Wireless sensor networks (WSNs) have been vastly employed in the collection and transmission of data via wireless networks. This type of network is nowadays used in many applications for surveillance activities in various environments due to its low cost and easy communications. In these networks, the sensors use a limited power source which after its depletion, since it is nonrenewable, network lifetime ends. Due to the weaknesses in sensor nodes, they are vulnerable to many threats. One notable attack threating WSN is Denial of Sleep (DoS). DoS attacks denotes the loss of energy in these sensors by keeping the nodes from going into sleep and energy-saving mode. In this paper, the Abnormal Sensor Detection Accuracy (ASDA-RSA) method is utilized to counteract DoS attacks to reducing the amount of energy consumed. The ASDA-RSA schema in this paper consists of two phases to enhancement security in the WSNs. In the first phase, a clustering approach based on energy and distance is used to select the proper cluster head and in the second phase, the RSA cryptography algorithm and interlock protocol are used here along with an authentication method, to prevent DoS attacks. Moreover, ASDA-RSA method is evaluated here via extensive simulations carried out in NS-2. The simulation results indicate that the WSN network performance metrics are improved in terms of average throughput, Packet Delivery Ratio (PDR), network lifetime, detection ratio, and average residual energy. KEYWORDSASDA-RSA, denial of sleep attack, network lifetime, RSA cryptography, WSNs | INTRODUCTIONNetworks constructed with multiple sensors enables novel applications covering a wide range of areas. However, it is well-known that networks forming from a range of sensors are prone to factors threatening their security. [1][2][3][4] Security is a main research topic in wireless sensor networks (WSNs). The widespread application of WSNs in security sensitive environment, such as military environment, made security considerations a basic requirement. Since nodes are the routing medium in the network, attacking the nodes eradicate the network. As routing is a trust-based operation among the nodes, there exists a good opportunity for attackers to disorder the routing process. These networks are usually formed without pre-planning and are utilized for a short period; hence, security investigations in
Wireless Sensor Networks (WSN) contain numerous nodes that their main goals are to monitor and control environments. Also, sensor nodes distribute based on network usage. One of the most significant issues in this type of network is the energy consumption of sensor nodes. In fixed-sink networks, nodes which are near the sink act as an interface to transfer data of other nodes to sink. This causes the energy consumption of sensors reduces rapidly. Therefore, the lifetime of the network declines. Sensor nodes owing to their weaknesses are susceptible to several threats, one of which is Denial of Sleep Attack (DoSA) threating WSN. Hence, the DoSA attack refers to the energy loss in these nodes by maintaining the nodes from entering energy-saving and sleep mode. In this paper, a hybrid approach is proposed based on mobile sink, firefly algorithm based on leach, and Hopefield Neural Network (WSN-FAHN). Thus, mobile sink is applied to both improve energy consumption and increase network lifetime. Firefly algorithm is proposed to cluster nodes and authenticate in two levels to prevent from DoSA. In addition, Hopefield Neural Network detects the direction route of the sink movement to send data of CH. Furthermore, here WSN-FAHN technique is assessed through wide simulations performed in the NS-2 environment. The WSN-FAHN procedure superiority is demonstrated by simulation outcomes in comparison with contemporary schemes based on performance metrics like Packet Delivery Ratio (PDR), average throughput, detection ratio, and network lifetime while decreasing the average residual energy.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.