Skip to main content

An Improved Energy-Efficient Faulty Information Extraction Scheme Using PFDIAES and PFDIF Algorithms

  • Conference paper
  • First Online:
Soft Computing: Theories and Applications

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1154))

Abstract

Wireless Sensor Networks (WSNs) comprises tiny sensor nodes which have been used for various applications such as Health Monitoring, Forest Fire Detection, Data Collection, Temperature Sensing, Military Application, and Security applications. Among the applications, Security in WSNs is the most challenging one because faulty information can be easily injected into the network by the intruder/attacker. Faulty information injection at the sink level may reduce the lifetime of the network and also energy wastage due to the difficulty in updating information with Base Station (BS). Two algorithms are proposed to detect and drop the false data such as Prevention of False Data Injection using Advanced Encryption Standard (PFDIAES) and Prevention of False Data Injection with Fuzzy-based method (PFDIF). The proposed improved energy-efficient faulty information extraction using PFDIF and PFDIAES algorithms is used to filter and prevent false data at the destination node. To analyze the performance of the network in critical condition, the gang attack is also considered. From the simulation results, PFDIAES has an average energy efficiency value of 1.7% and PFDIF has 5.5% of energy efficiency than the existing algorithms such as AES and FUZZY-based method.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Bhattacharyya, D., Kim, T.-H., Pal, S.: A comparative study of wireless sensor networks and their routing protocols. Sensors 10 (2010)

    Google Scholar 

  2. Chong, C.-Y., Kumar, S.P.: Sensor networks: evolution, opportunities and challenges. Proc. IEEE 91(8) (2003)

    Google Scholar 

  3. Lu, R., Lin, X., Zhu, H., Liang, X.: BECAN: A bandwidth—Efficient cooperative authentication scheme for filtering injected false data in wireless sensor networks. IEEE Trans. Parallel Distrib. Syst. 23(1), 32–43 (2012)

    Google Scholar 

  4. Haider, T., Yusuf, M.: A fuzzy approach to energy optimized routing for wireless sensor networks. Int. Arab J. Inf. Technol. 6(2), 179 (2009)

    Google Scholar 

  5. Kim, M., Kim, Y., Cho, H.: Design of cryptographic hardware architecture for mobile computing. J. Inf. Process. Syst. 5(4), 187 (2009)

    Article  Google Scholar 

  6. Zhange, Z., Jiang, C.: False data injection—Resilient security routing protocols for wireless sensor networks. J. Netw. 7(12), 2025–2030 (2012)

    Google Scholar 

  7. Godbole, V.: Performance analysis of clustering protocol using fuzzy logic for wireless sensor network. IAES Int. J. Artif. Intell. (IJ-AI) 1(3), 103–111 (2012)

    Google Scholar 

  8. Shahina, K., Pavithran, A.: Filtering scheme for injected false data in WSN. IOSR J. Comput. Eng. 13(6), 29–31 (2013)

    Google Scholar 

  9. Benamar, K., Djilalli, M., Mohammed, F., Abdellah, M.: An efficient key management scheme for hierarchical wireless sensor networks. Wirel. Sens. Netw. 2012(4), 155–16 (2012). http://dx.doi.org/10.4236/wsn.2012.46022

  10. Jiang, H., Sun, Y., Sun, R., Xu, H.: Fuzzy-logic-based energy optimized routing for wireless sensor networks. Int. J. Distrib. Sens. Netw. 2013(216561) (2013)

    Google Scholar 

  11. Yang, X., Lin, J., Yu, W., Moulema, P.M., Fu, X., Zhao, W.: A novel en-route filtering scheme against false data injection attacks in cyber-physical networked systems. IEEE Trans. Comput. 64(1), 4–18 (2015)

    Google Scholar 

  12. Vuran, M.C., Akyildiz, I.F: Spatial correlation—Based collaborative medium access control in wireless sensor networks. IEEE ACM Trans. Netw. 14(2), 316–329 (2006)

    Google Scholar 

  13. Lee, H.Y., Cho, T.H.: Fuzzy-based adaptive threshold determining method for the interleaved authentication in sensor networks. In: Proceedings of 5th Mexican International Conference on Artificial Intelligence. Lecture Notes in Computer Science, Advances in Artificial Intelligence, vol. 4293, pp. 112–121 (2006)

    Google Scholar 

  14. Moon, S.Y., Cho, T.H.: Key index-based routing for filtering false event reports in wireless sensor networks. IEICE Trans. 95-B(9), 2807–2814 (2012)

    Google Scholar 

  15. Gao, Zhipeng, Cheng, Weijing, Qiu, Xuesong, Meng, Luoming: A missing sensor data estimation algorithm based on temporal and spatial correlation. Int. J. Distrib. Sens. Netw. 2015, 1–10 (2015)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to P. T. Kalaivaani .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Kalaivaani, P.T., Krishnamoorthy, R. (2020). An Improved Energy-Efficient Faulty Information Extraction Scheme Using PFDIAES and PFDIF Algorithms. In: Pant, M., Kumar Sharma, T., Arya, R., Sahana, B., Zolfagharinia, H. (eds) Soft Computing: Theories and Applications. Advances in Intelligent Systems and Computing, vol 1154. Springer, Singapore. https://doi.org/10.1007/978-981-15-4032-5_79

Download citation

Publish with us

Policies and ethics