Trust based secure routing protocol using fuzzy logic in wireless sensor networks
Wireless Sensor Networks (WSNs) are the ultimate field for applications including critical security actions like military surveillance and discovery of forest fire. Wireless sensor networks consider the multi-hop routing and it produces greatest security against identity deception through replaying...
Saved in:
Published in | 2014 IEEE International Conference on Computational Intelligence and Computing Research pp. 1 - 5 |
---|---|
Main Authors | , |
Format | Conference Proceeding |
Language | English |
Published |
IEEE
01.12.2014
|
Subjects | |
Online Access | Get full text |
ISBN | 1479939749 9781479939749 |
DOI | 10.1109/ICCIC.2014.7238435 |
Cover
Abstract | Wireless Sensor Networks (WSNs) are the ultimate field for applications including critical security actions like military surveillance and discovery of forest fire. Wireless sensor networks consider the multi-hop routing and it produces greatest security against identity deception through replaying routing information. The trust in the sensor network plays a essential role in the military and more applications. Secured data aggregation is a main standard that interests serious research work. Current trust-aware routing protocols use long-established cryptographic techniques, which are not proficient of well tackling the serious problem. The factors results in increased complexity, high overhead and poor link quality in case of a variety of cryptographic techniques. In this paper, a fuzzy logic based trust evaluation approach is proposed in order to obtain the secured routing. The proposed method uses the Bio-inspired Energy Efficient-Cluster (BEE-C) protocol and fuzzy logic to calculate the trust of the nodes. The proposed method finds the black hole and flooding attack and eliminates the attack. The trust values are compared with the threshold value. The trust values above the threshold are considered as trusted nodes and the packets are passed through the node. The trust value below the threshold value is termed as untrusted node and is eliminated. The proposed approach provides lesser overhead, packet loss, and delay with better packet delivery ratio than the existing game theory, Fuzzy with trust (LEACH). |
---|---|
AbstractList | Wireless Sensor Networks (WSNs) are the ultimate field for applications including critical security actions like military surveillance and discovery of forest fire. Wireless sensor networks consider the multi-hop routing and it produces greatest security against identity deception through replaying routing information. The trust in the sensor network plays a essential role in the military and more applications. Secured data aggregation is a main standard that interests serious research work. Current trust-aware routing protocols use long-established cryptographic techniques, which are not proficient of well tackling the serious problem. The factors results in increased complexity, high overhead and poor link quality in case of a variety of cryptographic techniques. In this paper, a fuzzy logic based trust evaluation approach is proposed in order to obtain the secured routing. The proposed method uses the Bio-inspired Energy Efficient-Cluster (BEE-C) protocol and fuzzy logic to calculate the trust of the nodes. The proposed method finds the black hole and flooding attack and eliminates the attack. The trust values are compared with the threshold value. The trust values above the threshold are considered as trusted nodes and the packets are passed through the node. The trust value below the threshold value is termed as untrusted node and is eliminated. The proposed approach provides lesser overhead, packet loss, and delay with better packet delivery ratio than the existing game theory, Fuzzy with trust (LEACH). |
Author | Renubala, S. Dhanalakshmi, K. S. |
Author_xml | – sequence: 1 givenname: S. surname: Renubala fullname: Renubala, S. email: balarenusiva@gmail.com organization: Dept. of ECE, Kalasalingam Univ., Srivilliputhur, India – sequence: 2 givenname: K. S. surname: Dhanalakshmi fullname: Dhanalakshmi, K. S. email: Dhanalakshmi.jai3@gmail.com organization: Dept. of ECE, Kalasalingam Univ., Srivilliputhur, India |
BookMark | eNo1j81KAzEYRSPqwta-gG7yAlOTSTJJljKoHSiIMPuSny8lOE5KMkNpn17FujqcxblwF-hmTCMg9EDJmlKin7q27dp1TShfy5opzsQVWmmpKJdaMy1Fc40W_8L1Hfro81wmbE0Bjwu4OQPOaZ7iuMeHnKbk0oDn8qthPp9PeEj76HAc8TFmGKCUn2osKeMRpmPKn-Ue3QYzFFhduET960vfbqrt-1vXPm-rqMlUBauFZ8wZQbyXzCnvhRKK06ZudHDKNMwoZwlTyptAgDhLGQ-Way-slJYt0ePfbASA3SHHL5NPu8tp9g36PlDV |
ContentType | Conference Proceeding |
DBID | 6IE 6IL CBEJK RIE RIL |
DOI | 10.1109/ICCIC.2014.7238435 |
DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume IEEE Xplore All Conference Proceedings IEEE Electronic Library (IEL) IEEE Proceedings Order Plans (POP All) 1998-Present |
DatabaseTitleList | |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
EISBN | 9781479939756 1479939757 |
EndPage | 5 |
ExternalDocumentID | 7238435 |
Genre | orig-research |
GroupedDBID | 6IE 6IL CBEJK RIE RIL |
ID | FETCH-LOGICAL-i90t-fb95d33ca50dd73c8dd5858416269fc8a63a8cb0388daf0e0cb134fb49d5b77b3 |
IEDL.DBID | RIE |
ISBN | 1479939749 9781479939749 |
IngestDate | Wed Jun 26 19:20:57 EDT 2024 |
IsPeerReviewed | false |
IsScholarly | false |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-i90t-fb95d33ca50dd73c8dd5858416269fc8a63a8cb0388daf0e0cb134fb49d5b77b3 |
PageCount | 5 |
ParticipantIDs | ieee_primary_7238435 |
PublicationCentury | 2000 |
PublicationDate | 2014-Dec. |
PublicationDateYYYYMMDD | 2014-12-01 |
PublicationDate_xml | – month: 12 year: 2014 text: 2014-Dec. |
PublicationDecade | 2010 |
PublicationTitle | 2014 IEEE International Conference on Computational Intelligence and Computing Research |
PublicationTitleAbbrev | ICCIC |
PublicationYear | 2014 |
Publisher | IEEE |
Publisher_xml | – name: IEEE |
Score | 1.6916286 |
Snippet | Wireless Sensor Networks (WSNs) are the ultimate field for applications including critical security actions like military surveillance and discovery of forest... |
SourceID | ieee |
SourceType | Publisher |
StartPage | 1 |
SubjectTerms | Cryptographic techniques Fuzzy logic Game theory Low Energy Adaptive Clustering Hierarchy (LEACH) Overhead Peer-to-peer computing Routing Routing protocols Secured data aggregation Trust Wireless sensor networks Wireless Sensor Networks (WSNs) |
Title | Trust based secure routing protocol using fuzzy logic in wireless sensor networks |
URI | https://ieeexplore.ieee.org/document/7238435 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3PS8MwFH5sO3lS2cTf5ODRdu2SJu25ODZhojBht9H8kqG0srUH99eb167zBx68NYWWkIT3JS_f9z2AG55poXgo3c4tirGEmYuDDmi9WKrMhkxqZTGhP3vgk2d2v4gWHbjda2GMMTX5zPj4WN_l60JVmCobYoEsB-9d6Lpl9k2rJRzIun1x0lo4te1WJBMkw2maTlNkcjF_95cf5VRqNBkfwqztR0MiefWrUvpq-8ui8b8dPYLBl26PPO4R6Rg6Ju_D0xxlFQThSpMNptcNWRcV0p0JujQUbikQpL-_EFtttx-kjoZklRO0MX5zkdB9lW-KNckbyvhmAPPx3TydeLtCCt4qCUrPyiTSlGLxA60FVbHW7pCA940jnlgVZ5xmsZLoC6MzG5hAyZAyK1miIymEpCfQy4vcnAIxSkhOw9FICc1CqaS2LAqojl3gE4bxM-jjaCzfG6uM5W4gzv9-fQEHOCMNO-QSeuW6MlcO40t5XU_uJyuIpp8 |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV27TsMwFLVKGWAC1CLeeGAkaVI7djJHVC20FUhB6lbFL1SBEtQmA_16fJOmPMTAFkdKZNnWPfb1OecidMNSxSXzhd25BSGUMLNx0AKtEwqZGp8KJQ0k9CdTNnym97Ng1kK3Wy2M1roin2kXHqu7fJXLElJlPSiQZeF9B-1a3KfBN7UWtzBrd8ZRY-LUtBuZjBf1RnE8ioHLRd3Nf34UVKnwZHCAJk1PahrJq1sWwpXrXyaN_-3qIep-Kffw4xaTjlBLZx30lICwAgNgKbyCBLvGy7wEwjMGn4bcLgYMBPgXbMr1-gNX8RAvMgxGxm82FtqvslW-xFlNGl91UTK4S-Khsyml4Cwir3CMiAJFCJQ_UIoTGSpljwlw49hnkZFhykgaSgHOMCo1nvak8Ak1gkYqEJwLcozaWZ7pE4S15IIRv9-XXFFfSKEMDTyiQhv6uKbsFHVgNObvtVnGfDMQZ3-_vkZ7w2Qyno9H04dztA-zU3NFLlC7WJb60iJ-Ia6qif4EFeGp7A |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2014+IEEE+International+Conference+on+Computational+Intelligence+and+Computing+Research&rft.atitle=Trust+based+secure+routing+protocol+using+fuzzy+logic+in+wireless+sensor+networks&rft.au=Renubala%2C+S.&rft.au=Dhanalakshmi%2C+K.+S.&rft.date=2014-12-01&rft.pub=IEEE&rft.isbn=1479939749&rft.spage=1&rft.epage=5&rft_id=info:doi/10.1109%2FICCIC.2014.7238435&rft.externalDocID=7238435 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781479939749/lc.gif&client=summon&freeimage=true |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781479939749/mc.gif&client=summon&freeimage=true |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781479939749/sc.gif&client=summon&freeimage=true |