Enhanced Security with Improved Defensive Routing Mechanism in Wireless Sensor Networks
نویسندگان
چکیده
In recent scenario of Wireless Sensor Networks (WSNs), there are many application developed for handling sensitive and private data such as military information, surveillance data, tracking, etc. Hence, the sensor nodes WSNs distributed in an intimidating region, which is non-rigid to attacks. The research domains WSN deal with models handle communications against malicious attacks threats. traditional models, solution has been made defending networks, only specific However, real-time applications, kind attack that launched by adversary not known. Additionally, on developing a security mechanism WSN, resource constraints also be considered. With note, this paper presents Enhanced Security Model Improved Defensive Routing Mechanism (IDRM) network from various Moreover, efficient model design, work includes part feature evaluation some general WSNs. IDRM determination optimal secure paths Node routing operations. performance proposed evaluated respect several factors; it found achieved better levels than other existing communications. It proven produces 74% PDR average minimized packet drop 38% when comparing works.
منابع مشابه
A Secure Routing Algorithm for Underwater Wireless Sensor Networks
Recently, underwater Wireless Sensor Networks (UWSNs) attracted the interest of many researchers and the past three decades have held the rapid progress of underwater acoustic communication. One of the major problems in UWSNs is how to transfer data from the mobile node to the base stations and choosing the optimized route for data transmission. Secure routing in UWSNs is necessary for packet d...
متن کاملRouting Hole Handling Techniques for Wireless Sensor Networks: A Review
A Wireless Sensor Network consists of several tiny devices which have the capability to sense and compute the environmental phenomenon. These sensor nodes are deployed in remote areas without any physical protections. A Wireless Sensor Network can have various types of anomalies due to some random deployment of nodes, obstruction and physical destructions. These anomalies can diminish the sensi...
متن کاملEnhanced Security in Wireless Sensor Networks
Increased demand for Wireless Sensor Networks(WSNs) in fields such as the military, ecological survey and health related areas which deals with sensitive information has imposed the overhead of security in such networks. Attacks on wireless sensor networks have justified the importance of security in this field. Constraints on memory, computation, energy and transmission range associated with W...
متن کاملWireless Networks Security Using Dispersive Routing Mechanism
Attacks in wireless sensor networks are Compromised-node and denial-of-service (DOS). In the Compromised-node attack (CN attack); an adversary physically compromises a subset of nodes to eavesdrop information, whereas in the denial-of-service attack, the adversary interferes with the normal operation of the network by actively disrupting, changing, or even paralyzing the functionality of a subs...
متن کاملSecurity Topology in Wireless Sensor Networks with Routing Optimization
Multiple sensor nodes deployed in a common neighborhood to sense an event and subsequently transmit sensed information to a remote processing unit or base station, has been the recent focus of research. Tiny sensor nodes, which consist of sensing, data processing, and communicating components, leverage the idea of sensor networks based on collaborative effort of a large number of nodes. These n...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Computer systems science and engineering
سال: 2023
ISSN: ['0267-6192']
DOI: https://doi.org/10.32604/csse.2023.026465