Fuzzy logic determining multi-paths in Gray hole attack for improving the energy efficiency of sensor Networks

Authors:

Sybi Cynthia J,Sheryl Radley,L Mary Gladence,

DOI NO:

https://doi.org/10.26782/jmcms.spl.3/2019.09.00003

Keywords:

Gray hole attack (GHA),dynamic wireless sensor networks (Dynamic WSN),Fuzzy logic determining multi-paths in Gray hole attack (FL-MP-GHA),

Abstract

A Gray Hole Attack (GHA) in dynamic wireless sensor networks (Dynamic WSN) is an attack that specifically drops or conveys occasion packets as the traded off hub moves. In such an attack, it is hard to recognize the traded off hub contrasted and the sending attack happening in the remote sensor arrange on the grounds that all sensor hubs move. To distinguish sending attacks in Dynamic WSN, a haze figuring based framework for a Gray hole recognition plot known as Fuzzy logic determining multi-paths in Gray hole attack (FL-MP-GHA) has been proposed. In any case, since the proposed recognition conspire utilizes a solitary way, the vitality utilization of the sensor hub for course revelation when the sensor hub moves is substantial. To take care of this issue, the manuscript utilizes fluffy rationale to decide the quantity of multi-ways expected to improve the vitality effectiveness of sensor systems. Trial results demonstrate that the vitality productivity of the sensor organize is improved.

Refference:

I. A.Abduvaliyev, A.S.K.Pathan, J.Zhou, R.Roman, W.C.Wong, “On the vital
areas of intrusion detection systems in wireless sensor networks”, IEEE
Communications Surveys & Tutorials, Vol.: 15, Issue: 3, pp. 1223-1237,
2013.
II. C.Zhu, H.Wang, X.Liu, L.Shu, L.T.Yang, V.C.Leung, “A novel sensory data
processing framework to integrate sensor networks with mobile cloud”, IEEE
Systems Journal, Vol.: 10, Issue: 3, pp. 1125-1136, 2016.
III. D.Li, Z.Aung, J.R.Williams, A.Sanchez, “Efficient authentication scheme for
data aggregation in smart grid with fault tolerance and fault diagnosis”, In
2012 IEEE PES Innovative Smart Grid Technologies, pp. 1-8, January 2012.
IV. I.Amundson, X.D.Koutsoukos, “A survey on localization for mobile wireless
sensor networks.” Mobile entity localization and tracking in GPS-less
environnments”, Springer, Berlin, Heidelberg, pp. 235-254, 2009.
V. Q.Yaseen, F.AlBalas, Y.Jararweh, M.Al-Ayyoub, “A fog computing based
system for selective forwarding detection in mobile wireless sensor
networks”, In 2016 IEEE 1st International Workshops on Foundations and
Applications of Self* Systems (FAS* W) (pp. 256-262). IEEE., pp. 1223-
1237, September 2016.
VI. W.J.Chung, T.H.Cho, T. H, “A Multi-Path Routing Determination Method
for Improving the Energy Efficiency in Selective Forwarding Attack
Detection Based MWSNs”, International Journal of Wireless & Mobile
Networks, Vol.: 10, 2018.
VII. Y.Liu, M.Dong, K.Ota, A.Liu, “ActiveTrust: Secure and trustable routing in
wireless sensor networks”, IEEE Transactions on Information Forensics and
Security, 11(9), 2013-2027. Vol.: 15, Issue: 3, pp. 1223-1237, 2016.
VIII. Z.Zhang, K.Long, J.Wang, F.Dressler, “On swarm intelligence inspired selforganized
networking: its bionic mechanisms, designing principles and
optimization approaches”, IEEE Communications Surveys & Tutorials, Vol.:
16, Issue: 1, pp. 513-537, 2014.

View | Download