Abstract
Wireless Sensor Networks (WSN) provides extra vulnerabilities to overflow observer intruders because of the revealed pattern of authority overloading via the leader node. Studying packet overflow for an attack requires skill.
Aim/objective: The main challenge is to find a correlation between the cost of energy used, packet forwarding reliability, and the sensor network's level of protection. In this collective, previous methods focused mostly on cryptographic algorithms to achieve better packet security; however, this only shows a detachment of the safeguard matter of fact based on a mixture of operational network security and an energy-aware messaging platform that gives the same level of security. Still, it uses more energy during the route discovery process.
Methodology: This research demonstrates how a method called "Enhanced Security Against Intruder Based on Bafflement" (ESAIB) can use to make rank-based route changes safer. It depends on how the routes overlap, how much energy they use, how much the links cost, and how safe the nodes are. After which, the k-anonymity model says that monitoring nodes with the scrutiny algorithm can choose several intruder receiver nodes that look exactly like real target nodes. Ultimately, the best routes and selected items are chosen, and a higher risk level is reached without sacrificing energy efficiency.
Findings: The simulation results show that this method can effectively stop traffic monitoring attacks and hide the network topology for software-defined WSNs. Also, the proposed approaches can make attacks less likely to work while using less energy and making the network last longer. It needs to use the least energy and time from beginning to end. It makes it easier to find things, lasts longer, delivers more packets, and makes the network safer.
Keyword
Wireless Sensor Networks, energy-aware communication, Enhanced Security against intruders based on the Bafflement technique, scrutiny algorithm, k-anonymity model, security management intrusion detection.
PDF Download (click here)
|