Abstract
Many experts and scholars focus on the Maclaurin symmetric mean (MSM) equation, which can reflect the interrelationship among the multi-input arguments. It has been generalized to different fuzzy environments and put into use in various actual decision problems. The fuzzy data intuitionistic fuzzy numbers (FNIFNs) could well depict the uncertainties and fuzziness during the security evaluation of Wireless Sensor Network (WSN). And the WSN security evaluation is frequently viewed as the multiple attribute decision-making (MADM) issue. In this paper, we expand the generalized Maclaurin symmetric mean (GMSM) equation with FNIFNs to propose the fuzzy number intuitionistic fuzzy generalized MSM (FNIFGMSM) equation and fuzzy number intuitionistic fuzzy weighted generalized MSM (FNIFWGMSM) equation in this study. A few MADM tools are developed with FNIFWGMSM equation. Finally, taking WSN security evaluation as an example, this paper illustrates effectiveness of the depicted approach. Moreover, by comparing and analyzing the existing methods, the effectiveness and superiority of the FNIFWGMSM method are further certified.
Keywords
Introduction
In 1965, Zadeh [1] established a novel fuzzy set (FS) to deal with decision information in the fuzzy new domain [2–5]. In recent years, more and more methods and models are proposed to solve the fuzzy decision-making issues [6–12]. To extend novel FS, the intuitionistic fuzzy sets (IFSs) [13] was developed. Subsequently, FS and its related extension knowledges are exploited into the more and more decision domains [14–21]. Li [22] built the GOWA operator to MADM using IFSs. Tan [23] constructed the Choquet integral-based TOPSIS method for IF-MADM. Wu and Zhang [24] built the IF-MADM based on weighted entropy. Zhao, Zheng and Wan [25] defined the Interactive intuitionistic fuzzy algorithms for multilevel programming problems. De and Sana [26] defined the The (p,q,r,l) method for random demand with Bonferroni mean under IFSs. Garg [3] proposed the improved cosine similarity measure for IFSs. Zhao, Wei, Chen and Wei [27] defined the intuitionistic fuzzy MABAC method based on cumulative prospect theory. Arya and Yadav [28] defined the intuitionistic fuzzy super-efficiency slack-based measure. Joshi, Kumar, Gupta and Kaur [29] defined the Jensen-alpha-Norm dissimilarity measure for IFSs. Xiao, Zhang, Wei, Wu, Wei, Guo and Wei [30] built the intuitionistic fuzzy Taxonomy method. Li, Chen, Yang and Li [31] defined the time-preference and VIKOR-based dynamic method for IF-MADM. Zhang, Gao, Wei and Chen [32] built the grey relational analysis method based on cumulative prospect theory for intuitionistic fuzzy MAGDM. [33]built the Taxonomy method for MAGDM based on interval-valued intuitionistic fuzzy with entropy. Furthermore, Liu and Yuan [34] built the fuzzy number IFSs (FNIFSs) to combine the IFSs with the triangular fuzzy sets (TFSs). Wang [35] built the geometric operators under FNIFSs. Verma [36] defined the GFNIFWBM operator under FNIFSs. Wang and Wang [37] defined the FNIFHCG operator under FNIFSs. Lu [38] built the IFNIFHCG operator for international competitiveness assessment. Fan [39] built the FNIFHPWG function to make evaluation about knowledge innovation ability. Wang and Yu [40] defined the FNIFHCA function to evaluate the rural landscape design projects.
Nevertheless, all the functions and tools proposed by the above scholars do not take into account the relationship between parameters [41–45]. To conquer these shortcomings, the crucial purpose of the article is to connect the FNIFSs with GMSM operator [46, 47] to build several novel fused formulas under FNIFSs.
Consequently, the rest work would be depicted. Several basic concepts of FNIFSs and GMSM formulas would be depicted in the second chapter. The GMSM formulas with FNIFSs would be constructed in the third chapter. An instance about WSN security evaluation is given in the fourth chapter. The conclusions reached will be depicted the last chapter.
Preliminaries
In this section, we introduced the concept of fuzzy number intuitionistic fuzzy sets (FNIFSs) [32] and the GMSM operator[47].
Fuzzy number intuitionistic fuzzy set
Liu and Yuan [34] gave the definition of FNIFS, and the membership and non-membership are given in the form of TFNs.
T B (e), F B (e) are two TFNs between 0 and 1, and T B (e) = (X (e) , Y (e) , Z (e)) , e → [0, 1], F B (e) = (A (e) , S (e) , D (e)) , E → [0, 1], 0 ⩽ Z (e) + D (e) ⩽ 1, ∀ e ∈ E.
Let T B (e) = (X (e) , Y (e) , Z (e)), F B (e) = (A (e) , S (e) , D (e)), so Q (e) =〈 (X (e) , Y (e) , Z (e)) , (A (e) , S (e) , D (e)) 〉, Q (e) is view as a FNIFN.
Based on the SF (Q (e)) and AH (Q (e)), next, let’s look at the size comparison of the two FNIFN:
if AH (Q (e1)) = AH (Q (e2)), then Q (e1) = Q (e2); if AH (Q (e1)) < AH (Q (e2)), then Q (e1) < Q (e2).
Maclaurin [47] proposed the generalized MSM (GMSM) considering the individual differences.
Then we called GMSM(k,λ1,λ2,…,λ
k
) the GMSM operator, where (i1, i2, …, i
k
) traverses all the k-tuple combinations of (1, 2, …, n),
The FNIFGMSM operator
Here we’re going to expand GMSM to coalesce all FNIFNs and establish the fuzzy number intuitionistic fuzzy GMSM (FNIFGMSM) operator.
Thus,
Thereafter,
Furthermore,
Therefore,
Hence, (6) is kept.
Then we need to prove that Eq. (6) is still an FNIFN. We need to prove two following conditions: (X (e) , Y (e) , Z (e))⊆ [0, 1] , (A (e) , S (e) , D (e)) ⊆ [0, 1] ; 0 ⩽ Z (e) + D (e) ⩽ 1 .
Then,
Thus
That is to say:
② For Z (e m l ) + D (e m l ) ⩽ 1, then we can derive Z (e m l ) ⩽ 1 - D (e m l ) , thus
Next we explore some properties about the FNIFGMSM formula.
In real-life MADM, it’s crucial to fully take attribute weights into account. we shall build fuzzy number intuitionistic fuzzy weighted GMSM (FNIFWGMSM) formula.
Then we called
Thus,
Thereafter,
Furthermore,
Therefore,
Hence, (19) is kept.
Then we could prove that Eq. (19) is an FNIFN. We need to prove two following conditions: (X (e) , Y (e) , Z (e))⊆ [0, 1] , (A (e) , S (e) , D (e)) ⊆ [0, 1] ; 0 ⩽ Z (e) + D (e) ⩽ 1 .
Then,
Thus,
That means
② For Z (e
m
l
) + D (e
m
l
) ⩽ 1, then we can derive D (e
m
l
) ⩽ 1 - Z (e
m
l
) , thus
Then we will discuss some properties of FNIFWGMSM operator.
Data instance
A wireless sensor network (WSN) is a network constructed through the self-organization of a-large number of sensor nodes. Considering ongoing network security problems, considerable research is focusing on the security of WSNs from different perspectives, with the goal of ensuring that these networks are operating effectively. In terms of security issues, the problems encountered by WSNs and traditional wireless networks can widely differ based on the characteristics of the individual network. Since the resources for sensor nodes are limited, processing power, storage space, energy, and other factors can prevent the direct application of effective security protocols and algorithms to wireless sensor networks, resulting in greater security risks. Given the popular application of wireless sensor networks, the security problems experienced by WSNs are becoming increasingly concerning. Therefore, determining the most effective measures to ensure the safety of wireless sensor networks has become a common concern. The WSN security evaluation could de regarded as the MADM or MAGDM problem [49–54]. A point in case about the WSN security evaluation with FNIFNs would be utilized to illustrate the above MADM methods. We shall give 5 possible computer network systems H i (i = 1, 2, 3, 4, 5) to choose. The experts select four attributes to evaluate the WSN security of these computer network systems: ① J1 represents tactics; ② J2 means technology; ③ J3 represents economy; ④ J4 means the logistics and strategy. Several computer network systems shall be depicted with FNIFNs by the DMs on the strength of 4 criterions (whose weighting vector ξ = (0.25, 0.20, 0.15, 0.40)), the FNIFN decision matrix as depicted in Table 1.
The FNIFN DM
The FNIFN DM
Then, the FNIFWDMSM operator is used to deal with WSN security evaluation with FNIFNs.
The coalesced values by the FNIFWMSM operators
In this section, we will compare the technology depicted with other technologies, and the conclusions are shown as Table 6.
The SF of the computer network systems
The SF of the computer network systems
Order of the computer network systems
Ranking results for different parameters of the FNIFWMSM operator
Comparative analysis
From above analysis, Compared the result of the proposed FNIFWGMSM operator with FNIFWA and FNIFWG formulas, these schemes rank a little differently and the optimal alternative is not different. The FNIFWA and FNIFWG formulas, don’t consider the relationship between given arguments, which can’t correctly estimate the effect of different values of n arguments on the end results. The FNIFWGMSM formula could perfectly consider the relationship between different values of n being fused.
With the development of science and technology, performance of sensors has been greatly improved. Wireless sensor networks have a wide range of applications in the fields of smart grid, intelligent transportation, aerospace and so on. However, wireless sensor networks are more vulnerable to malicious cyber-attacks and more frangible in security due to the intrinsic interconnections among the sensors. Therefore, ensuring the security of wireless sensor networks is more important and urgent than ever. At present, three categories of cyber-attacks are commonly investigated: denial-of-service attacks, false data injection attacks and replay attacks. In this paper, we study the MADM issues with FNIFNs. and utilize the GMSM formula to build several GMSM fused formulas with FNIFNs: FNIFGMSM operator and FNIFWGMSM operator. The characteristic of these two operators is also deliberated. The FNIFWGMSM formula is utilized to cope with the MADM issues with FNIFNs. Finally, taking WSN security evaluation as an example, this paper illustrates effectiveness of the depicted approach. Moreover, by comparing and analyzing the existing methods, the effectiveness and superiority of the FNIFWGMSM method are further certified. In our future research, the proposed methods and algorithms will be needful and meaningful to apply to work out other real decision making problems [54–59] and the developed approaches can also be extended to other unpredictable and uncertain information [60–68].
Footnotes
Acknowledgments
This work was supported by Characteristic innovation projects in Guangdong Province (2019GKTSCX037).
