Loading

Fuzzy-based Dynamic Security Parameters Determination Method to Improve Energy Efficiency
Ye-lim Kang1, Tae-ho Cho2

1Ye-lim Kang, Department of Electrical and Computer Engineering, Sungkyunkwan University, Suwon, Republic of Korea.
2Tae-ho Cho*, Department of Computer Science and Engineering,

Manuscript received on March 28, 2020. | Revised Manuscript received on April 25, 2020. | Manuscript published on April 30, 2020. | PP: 1952-1958 | Volume-9 Issue-4, April 2020. | Retrieval Number: D9024049420/2020©BEIESP | DOI: 10.35940/ijeat.D9024.049420
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Fine dust is a harmful substance that floats in the atmosphere. It is not filtered well in the bronchus and causes health problems when it accumulates in the body. Fine dust that is present in the air outside can flow into buildings through windows and other openings, adversely affecting indoor air quality. It has negative health effects on people who live indoors. As attention to problems associated with fine dust gradually rises, the importance of continuously managing the quality of indoor air through air purification rises. Therefore, recently, research and development into systems to periodically purify indoor air are being carried out. This paper introduces an air purification system, a Wireless Sensor Networks (WSNs)-based Internet of Things (IoT) air purification system. In the WSNs-based IoT air purification system, the IoT air purifier is controlled based on event information that the WSNs senses, so it is important to maintain the security of the event information. To this end, a WSNs security protocol, Interleaved Hop by hop Authentication (IHA), is used in this system. IHA is a security protocol in which sensor nodes and a Base Station (BS) detect and drop false reports if the number of compromised sensor nodes does not exceed a security threshold. That is, because the false report injection attack that the number of compromised sensor nodes exceeds security threshold can’t defend by IHA, it is detected and defended through Data Calibration. However, considerable energy of the sensor nodes is unnecessarily consumed in the process of forwarding false reports. Thus, this paper proposes a method of decreasing and increasing security thresholds dynamically according to the network situation using fuzzy logic. This proposed scheme has the advantages of improvements in both the overall energy efficiency and network lifetime in WSNs.
Keywords: Security, Wireless Sensor Networks, Internet of Things, Interleaved Hop-by-hop Authentication, False report injection attack,