Cluster adaptation method to enhance performance of filtering scheme in sensor networks

Sensor networks are the next generation of technology for use in various applications, including tracking, monitoring and control. However, sensor networks still have some inherent security and hardware problems. The cluster routing scheme has been proposed in attempt to reduce duplication reports. Moreover, statistical en-route filtering (SEF) has been proposed to detect and drop the injected fabricated report found in the sensor network. When SEF method is applied in cluster-based sensor networks, their detection capabilities may be quite poor because the proposed schemes do not consider each possible feature that may be present. To solve this problem, we propose a cluster adaptation method to enhance the performance of SEF. The proposed method uses a fuzzy logic approach to form an efficient cluster for SEF. The sufficient performance of the proposed method is shown by the simulation results.

[1]  Ameer Ahmed Abbasi,et al.  A survey on clustering algorithms for wireless sensor networks , 2007, Comput. Commun..

[2]  Tae Ho Cho,et al.  Fuzzy Key Dissemination Limiting Method for the Dynamic Filtering-Based Sensor Networks , 2007, ICIC.

[3]  Ruay-Shiung Chang,et al.  Weight-based clustering multicast routing protocol for mobile ad hoc networks , 2003, 2003 IEEE Wireless Communications and Networking, 2003. WCNC 2003..

[4]  JAMAL N. AL-KARAKI,et al.  Routing techniques in wireless sensor networks: a survey , 2004, IEEE Wireless Communications.

[5]  Tae Ho Cho,et al.  Fuzzy Rule-Based Enhancing Key Dissemination Method for the Dynamic Filtering-Based Sensor Networks , 2007, Int. J. Inf. Acquis..

[6]  Jie Wu,et al.  A probabilistic voting-based filtering scheme in wireless sensor networks , 2006, IWCMC '06.

[7]  Ian F. Akyildiz,et al.  Sensor Networks , 2002, Encyclopedia of GIS.

[8]  Ossama Younis,et al.  HEED: a hybrid, energy-efficient, distributed clustering approach for ad hoc sensor networks , 2004, IEEE Transactions on Mobile Computing.

[9]  Haiyun Luo,et al.  Statistical en-route filtering of injected false data in sensor networks , 2005, IEEE J. Sel. Areas Commun..

[10]  Soo Young Moon,et al.  Verification Probability Control Method in Sensor Networks , 2008 .

[11]  Sushil Jajodia,et al.  An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.

[12]  Ruay-Shiung Chang,et al.  A weight-based clustering multicast routing protocol for mobile ad hoc networks , 2005, Int. J. Internet Protoc. Technol..

[13]  Yong Guan,et al.  A Dynamic En-Route Scheme for Filtering False Data Injection in Wireless Sensor Networks , 2005, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[14]  David B. Skalak,et al.  Prototype and Feature Selection by Sampling and Random Mutation Hill Climbing Algorithms , 1994, ICML.