به کارگیری منطق فازی در انتخاب مناسب گره بعدی برای پیکربندی مسیر با پروتکل LEAP در شبکههای حسگر بیسیم
محورهای موضوعی : مهندسی برق و کامپیوتروحید ستاری نائینی 1 * , فاطمه موحدی 2
1 - دانشگاه شهید باهنر کرمان
2 - دانشگاه آزاد اسلامی واحد کرمان
کلید واژه: انتخاب گام بعدی پروتکل LEAP شبکه حسگر بیسیم کاهش مصرف انرژی مسیریابی,
چکیده مقاله :
با توجه به این که در شبکههای حسگر بیسیم، انتخاب مناسب گره بعدی جهت جلوگیری از حملات و کاهش سطح مصرف انرژی حایز اهمیت است، در این مقاله روشی مبتنی بر منطق فازی برای انتخاب گره گام بعدی با مد نظر قرار دادن وضعیت و انتقال گزارش به گرههای مختلف ارائه میشود. در این روش به صورتی کارامد گره گام بعدی با چهار عامل بر مبنای سیستم منطق فازی انتخاب میشود. این چهار عامل، بیانکننده چهار پارامتر بهینهشده از نظر انرژی، یعنی درجه نزدیکی گره به کوتاهترین مسیر، درجه نزدیکی گره به سرخوشه، نسبت انرژی باقیمانده هر گره و تعداد پیامهای غلط فیلترشده میباشد. روش پیشنهادی با افزایش سطح انرژی و حفظ سطح همسانی از امنیت در مقایسه با پروتکل LEAP همراه است. همچنین این امکان فراهم میشود تا با انتخاب مناسب گام بعدی قادر به شناسایی مسیرهای مناسب و امن و جلوگیری از حملات باشیم. مقایسه روش پیشنهادی و روشهای مرتبط نشان میدهد که روش پیشنهادی مصرف انرژی را کاهش چشمگیری داده و متعاقب آن طول عمر شبکه را افزایش میدهد. همچنین نتایج حاصل از شبیهسازی نشان میدهد که با انتخاب مناسب گام بعدی با تلفات بسته کمتری نسبت به روشهای دیگر مواجه هستیم
Since in wireless sensor networks, selection of next hop is critical in attack avoidance and lowering the power consumption, a method based on fuzzy logic is proposed in this paper considering status and report transmission of the nodes. In this method, the next hop is selected considering four factors, based on fuzzy logic system. These factors, indicating four optimized parameters; i.e., degree of node proximity to the shortest path, degree of node proximity to the sink, residual energy ratio of each node, and the number of false filtered messages. This method leads to an increase in energy level as well as maintaining security level in comparison with LEAP protocol. Meanwhile, it is possible to identify safe paths. Comparing with other related methods, it is shown that this method leads to significant reduction in energy consumption level and consequently the life-time of the network is increased. Meanwhile with selecting the appropriate next hop, packet drops are reduced as well.
[1] N. Sharma, "Impact of varying packet size on multihop routing protocol in wireless sensor networks," Int. J. Adv. Stud. Comput. Sci. Eng., vol. 3, no. 9, pp. 10–16, 2014.
[2] D. S. Yoo and S. S. Choi, "Medium access control with dynamic frame length in wireless sensor networks," J. of Information Processing Systems, vol. 6, no. 4, pp. 501-510, Dec. 2010.
[3] S. Zhu, S. Setia, and S. Jajodia, "LEAP+: efficient security mechanisms for large-scale distributed sensor networks," ACM Trans. Sen. Netw., vol. 2, no. 4, pp. 500-528, Nov. 2006.
[4] S. M. Nam and T. H. Cho, "A fuzzy rule-based path configuration method for LEAP in sensor networks," Ad Hoc Networks, vol. 31, no. 8, pp. 63-79, Mar. 2015.
[5] M. Akram and T. H. Cho "Energy efficient fuzzy adaptive selection of verification nodes in wireless sensor networks," Ad Hoc Networks, vol. 47, pp. 16-25, sept. 2016.
[6] م. ابراهیمی، ح. ز. احمدی و م. عباس نژادآرا، "ارزیابی روشهای توافق کلید مبتنی بر ساختار Fuzzy Vault در شبکههای سنسور بیسیم روی بدن با استفاده از روش AHP فازی،" نشریه مهندسی برق و مهندسی کامپیوتر، سال 13، شماره 4، صص. 141-133، زمستان 1394.
[7] ف. صباحی و م. ر. اکبرزاده توتونچی، "شناسایی سیستمهای غیرخطی بر اساس منطق فازی توسعهیافته،" مجله مهندسی برق دانشگاه تبریز، دوره 44، شماره 1، صص. 32-23، بهار 1393.
[8] M. Mirzaie and S. M. Mazinani, "Adaptive MCFL: an adaptive multi-clustering algorithm using fuzzy logic in wireless sensor network," Computer Communications, vol. 111, no. 1, pp. 56-67, Oct. 2017.
[9] J. K. Lee, S. M. Nam, and T. H. Cho, "ENSP: energy efficient next hop selection in a probabilistic voting-based filtering scheme using fuzzy logic," Informatics Engineering, an International J., vol 2, no. 4, pp. 1-12, Dec. 2014.
[10] S. Banerjee and S. Khuller, "A clustering scheme for hierarchical control in multi-hop wireless networks," in Proc. of 20th Annual Joint Conf. of the IEEE Computer and Communications Societies, INFOCOM'01, pp. 1028-1037, Anchorage, AK, USA, 22-26 Apr. 2001.
[11] M. Gerla, T. J. Kwon, and G. Pei, "On demand routing in large ad hoc wireless networks with passive clustering," in Proc. of Wireless Communications and Networking Conf., WCNC'00, vol. 1 pp. 100-105, Chicago, IL, USA, 23-28 Sept. 2000.
[12] S. Basagni, "Distributed clustering algorithm for ad-hoc networks," in Proc. Int. Symp. on Parallel Architectures, Algorithms, and Networks, I-SPAN'99, pp. 310-315, Perth/Fremantle, Australia, 23-25 Jun. 1999.
[13] W. R. Heinzelman, A. Chandrakasan, and H. Balakrishnan, "An application-specific protocol architecture for wireless microsensor networks," IEEE Trans. on Wireless Communications, vol. 1, no. 4, pp. 660-670, Dec. 2002.
[14] D. Estrin, R. Govindan, J. Heidemann, and S. Kumar, "Next century challenges: scalable coordination in sensor networks," in Proc. of the ACM/IEEE Int. Conf. on Mobile Computing and Networking, MOBICOM'99, pp. 263-270, Seattle, Washington, USA, Aug. 1999.
[15] O. Younis and S. Fahmy, "Distributed clustering in ad-hoc sensor networks: a hybrid energy-efficient approach," in Proc. of Twenty-third Annual Joint Conf. of the IEEE Computer and Communications Societies, INFOCOM'04, vol. 1, pp. 640-699, Mar. 2004.
[16] J. Kulik, W. R. Heinzelman, and H. Balakrishnan, "Negotiation-based protocols for disseminating information in wireless sensor networks," ACM Wireless Networks, vol. 8, no. 2-3, pp. 169-185, Mar. 2002.
[17] K. Akkaya and M. Younis, "A survey on routing protocols for wireless sensor networks," Ad Hoc Networks, vol. 3, no. 3, pp. 325-349, May 2005.
[18] M. Handy, M. Haase, and D. Timmermann, "Low energy adaptive clustering hierarchy with deterministic cluster-head selection," in Proc. 4th Int. Workshop on Mobile and Wireless Communications Network, pp. 368-372, Dec. 2002.
[19] S. Zhu, S. Setia, and S. Jajodia, "LEAP: efficient security mechanisms for large-scale distributed sensor networks," in Proc. of the 10th ACM Conf. on Computer and Communications Security, pp. 62-72, Oct. 2003.
[20] C. H. Lim, "LEAP++: a robust key establishment scheme for wireless sensor networks," in Proc. Distributed Computing Systems Workshops, pp. 376-381, Jul.2008.
[21] S. Slijepcevic, M. Potkonjak, V. Tsiatsis, S. Zimbeck, and M. B. Srivastava, "On communication security in wireless ad-hoc sensor networks," in Proc. 11th IEEE Int. Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, WET ICE'02, pp. 139-144, Nov. 2002.
[22] R. M. Verma and B. E. Basile, "Modeling and analysis of LEAP, a key management protocol for wireless sensor networks," in Proc. IEEE Int. Conf. on Sensing, Communications and Networking, SECON'13, pp. 65-67, Oct. 2013..
[23] A. Perrig, R. Szewczyk, J. D. Tygar, V. Wen, and D. E. Culler, "SPINS: security protocols for sensor networks," Wireless Networks, vol. 8, no. 5, pp. 521-534, Sept. 2002.
[24] L. Rongxing, L. Xiaodong, Z. Haojin, L. Xiaohui, and S. Xuemin, "BECAN: a bandwidth-efficient cooperative authentication scheme for filtering injected false data in wireless sensor networks," IEEE Trans. Parallel Distrib. Syst., vol. 23, no. 1, pp. 32-43, Jan. 2012.
[25] D. De, "A distributed algorithm for localization error detection-correction, use in in-network faulty reading detection: applicability in long-thin wireless sensor networks," in Proc. IEEE Wireless Communications and Networking Conf., 2009. WCNC'09, 6 pp., May 2009.
[26] W. R. Heinzelman, A. Chandrakasan, and H. Balakrishnan, "Energy-efficient communication protocol for wireless microsensor networks," in Proc. of the 33rd Annual Hawaii Int. Conf. on System Sciences, 10 pp., Aug. 2000.