|
05 July 2023, Volume 38 Issue 3
|
|
|
Abstract
A few of the many uses for wireless sensor networks (WSNs) include the military, the medical industry, the monitoring of the ocean and animals, the functioning of manufacturing machinery, the safety of structures, and even the detection of earthquakes. WSNs are more prone to intrusion than wired networks because of their complexity and upkeep requirements. Each node has a limited number of resources it can use, including electricity, random access memory (RAM), and a central processing unit (CPU). Developing a quick and dependable security protocol is crucial to thwarting attacks on WSNs, particularly Denial-of-Service (DoS) attacks. However, suppose an attacker sends many phone signals or retransmits signals that have already been sent. In that case, they may be able to take control of some sensors and launch a DoS assault. If it were severed by a DoS attack, whether purposefully or unintentionally, the quantity of bandwidth available for wireless communications would be significantly decreased. The network is hampered by this, which increases the likelihood of a crash. The procedures described, including message observation and shared key authentication, enable the cluster head (CH) and other sensor nodes in the network to now assess whether the communicating node is an attacker node or not. This method enables the quick identification and mitigation of the source of DoS attacks.
Keyword
Cluster Head (CH), Denial of Service (DoS), Wireless Sensor Network (WSN), Sensor Network (SN), One-Way Hash Chain
PDF Download (click here)
|