Improving Adhoc wireless sensor networks security using distributed automaton

被引:5
|
作者
Venkatraman, S. [1 ]
Kumar, P. Arun Raj [1 ]
机构
[1] Natl Inst Technol Puducherry, CSE Dept, Karaikal, Puducherry, India
来源
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS | 2019年 / 22卷 / Suppl 6期
关键词
Cluster behavior; Control mechanism; Distributed automaton; Malicious behaviour detection; State space model; CHALLENGES; ATTACKS;
D O I
10.1007/s10586-018-2352-3
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Wireless Sensor Network due to their Adhoc nature have emerged as a popular technology driving the growth of Internet of Things and Cyber Physical Systems. Wireless Sensor Networks due to their self-configuring nature are more vulnerable to attacks at all layers of the OSI model. Malicious attacks include packet drops, change in the data structure and mimicking other devices to destabilize the network. This work proposed an Intelligent Control Mechanism to secure WSN based on the principles of Distributed Automaton. Simulations carried out show the effectiveness of the proposed technique in not only improving the network performance but also reduction in time space complexities. The proposed techniques performs well even in heterogenous network by using the clustered behavior.
引用
收藏
页码:14551 / 14557
页数:7
相关论文
共 50 条
  • [21] Security for Wireless Sensor Networks
    Wang, Yilin
    Qin, Maosheng
    INTERNATIONAL CONFERENCE ON CONTROL, AUTOMATION AND SYSTEMS (ICCAS 2010), 2010, : 844 - 848
  • [22] Security in Wireless Sensor Networks
    Obaidat, Mohammed S.
    Nicopolitidis, Petros
    Li, Jung-Shian
    SECURITY AND COMMUNICATION NETWORKS, 2009, 2 (02) : 101 - 103
  • [23] Security in wireless sensor networks
    Giruka, Venkata C.
    Singhal, Mukesh
    Royalty, James
    Varanasi, Srilekha
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2008, 8 (01): : 1 - 24
  • [24] On the security of wireless sensor networks
    Roman, R
    Zhou, JY
    Lopez, J
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2005, PT 3, 2005, 3482 : 681 - 690
  • [25] Security in Wireless Sensor Networks
    Aranzazu Suescun, Catalina
    SISTEMAS & TELEMATICA, 2009, 7 (13): : 43 - 73
  • [26] Security in wireless sensor networks
    Du, Xiaojiang
    Chen, Hsiao-Hwa
    IEEE WIRELESS COMMUNICATIONS, 2008, 15 (04) : 60 - 66
  • [27] Security in wireless sensor networks
    Perrig, A
    Stankovic, J
    Wagner, D
    COMMUNICATIONS OF THE ACM, 2004, 47 (06) : 53 - 57
  • [28] Applications of Wireless Adhoc and Sensor Networks (AWASN2021)
    Sakai, Kazuya
    ACM International Conference Proceeding Series, 2021,
  • [29] Using a distributed snapshot algorithm in wireless sensor networks
    da Silva, APR
    Teixeira, FA
    Lage, RKV
    Ruiz, LB
    Loureiro, AAF
    Nogueira, JMS
    NINTH IEEE WORKSHOP ON FUTURE TRENDS OF DISTRIBUTED COMPUTING SYSTEMS, PROCEEDINGS, 2003, : 31 - 37
  • [30] Distributed detection in wireless sensor networks using dynamic sensor thresholds
    Ray, Priyadip
    Varshney, Pramod K.
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2008, 4 (01) : 5 - 12