skip to main content
10.1145/3017971.3017989acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiccnsConference Proceedingsconference-collections
research-article

Eliminating Route Modifiers by Pattern Synthesis Process in Wireless Sensor Networks

Authors Info & Claims
Published:26 November 2016Publication History

ABSTRACT

In real world scenario, the viability of the sensor networks has proved by standardizing the technologies. Wireless sensor networks are vulnerable to both electronic and physical security breaches, because of their deployment in remote, distributed, inaccessible locations. The compromised sensor nodes send malicious data to the base station, thus the total network effectiveness will possibly be compromised. To detect and seclude the Route modifiers, a neural network based Pattern Synthesis Process (PSP) is proposed. This algorithm senses data at any node on present and previous patterns obtained from the en-route nodes. The eminence of any node is upgraded by their predicted and reported patterns. This paper propounds a solution not only to detect the route modifiers and also to seclude the malevolent nodes from the network. The Simulation result proves the effective performance of the network by the proposed methodology in terms of energy level, routing and various network conditions.

References

  1. Kyoungsoo Bok.l, Yunjeong Lee, Junho Park and Jaesoo yoo, " An Energy- Efficient Secure scheme in Wireless Sensor Networks", Hindawi, Journal of Sensors, Article ID 1321079, 11 pages, Volume 2016.Google ScholarGoogle Scholar
  2. C. Zhu, L. Shu, T.Hara, L.Wang, s.Nishiq and L.T.Yang, " A Survey on Communication and Data Management issues in Mobile Sensor Networks", Wireless Communications and Mobile Computing, Vol. 14, No.1, pp 19--36, 2014. Google ScholarGoogle ScholarCross RefCross Ref
  3. Tao Li; Pingyi Fan; Zhengchuan Chen; Khaled Ben Letaief,"Optimum Transmission Policies for Energy Harvesting Sensor Networks Powered by a Mobile Control Center ", IEEE Transactions on Wireless Communications, Volume: 15, Issue: 9 Pages: 6132--6145, 2016. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. C.N Vanitha, M Usha," An Improved Version of Data filtration using Enhanced Routing Control Protocol in Wireless Sensor Networks", International journal of Applied Engineering and Research, Volume 10, Issue No. 46, pp. 32036--32043, 2015.Google ScholarGoogle Scholar
  5. M. Usha, C. N. Vanitha," Pruning Route Modifiers in Wireless Sensor Networks", Springer, Wireless Personal Communications, Volume 89, Issue 1, pp 27--43, July 2016. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. P.Annadurai, S.Vijayalakshmi, "Identifying malicious node using trust value in cluster based MANET (IMTVCM), IEEE, International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT), 2014.Google ScholarGoogle Scholar
  7. Nirav J.Patel, Rutvij H. Jhaveri, "Detecting packet dropping nodes using machine learning techniques in Mobile ad-hoc network: A survey", IEEE International Conference on Signal Processing And Communication Engineering Systems (SPACES), 2015. Google ScholarGoogle ScholarCross RefCross Ref
  8. Jheena Rathore, Venkataramana Badarla, Supratim shit "Consensus- Aware Sociopsychological Trust model for wireless sensor networks", ACM Transactions on sensor networks(TOSN), Volume 12, Issue 3, August 2016.Google ScholarGoogle Scholar
  9. Kyung-Ah Shim,"A Survey of Public-Key Cryptographic Primitives in Wireless Sensor Networks", IEEE Communications Surveys & Tutorials, Volume: 18, Issue: 1, 2016.Google ScholarGoogle ScholarCross RefCross Ref
  10. J. Sengathir, R. Manoharan, "Selfish Conscious Mathematical Model based on Reliable Conditional Survivability Co-efficient in MANET Routing", Elsevier, 2013.Google ScholarGoogle Scholar
  1. Eliminating Route Modifiers by Pattern Synthesis Process in Wireless Sensor Networks

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      ICCNS '16: Proceedings of the 6th International Conference on Communication and Network Security
      November 2016
      133 pages
      ISBN:9781450347839
      DOI:10.1145/3017971

      Copyright © 2016 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 26 November 2016

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed limited
    • Article Metrics

      • Downloads (Last 12 months)1
      • Downloads (Last 6 weeks)0

      Other Metrics

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader