Abstract
In wireless sensor networks, sensors have stringent energy and computation requirements as they must function unattended. The sensor nodes can be compromised by adversaries who attack network layers such as in sinkhole attacks. Sinkhole attacks have the goal of changing routing paths and snatching data surrounding the compromised node. A localized encryption and authentication protocol (LEAP) observes different types of messages exchanged between sensors that have different security requirements to cope with the attack. Even though this original method excels in security communication using multiple keys, the data is transmitted without optimal selection of the next nodes. In this paper, our proposed method selects the optimal next node based on a fuzzy logic system. We evaluated the energy and security performances of our method against sinkhole attack. Our focus is to improve energy efficiency and maintain the same security level as compared to LEAP. Experimental results indicated that the proposed method saves up to 5 % of the energy while maintaining the security level against the attack as compared to LEAP.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., et al.: A survey on sensor networks. IEEE Commun. Mag. 40, 102–114 (2002)
Xbox sensor networks. http://www.xbox.com
Intanagonwiwat, C., Govindan, R., Estrin, D.: Directed diffusion: a scalable and robust communication paradigm for sensor networks. In: Proceedings of the 6th Annual International Conference on Mobile Computing and Networking, pp. 56–67 (2000)
Lee, H.Y., Cho, T.H.: Optimized fuzzy adaptive filtering for ubiquitous sensor networks. IEICE Trans. Commun. E94.B, 1648–1656 (2011)
Li, F., Srinivasan, A., Wu, J.: PVFS: a probabilistic voting-based filtering scheme in wireless sensor networks. Int. J. Secur. Netw. 3, 173–182 (2008)
Ngai, E.C.H., Liu, J., Lyu, M.R.: On the intruder detection for sinkhole attack in wireless sensor networks. In: IEEE International Conference on Communications, ICC 2006, vol. 8, pp. 3383–3389 (2006)
Ngai, E.C.H., Liu, J., Lyu, M.R.: An efficient intruder detection algorithm against sinkhole attacks in wireless sensor networks. Comput. Commun. 30, 2353–2364 (2007)
Nghiem, T.P., Cho, T.H.: A fuzzy-based interleaved multi-hop authentication scheme in wireless sensor networks. J. Parallel Distrib. Comput. 69, 441–450 (2009)
Ye, F., Chen, A., Lu, S., et al.: A scalable solution to minimum cost forwarding in large sensor networks. In: Proceedings of the Tenth International Conference on Computer Communications and Networks 2001, pp. 304–309 (2001)
Ye, F., Luo, H., Lu, S., et al.: Statistical en-route filtering of injected false data in sensor networks. IEEE J. Sel. Areas Commun. 23, 839–850 (2005)
Zhu, S., Setia, S., Jajodia, S.: LEAP: efficient security mechanisms for large-scale distributed sensor networks. In: Proceedings of the 10th ACM Conference on Computer and Communications Security, pp. 62–72. ACM (2003)
Zhu, S., Setia, S., Jajodia, S.: LEAP+: efficient security mechanisms for large-scale distributed sensor networks. ACM Trans. Sen. Netw. 2, 500–528 (2006)
Acknowledgments
This research was supported by Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education, Science and Technology (No. 2013R1A2A2A01013971).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Nam, S.M., Cho, T.H. (2015). A Method to Select Next Hop Node for Improving Energy Efficiency in LEAP-Based WSNs. In: Huang, DS., Bevilacqua, V., Premaratne, P. (eds) Intelligent Computing Theories and Methodologies. ICIC 2015. Lecture Notes in Computer Science(), vol 9225. Springer, Cham. https://doi.org/10.1007/978-3-319-22180-9_64
Download citation
DOI: https://doi.org/10.1007/978-3-319-22180-9_64
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-22179-3
Online ISBN: 978-3-319-22180-9
eBook Packages: Computer ScienceComputer Science (R0)