SPINS: security protocols for sensor networks
Wireless Networks
SIA: secure information aggregation in sensor networks
Proceedings of the 1st international conference on Embedded networked sensor systems
A dynamic en-route scheme for filtering false data injection in wireless sensor networks
Proceedings of the 3rd international conference on Embedded networked sensor systems
A probabilistic voting-based filtering scheme in wireless sensor networks
Proceedings of the 2006 international conference on Wireless communications and mobile computing
Fuzzy logic based propagation limiting method for message routing in wireless sensor networks
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part IV
Key inheritance-based false data filtering scheme in wireless sensor networks
ICDCIT'06 Proceedings of the Third international conference on Distributed Computing and Internet Technology
Routing techniques in wireless sensor networks: a survey
IEEE Wireless Communications
IEEE Communications Magazine
Statistical en-route filtering of injected false data in sensor networks
IEEE Journal on Selected Areas in Communications
CEA'09 Proceedings of the 3rd WSEAS international conference on Computer engineering and applications
Cluster adaptation method to enhance performance of filtering scheme in sensor networks
ICACT'09 Proceedings of the 11th international conference on Advanced Communication Technology - Volume 1
Fuzzy-based determination method for redistributing keys in sensor networks
ICACT'10 Proceedings of the 12th international conference on Advanced communication technology
Efficient key dissemination method using fuzzy logic based dynamic en-route filtering
ICIC'10 Proceedings of the Advanced intelligent computing theories and applications, and 6th international conference on Intelligent computing
Hi-index | 0.00 |
The dynamic en-route filtering scheme (DEF) proposed by Yu and Guan was designed to detect and drop false reports in wireless sensor networks. In this scheme the choice of a threshold value that limits the key dissemination is important since it represents a trade-off between detection power and overhead. A large threshold value increases the probability of detecting false reports but it consumes too much energy in the key dissemination phase. Thus, we should choose a threshold value such that it provides sufficient detection power, while consumes energy effectively. In this paper we propose a key dissemination limiting method for DEF. The threshold value to limit the key dissemination is determined by a fuzzy rule-based system with consideration of the energy level of the network, the number of keys in a cluster, and the distance from the base station (BS) to that cluster. The simulation results show that the proposed method can conserve energy, while it provides sufficient detection power.