Fuzzy Logic Based Technique Using Trust Authentication for a Secure Data Exchange in Wireless Sensor Networks

  IJPTT-book-cover
 
International Journal of P2P Network Trends and Technology (IJPTT)          
 
© 2015 by IJPTT Journal
Volume - 5 Issue - 3
Year of Publication : 2015
Authors : Blessey.P.M, R.Geetha
  10.14445/22492615/IJPTT-V18P402

MLA

Blessey.P.M, R.Geetha "Fuzzy Logic Based Technique Using Trust Authentication for a Secure Data Exchange in Wireless Sensor Networks". International Journal of P2P Network Trends and Technology (IJPTT), V5(3):5-11 May - Jun 2015, ISSN:2249-2615, www.ijpttjournal.org, Published by Seventh Sense Research Group.

Abstract

Secure links are established between the nodes to provide guaranteed high security, integrity and better performance in wireless sensor network. In order to achieve secure link between the nodes, the concept of trust and certification authority is integrated to combat against the misbehaving entities to deal with the security challenges. The fuzzy based technique is employed by the cluster head to differentiate the nodes as trusted or malicious by issuing the services only to the trusted node and eliminates the misbehaving nodes. The proposed scheme is more reliable and provides improved security in military network. Existing random seed distribution with transitory master key scheme – a hybrid approach of random key distribution and transitory master key may provide the resilience and the connectivity but still the security is degraded, if the secret key is compromised. Even though a number of key management schemes have been used, none of them are satisfactory. Compared to the existing scheme, the proposed scheme provides better security features but also ensures enemy intruders to stay away from the network. Hence, it offers good communication with sufficient connectivity among the nodes; hence it could be used in military and remote area communication.

References

[1] Xiangqian Chen, Kia Makki, Kang Yen, and Niki Pissinoum, “Sensor Network Security: A Survey”, IEEE Communications Surveys & Tutorials, vol. 11, no. 2, pp. 52-73 Jun. 2009.
[2] J. Lee et al., “Key management issues in wireless sensor networks: Current proposals and future developments,” IEEE Wireless Commun., vol. 14, no. 5, pp. 76–84, Oct. 2007.
[3] K. Leena Begum, D. Arun Kumar Reddy, "Design and Accomplishment of TARF: A Trust-Aware Routing Framework for WSNs", International Journal of P2P Network Trends and Technology (IJPTT), vol.11, pp. 20-25, Sep. 2014.
[4] V. Mareeswari, K. Ramakrishna and R. Vijayan, “Energy based Trust solution for Detecting Selfish Nodes in MANET using Fuzzy logic”, International Journal of Research and Reviews in Computer Science (IJRRCS), vol. 2, no. 3,pp. 647-652 , Jun. 2011.
[5] V. J. Sivanagappa, M. Sarumathi, R. Sivaranjani, N. Soniya, “Slip Ring Induction Motor Power Factor Control Using Fuzzy Logic Controller”, International Journal of P2P Network Trends and Technology (IJPTT), vol. 7,pp. 40-46, Apr. 2014.
[6] S. B. Shaik, R. Arnab, and K. N. Mrinal, “A Direct Trust Dependent Link State Routing Protocol Using Route Trusts for WSNs (DTLSRP)”, Scientific Research on Wireless Sensor Network, vol. .3, pp. 125-134, Apr. 2011.
[7] R. Vijayan, S. Sumitkumar, “A Novel Approach for Providing Security in Vehicular Adhoc Network through Vehicles Present in the Network”, International Journal of Advanced Research in Computer Science, vol. 2, no.1,pp. 595-598, Jan. 2011.
[8] I. Farruh, S. M. Aamir, W. K. Sung, and B. Bahodir, ”Trust management system in wireless sensor networks: design considerations and research challenges”, Transactions on Emerging Telecommunications Technologies, vol. 26, no. 2, pp. 107-130, Jun. 2013.
[9] R. P. Nachiketh , R. Srivaths, R. Anand, N. K. Jha, (2006) , “A Study of the Energy Consumption Characteristics of Cryptographic Algorithms and Security Protocols”, IEEE Transactions On Mobile Computing, vol.5, no. 2, pp.128-143, Feb. 2006.
[10] G.S. Mamatha, and Dr. S. C. Sharma, “A Highly Secured Approach against Attacks in MANETS, “International Journal of Computer Theory and Engineering, vol. 2, no. 5, pp. 1793-8201, Oct. 2010.
[11] A.Rajaram and Dr.S.Palaniswami , (2010), “Detecting Malicious Node in MANET using trust based Cross-Layer Security Protocol”, International Journal of Computer Science and Information Technologies, vol. 1, no. 2, pp. 130-137,May. 2010.
[12] V. Geetha and K. Chandrasekaran, (2014), “A Distributed Trust Based Secure Communication Framework for Wireless Sensor Network”, Scientific Research Publishing Inc, vol. 6, pp. 173-183, Sept. 2014.
[13] M. Mohit, K. Namarta, N. Esh, and P. S. Aman, “Rule Based Technique detecting Security attack for Wireless Sensor network using fuzzy logic”, International Journal of Advanced Research in Computer Engineering & Technology, vol. 1, no. 4, pp. 244-251, Jun.2012.
[14] C. Mala, S. Siddhartha, P. Shishir, G. Nagamaputhur, and S. Balasubramanian, “Routing for Wireless Mesh Networks with Multiple Constraints Using Fuzzy Logic”, The International Arab Journal of
Information Technology, vol. 9, no. 1, Jan. 2012. [15] R. A. Shalikh., H. Jameel, B. J. d’Auriol., Heejo Lee, Sungyoung Lee, and Young-Jae Song , (2009), “Group-Based Trust Management Scheme for Clustered Wireless Sensor Networks”, IEEE Transactions on Parallel and Distributed Systems, vol. 2, no. 1, pp. 1698–1712, Nov. 2209.

Keywords
Fuzzy logic, Securing Military Network, Trust, Key Management, Misbehaving node detection