Bimonthly    Since 1986
ISSN 1004-9037
Publication Details
Edited by: Editorial Board of Journal of Data Acquisition and Processing
P.O. Box 2704, Beijing 100190, P.R. China
Sponsored by: Institute of Computing Technology, CAS & China Computer Federation
Undertaken by: Institute of Computing Technology, CAS
Published by: SCIENCE PRESS, BEIJING, CHINA
Distributed by:
China: All Local Post Offices
 
   
      1 Jan 2023, Volume 38 Issue 1   
    Article

    1. ENHANCED SECURITY AGAINST INTRUDER BASED ON BAFFLEMENT TECHNIQUE FOR WIRELESS SENSOR NETWORK USING TRACKING NODE WITH SCRUTINY ALGORITHM
    S Sowndeswari, E.Kavitha
    Journal of Data Acquisition and Processing, 2023, 38 (1): 1878-1899 . 

    Abstract

    Wireless Sensor Networks (WSN) provides extra vulnerabilities to overflow observer intruders because of the revealed pattern of authority overloading via the leader node. Studying packet overflow for an attack requires skill. Aim/objective: The main challenge is to find a correlation between the cost of energy used, packet forwarding reliability, and the sensor network's level of protection. In this collective, previous methods focused mostly on cryptographic algorithms to achieve better packet security; however, this only shows a detachment of the safeguard matter of fact based on a mixture of operational network security and an energy-aware messaging platform that gives the same level of security. Still, it uses more energy during the route discovery process. Methodology: This research demonstrates how a method called "Enhanced Security Against Intruder Based on Bafflement" (ESAIB) can use to make rank-based route changes safer. It depends on how the routes overlap, how much energy they use, how much the links cost, and how safe the nodes are. After which, the k-anonymity model says that monitoring nodes with the scrutiny algorithm can choose several intruder receiver nodes that look exactly like real target nodes. Ultimately, the best routes and selected items are chosen, and a higher risk level is reached without sacrificing energy efficiency. Findings: The simulation results show that this method can effectively stop traffic monitoring attacks and hide the network topology for software-defined WSNs. Also, the proposed approaches can make attacks less likely to work while using less energy and making the network last longer. It needs to use the least energy and time from beginning to end. It makes it easier to find things, lasts longer, delivers more packets, and makes the network safer.

    Keyword

    Wireless Sensor Networks, energy-aware communication, Enhanced Security against intruders based on the Bafflement technique, scrutiny algorithm, k-anonymity model, security management intrusion detection.


    PDF Download (click here)

SCImago Journal & Country Rank

ISSN 1004-9037

         

Home
Editorial Board
Author Guidelines
Subscription
Journal of Data Acquisition and Processing
Institute of Computing Technology, Chinese Academy of Sciences
P.O. Box 2704, Beijing 100190 P.R. China
E-mail: info@sjcjycl.cn
 
  Copyright ©2015 JCST, All Rights Reserved