Open Access Open Access  Restricted Access Subscription Access

Effective Clustering and Certificateless Encryption Techniques in the Military Domain for Attack Detection


Affiliations
1 Department of Computer Science and Engineering, Sri Ramakrishna Institute of Technology, India
2 Department of Management Studies, Anna University Regional Campus, Coimbatore, India
3 Department of Information Technology, Sri Ramakrishna Engineering College, India

   Subscribe/Renew Journal


The goal of a wireless sensor network (WSN) is to connect numerous nodes via a multi-hop self-organizing network. A variety of sensor nodes are arranged and positioned in relation to other nodes to provide safe data exchange. Sensor nodes watch as a sink node processes the data. The network includes a variety of assaults, including floods, wormhole, black hole, sinkhole, and so on. One of the most challenging tasks in WSN is secure routing because of the existence of attacks. The technology of attack detection is employed to identify attacks and enhances the security of data transmission. It provides a way to ignore network threats, enabling secure communication. Most recent efforts have been focused on implementing secure data communication in wireless sensor networks. However, the more accurate detection attack was not achieved. Numerous intrusion attackers are available to compromise network data packet communication. To provide better data distribution amongst soldiers in a combat environment, this wireless network invader node needs to be identified. Hence, in a WSN context, data transmission with a military scenario entails armed men engaged in combat, such as fighter aircraft, tankers, and shot ships. Finding intrusion attackers is a difficult task, especially in the highly dynamic military wireless sensor network. Therefore, different techniques are developed in WSN for achieving attack detection accuracy with minimal delay and maximum data delivery rate.

Keywords

WSN, Secure Routing, Black Hole Attack Detection, Floods, Sink Hole Wormhole, Certificateless Signcryption Secure Communication
Subscription Login to verify subscription
User
Notifications
Font Size

Abstract Views: 22




  • Effective Clustering and Certificateless Encryption Techniques in the Military Domain for Attack Detection

Abstract Views: 22  | 

Authors

S. Rajesh
Department of Computer Science and Engineering, Sri Ramakrishna Institute of Technology, India
M.S. Premapriya
Department of Management Studies, Anna University Regional Campus, Coimbatore, India
A. Jayasmruthi
Department of Computer Science and Engineering, Sri Ramakrishna Institute of Technology, India
V. Muthu Lakshmi
Department of Information Technology, Sri Ramakrishna Engineering College, India

Abstract


The goal of a wireless sensor network (WSN) is to connect numerous nodes via a multi-hop self-organizing network. A variety of sensor nodes are arranged and positioned in relation to other nodes to provide safe data exchange. Sensor nodes watch as a sink node processes the data. The network includes a variety of assaults, including floods, wormhole, black hole, sinkhole, and so on. One of the most challenging tasks in WSN is secure routing because of the existence of attacks. The technology of attack detection is employed to identify attacks and enhances the security of data transmission. It provides a way to ignore network threats, enabling secure communication. Most recent efforts have been focused on implementing secure data communication in wireless sensor networks. However, the more accurate detection attack was not achieved. Numerous intrusion attackers are available to compromise network data packet communication. To provide better data distribution amongst soldiers in a combat environment, this wireless network invader node needs to be identified. Hence, in a WSN context, data transmission with a military scenario entails armed men engaged in combat, such as fighter aircraft, tankers, and shot ships. Finding intrusion attackers is a difficult task, especially in the highly dynamic military wireless sensor network. Therefore, different techniques are developed in WSN for achieving attack detection accuracy with minimal delay and maximum data delivery rate.

Keywords


WSN, Secure Routing, Black Hole Attack Detection, Floods, Sink Hole Wormhole, Certificateless Signcryption Secure Communication