Abstract

Fine dust is a harmful substance that floats in the atmosphere. It is not filtered well in the bronchus and causes health problems when it accumulates in the body. Fine dust that is present in the air outside can flow into buildings through windows and other openings, adversely affecting indoor air quality. It has negative health effects on people who live indoors. As attention to problems associated with fine dust gradually rises, the importance of continuously managing the quality of indoor air through air purification rises. Therefore, recently, research and development into systems to periodically purify indoor air are being carried out. This paper introduces an air purification system, a Wireless Sensor Networks (WSNs)-based Internet of Things (IoT) air purification system. In the WSNs-based IoT air purification system, the IoT air purifier is controlled based on event information that the WSNs senses, so it is important to maintain the security of the event information. To this end, a WSNs security protocol, Interleaved Hop by hop Authentication (IHA), is used in this system. IHA is a security protocol in which sensor nodes and a Base Station (BS) detect and drop false reports if the number of compromised sensor nodes does not exceed a security threshold. That is, because the false report injection attack that the number of compromised sensor nodes exceeds security threshold can’t defend by IHA, it is detected and defended through Data Calibration. However, considerable energy of the sensor nodes is unnecessarily consumed in the process of forwarding false reports. Thus, this paper proposes a method of decreasing and increasing security thresholds dynamically according to the network situation using fuzzy logic. This proposed scheme has the advantages of improvements in both the overall energy efficiency and network lifetime in WSNs.

Highlights

  • Fine dust is a harmful substance that floats in the atmosphere

  • A false report injection attack where the number of compromised sensor nodes is less than the security threshold does not have an effect on executing normal operation of the Internet of Things (IoT) air purifier because false reports are detected early and dropped through en-route filtering in Interleaved Hop by hop Authentication (IHA) [8]

  • Compared to existing IHA, the proposed scheme shows, on average, a 5.53% improvement in the energy efficiency in a false report injection attack where the number of compromised sensor nodes is less than the security threshold

Read more

Summary

Interleaved Hop-by-hop Authentication

It is easy for an attacker to compromise sensor nodes because WSNs use wireless communication and are deployed in an open environment. The attacker compromises sensor nodes, acquires keys and generates a report using the keys. In BS hello, each sensor node finds an upper association node located within security threshold+1. In Cluster Acknowledgement, each sensor node finds a lower association node located within security threshold+1. The forwarding node generates a MAC using a pairwise key shared with an upper association node and transmits a report adding the MAC to the report. V.BS verification If the report is transmitted to the BS, the BS verifies MACs using individual keys shared with all sensor nodes. Is the student tall?” the sentence is ambiguous because tall height isn’t defined; it is called a fuzzy sentence. A fuzzy set is defined first, and input and output values through fuzzification should be converted into a membership function. The Center of Gravity Method and Mamdani’s inference method are methods of defuzzification [12]

Fine dust
Internet of Things corresponding values
Problem Statement
Assumption
CHANGE OF SECURITY THRESHOLD
Experiment results
Findings
CONCLUSION
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call