Open Access
Subscription Access
Effective Clustering and Certificateless Encryption Techniques in the Military Domain for Attack Detection
Subscribe/Renew Journal
The goal of a wireless sensor network (WSN) is to connect numerous nodes via a multi-hop self-organizing network. A variety of sensor nodes are arranged and positioned in relation to other nodes to provide safe data exchange. Sensor nodes watch as a sink node processes the data. The network includes a variety of assaults, including floods, wormhole, black hole, sinkhole, and so on. One of the most challenging tasks in WSN is secure routing because of the existence of attacks. The technology of attack detection is employed to identify attacks and enhances the security of data transmission. It provides a way to ignore network threats, enabling secure communication. Most recent efforts have been focused on implementing secure data communication in wireless sensor networks. However, the more accurate detection attack was not achieved. Numerous intrusion attackers are available to compromise network data packet communication. To provide better data distribution amongst soldiers in a combat environment, this wireless network invader node needs to be identified. Hence, in a WSN context, data transmission with a military scenario entails armed men engaged in combat, such as fighter aircraft, tankers, and shot ships. Finding intrusion attackers is a difficult task, especially in the highly dynamic military wireless sensor network. Therefore, different techniques are developed in WSN for achieving attack detection accuracy with minimal delay and maximum data delivery rate.
Keywords
WSN, Secure Routing, Black Hole Attack Detection, Floods, Sink Hole Wormhole, Certificateless Signcryption Secure Communication
Subscription
Login to verify subscription
User
Font Size
Information
Abstract Views: 45