A multi-path secure routing for the detection of node capturing attack in wireless sensor network
Annotation
Over the past few years, the devices in Wireless Sensor Networks (WSN) are growing exponentially due to the emergence of many sophisticated applications. This tremendous growth leads to serious security challenges, and the devices of WSN should be protected from various attacks. WSN can be configured dynamically without fixed infrastructure and the devices can be talked with one another in an ad-hoc manner. Due to the dynamic nature of WSN, routing is considered as the challenging task that should be performed efficiently with robust routing mechanism. Even though many routing schemes have been emerged for WSN, they are not well scalable in very large-scale environment. This work introduces multi path routing strategy, and the routing will be selected based on trusted nodes. First, the trusted nodes are identified using trusted metrics of each node in the network. These metrics are calculated based on the threshold value of nodes. Then, secure routing is established by isolating node capturing attacks from the path. The performance of the work is analyzed in terms of packet loss, computational time and throughput. The paper compares the performance with the state-of-the-art routing schemes such as EMBTR (Enhanced Multi Attribute Based Attack Resistance), TSRM (Trust based secure routing model), and TARF (Trust-aware routing framework for WSNs). The outcome of the simulation shows that the proposed scheme outperforms the other state-of-the-work in terms of computational cost, throughput, and delay.
Keywords
Постоянный URL
Articles in current issue
- Pulse recording of dynamic holograms in bismuth silicate crystal in a broad wavelength range
- Hybrid endoscope with television and multispectral image processing for the internal organs cancer early diagnostics
- Modelling of a composite waveguide holographic display
- Application of infrared spectroscopy methods in studying compositions for paper sizing
- Distribution optimization method of pixel density by surveillance area
- Evaluation and development of a method for compensating the positioning error of computer numeric control equipment
- Compensation of output external disturbances for a class of linear systems with control delay
- Luminescence technique for studying the growth of AgInS2 quantum dots
- Peculiarities of pulsed laser deposition of thin InGaAsN films in an active background gas atmosphere
- Determination of the electron distribution in thin barrier AlGaAs/GaAs superlattices by capacitance-voltage profiling
- Spectral and kinetic properties of silver sulfide quantum dots in an external electric field
- Influence of nano-sized horizontal inhomogeneities on surface profiling by means of XPS
- Organic light-emitting diodes with new dyes based on coumarin
- Fabrication and characterization of hybrid composite of Al6082/SiC/rice husk powder using friction stir processing
- A method for documenting architectural solutions of computing platforms
- Improving out of vocabulary words recognition accuracy for an end-to-end Russian speech recognition system
- Method for monitoring the state of elements of cyber-physical systems based on time series analysis
- Application of the text wave model to the sentiment analysis problem
- Automated evaluation of ECG parameters during the COVID-19 pandemic
- Multi-agent adaptive routing by multi-headattention-based twin agents using reinforcement learning
- Joint learning of agents and graph embeddings in a conveyor belt control problem
- Simulation of radiative transfer in gas-liquid foams
- The effect of signal-to-noise ratio value on the error in measuring acoustic emission parameters: statistical assessment
- Simulating the process of steady-state thermoreflectance for measuring the thermal conductivity of materials
- Modeling and simulation ofone- and two-row six-bladed ducted fans
- Differential-difference model of heat transfer in solids using the method of parametric identification