Skip to main content

A Method to Select Next Hop Node for Improving Energy Efficiency in LEAP-Based WSNs

  • Conference paper
  • First Online:
Intelligent Computing Theories and Methodologies (ICIC 2015)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 9225))

Included in the following conference series:

  • 1729 Accesses

Abstract

In wireless sensor networks, sensors have stringent energy and computation requirements as they must function unattended. The sensor nodes can be compromised by adversaries who attack network layers such as in sinkhole attacks. Sinkhole attacks have the goal of changing routing paths and snatching data surrounding the compromised node. A localized encryption and authentication protocol (LEAP) observes different types of messages exchanged between sensors that have different security requirements to cope with the attack. Even though this original method excels in security communication using multiple keys, the data is transmitted without optimal selection of the next nodes. In this paper, our proposed method selects the optimal next node based on a fuzzy logic system. We evaluated the energy and security performances of our method against sinkhole attack. Our focus is to improve energy efficiency and maintain the same security level as compared to LEAP. Experimental results indicated that the proposed method saves up to 5 % of the energy while maintaining the security level against the attack as compared to LEAP.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., et al.: A survey on sensor networks. IEEE Commun. Mag. 40, 102–114 (2002)

    Article  Google Scholar 

  2. Xbox sensor networks. http://www.xbox.com

  3. Intanagonwiwat, C., Govindan, R., Estrin, D.: Directed diffusion: a scalable and robust communication paradigm for sensor networks. In: Proceedings of the 6th Annual International Conference on Mobile Computing and Networking, pp. 56–67 (2000)

    Google Scholar 

  4. Lee, H.Y., Cho, T.H.: Optimized fuzzy adaptive filtering for ubiquitous sensor networks. IEICE Trans. Commun. E94.B, 1648–1656 (2011)

    Article  Google Scholar 

  5. Li, F., Srinivasan, A., Wu, J.: PVFS: a probabilistic voting-based filtering scheme in wireless sensor networks. Int. J. Secur. Netw. 3, 173–182 (2008)

    Article  Google Scholar 

  6. Ngai, E.C.H., Liu, J., Lyu, M.R.: On the intruder detection for sinkhole attack in wireless sensor networks. In: IEEE International Conference on Communications, ICC 2006, vol. 8, pp. 3383–3389 (2006)

    Google Scholar 

  7. Ngai, E.C.H., Liu, J., Lyu, M.R.: An efficient intruder detection algorithm against sinkhole attacks in wireless sensor networks. Comput. Commun. 30, 2353–2364 (2007)

    Article  Google Scholar 

  8. Nghiem, T.P., Cho, T.H.: A fuzzy-based interleaved multi-hop authentication scheme in wireless sensor networks. J. Parallel Distrib. Comput. 69, 441–450 (2009)

    Article  Google Scholar 

  9. Ye, F., Chen, A., Lu, S., et al.: A scalable solution to minimum cost forwarding in large sensor networks. In: Proceedings of the Tenth International Conference on Computer Communications and Networks 2001, pp. 304–309 (2001)

    Google Scholar 

  10. Ye, F., Luo, H., Lu, S., et al.: Statistical en-route filtering of injected false data in sensor networks. IEEE J. Sel. Areas Commun. 23, 839–850 (2005)

    Article  Google Scholar 

  11. Zhu, S., Setia, S., Jajodia, S.: LEAP: efficient security mechanisms for large-scale distributed sensor networks. In: Proceedings of the 10th ACM Conference on Computer and Communications Security, pp. 62–72. ACM (2003)

    Google Scholar 

  12. Zhu, S., Setia, S., Jajodia, S.: LEAP+: efficient security mechanisms for large-scale distributed sensor networks. ACM Trans. Sen. Netw. 2, 500–528 (2006)

    Article  Google Scholar 

Download references

Acknowledgments

This research was supported by Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education, Science and Technology (No. 2013R1A2A2A01013971).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Tae Ho Cho .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Nam, S.M., Cho, T.H. (2015). A Method to Select Next Hop Node for Improving Energy Efficiency in LEAP-Based WSNs. In: Huang, DS., Bevilacqua, V., Premaratne, P. (eds) Intelligent Computing Theories and Methodologies. ICIC 2015. Lecture Notes in Computer Science(), vol 9225. Springer, Cham. https://doi.org/10.1007/978-3-319-22180-9_64

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-22180-9_64

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-22179-3

  • Online ISBN: 978-3-319-22180-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics