Open Access
Subscription Access
Open Access
Subscription Access
Energy Efficient Based Secure Data Transmission For Multi Hop Trust Management Technique Using Wireless Sensor Network
Subscribe/Renew Journal
Secure data transfer is intended to keep data safe from illegal access, damage, or disruption. In this proposed technique, an intrusion prevention system is built to counter the rapidly growing threats offered by the current generation of malware, software, and exploits. As the number of intruders has grown, the network environment has become more complicated, making threat mitigation more difficult. Modern wireless sensor networks have emerged for the aim of transmitting important information and services to an ever-growing set of users. Security is the most important issues in wireless network. Using this proposed Multi Hop Trust Management (MHTM) approach; trust management technique is used to identify the trusted nodes with malicious node. Then secured and efficient way of data transmission are directed and communicated to any kind of networks re confirmed here. The result attained shows MHTM technique attains better performance than TSRP in stipulations of energy efficiency, data transmission delay, communication overhead, throughput, malicious sensor device misclassification rate and identification.
Keywords
Wireless Sensor Network, Cluster Heads (CH), Cluster Member (CM), Malicious Nodes Identification (MNI) and Security.
Subscription
Login to verify subscription
User
Font Size
Information
- S. Rizwana, K.M. Gayathri and N. Thangadurai, “Intrusion Detection Algorithm for Packet Loss Minimization in Wireless Sensor Networks”, International Journal of Engineering and Advanced Technology, Vol. 8, No. 6, pp. 69-74, 2019.
- T. Karthikeyan and K. Praghash, “Improved Authentication in Secured Multicast Wireless Sensor Network (MWSN) using Opposition Frog Leaping Algorithm to Resist Man-inMiddle Attack”, Wireless Personal Communications, Vol. 113, pp. 1-17, 2021.
- T. Karthikeyan and K. Praghash, “Data Privacy Preservation and Trade-off Balance Between Privacy and Utility Using Deep Adaptive Clustering and Elliptic Curve Digital Signature Algorithm”, Wireless Personal Communications, Vol. 116, pp. 1-16, 2021.
- R. Manikandan and M. Ramkumar, “Design of Autonomous Production using Deep Neural Network for Complex Job”, Materials Today: Proceedings, Vol. 4, pp. 1-12, 2021.
- Huangshui Hu, Youjia Han, Hongzhi Wang, Meiqin Yao and Chuhang Wang “Trust-Aware Secure Routing Protocol for Wireless Sensor Networks”, ETRI Journals, Vol. 20, No. 1, pp. 674-683, 2021.
- Iman Almomani, Bassam Al-Kasasbeh and Mousa ALAkhras, “WSN-DS: A Dataset for Intrusion Detection Systems in Wireless Sensor Networks”, Journal of Sensors, Vol. 2016, pp. 1-16, 2016.
- Rupinder Singh, Jatinder Singh and Ravinder Singh “Fuzzy Based Advanced Hybrid Intrusion Detection System to Detect Malicious Nodes in Wireless Sensor Networks”, Wireless Communications and Mobile Computing, Vol. 2017, pp. 1-15, 2017.
- Syed Muhammad Sajjada, Safdar Hussain Boukb and Muhammad Yousafa, “Neighbor Node Trust Based Intrusion Detection System for WSN”, Proceedings of International Conference on Emerging Ubiquitous Systems and Pervasive Networks, pp. 183-188, 2015.
- Umashankar Ghugar, Jayaram Pradhan, Sourav Kumar Bhoi and Rashmi Ranjan Sahoo, “LB-IDS: Securing Wireless Sensor Network using Protocol Layer Trust-Based Intrusion Detection System”, Journal of Computer Networks and Communications, Vol. 2019, pp. 1-14, 2019.
- Gonugunta Tulasi and R. Suresh, “Secure Data Transmission in Wireless Sensor Networks: Against Packet Dropping Attacks”, International Research Journal of Engineering and Technology, Vol.3, No. 7, pp. 2386-2389, 2016.
- Sushant Kumar Pandey “An Anomaly Detection TechniqueBased Intrusion Detection System for Wireless Sensor Network”, International Journal on Wireless and Mobile Computing, Vol. 1, No. 4, pp. 323-333, 2019.
- Zhang Huanan, Xing Suping and Wang Jiannan, “Security and Application of Wireless Sensor Network”, Proceedings of International Conference of Information and Communication Technology, pp. 486-492, 2021.
- Xinying Yu, Fengyin Li, Tao Li, Nan Wu, Hua Wang and Huiyu Zhou, “Trust‑Based Secure Directed Diffusion Routing protocol in WSN”, Journal of Ambient Intelligence and Humanized Computing, Vol. 43, pp. 1-13, 2020.
- Hanane Kalkha, Hassan Satori and Khalid Satori, “Preventing Black Hole Attack in Wireless Sensor Network using HMM”, Proceedings of International Conference of Intelligent Computing in Data Sciences, pp. 1-12, 2018.
- Parmar Amisha and V.B. Vaghela, “Detection and Prevention of Wormhole Attack in Wireless Sensor Network using AOMDV Protocol”, Proceedings of International Conference on Communication, Computing and Virtualization, pp. 1-8, 2016.
- Reem Alattas, “Detecting Black-Hole Attacks in WSNs using Multiple Base Stations and Check Agents”, Proceedings of International Conference on Future Technologies, pp. 1020-1024, 2016.
- Mohammad Wazid, Avita Katal, Roshan Singh Sachan, R.H. Goudar and D.P. Singh “Detection and Prevention Mechanism for Blackhole Attack in Wireless Sensor Network”, Proceedings of International conference on Communication and Signal Processing, pp. 576-581, 2013.
- Jitendra Kurmi, Ram Singar Verma and Sarita Soni, “An Efficient and Reliable Methodology for Wormhole Attack Detection in Wireless Sensor Network”, Advances in Computational Sciences and Technology, Vol. 10, No. 5, pp. 1129-1138, 2017.
Abstract Views: 189
PDF Views: 0