paper
  • First Online:
Cybernetics and Automation Control Theory Methods in Intelligent Algorithms (CSOC 2019)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 986))

Included in the following conference series:

  • 469 Accesses

Abstract

Security problems associated with the Wireless Sensor Network (WSN) have yet not met it fail-proof solution against the most lethal threat. After reviewing existing security solution, it was felt that there is a wide scope of improvement as existing system still cannot offer certainty in its decision of adversaries, whether it is identification or prevention of any threat. Therefore, the proposed system introduces a novel mechanism where fuzzy logic has been applied to filter down the decisions on the basis of unique pattern of energy and distance factors to identify and prevent the adversary from stealing the public keys within the sensor node. The study outcome shows that proposed system offers significant security without affecting the communication performance. In fact, proposed system exhibits good residual energy and sustaining data delivery performance for a longer iteration.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Xu, G., Shen, W., Wang, X.: Applications of wireless sensor networks in marine environment monitoring: a survey. Sensors 14(9), 16932–16954 (2014)

    Article  Google Scholar 

  2. Kobo, H.I., Abu-Mahfouz, A.M., Hancke, G.P.: A survey on software-defined wireless sensor networks: challenges and design requirements. IEEE Access 5, 1872–1899 (2017)

    Article  Google Scholar 

  3. Ruiz, M., Alvarez, E., Serrano, A., Garcia, E.: The convergence between wireless sensor networks and the Internet of Things; challenges and perspectives: a survey. IEEE Lat. Am. Trans. 14(10), 4249–4254 (2016)

    Article  Google Scholar 

  4. Kumar, S.A.A., Ovsthus, K., Kristensen, L.M.: An industrial perspective on wireless sensor networks—a survey of requirements, protocols, and challenges. IEEE Commun. Surv. Tutorials 16(3), 1391–1412 (2014)

    Article  Google Scholar 

  5. AlMheiri, S.M., AlQamzi, H.S.: Data link layer security protocols in wireless sensor networks: a survey. In: 2013 10th IEEE International Conference on Networking, Sensing and Control (ICNSC), Evry, pp. 312–317 (2013)

    Google Scholar 

  6. Khedim, F., Labraoui, N., Lehsaini, M.: Dishonest recommendation attacks in wireless sensor networks: a survey. In: 2015 12th International Symposium on Programming and Systems (ISPS), Algiers, pp. 1–10 (2015)

    Google Scholar 

  7. Elgenaidi, W., Newe, T., O’Connell, E., Mathur, A., Toal, D., Dooly, G.: Reconfiguration of neighbouring nodes in coastal monitoring wireless sensor networks based on leader node recommendation. In: 2017 4th International Conference on Control, Decision and Information Technologies (CoDIT), Barcelona, pp. 0348–0352 (2017)

    Google Scholar 

  8. Tomić, I., McCann, J.A.: A survey of potential security issues in existing wireless sensor network protocols. IEEE Internet Things J. 4(6), 1910–1923 (2017)

    Article  Google Scholar 

  9. Grover, J., Sharma, S.: Security issues in wireless sensor network—a review. In: 2016 5th International Conference Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO), pp. 397–404 (2016)

    Google Scholar 

  10. Yegireddi, R., Kumar, R.K.: A survey on conventional encryption algorithms of cryptography. In: 2016 International Conference on ICT in Business Industry & Government (ICTBIG), Indore, pp. 1–4 (2016)

    Google Scholar 

  11. Aissani, S., Omar, M., Tari, A., Bouakkaz, F.: µKMS: micro key management system for WSNs. IET Wirel. Sens. Syst. 8(2), 87–97 (2018)

    Article  Google Scholar 

  12. Burg, A., Chattopadhyay, A., Lam, K.Y.: Wireless communication and security issues for cyber-physical systems and the Internet-of-Things. Proc. IEEE 106(1), 38–60 (2018)

    Article  Google Scholar 

  13. Gandino, F., Ferrero, R., Montrucchio, B., Rebaudengo, M.: Fast hierarchical key management scheme with transitory master key for wireless sensor networks. IEEE Internet of Things J. 3(6), 1334–1345 (2016)

    Article  Google Scholar 

  14. Gopalakrishnan, B., Bhagyaveni, M.A.: Anti-jamming communication for body area network using chaotic frequency hopping. Healthc. Technol. Lett. 4(6), 233–237 (2017)

    Article  Google Scholar 

  15. Gope, P., Hwang, T.: A realistic lightweight anonymous authentication protocol for securing real-time application data access in wireless sensor networks. IEEE Trans. Ind. Electron. 63(11), 7124–7132 (2016)

    Article  Google Scholar 

  16. Sayad Haghighi, M., Wen, S., Xiang, Y., Quinn, B., Zhou, W.: On the race of worms and patches: modeling the spread of information in wireless sensor networks. IEEE Trans. Inf. Forensics Secur. 11(12), 2854–2865 (2016)

    Article  Google Scholar 

  17. Huang, M., Yu, B., Li, S.: PUF-assisted group key distribution scheme for software-defined wireless sensor networks. IEEE Commun. Lett. 22(2), 404–407 (2018)

    Article  Google Scholar 

  18. Kesavan, V.T., Radhakrishnan, S.: Cluster based secure dynamic keying technique for heterogeneous mobile wireless sensor networks. China Commun. 13(6), 178–194 (2016)

    Article  Google Scholar 

  19. Li, Z., Wang, H., Fang, H.: Group-based cooperation on symmetric key generation for wireless body area networks. IEEE Internet of Things J. 4(6), 1955–1963 (2017)

    Article  Google Scholar 

  20. Moara-Nkwe, K., Shi, Q., Lee, G.M., Eiza, M.H.: A novel physical layer secure key generation and refreshment scheme for wireless sensor networks. IEEE Access 6, 11374–11387 (2018)

    Article  Google Scholar 

  21. Oliveira, L.M.L., Rodrigues, J.J.P.C., de Sousa, A.F., Denisov, V.M.: Network admission control solution for 6LoWPAN networks based on symmetric key mechanisms. IEEE Trans. Ind. Inf. 12(6), 2186–2195 (2016)

    Article  Google Scholar 

  22. Shim, K.A.: BASIS: a practical multi-user broadcast authentication scheme in wireless sensor networks. IEEE Trans. Inf. Forensics Secur. 12(7), 1545–1554 (2017)

    Article  Google Scholar 

  23. Shin, S., Kwon, T.: Two-factor authenticated key agreement supporting unlinkability in 5G-integrated wireless sensor networks. IEEE Access 6, 11229–11241 (2018)

    Article  Google Scholar 

  24. Tian, F., et al.: Secrecy rate optimization in wireless multi-hop full duplex networks. IEEE Access 6, 5695–5704 (2018)

    Article  Google Scholar 

  25. Al-Turjman, F., Kirsal Ever, Y., Ever, E., Nguyen, H.X., David, D.B.: Seamless key agreement framework for mobile-sink in iot based cloud-centric secured public safety sensor networks. IEEE Access 5, 24617–24631 (2017)

    Article  Google Scholar 

  26. Wu, J., Ota, K., Dong, M., Li, C.: A hierarchical security framework for defending against sophisticated attacks on wireless sensor networks in smart cities. IEEE Access 4, 416–424 (2016)

    Article  Google Scholar 

  27. Yildiz, H.U., Ciftler, B.S., Tavli, B., Bicakci, K., Incebacak, D.: The Impact of Incomplete Secure Connectivity on the Lifetime of Wireless Sensor Networks. IEEE Syst. J. 12(1), 1042–1046 (2018)

    Article  Google Scholar 

  28. Zhang, J., Tao, X., Wu, H., Zhang, X.: Secure transmission in SWIPT-powered two-way untrusted relay networks. IEEE Access 6, 10508–10519 (2018)

    Article  Google Scholar 

  29. Zhao, J.: Topological properties of secure wireless sensor networks under the q-composite key predistribution scheme with unreliable links. IEEE/ACM Trans. Netw. 25(3), 1789–1802 (2017)

    Article  Google Scholar 

  30. Zheng, G., et al.: Multiple ECG fiducial points-based random binary sequence generation for securing wireless body area networks. IEEE J. Biomed. Health Inf. 21(3), 655–663 (2017)

    Article  Google Scholar 

  31. Tejashwini, N., Shashikumar, D.R., Satyanarayan Reddy, K.: Mobile communication security using Galios field in elliptic curve cryptography. In: 2015 International Conference on Emerging Research in Electronics, Computer Science and Technology (ICERECT), Mandya, pp. 251–256 (2015)

    Google Scholar 

  32. Oliveira, L.B., Wong, H.C., Bern, M., Dahab, R., Loureiro, A.A.F.: SecLEACH - a random key distribution solution for securing clustered sensor networks. In: Fifth IEEE International Symposium on Network Computing and Applications (NCA 2006), Cambridge, MA, pp. 145–154 (2006)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to N. Tejashwini .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Tejashwini, N., Shashi Kumar, D.R., Satyanarayan Reddy, K. (2019). Novel Filtering-Based Approach Using Fuzzy Logic for Prevention of Adversaries in Sensory Application. In: Silhavy, R. (eds) Cybernetics and Automation Control Theory Methods in Intelligent Algorithms. CSOC 2019. Advances in Intelligent Systems and Computing, vol 986. Springer, Cham. https://doi.org/10.1007/978-3-030-19813-8_1

Download citation

Publish with us

Policies and ethics