A general framework for adaptive filtering in wireless sensor networks based on fuzzy logic

被引:0
作者
Lee, Hae Young [1 ]
Cho, Tae Ho [1 ]
机构
[1] Sungkyunkwan Univ, Sch Informat & Commun Engn, Suwon 440746, South Korea
来源
ADVANCED INTELLIGENT COMPUTING THEORIES AND APPLICATIONS, PROCEEDINGS: WITH ASPECTS OF THEORETICAL AND METHODOLOGICAL ISSUES | 2008年 / 5226卷
关键词
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Wireless sensor networks are vulnerable to false data injection attacks. In these, adversaries inject false reports into the network using compromised nodes, with the goal of deceiving the base station and depleting the energy resources of forwarding nodes. Several filtering schemes, and the adaptive versions of them, have been proposed to detect and drop such false reports during the forwarding process. In this paper, we propose a fuzzy-based framework to achieve adaptive filtering of false reports. A fuzzy rule-based system controls the security level of the filtering scheme through the determination of the required number of endorsements in every report. Compared to existing adaptive solutions, the proposed method uses more practical factors for the determination and can be applied to the network, regardless of scale. The proposed method can provide energy saving and sufficient resilience against false data injection attacks.
引用
收藏
页码:1234 / +
页数:3
相关论文
共 17 条
[1]  
[Anonymous], 2003, PROC 1 INT C EMBEDDE
[2]  
DE P, 2006, INT WORKSH WIR MOB M, P237
[3]   Fuzzy adaptive selection of filtering schemes for energy saving in sensor networks [J].
Lee, Hae Young ;
Cho, Tae Ho .
IEICE TRANSACTIONS ON COMMUNICATIONS, 2007, E90B (12) :3346-3353
[4]  
Lee HY, 2007, LECT NOTES ARTIF INT, V4570, P64
[5]  
Lee HY, 2006, LECT NOTES ARTIF INT, V4293, P112
[6]  
Lee HY, 2006, LECT NOTES COMPUT SC, V4317, P116
[7]  
LEE HY, 2006, ENFORMATIKA, V14, P157
[8]  
LEE SJ, 2008, INT J COMPUTER SCI N, V8
[9]  
LI F, 2006, P IWCMC, P27
[10]  
Marti S., 2000, MobiCom 2000. Proceedings of the Sixth Annual International Conference on Mobile Computing and Networking, P255, DOI 10.1145/345910.345955