2011
DOI: 10.1587/transcom.e94.b.1648
|View full text |Cite
|
Sign up to set email alerts
|

Optimized Fuzzy Adaptive Filtering for Ubiquitous Sensor Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
17
0

Year Published

2014
2014
2017
2017

Publication Types

Select...
5
1
1

Relationship

3
4

Authors

Journals

citations
Cited by 13 publications
(17 citation statements)
references
References 10 publications
0
17
0
Order By: Relevance
“…If the output is SEF or IHA, it activates the chosen countermeasure against the attack simultaneously. Figure 3 shows the fuzzy membership functions, which were optimized by the genetic algorithm-based optimization method (GAOM) [5] with the consideration of the characteristics of a given network. Note that the membership functions for OF are fixed (i.e., target-independent) and thus not determined by GAOM.…”
Section: Fuzzy-based Adaptive Countering Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…If the output is SEF or IHA, it activates the chosen countermeasure against the attack simultaneously. Figure 3 shows the fuzzy membership functions, which were optimized by the genetic algorithm-based optimization method (GAOM) [5] with the consideration of the characteristics of a given network. Note that the membership functions for OF are fixed (i.e., target-independent) and thus not determined by GAOM.…”
Section: Fuzzy-based Adaptive Countering Methodsmentioning
confidence: 99%
“…Thanks to the adaptive selection of countermeasures, it can save extra energy resources also in the case of FDIAs. Moreover, the membership functions of its fuzzy system can be determined automatically [5], so that it does not need manual parameter settings. Simulation results show the effectiveness of the method.…”
Section: Introductionmentioning
confidence: 99%
“…However, it is not possible to guarantee that these parameters will always be selected by some "omniscient" experts for every WSN application. By contrast, a major benefit of the proposed method is that the two fuzzy systems, which are the essential components used for FEIA detection and countermeasure selection, can be optimized automatically by combining a simulation and a genetic algorithm [16]. To optimize the fuzzy systems for a WSN, users only have to build a simulation model of the WSN, which can be obtained using a GUI-based tool.…”
Section: Optimization Of Fuzzy Membership Functionsmentioning
confidence: 99%
“…The proposed method has the following merits compared with ACS, which is another centralized solution. (1) The fuzzy systems can be optimized automatically by combining a genetic algorithm with a simulation [16], which virtually eliminates the manual parameter settings used in ACS. (2) Fewer input factors are required to detect FEIAs and to select the countermeasures, which reduces the space requirements and computation complexity.…”
Section: Introductionmentioning
confidence: 99%
“…These spurious packets are launched into the network using the compromised nodes with the goal of changing routing paths and stealing data using a compromised node disguised as a base station, as shown in Fig. 1 [18]. In this scenario, it is possible that the compromised node will reveal the keys of a sensor node [15].…”
Section: Introductionmentioning
confidence: 99%