Cdma Based Security for Warm-hole Attacks in Underwater Wireless Sensor Network System
نویسندگان
چکیده
Regular activity of the human is being extended to marine and sub-marine regions. Invention of war activity and marine research on minerals and bio-diversity is leading to install wireless sensor devices in deep underwater system. The underwater sensors and network areas are applied through a number of applications like research, water games, self-defense against enmity, finding of minerals and study of the effect of soil erosion, bio-diversity, and greenhouse effect. Marine weather is having a strong impact on the transmission system. Marine weather imposes highly corrosion, multipath fading, high delay, limiting bandwidth, multi-path fading on the transmission system. Worm-hole is one of the multi paths fading error in underwater sensor technology. A wormhole is caused by the mirror image effect of transmission system from one device to another device. Wormhole causing serious problem like fading of important data, adverse effect on the neighbor devices present in underwater system, illegal data transmission and using valuable bandwidth. To avoid the warm hole effect on under water network system this method proposes a CDMA based transmission which is having a numbering system for every device present in the network, every node is having a controller which can detect it through calculation method. This technique is an efficient error detecting technique without any overload of extra hardware device and complex protocol.
منابع مشابه
A Secure Routing Algorithm for Underwater Wireless Sensor Networks
Recently, underwater Wireless Sensor Networks (UWSNs) attracted the interest of many researchers and the past three decades have held the rapid progress of underwater acoustic communication. One of the major problems in UWSNs is how to transfer data from the mobile node to the base stations and choosing the optimized route for data transmission. Secure routing in UWSNs is necessary for packet d...
متن کاملSecurity Analysis of Lightweight Authentication Scheme with Key Agreement using Wireless Sensor Network for Agricultural Monitoring System
Wireless sensor networks have many applications in the real world and have been developed in various environments. But the limitations of these networks, including the limitations on the energy and processing power of the sensors, have posed many challenges to researchers. One of the major challenges is the security of these networks, and in particular the issue of authentication in the wireles...
متن کاملA Lightweight Intrusion Detection System Based on Specifications to Improve Security in Wireless Sensor Networks
Due to the prevalence of Wireless Sensor Networks (WSNs) in the many mission-critical applications such as military areas, security has been considered as one of the essential parameters in Quality of Service (QoS), and Intrusion Detection System (IDS) is considered as a fundamental requirement for security in these networks. This paper presents a lightweight Intrusion Detection System to prote...
متن کاملToward an energy efficient PKC-based key management system for wireless sensor networks
Due to wireless nature and hostile environment, providing of security is a critical and vital task in wireless sensor networks (WSNs). It is known that key management is an integral part of a secure network. Unfortunately, in most of the previous methods, security is compromised in favor of reducing energy consumption. Consequently, they lack perfect resilience and are not fit for applications ...
متن کاملEvaluation of an Intrusion Detection System for Routing Attacks in Wireless Self-organised Networks
Wireless Sensor Networks (WSNs) arebecoming increasingly popular, and very useful in militaryapplications and environmental monitoring. However,security is a major challenge for WSNs because they areusually setup in unprotected environments. Our goal in thisstudy is to simulate an Intrusion Detection System (IDS)that monitors the WSN and report intrusions accurately andeffectively. We have thus...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2014