00824nam0-22002891i-450 99000437941040332120190211162613.084-8429-023-100043794120030207d2001----km-y0itay50------bacatESy-------001yy<<La >>llengua catalana com a sistemaCarme Vilà ComajoanBarcelonaUniversitat Oberta de Catalunya2001259 p.27 cmManuals52Lingua catalanaManuali449.9820itVilà Comajoan,Carme175751ITUNINARICAUNIMARCBK990004379410403321449.98 VIL 1Bibl.45060FLFBCFLFBCLlengua catalana com a sistema541288UNINA02586oam 2200433zu 450 991014080070332120241212220014.09781424469215142446921X(CKB)2670000000046377(SSID)ssj0000452684(PQKBManifestationID)12139205(PQKBTitleCode)TC0000452684(PQKBWorkID)10472490(PQKB)10939945(NjHacI)992670000000046377(EXLCZ)99267000000004637720160829d2010 uy engur|||||||||||txtccr2010 IEEE International Conference on Fuzzy Systems[Place of publication not identified]I E E E20101 online resource illustrationsBibliographic Level Mode of Issuance: Monograph9781424469192 1424469198 The effect of advances in the fields of ubiquitous computing, wireless communications and embedded system design has seen a corresponding rapid improvement of wireless sensor technology. Sensor networks have emerged as a platform for deployment and sustenance of critical applications that require real-time sensing and data acquisition for decision-making purposes. A significant number of malicious attacks against the security of such networks have been identified in recent times. Considering the untrusted environments of operations of such networks, the threat of distributed attacks against constrained sensory resources i.e. sensor power, computation and communication capabilities cannot be overlooked. In this paper, we propose a fuzzy logic-based approach towards achieving demarkation in the values of specific parameters of an attack detection scheme for detecting distributed node-exhaustion attacks in wireless sensor networks. Using the Unified And-Or (UAO) aggregation operator, we model and formulate a mechanism to achieve a tradeoff between frequent attack detection and sensor node energy utilization. Simulation results prove the effectiveness of our approach in addressing the issue of computing the optimal parameter values for achieving a reasonable tradeoff between attack detection rate and sensor node energy utilization rate.Fuzzy systemsCongressesFuzzy systems003.7IEEE StaffPQKBPROCEEDING99101408007033212010 IEEE International Conference on Fuzzy Systems2545901UNINA