Abstract
Security problems associated with the Wireless Sensor Network (WSN) have yet not met it fail-proof solution against the most lethal threat. After reviewing existing security solution, it was felt that there is a wide scope of improvement as existing system still cannot offer certainty in its decision of adversaries, whether it is identification or prevention of any threat. Therefore, the proposed system introduces a novel mechanism where fuzzy logic has been applied to filter down the decisions on the basis of unique pattern of energy and distance factors to identify and prevent the adversary from stealing the public keys within the sensor node. The study outcome shows that proposed system offers significant security without affecting the communication performance. In fact, proposed system exhibits good residual energy and sustaining data delivery performance for a longer iteration.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Xu, G., Shen, W., Wang, X.: Applications of wireless sensor networks in marine environment monitoring: a survey. Sensors 14(9), 16932–16954 (2014)
Kobo, H.I., Abu-Mahfouz, A.M., Hancke, G.P.: A survey on software-defined wireless sensor networks: challenges and design requirements. IEEE Access 5, 1872–1899 (2017)
Ruiz, M., Alvarez, E., Serrano, A., Garcia, E.: The convergence between wireless sensor networks and the Internet of Things; challenges and perspectives: a survey. IEEE Lat. Am. Trans. 14(10), 4249–4254 (2016)
Kumar, S.A.A., Ovsthus, K., Kristensen, L.M.: An industrial perspective on wireless sensor networks—a survey of requirements, protocols, and challenges. IEEE Commun. Surv. Tutorials 16(3), 1391–1412 (2014)
AlMheiri, S.M., AlQamzi, H.S.: Data link layer security protocols in wireless sensor networks: a survey. In: 2013 10th IEEE International Conference on Networking, Sensing and Control (ICNSC), Evry, pp. 312–317 (2013)
Khedim, F., Labraoui, N., Lehsaini, M.: Dishonest recommendation attacks in wireless sensor networks: a survey. In: 2015 12th International Symposium on Programming and Systems (ISPS), Algiers, pp. 1–10 (2015)
Elgenaidi, W., Newe, T., O’Connell, E., Mathur, A., Toal, D., Dooly, G.: Reconfiguration of neighbouring nodes in coastal monitoring wireless sensor networks based on leader node recommendation. In: 2017 4th International Conference on Control, Decision and Information Technologies (CoDIT), Barcelona, pp. 0348–0352 (2017)
Tomić, I., McCann, J.A.: A survey of potential security issues in existing wireless sensor network protocols. IEEE Internet Things J. 4(6), 1910–1923 (2017)
Grover, J., Sharma, S.: Security issues in wireless sensor network—a review. In: 2016 5th International Conference Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO), pp. 397–404 (2016)
Yegireddi, R., Kumar, R.K.: A survey on conventional encryption algorithms of cryptography. In: 2016 International Conference on ICT in Business Industry & Government (ICTBIG), Indore, pp. 1–4 (2016)
Aissani, S., Omar, M., Tari, A., Bouakkaz, F.: µKMS: micro key management system for WSNs. IET Wirel. Sens. Syst. 8(2), 87–97 (2018)
Burg, A., Chattopadhyay, A., Lam, K.Y.: Wireless communication and security issues for cyber-physical systems and the Internet-of-Things. Proc. IEEE 106(1), 38–60 (2018)
Gandino, F., Ferrero, R., Montrucchio, B., Rebaudengo, M.: Fast hierarchical key management scheme with transitory master key for wireless sensor networks. IEEE Internet of Things J. 3(6), 1334–1345 (2016)
Gopalakrishnan, B., Bhagyaveni, M.A.: Anti-jamming communication for body area network using chaotic frequency hopping. Healthc. Technol. Lett. 4(6), 233–237 (2017)
Gope, P., Hwang, T.: A realistic lightweight anonymous authentication protocol for securing real-time application data access in wireless sensor networks. IEEE Trans. Ind. Electron. 63(11), 7124–7132 (2016)
Sayad Haghighi, M., Wen, S., Xiang, Y., Quinn, B., Zhou, W.: On the race of worms and patches: modeling the spread of information in wireless sensor networks. IEEE Trans. Inf. Forensics Secur. 11(12), 2854–2865 (2016)
Huang, M., Yu, B., Li, S.: PUF-assisted group key distribution scheme for software-defined wireless sensor networks. IEEE Commun. Lett. 22(2), 404–407 (2018)
Kesavan, V.T., Radhakrishnan, S.: Cluster based secure dynamic keying technique for heterogeneous mobile wireless sensor networks. China Commun. 13(6), 178–194 (2016)
Li, Z., Wang, H., Fang, H.: Group-based cooperation on symmetric key generation for wireless body area networks. IEEE Internet of Things J. 4(6), 1955–1963 (2017)
Moara-Nkwe, K., Shi, Q., Lee, G.M., Eiza, M.H.: A novel physical layer secure key generation and refreshment scheme for wireless sensor networks. IEEE Access 6, 11374–11387 (2018)
Oliveira, L.M.L., Rodrigues, J.J.P.C., de Sousa, A.F., Denisov, V.M.: Network admission control solution for 6LoWPAN networks based on symmetric key mechanisms. IEEE Trans. Ind. Inf. 12(6), 2186–2195 (2016)
Shim, K.A.: BASIS: a practical multi-user broadcast authentication scheme in wireless sensor networks. IEEE Trans. Inf. Forensics Secur. 12(7), 1545–1554 (2017)
Shin, S., Kwon, T.: Two-factor authenticated key agreement supporting unlinkability in 5G-integrated wireless sensor networks. IEEE Access 6, 11229–11241 (2018)
Tian, F., et al.: Secrecy rate optimization in wireless multi-hop full duplex networks. IEEE Access 6, 5695–5704 (2018)
Al-Turjman, F., Kirsal Ever, Y., Ever, E., Nguyen, H.X., David, D.B.: Seamless key agreement framework for mobile-sink in iot based cloud-centric secured public safety sensor networks. IEEE Access 5, 24617–24631 (2017)
Wu, J., Ota, K., Dong, M., Li, C.: A hierarchical security framework for defending against sophisticated attacks on wireless sensor networks in smart cities. IEEE Access 4, 416–424 (2016)
Yildiz, H.U., Ciftler, B.S., Tavli, B., Bicakci, K., Incebacak, D.: The Impact of Incomplete Secure Connectivity on the Lifetime of Wireless Sensor Networks. IEEE Syst. J. 12(1), 1042–1046 (2018)
Zhang, J., Tao, X., Wu, H., Zhang, X.: Secure transmission in SWIPT-powered two-way untrusted relay networks. IEEE Access 6, 10508–10519 (2018)
Zhao, J.: Topological properties of secure wireless sensor networks under the q-composite key predistribution scheme with unreliable links. IEEE/ACM Trans. Netw. 25(3), 1789–1802 (2017)
Zheng, G., et al.: Multiple ECG fiducial points-based random binary sequence generation for securing wireless body area networks. IEEE J. Biomed. Health Inf. 21(3), 655–663 (2017)
Tejashwini, N., Shashikumar, D.R., Satyanarayan Reddy, K.: Mobile communication security using Galios field in elliptic curve cryptography. In: 2015 International Conference on Emerging Research in Electronics, Computer Science and Technology (ICERECT), Mandya, pp. 251–256 (2015)
Oliveira, L.B., Wong, H.C., Bern, M., Dahab, R., Loureiro, A.A.F.: SecLEACH - a random key distribution solution for securing clustered sensor networks. In: Fifth IEEE International Symposium on Network Computing and Applications (NCA 2006), Cambridge, MA, pp. 145–154 (2006)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Tejashwini, N., Shashi Kumar, D.R., Satyanarayan Reddy, K. (2019). Novel Filtering-Based Approach Using Fuzzy Logic for Prevention of Adversaries in Sensory Application. In: Silhavy, R. (eds) Cybernetics and Automation Control Theory Methods in Intelligent Algorithms. CSOC 2019. Advances in Intelligent Systems and Computing, vol 986. Springer, Cham. https://doi.org/10.1007/978-3-030-19813-8_1
Download citation
DOI: https://doi.org/10.1007/978-3-030-19813-8_1
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-19812-1
Online ISBN: 978-3-030-19813-8
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)