Open Access
Subscription Access
Multi-Path Route Determination Method for Network Load Balancing in Fap-Based WSNS Using Fuzzy Logic
A flooding attack in wireless sensor networks is a type of threat that shortens the lifetimes of the sensor networks. Although flooding attack prevention techniques have been proposed, if a continuous flooding attack occurs, the sensor node energy is depleted during detection. In this paper, we use multi-path routing to solve this problem. In order to balance the load of the sensor node, energy balancing of the sensor node is controlled by determining the number of pathways using fuzzy logic. By adjusting the energy balancing of the sensor nodes, the number of energy-exhausting sensor nodes can be reduced. As a result, when a flooding attack occurs, the energy efficiency of the sensor node is increased by determining the number of pathways.
Keywords
Wireless Sensor Network, Multi-Path Routing, Fuzzy Logic, Flooding Attack Prevention, Network Load Balancing.
User
Font Size
Information
- I. F. Akyildiz, W. Su, Y. Sankarasubramaniam and E. Cayirci, "A survey on sensor networks,"
- Communications Magazine, IEEE, vol. 40, pp. 102-114, 2002.
- C. Karlof and D. Wagner, "Secure routing in wireless sensor networks: Attacks and countermeasures," Ad Hoc Networks, Vol. 1, No. 2, pp. 293-315, 2003
- Y. Wang, G. Attebury and B. Ramamurthy, “A survey of security issues in wireless sensor networks,” IEEE Communications Surveys & Tutorials, vol. 8, pp. 2-23, 2007
- Y. Ping, H. Yafei, Z. Yiping, Z. Shiyong and D. Zhoulin, “Flooding attack and defence in ad hoc networks,” Journal of Systems Engineering and Electronics, Vol. 17, No.2, pp. 410-416, 2006
- C. Perkins, E. Belding-Royer, and S. Das, "Ad hoc on-demand distance vector (AODV) routing," IETF RFC 3561, 2003
- N. D. Pham and H. Choo, "Energy efficient expanding ring search for route discovery in MANETs," Communications, 2008
- D. R. Raymond and S. F. Midkiff, “Denial-of-Service in Wireless Sensor Networks: Attacks and Defenses,” IEEE Pervasive Computing, vol. 7, pp. 74-81, 2008
- J. N. Al-Karaki and A. E. Kamal, “Routing techniques in wireless sensor networks: a survey,” IEEE wireless communications, vol. 11, pp. 6-28, 2004
- M. Radi, B. Dezfouli, K. A. Bakar and M. Lee, “Multipath routing in wireless sensor networks: survey and research challenges,” Sensors, vol. 12, pp. 650-685, Jan. 2012
- J. Deng, R. Han, and S. Mishra, "Defending against path-based DoS attacks in wireless sensor networks," In Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks pp. 89-96, 2005
- F. Ye, H. Luo, S. Lu, and L. Zhang, "Statistical en-route filtering of injected false data in sensor networks," IEEE Journal on Selected Areas in Communications, Vol. 23, No. 4, pp. 839-850, 2005
Abstract Views: 349
PDF Views: 158