针对移动无线传感器网络中恶意传感器节点的高效入侵识别集群机制

D. Giji Kiruba, J. Benita, D. Rajesh
{"title":"针对移动无线传感器网络中恶意传感器节点的高效入侵识别集群机制","authors":"D. Giji Kiruba, J. Benita, D. Rajesh","doi":"10.51983/ijiss-2023.13.2.3793","DOIUrl":null,"url":null,"abstract":"A collection of wireless nodes that may be installed at any location and at any time without requiring an established network structure is called a mobile wireless sensor network. The problem of network performance arises from the mobility of nodes and their misbehaviour. Network performance is negatively impacted by data loss and sensor node misbehaviour. In certain cases, there are malicious sensor nodes that are designed to destroy the network’s capacity. This work aims to identify hostile nodes using an irregular set technique. The route entry table’s broadcasting metadata helps identify rogue nodes. Every sensor node in the network broadcasts information about adjacent nodes and maintains a sentry table. Premeditated data delivery proportion, throughput, delay, packet drop, and fault rate are used to estimate broadcasting record parameters. In the NS2 environment, mobile nodes with varying velocities are simulated. To generate an information table, mobile nodes with varying speeds are examined based on their broadcasting records. On the basis of guidelines taken from the irregular set tactic table, good and bad nodes are distinguished. Packets are disseminated along the shortest path that doesn’t contain any malicious nodes. The results of the proposed technique show that an irregular set tactic increases throughput, network capability, data delivery percentage, and end-to-end delay reduction in mobile sensors.","PeriodicalId":447091,"journal":{"name":"Indian Journal of Information Sources and Services","volume":"12 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2023-11-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A Proficient Obtrusion Recognition Clustered Mechanism for Malicious Sensor Nodes in a Mobile Wireless Sensor Network\",\"authors\":\"D. Giji Kiruba, J. Benita, D. Rajesh\",\"doi\":\"10.51983/ijiss-2023.13.2.3793\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"A collection of wireless nodes that may be installed at any location and at any time without requiring an established network structure is called a mobile wireless sensor network. The problem of network performance arises from the mobility of nodes and their misbehaviour. Network performance is negatively impacted by data loss and sensor node misbehaviour. In certain cases, there are malicious sensor nodes that are designed to destroy the network’s capacity. This work aims to identify hostile nodes using an irregular set technique. The route entry table’s broadcasting metadata helps identify rogue nodes. Every sensor node in the network broadcasts information about adjacent nodes and maintains a sentry table. Premeditated data delivery proportion, throughput, delay, packet drop, and fault rate are used to estimate broadcasting record parameters. In the NS2 environment, mobile nodes with varying velocities are simulated. To generate an information table, mobile nodes with varying speeds are examined based on their broadcasting records. On the basis of guidelines taken from the irregular set tactic table, good and bad nodes are distinguished. Packets are disseminated along the shortest path that doesn’t contain any malicious nodes. The results of the proposed technique show that an irregular set tactic increases throughput, network capability, data delivery percentage, and end-to-end delay reduction in mobile sensors.\",\"PeriodicalId\":447091,\"journal\":{\"name\":\"Indian Journal of Information Sources and Services\",\"volume\":\"12 1\",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-11-27\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Indian Journal of Information Sources and Services\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.51983/ijiss-2023.13.2.3793\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Indian Journal of Information Sources and Services","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.51983/ijiss-2023.13.2.3793","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

移动无线传感器网络是一个无线节点的集合,这些节点可随时随地安装,无需建立网络结构。节点的移动性及其不当行为会带来网络性能问题。数据丢失和传感器节点的不当行为会对网络性能产生负面影响。在某些情况下,恶意传感器节点会破坏网络容量。这项工作旨在利用不规则集技术识别恶意节点。路由条目表的广播元数据有助于识别恶意节点。网络中的每个传感器节点都会广播相邻节点的信息,并维护一个哨兵表。预设的数据交付比例、吞吐量、延迟、丢包和故障率用于估算广播记录参数。在 NS2 环境中,模拟了具有不同速度的移动节点。为了生成信息表,根据不同速度的移动节点的广播记录对其进行检查。根据不规则集战术表中的准则,区分出好节点和坏节点。数据包沿着不包含任何恶意节点的最短路径传播。所提技术的结果表明,不规则集战术提高了移动传感器的吞吐量、网络能力、数据交付率,并减少了端到端延迟。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
A Proficient Obtrusion Recognition Clustered Mechanism for Malicious Sensor Nodes in a Mobile Wireless Sensor Network
A collection of wireless nodes that may be installed at any location and at any time without requiring an established network structure is called a mobile wireless sensor network. The problem of network performance arises from the mobility of nodes and their misbehaviour. Network performance is negatively impacted by data loss and sensor node misbehaviour. In certain cases, there are malicious sensor nodes that are designed to destroy the network’s capacity. This work aims to identify hostile nodes using an irregular set technique. The route entry table’s broadcasting metadata helps identify rogue nodes. Every sensor node in the network broadcasts information about adjacent nodes and maintains a sentry table. Premeditated data delivery proportion, throughput, delay, packet drop, and fault rate are used to estimate broadcasting record parameters. In the NS2 environment, mobile nodes with varying velocities are simulated. To generate an information table, mobile nodes with varying speeds are examined based on their broadcasting records. On the basis of guidelines taken from the irregular set tactic table, good and bad nodes are distinguished. Packets are disseminated along the shortest path that doesn’t contain any malicious nodes. The results of the proposed technique show that an irregular set tactic increases throughput, network capability, data delivery percentage, and end-to-end delay reduction in mobile sensors.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信