Fuzzy Logic Election of Node for Routing in WSNs

Sensor nodes of Wireless Sensor Networks (WSNs) are resource constraints in energy, memory, processing and communication bandwidth. Since they are operated by battery, their life span is limited. Specially, energy conservation is very important issue in the WSN, because it directly affects the life of the node as well as the entire network. Here, we develop a new way of electing a node among many trustworthy nodes for routing processes. This method consumes the energies of network nodes based on Fuzzy logic applied on their residual energy, trust level and distance from the Base Station. The proposed method elects one indispensible node for participating in routing among many worthy nodes. Hence, this method of election of node for routing in WSN sees the conservation of nodes energies go by very smooth and justifying, thereby increasing the life of the WSN.

[1]  Sungyoung Lee,et al.  LSec: Lightweight Security Protocol for Distributed Wireless Sensor Network , 2006, PWC.

[2]  Ramesh Govindan,et al.  Monitoring civil structures with a wireless sensor network , 2006, IEEE Internet Computing.

[3]  David A. Wagner,et al.  TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.

[4]  David A. Wagner,et al.  Security in wireless sensor networks , 2004, SASN '04.

[5]  Sasikanth Avancha,et al.  Security for Sensor Networks , 2004 .

[6]  David A. Wagner,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Ad Hoc Networks.

[7]  John Anderson,et al.  Wireless sensor networks for habitat monitoring , 2002, WSNA '02.

[8]  Theodore B. Zahariadis,et al.  Mobile Networks Trust management in wireless sensor networks , 2010, Eur. Trans. Telecommun..

[9]  Mrinal Kanti Naskar,et al.  Geometric mean based trust management system for WSNs (GMTMS) , 2011, 2011 World Congress on Information and Communication Technologies.

[10]  Mukesh Singhal,et al.  Security in wireless sensor networks , 2008, Wirel. Commun. Mob. Comput..

[11]  Mark G. Terwilliger,et al.  Overview of Sensor Networks , 2004 .

[12]  Zhu Han,et al.  Defense of trust management vulnerabilities in distributed networks , 2008, IEEE Communications Magazine.

[13]  Mani Srivastava,et al.  Overview of sensor networks , 2004 .

[14]  David E. Culler,et al.  SPINS: Security Protocols for Sensor Networks , 2001, MobiCom '01.

[15]  Rodrigo Roman,et al.  Trust management systems for wireless sensor networks: Best practices , 2010, Comput. Commun..

[16]  Deborah Estrin,et al.  Guest Editors' Introduction: Overview of Sensor Networks , 2004, Computer.