Skip to main content
Erschienen in: The Journal of Supercomputing 8/2019

28.08.2018

Safety relay selection algorithms based on fuzzy relationship for wireless sensor networks

verfasst von: Tung-Huang Feng, Neng-Yih Shih, Min-Shiang Hwang

Erschienen in: The Journal of Supercomputing | Ausgabe 8/2019

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The remote nodes using a selecting relay algorithm (SRA) transmit its dates on wireless sensor networks (WSNs). The algorithm can enhance the network life cycle. It selects an appropriate cooperation node as a relay node by balancing between power consumption and communication. More recently, scholars have applied a fuzzy theory to SRA and achieved better tradeoffs. This study further simulates the application of four set types of attacks each layer on WSNS. Then, comparing with different fuzzification and defuzzification methods, a fuzzy inference system was built for the security performance. The results show that there are two methods which can improve the algorithm’s safety: one is fuzzification Or-Max connection Method, and the other is defuzzification of Lom and Som methods.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Krishnamachari B (2005) Networking wireless sensors. Cambridge University Press, CambridgeCrossRef Krishnamachari B (2005) Networking wireless sensors. Cambridge University Press, CambridgeCrossRef
2.
Zurück zum Zitat Katiyar V, Chand N (2010) Recent advances and future trends in wireless sensor networks. Int J Appl Eng Res 1:330–342 Katiyar V, Chand N (2010) Recent advances and future trends in wireless sensor networks. Int J Appl Eng Res 1:330–342
3.
Zurück zum Zitat He D, Chen C, Chan S, Bu J, Yang LT (2013) Security analysis and improvement of a secure and distributed reprogramming protocol for wireless sensor networks. IEEE Trans Ind Electron 60:5348–5354CrossRef He D, Chen C, Chan S, Bu J, Yang LT (2013) Security analysis and improvement of a secure and distributed reprogramming protocol for wireless sensor networks. IEEE Trans Ind Electron 60:5348–5354CrossRef
4.
Zurück zum Zitat Reiter G (2014) Wireless connectivity for the Internet of Things. Texas Instruments, Dallas Reiter G (2014) Wireless connectivity for the Internet of Things. Texas Instruments, Dallas
5.
Zurück zum Zitat Soliman HS, Omari M (2006) Application of synchronous dynamic encryption system (sdes) in wireless sensor networks. Int J Netw Secur 3:160–171 Soliman HS, Omari M (2006) Application of synchronous dynamic encryption system (sdes) in wireless sensor networks. Int J Netw Secur 3:160–171
6.
Zurück zum Zitat Luo RC, Chen O (2012) Mobile sensor node deployment and asynchronous power management for wireless sensor networks. IEEE Trans Ind Electron 59:2377–2385CrossRef Luo RC, Chen O (2012) Mobile sensor node deployment and asynchronous power management for wireless sensor networks. IEEE Trans Ind Electron 59:2377–2385CrossRef
7.
Zurück zum Zitat He D, Chen C, Chan S, Bu J (2012) SDRP: a secure and distributed reprogramming protocol for wireless sensor networks. IEEE Trans Ind Electron 59:4155–4163CrossRef He D, Chen C, Chan S, Bu J (2012) SDRP: a secure and distributed reprogramming protocol for wireless sensor networks. IEEE Trans Ind Electron 59:4155–4163CrossRef
8.
Zurück zum Zitat Dohler M, Heath RW, Lozano JA, Papadias CB, Valen-zuela RA (2011) Is the PHY layer dead. IEEE Commun Mag 49:159–165CrossRef Dohler M, Heath RW, Lozano JA, Papadias CB, Valen-zuela RA (2011) Is the PHY layer dead. IEEE Commun Mag 49:159–165CrossRef
9.
Zurück zum Zitat Faye S, Myoupo JF (2013) Secure and energy-efficient geocast protocol for wireless sensor networks based on a hierarchical clustered structure. Int J Netw Secur 15:151–160 Faye S, Myoupo JF (2013) Secure and energy-efficient geocast protocol for wireless sensor networks based on a hierarchical clustered structure. Int J Netw Secur 15:151–160
10.
Zurück zum Zitat Gutierrez A, Dopico NI, Gonzalez C, Zazo S, Jimenez-Leube J, Raos I (2013) Cattle-powered node experience in a heterogeneous network for localization of herds. IEEE Trans Ind Electron 60:3176–3184CrossRef Gutierrez A, Dopico NI, Gonzalez C, Zazo S, Jimenez-Leube J, Raos I (2013) Cattle-powered node experience in a heterogeneous network for localization of herds. IEEE Trans Ind Electron 60:3176–3184CrossRef
11.
Zurück zum Zitat Li P, Wen Y, Jia C, Li X (2011) A magnetoelectric composite energy harvester and power management circuit. IEEE Trans Ind Electron 58:2944–2951CrossRef Li P, Wen Y, Jia C, Li X (2011) A magnetoelectric composite energy harvester and power management circuit. IEEE Trans Ind Electron 58:2944–2951CrossRef
12.
Zurück zum Zitat Deverajan GG, Saravanan R (2015) Fuzzy based energy aware routing method with trustworthiness for MANET. Int J Electron Inf Eng 3(2):67–80 Deverajan GG, Saravanan R (2015) Fuzzy based energy aware routing method with trustworthiness for MANET. Int J Electron Inf Eng 3(2):67–80
13.
Zurück zum Zitat Zhai C, Liu J, Zheng L, Xu H, Chen H (2012) Maximise life-time of wireless sensor networks via a distributed cooperative routing algorithm. Trans Emerg Telecommun Technol 23:414–428CrossRef Zhai C, Liu J, Zheng L, Xu H, Chen H (2012) Maximise life-time of wireless sensor networks via a distributed cooperative routing algorithm. Trans Emerg Telecommun Technol 23:414–428CrossRef
14.
Zurück zum Zitat Abdulhadi S, Jaseemuddin M, Anpalagan A (2010) A survey of distributed relay selection schemes in cooperative wireless ad hoc networks. Springer Wirel Pers Commun 63:1–19 Abdulhadi S, Jaseemuddin M, Anpalagan A (2010) A survey of distributed relay selection schemes in cooperative wireless ad hoc networks. Springer Wirel Pers Commun 63:1–19
15.
Zurück zum Zitat Yang W, Cai Y, Xu Y (2009) An energy-aware relay selection algorithm based on fuzzy comprehensive evaluation. In: Proceedings of the International Conference on Network Security, Wireless Communication Trusted Computing, pp 144–146 Yang W, Cai Y, Xu Y (2009) An energy-aware relay selection algorithm based on fuzzy comprehensive evaluation. In: Proceedings of the International Conference on Network Security, Wireless Communication Trusted Computing, pp 144–146
16.
Zurück zum Zitat Brante G, Peron GDS, Souza RD, Abrão T (2013) Distributed fuzzy logic-based relay selection algorithm for cooperative wireless sensor networks. IEEE Sens J 13:4375–4386CrossRef Brante G, Peron GDS, Souza RD, Abrão T (2013) Distributed fuzzy logic-based relay selection algorithm for cooperative wireless sensor networks. IEEE Sens J 13:4375–4386CrossRef
17.
Zurück zum Zitat Rekhis S, Boudriga N (2009) Pattern-based digital investigation of x-hole attacks in wireless adhoc and sensor networks. Ultra Modern Telecommunications and Workshops (ICUMT), pp 1–8 Rekhis S, Boudriga N (2009) Pattern-based digital investigation of x-hole attacks in wireless adhoc and sensor networks. Ultra Modern Telecommunications and Workshops (ICUMT), pp 1–8
18.
Zurück zum Zitat Shah VK, Gharge AP (2012) A Review on Relay Selection Techniques in Cooperative Communication. Int J Eng Innov Technol 2:65–69 Shah VK, Gharge AP (2012) A Review on Relay Selection Techniques in Cooperative Communication. Int J Eng Innov Technol 2:65–69
19.
Zurück zum Zitat Sugeno M (1977) Fuzzy measures and fuzzy integrals: a survey. Fuzzy Autom Decis Process 78(33):89–102MathSciNet Sugeno M (1977) Fuzzy measures and fuzzy integrals: a survey. Fuzzy Autom Decis Process 78(33):89–102MathSciNet
20.
Zurück zum Zitat Mamdani EH (1977) Application of fuzzy logic to approximate reasoning using linguistic synthesis. IEEE Trans Comput 26:1182–1191CrossRefMATH Mamdani EH (1977) Application of fuzzy logic to approximate reasoning using linguistic synthesis. IEEE Trans Comput 26:1182–1191CrossRefMATH
21.
Zurück zum Zitat Sugeno M (1985) Industrial applications of fuzzy control. Elsevier, New YorkMATH Sugeno M (1985) Industrial applications of fuzzy control. Elsevier, New YorkMATH
22.
Zurück zum Zitat Mamdani EH, Assilian S (1975) An experiment in linguistic synthesis with a fuzzy logic controller. Int J Man Mach Stud 7:1–13CrossRefMATH Mamdani EH, Assilian S (1975) An experiment in linguistic synthesis with a fuzzy logic controller. Int J Man Mach Stud 7:1–13CrossRefMATH
23.
Zurück zum Zitat Yang W, Cai Y, Xu Y (2009) An energy-aware relay selection algorithm based on fuzzy comprehensive evaluation. In: Proceedings of the International Conference on Network Security, Wireless Communication Trusted Computing, pp 144–146 Yang W, Cai Y, Xu Y (2009) An energy-aware relay selection algorithm based on fuzzy comprehensive evaluation. In: Proceedings of the International Conference on Network Security, Wireless Communication Trusted Computing, pp 144–146
24.
Zurück zum Zitat Heinzelman WR, Chandrakasan A, Balakrishnan H (2000) Energy-efficient communication protocol for wireless microsensor networks. In: Proceedings of the 33rd Hawaii International Conference on System Sciences, pp 1–10 Heinzelman WR, Chandrakasan A, Balakrishnan H (2000) Energy-efficient communication protocol for wireless microsensor networks. In: Proceedings of the 33rd Hawaii International Conference on System Sciences, pp 1–10
25.
Zurück zum Zitat Landstra T, Jagannathan S, Zawodniok M (2009) Energy-efficient hybrid key management protocol for wireless sensor networks. Int J Netw Secur 9:121–134 Landstra T, Jagannathan S, Zawodniok M (2009) Energy-efficient hybrid key management protocol for wireless sensor networks. Int J Netw Secur 9:121–134
26.
Zurück zum Zitat Asadi M, Zimmerman C, Agah A (2013) A game-theoretic approach to security and power conservation in wireless sensor networks. Int J Netw Secur 15:50–58 Asadi M, Zimmerman C, Agah A (2013) A game-theoretic approach to security and power conservation in wireless sensor networks. Int J Netw Secur 15:50–58
27.
Zurück zum Zitat Halgamuge MN, Zukerman M, Ramamohanarao K (2009) An estimation of sensor energy consumption. Progr Electromagn Res B 12:259–295CrossRef Halgamuge MN, Zukerman M, Ramamohanarao K (2009) An estimation of sensor energy consumption. Progr Electromagn Res B 12:259–295CrossRef
28.
Zurück zum Zitat Li WT, Feng TH, Hwang MS (2014) Distributed detecting node replication attacks in wireless sensor networks: a survey. Int J Netw Secur 16:323–330 Li WT, Feng TH, Hwang MS (2014) Distributed detecting node replication attacks in wireless sensor networks: a survey. Int J Netw Secur 16:323–330
Metadaten
Titel
Safety relay selection algorithms based on fuzzy relationship for wireless sensor networks
verfasst von
Tung-Huang Feng
Neng-Yih Shih
Min-Shiang Hwang
Publikationsdatum
28.08.2018
Verlag
Springer US
Erschienen in
The Journal of Supercomputing / Ausgabe 8/2019
Print ISSN: 0920-8542
Elektronische ISSN: 1573-0484
DOI
https://doi.org/10.1007/s11227-018-2547-7

Weitere Artikel der Ausgabe 8/2019

The Journal of Supercomputing 8/2019 Zur Ausgabe