738 research outputs found

    Performance evaluation of two-fuzzy based cluster head selection systems for wireless sensor networks

    Get PDF
    Sensor networks supported by recent technological advances in low power wireless communications along with silicon integration of various functionalities are emerging as a critically important computer class that enable novel and low cost applications. There are many fundamental problems that sensor networks research will have to address in order to ensure a reasonable degree of cost and system quality. Cluster formation and cluster head selection are important problems in sensor network applications and can drastically affect the network’s communication energy dissipation. However, selecting of the cluster head is not easy in different environments which may have different characteristics. In this paper, in order to deal with this problem, we propose two fuzzy-based systems for cluster head selection in sensor networks. We call these systems: FCHS System1 and FCHS System2. We evaluate the proposed systems by simulations and have shown that FCHS System2 make a good selection of the cluster head compared with FCHS System1 and another previous system.Peer ReviewedPostprint (published version

    FUZZY BASED SECURITY ALGORITHM FOR WIRELESS SENSOR NETWORKS IN THE INTERNET OF THINGS PARADIGM

    Get PDF
    Published ThesisThe world is embracing the idea of Internet of Things and Industrial Revolution 4.0. However, this acceptance of computerised evolution is met with a myriad of challenges, where consumers of this technology are also growing ever so anxious about the security of their personal data as well as reliability of data collected by the millions and even billions of sensors surrounding them. Wireless sensor networks are the main baseline technology driving Internet of things; by their very inherent nature, these networks are too vulnerable to attacks and yet the network security tools designed for conventional computer networks are not effective in countering these attacks. Wireless sensors have low computational resources, may be highly mobile and in most cases, these networks do not have a central point which can be marked as an authentication point for the sensors, any node can join or leave whenever they want. This leaves the sensors and the internet of things applications depending on them highly susceptible to attacks, which may compromise consumer information and leave security breaches in situation that need absolute security such as homes or even the cars they drive. There are many possibilities of things that could go wrong when hackers gain control of sensors in a car or a house. There have been many solutions offered to address security of Wireless Sensor Networks; however, most of those solutions are often not customised for African context. Given that most African countries have not kept pace with the development of these underlying technologies, blanket adoption of the solutions developed for consumption in the developed world has not yielded optimal results. The focus of this research was the development of an Intrusion Detection System that works in a hierarchical network structured Wireless Sensor Network, where cluster heads oversee groups of nodes and relay their data packets all the way to the sink node. This is a reactive Intrusion Detection System (IDS) that makes use of a fuzzy logic based algorithm for verification of intrusion detections. This system borrows characteristics of traditional Wireless Sensor Networks in that it is hosted external to the nodes; that is, on a computer or server connected to the sink node. The rational for this is the premise that developing the system in this manner optimises the power and processing resource of nodes because no part of the IDS is found in the nodes and they are left to focus purely on sensing. The Intrusion Detection System makes use of remote Over The Air programming to communicate with compromised nodes, to either shut down or reboot and is designed with the ZigBee protocol in mind. Additionally, this Intrusion Detection System is intended to being part of a larger Internet of Things integration framework being proposed at the Central University of Technology. This framework is aimed at developing an Internet of Things adoption strategy customised for African needs and regionally local consumers. To evaluate the effectiveness of the solution, the rate of false detections being picked out by the security algorithm were reduced through the use of fuzzy logic systems; this resulted in an accuracies of above 90 %. The algorithm is also very light when asymptotic notation is applied, making it ideal for Wireless Sensors. Lastly, we also put forward the Xbee version of the Triple Modular Redundancy architecture, customised for Wireless sensor networks in order to beef-up on the security solution presented in this dissertation

    A Security Algorithm for Wireless Sensor Networks in the Internet of Things Paradigm

    Get PDF
    Conference ProceedingsIn this paper we explore the possibilities of having an algorithm that can protect Zigbee wireless sensor networks from intrusion; this is done from the Internet of Things paradigm. This algorithm is then realised as part of an intrusion detection system for Zigbee sensors used in wireless networks. The paper describes the algorithm used, the programming process, and the architecture of the system developed as well as the results achieved

    The design and implementation of fuzzy query processing on sensor networks

    Get PDF
    Sensor nodes and Wireless Sensor Networks (WSN) enable observation of the physical world in unprecedented levels of granularity. A growing number of environmental monitoring applications are being designed to leverage data collection features of WSN, increasing the need for efficient data management techniques and for comparative analysis of various data management techniques. My research leverages aspects of fuzzy database, specifically fuzzy data representation and fuzzy or flexible queries to improve upon the efficiency of existing data management techniques by exploiting the inherent uncertainty of the data collected by WSN. Herein I present my research contributions. I provide classification of WSN middleware to illustrate varying approaches to data management for WSN and identify a need to better handle the uncertainty inherent in data collected from physical environments and to take advantage of the imprecision of the data to increase the efficiency of WSN by requiring less information be transmitted to adequately answer queries posed by WSN monitoring applications. In this dissertation, I present a novel approach to querying WSN, in which semantic knowledge about sensor attributes is represented as fuzzy terms. I present an enhanced simulation environment that supports more flexible and realistic analysis by using cellular automata models to separately model the deployed WSN and the underlying physical environment. Simulation experiments are used to evaluate my fuzzy query approach for environmental monitoring applications. My analysis shows that using fuzzy queries improves upon other data management techniques by reducing the amount of data that needs to be collected to accurately satisfy application requests. This reduction in data transmission results in increased battery life within sensors, an important measure of cost and performance for WSN applications

    A New Collaborative Knowledge-Based Approach for Wireless Sensor Networks

    Get PDF
    This work presents a new approach for collaboration among sensors in Wireless Sensor Networks. These networks are composed of a large number of sensor nodes with constrained resources: limited computational capability, memory, power sources, etc. Nowadays, there is a growing interest in the integration of Soft Computing technologies into Wireless Sensor Networks. However, little attention has been paid to integrating Fuzzy Rule-Based Systems into collaborative Wireless Sensor Networks. The objective of this work is to design a collaborative knowledge-based network, in which each sensor executes an adapted Fuzzy Rule-Based System, which presents significant advantages such as: experts can define interpretable knowledge with uncertainty and imprecision, collaborative knowledge can be separated from control or modeling knowledge and the collaborative approach may support neighbor sensor failures and communication errors. As a real-world application of this approach, we demonstrate a collaborative modeling system for pests, in which an alarm about the development of olive tree fly is inferred. The results show that knowledge-based sensors are suitable for a wide range of applications and that the behavior of a knowledge-based sensor may be modified by inferences and knowledge of neighbor sensors in order to obtain a more accurate and reliable output

    CLUSTER HEAD ELECTION MECHANISM-BASED ON FUZZY LOGIC (CHEF) WITH TDMA IN WSN

    Get PDF
    Wireless sensor networks (WSN) are being used for huge range of applications where the traditional infrastructure based network is mostly infeasible. The most challenging aspect of WSN is that they are energy resource-constrained and that energy cannot be replenish. the wireless sensor network of power limited sensing devices called sensor deployed in a region to sense various types physical information from the environment, when these sensors sense and transmit data to other sensors present in the network, even the cluster head is elected according to check their residual energy considerable amount of energy will drain automatically to overcome this drawback by considering the protocol a fuzzy logic approach is used to elect the cluster head based on three descriptors-energy, centrality & distance and second CH is elected according to TDMA to overcome the data lost during energy drain occur in the CH .NS-2 simulation shows that proposed protocol provides higher energy efficiency. This paper proposes the mechanism or device is capable of utilizing its own system of control simply called as self-configurable clustering mechanism to detect the disordered CHs and replace them with other nodes. And results have been derived from simulator ns-2 to show the better performance
    • …
    corecore