Trust based secure routing protocol using fuzzy logic in wireless sensor networks

Wireless Sensor Networks (WSNs) are the ultimate field for applications including critical security actions like military surveillance and discovery of forest fire. Wireless sensor networks consider the multi-hop routing and it produces greatest security against identity deception through replaying...

Full description

Saved in:
Bibliographic Details
Published in2014 IEEE International Conference on Computational Intelligence and Computing Research pp. 1 - 5
Main Authors Renubala, S., Dhanalakshmi, K. S.
Format Conference Proceeding
LanguageEnglish
Published IEEE 01.12.2014
Subjects
Online AccessGet full text
ISBN1479939749
9781479939749
DOI10.1109/ICCIC.2014.7238435

Cover

Abstract Wireless Sensor Networks (WSNs) are the ultimate field for applications including critical security actions like military surveillance and discovery of forest fire. Wireless sensor networks consider the multi-hop routing and it produces greatest security against identity deception through replaying routing information. The trust in the sensor network plays a essential role in the military and more applications. Secured data aggregation is a main standard that interests serious research work. Current trust-aware routing protocols use long-established cryptographic techniques, which are not proficient of well tackling the serious problem. The factors results in increased complexity, high overhead and poor link quality in case of a variety of cryptographic techniques. In this paper, a fuzzy logic based trust evaluation approach is proposed in order to obtain the secured routing. The proposed method uses the Bio-inspired Energy Efficient-Cluster (BEE-C) protocol and fuzzy logic to calculate the trust of the nodes. The proposed method finds the black hole and flooding attack and eliminates the attack. The trust values are compared with the threshold value. The trust values above the threshold are considered as trusted nodes and the packets are passed through the node. The trust value below the threshold value is termed as untrusted node and is eliminated. The proposed approach provides lesser overhead, packet loss, and delay with better packet delivery ratio than the existing game theory, Fuzzy with trust (LEACH).
AbstractList Wireless Sensor Networks (WSNs) are the ultimate field for applications including critical security actions like military surveillance and discovery of forest fire. Wireless sensor networks consider the multi-hop routing and it produces greatest security against identity deception through replaying routing information. The trust in the sensor network plays a essential role in the military and more applications. Secured data aggregation is a main standard that interests serious research work. Current trust-aware routing protocols use long-established cryptographic techniques, which are not proficient of well tackling the serious problem. The factors results in increased complexity, high overhead and poor link quality in case of a variety of cryptographic techniques. In this paper, a fuzzy logic based trust evaluation approach is proposed in order to obtain the secured routing. The proposed method uses the Bio-inspired Energy Efficient-Cluster (BEE-C) protocol and fuzzy logic to calculate the trust of the nodes. The proposed method finds the black hole and flooding attack and eliminates the attack. The trust values are compared with the threshold value. The trust values above the threshold are considered as trusted nodes and the packets are passed through the node. The trust value below the threshold value is termed as untrusted node and is eliminated. The proposed approach provides lesser overhead, packet loss, and delay with better packet delivery ratio than the existing game theory, Fuzzy with trust (LEACH).
Author Renubala, S.
Dhanalakshmi, K. S.
Author_xml – sequence: 1
  givenname: S.
  surname: Renubala
  fullname: Renubala, S.
  email: balarenusiva@gmail.com
  organization: Dept. of ECE, Kalasalingam Univ., Srivilliputhur, India
– sequence: 2
  givenname: K. S.
  surname: Dhanalakshmi
  fullname: Dhanalakshmi, K. S.
  email: Dhanalakshmi.jai3@gmail.com
  organization: Dept. of ECE, Kalasalingam Univ., Srivilliputhur, India
BookMark eNo1j81KAzEYRSPqwta-gG7yAlOTSTJJljKoHSiIMPuSny8lOE5KMkNpn17FujqcxblwF-hmTCMg9EDJmlKin7q27dp1TShfy5opzsQVWmmpKJdaMy1Fc40W_8L1Hfro81wmbE0Bjwu4OQPOaZ7iuMeHnKbk0oDn8qthPp9PeEj76HAc8TFmGKCUn2osKeMRpmPKn-Ue3QYzFFhduET960vfbqrt-1vXPm-rqMlUBauFZ8wZQbyXzCnvhRKK06ZudHDKNMwoZwlTyptAgDhLGQ-Way-slJYt0ePfbASA3SHHL5NPu8tp9g36PlDV
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/ICCIC.2014.7238435
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume
IEEE Xplore All Conference Proceedings
IEEE Electronic Library (IEL)
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
EISBN 9781479939756
1479939757
EndPage 5
ExternalDocumentID 7238435
Genre orig-research
GroupedDBID 6IE
6IL
CBEJK
RIE
RIL
ID FETCH-LOGICAL-i90t-fb95d33ca50dd73c8dd5858416269fc8a63a8cb0388daf0e0cb134fb49d5b77b3
IEDL.DBID RIE
ISBN 1479939749
9781479939749
IngestDate Wed Jun 26 19:20:57 EDT 2024
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i90t-fb95d33ca50dd73c8dd5858416269fc8a63a8cb0388daf0e0cb134fb49d5b77b3
PageCount 5
ParticipantIDs ieee_primary_7238435
PublicationCentury 2000
PublicationDate 2014-Dec.
PublicationDateYYYYMMDD 2014-12-01
PublicationDate_xml – month: 12
  year: 2014
  text: 2014-Dec.
PublicationDecade 2010
PublicationTitle 2014 IEEE International Conference on Computational Intelligence and Computing Research
PublicationTitleAbbrev ICCIC
PublicationYear 2014
Publisher IEEE
Publisher_xml – name: IEEE
Score 1.6916286
Snippet Wireless Sensor Networks (WSNs) are the ultimate field for applications including critical security actions like military surveillance and discovery of forest...
SourceID ieee
SourceType Publisher
StartPage 1
SubjectTerms Cryptographic techniques
Fuzzy logic
Game theory
Low Energy Adaptive Clustering Hierarchy (LEACH)
Overhead
Peer-to-peer computing
Routing
Routing protocols
Secured data aggregation
Trust
Wireless sensor networks
Wireless Sensor Networks (WSNs)
Title Trust based secure routing protocol using fuzzy logic in wireless sensor networks
URI https://ieeexplore.ieee.org/document/7238435
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3PS8MwFH5sO3lS2cTf5ODRdu2SJu25ODZhojBht9H8kqG0srUH99eb167zBx68NYWWkIT3JS_f9z2AG55poXgo3c4tirGEmYuDDmi9WKrMhkxqZTGhP3vgk2d2v4gWHbjda2GMMTX5zPj4WN_l60JVmCobYoEsB-9d6Lpl9k2rJRzIun1x0lo4te1WJBMkw2maTlNkcjF_95cf5VRqNBkfwqztR0MiefWrUvpq-8ui8b8dPYLBl26PPO4R6Rg6Ju_D0xxlFQThSpMNptcNWRcV0p0JujQUbikQpL-_EFtttx-kjoZklRO0MX5zkdB9lW-KNckbyvhmAPPx3TydeLtCCt4qCUrPyiTSlGLxA60FVbHW7pCA940jnlgVZ5xmsZLoC6MzG5hAyZAyK1miIymEpCfQy4vcnAIxSkhOw9FICc1CqaS2LAqojl3gE4bxM-jjaCzfG6uM5W4gzv9-fQEHOCMNO-QSeuW6MlcO40t5XU_uJyuIpp8
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV27TsMwFLVKGWAC1CLeeGAkaVI7djJHVC20FUhB6lbFL1SBEtQmA_16fJOmPMTAFkdKZNnWPfb1OecidMNSxSXzhd25BSGUMLNx0AKtEwqZGp8KJQ0k9CdTNnym97Ng1kK3Wy2M1roin2kXHqu7fJXLElJlPSiQZeF9B-1a3KfBN7UWtzBrd8ZRY-LUtBuZjBf1RnE8ioHLRd3Nf34UVKnwZHCAJk1PahrJq1sWwpXrXyaN_-3qIep-Kffw4xaTjlBLZx30lICwAgNgKbyCBLvGy7wEwjMGn4bcLgYMBPgXbMr1-gNX8RAvMgxGxm82FtqvslW-xFlNGl91UTK4S-Khsyml4Cwir3CMiAJFCJQ_UIoTGSpljwlw49hnkZFhykgaSgHOMCo1nvak8Ak1gkYqEJwLcozaWZ7pE4S15IIRv9-XXFFfSKEMDTyiQhv6uKbsFHVgNObvtVnGfDMQZ3-_vkZ7w2Qyno9H04dztA-zU3NFLlC7WJb60iJ-Ia6qif4EFeGp7A
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2014+IEEE+International+Conference+on+Computational+Intelligence+and+Computing+Research&rft.atitle=Trust+based+secure+routing+protocol+using+fuzzy+logic+in+wireless+sensor+networks&rft.au=Renubala%2C+S.&rft.au=Dhanalakshmi%2C+K.+S.&rft.date=2014-12-01&rft.pub=IEEE&rft.isbn=1479939749&rft.spage=1&rft.epage=5&rft_id=info:doi/10.1109%2FICCIC.2014.7238435&rft.externalDocID=7238435
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781479939749/lc.gif&client=summon&freeimage=true
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781479939749/mc.gif&client=summon&freeimage=true
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781479939749/sc.gif&client=summon&freeimage=true