ABSTRACT
In real world scenario, the viability of the sensor networks has proved by standardizing the technologies. Wireless sensor networks are vulnerable to both electronic and physical security breaches, because of their deployment in remote, distributed, inaccessible locations. The compromised sensor nodes send malicious data to the base station, thus the total network effectiveness will possibly be compromised. To detect and seclude the Route modifiers, a neural network based Pattern Synthesis Process (PSP) is proposed. This algorithm senses data at any node on present and previous patterns obtained from the en-route nodes. The eminence of any node is upgraded by their predicted and reported patterns. This paper propounds a solution not only to detect the route modifiers and also to seclude the malevolent nodes from the network. The Simulation result proves the effective performance of the network by the proposed methodology in terms of energy level, routing and various network conditions.
- Kyoungsoo Bok.l, Yunjeong Lee, Junho Park and Jaesoo yoo, " An Energy- Efficient Secure scheme in Wireless Sensor Networks", Hindawi, Journal of Sensors, Article ID 1321079, 11 pages, Volume 2016.Google Scholar
- C. Zhu, L. Shu, T.Hara, L.Wang, s.Nishiq and L.T.Yang, " A Survey on Communication and Data Management issues in Mobile Sensor Networks", Wireless Communications and Mobile Computing, Vol. 14, No.1, pp 19--36, 2014. Google ScholarCross Ref
- Tao Li; Pingyi Fan; Zhengchuan Chen; Khaled Ben Letaief,"Optimum Transmission Policies for Energy Harvesting Sensor Networks Powered by a Mobile Control Center ", IEEE Transactions on Wireless Communications, Volume: 15, Issue: 9 Pages: 6132--6145, 2016. Google ScholarDigital Library
- C.N Vanitha, M Usha," An Improved Version of Data filtration using Enhanced Routing Control Protocol in Wireless Sensor Networks", International journal of Applied Engineering and Research, Volume 10, Issue No. 46, pp. 32036--32043, 2015.Google Scholar
- M. Usha, C. N. Vanitha," Pruning Route Modifiers in Wireless Sensor Networks", Springer, Wireless Personal Communications, Volume 89, Issue 1, pp 27--43, July 2016. Google ScholarDigital Library
- P.Annadurai, S.Vijayalakshmi, "Identifying malicious node using trust value in cluster based MANET (IMTVCM), IEEE, International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT), 2014.Google Scholar
- Nirav J.Patel, Rutvij H. Jhaveri, "Detecting packet dropping nodes using machine learning techniques in Mobile ad-hoc network: A survey", IEEE International Conference on Signal Processing And Communication Engineering Systems (SPACES), 2015. Google ScholarCross Ref
- Jheena Rathore, Venkataramana Badarla, Supratim shit "Consensus- Aware Sociopsychological Trust model for wireless sensor networks", ACM Transactions on sensor networks(TOSN), Volume 12, Issue 3, August 2016.Google Scholar
- Kyung-Ah Shim,"A Survey of Public-Key Cryptographic Primitives in Wireless Sensor Networks", IEEE Communications Surveys & Tutorials, Volume: 18, Issue: 1, 2016.Google ScholarCross Ref
- J. Sengathir, R. Manoharan, "Selfish Conscious Mathematical Model based on Reliable Conditional Survivability Co-efficient in MANET Routing", Elsevier, 2013.Google Scholar
- Eliminating Route Modifiers by Pattern Synthesis Process in Wireless Sensor Networks
Recommendations
Group-based key predistribution for wireless sensor networks
Many key predistribution techniques have been developed recently to establish pairwise keys between sensor nodes in wireless sensor networks. To further improve these schemes, researchers have also proposed to take advantage of the sensors' expected ...
Location-aware key establishment in wireless sensor networks
IWCMC '06: Proceedings of the 2006 international conference on Wireless communications and mobile computingDue to its efficiency, symmetric key cryptography is very attractive in sensor networks. A number of pairwise key pre-distribution protocols have been proposed, but the scalability is often constrained by the conflict between the desired probability of ...
Secure Coverage Tree Construction Scheme for Wireless Sensor Networks
In wireless sensor networks, nodes usually construct tree structure in any monitored area to enable data aggregation and to transmit aggregated data by multi-hopping through neighbors to a remote sink (BS) which results in significant energy savings. ...
Comments