EIDA: An Energy-Intrusion aware Data Aggregation Technique for Wireless Sensor Networks
الموضوعات :Nafiseh Daneshgar 1 , M. Habibi Najafi 2 , Mohsen Jahanshahi 3 , Ehsan Ahvar 4
1 - Islamic Azad University
Qazvin Branch
Qazvin, Iran
2 - Islamic Azad University
Qazvin Branch
Qazvin, Iran
3 - Dept. of Computer Engineering
Central Tehran Branch, Islamic Azad University, Tehran, Iran
4 - Institut Mines-Telecom
Telecom SudParis,
Evry, France
الکلمات المفتاحية: data aggregation, Energy, intrusion, sensor network,
ملخص المقالة :
Energy consumption is considered as a critical issue in wireless sensor networks (WSNs). Batteries of sensor nodes have limited power supply which in turn limits services and applications that can be supported by them. An efcient solution to improve energy consumption and even trafc in WSNs is Data Aggregation (DA) that can reduce the number of transmissions. Two main challenges for DA are: (i) most DA techniques need network clustering. Clustering itself is a time and energy consuming procedure. (ii) DA techniques often do not have ability to detect intrusions. Studying to design a new DA technique without using clustering and with ability of nding intrusion is valuable. This paper proposes an energy-intrusion aware DA Technique (named EIDA) that does not need clustering. EIDA is designed to support on demand requests of mobile sinks in WSNs. It uses learning automata for aggregating data and a simple and effective algorithm for intrusion detection. Finally, we simulate
[1] Mo Li, Zhenjiang Li, and A. V. Vasilakos, “A Survey on Topology Control in Wireless Sensor Networks: Taxonomy, Comparative Study, and Open Issues'', Proceedings of the IEEE, Vol. 25, Issue 10, Pages 2367-2380, October 2013.
[2] Jamal. N. Al-Kamal, and Ahmed. E. Kamal, “Routing Techniques in Wireless Sensor Networks, A survey”, Wireless Communications, IEEE, vol. 11, pp. 6-28, 2004.
[3] Chih-Min Chao, Tzu-Ying Hsiao, “Design of structure-free and energy-balanced data aggregation in wireless sensor networks”, Journal of Network and Computer Applications 37 (2014) 229-239.
[4] Ismail Butun, Salvatore D. Morgera, and Ravi Sankar, “A Survey of Intrusion Detection Systems in Wireless Sensor Networks”, IEEE COMMUNICATIONS SURVEYS and TUTORIALS, VOL. 16, NO. 1, 2014.
[5] I. Butun and R. Sankar, “A Brief Survey of Access Control in Wireless Sensor Networks”, in Proc. IEEE Consumer Communications and Networking Conference, Las Vegas, Nevada, January 2011.
[6] M. Bala Krishna and Noble Vashishta,”Energy Efficient Data Aggregation Techniques in Wireless Sensor Networks”, 5th International Conference on Computational Intelligence and Communication Networks, 2013.
[7] W. R. Heinzelman, A. Chandrakasan, and H. Balakrishnan, “Energy effcient communication protocol for wireless microsensor networks,” in in Proc. of the 33rd International Conference on System Sciences (HICSS00), January 2000.
[8] M. Jahanshahi, S. Rahmani, S. Ghaderi, “An Efficient Cluster Head Selection Algorithm for Wireless Sensor Networks Using Fuzzy Inference Systems”, The International Journal of Smart Electrical Engineering (IJSEE), Vol.2, No. 2, 2013.K.S.Narendra, M.A.L.Thathachar, "learning automata: An introduction", Prentice Hall 1989.
[9] Vaibhav Pandey, Amarjeet Kaur and Narottam Chand, “A review on data aggregation techniques in wireless sensor network”, Journal of Electronic and Electrical Engineering, ISSN: 0976-8106 and E-ISSN: 0976-8114, Vol. 1, Issue 2, 2010.
[10] I X. Chen, K. Makki, K. Yen and N. Pissinou, “Sensor network security: A survey”, IEEE J. Communications Surveys and Tutorials, vol. 11, num. 2, pp. 52-73, 2009.
[11] Ehsan Ahvar, “EDQD: An Energy-Distance aware Query-based Data aggregation technique for wireless sensor network”, IEEE 24th International Conference on Advanced Information Networking and Applications workshop, australia, 2010.
[12] K.S.Narendra, M.A.L.Thathachar, ``learning automata: An introduction'', Prentice Hall 1989.
[13] C. Karlof and D. Wagner, “Secure routing in wireless sensor networks: attacks and countermeasures,” Ad Hoc Networks, vol. 1, no. 2-3, pp. 293-315, 2003.
[14] Andriy Stetsko, Vashek Matyas, “EffectivenessMetrics for Intrusion Detection in Wireless Sensor Networks”, European Conference on Computer Network Defense, 2009.
[15] Zeng X., Bagrodia R., and Geria M. "Glomosim: A Library for Parallel Simulation of Large Scale Wireless Networks" Proceedings of the 12th Workshop on Parallel and Distributed Simulations 1998; 154-161.
[16] S. S. Chiang, C. H. Huang, and K. C. Chang, “A Minimum Hop Routing Protocol for Home Security Systems Using Wireless Sensor Networks”, IEEE Transactions on Consumer Electronics, Vol. 53, no. 4, pp. 1483-1489, 2007.