WSN  Vol.3 No.11 , November 2011
Secure Path Cycle Selection Method Using Fuzzy Logic System for Improving Energy Efficiency in Statistical En-Route Filtering Based WSNs
Sensor nodes are easily compromised to malicious attackers due to an open environment. A false injected attack which takes place on application layer is elected by the compromised node. If the false report arrives in a base station, a false alarm is occurred, and the energy of the nodes is consumed. To detect the false report, statistical en-route filtering method is proposed. In this paper, we proposed the secure path cycle selection method using fuzzy rule-based system to consume effective energy. The method makes balanced energy consumption of each node. Moreover, the lifetime of the whole network will be increased. The base station determines the path cycle using the fuzzy rule-based system. The performance of the proposed method is demonstrated using simulation studies with the three methods.

Cite this paper
nullS. Nam, C. Sun and T. Cho, "Secure Path Cycle Selection Method Using Fuzzy Logic System for Improving Energy Efficiency in Statistical En-Route Filtering Based WSNs," Wireless Sensor Network, Vol. 3 No. 11, 2011, pp. 357-361. doi: 10.4236/wsn.2011.311041.
[1]   I. F. Akyildiz, W. Su, Y. Sankarasubramaniam and E. Ca- yirci, “A Survey on Sensor Networks,” IEEE Communications Magazine, Vol. 40, No. 8, 2002, pp. 102-114. doi:10.1109/MCOM.2002.1024422

[2]   K. Akkaya and M. Younis., “A Survey on Routing protocols for Wireless Sensor Networks,” Ad Hoc Network, Vol.3, No.3, 2005, pp. 325-349. doi:10.1016/j.adhoc.2003.09.010

[3]   J. N. Al-Karaki and A. E. Kanmal, “Routing techniques in wireless sensor networks: a survey,” IEEE Wireless Communication Society, Vol. 11, No. 6, 2004, pp. 6-28. doi:10.1109/MWC.2004.1368893

[4]   D. Culler, D. Estrin and M. Srivastava, “Guest Editors’ Introduction: Overview of sensor networks,” IEEE Computer Society, Vol.37, No. 8, 2004, pp. 41-49. doi:10.1109/MC.2004.93

[5]   C. Karlof et al., “Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures,” Elsevier's Ad Hoc Networks Journal, Special Issue on Sensor Network Protocols and Applications, Vol. 1, No. 2-3, 2003, pp. 293-315. doi:10.1109/SNPA.2003.1203362

[6]   F. Ye, H. Luo and S. Lu, “Statistical En-route Filtering of Injected False Data in Sensor Networks,” IEEE Journal Selected Area Communications, Vol. 23, No. 4, 2005, pp. 839-850. doi:10.1109/JSAC.2005.843561

[7]   C. I. Sun, H. Y. Lee and T. H. Cho, “A Path Selection Method for Improving the Detection Power of Statistical Filtering in Sensor Networks,” Journal of Information Science and Engineering, Vol. 25, No. 4, 2009, pp. 1163-1175.

[8]   J. M. Kim, Y. S. Han, H. Y. Lee and T. H. Cho, “Path Renewal Method in Filtering Based Wireless Sensor Networks,” Vol. 11, No. 2, 2011, pp. 1396-1404. doi:10.3390/s110201396

[9]   S. J. Lee, H. Y. Lee and T. H. Cho, “Environment-Based Selection Method for En-route Filtering Scheme Using Fuzzy Logic,” Journal of Networks, Vol. 5, No 3, 2010, pp. 292-299. doi:10.4304/jnw.5.3.292-299

[10]   S. H. Lee and T. H. Cho, “Fuzzy Based Key Re-Distribution Period Determination Method in Wireless Sensor Networks,” Lecture Notes in Computer Science, Vol. 6216, 2010, pp. 495-502. doi:10.1007/978-3-642-14932-0_62

[11]   H. Y. Lee and T. H. Cho, “Fuzzy-Based Adaptive Thre- shold Determining Method for the Interleaved Authentication in Sensor Networks,” ICDCIT 2006, Lecture Notes in Computer Science, Vol. 4319, 2006, pp. 116-127. doi:10.1007/11925231_11

[12]   Louder than a Bomb Software, “Free Fuzzy Logic Library,” 2001,

[13]   L. A. Zadeh, “Fuzzy Logic,” 2011,