| Literature DB >> 27338411 |
Idris Abubakar Umar1, Zurina Mohd Hanapi2, A Sali3, Zuriati A Zulkarnain4.
Abstract
Resource bound security solutions have facilitated the mitigation of spatio-temporal attacks by altering protocol semantics to provide minimal security while maintaining an acceptable level of performance. The Dynamic Window Secured Implicit Geographic Forwarding (DWSIGF) routing protocol for Wireless Sensor Network (WSN) has been proposed to achieve a minimal selection of malicious nodes by introducing a dynamic collection window period to the protocol's semantics. However, its selection scheme suffers substantial packet losses due to the utilization of a single distance based parameter for node selection. In this paper, we propose a Fuzzy-based Geographic Forwarding protocol (FuGeF) to minimize packet loss, while maintaining performance. The FuGeF utilizes a new form of dynamism and introduces three selection parameters: remaining energy, connectivity cost, and progressive distance, as well as a Fuzzy Logic System (FLS) for node selection. These introduced mechanisms ensure the appropriate selection of a non-malicious node. Extensive simulation experiments have been conducted to evaluate the performance of the proposed FuGeF protocol as compared to DWSIGF variants. The simulation results show that the proposed FuGeF outperforms the two DWSIGF variants (DWSIGF-P and DWSIGF-R) in terms of packet delivery.Entities:
Keywords: fuzzy logic; geographic forwarding; malicious nodes; node selection; routing protocol; security; wireless sensor network
Year: 2016 PMID: 27338411 PMCID: PMC4934368 DOI: 10.3390/s16060943
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1Forwarding area.
Figure 2Forwarding process.
Figure 3Fuzzy Logic System (FLS)
Figure 4Fuzzy input membership mapping
Simulation parameters.
| System Parameter | Value |
|---|---|
| Terrain | 150 × 150 m |
| Number of Nodes | 196, Uniform |
| Radio Range | 40 m |
| Application Streams | CBR |
| Radio Bandwidth | 200 kbps |
| Simulation Length | 100 packets |
| Node Placement | Grid |
Figure 5Strategic placement of malicious nodes
Figure 6Packet delivery.
Figure 7Possibility of attacker selection.
Figure 8Packet delivery.
Figure 9Packet Delivery Ratio (PDR).
Figure 10Energy consumption.
Figure 11End to end delay.