簇内多跳通信中抵御选择性转发攻击和黑洞攻击的鲁棒三态安全机制

Q4 Computer Science
A. Anitha, S. Mythili
{"title":"簇内多跳通信中抵御选择性转发攻击和黑洞攻击的鲁棒三态安全机制","authors":"A. Anitha, S. Mythili","doi":"10.22247/ijcna/2023/221900","DOIUrl":null,"url":null,"abstract":"– Security is the most vital issue to be addressed in Wireless Sensor Networks (WSNs). The WSN dominates since it has an effectiveness of applications in numerous fields. Though it has effectiveness towards its applications likewise it is susceptible to two different kinds of attacks (i.e.) external attacks and internal attacks existence of constrained reckoning resources, low memory, inadequate battery lifetime, handling control, and nonexistence of interfere resilient packet. Handle internal attacks such as selective forwarding attacks (SFAs) and black hole attacks (BHA) are considered to be the most common security extortions in wireless sensor networks. The attacker nodes will execute mischievous activities during data communication by creating traffic load, delaying packet delivery, dropping packets selectively or dropping all packets, energy consumption, and depleting all network resources. These attacks can be handled efficiently by implementing the proposed methodology for detecting, preventing, and recovering Cluster Heads (CHs), Cluster Members (CMs), and Transient Nodes (TNs) from SFAs and BHA in intra-cluster multi-hop. It is accomplished by proposing a robust strategy for overcoming internal attacks on cluster head, cluster member, and transient node. The Fuzzy C-Means clustering is used to discover the prominent cluster head. The uncertainty entropy model is used to detect internal attacks by removing the malicious node from the transition path. The intermediate node is been selected based on the degree and dimension. The experimental results of the proposed Robust Tristate Security Mechanism (RTSSM) against SFAs and BHA are evaluated with packet delivery ratio, throughput, and packet drop and the results prove the effectiveness of the proposed methodology and it also aids in the extension of the network lifetime.","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":" ","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2023-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Robust Tristate Security Mechanism to Protect Against Selective Forwarding Attack and Black Hole Attack in Intra-Cluster Multi-Hop Communication\",\"authors\":\"A. Anitha, S. Mythili\",\"doi\":\"10.22247/ijcna/2023/221900\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"– Security is the most vital issue to be addressed in Wireless Sensor Networks (WSNs). The WSN dominates since it has an effectiveness of applications in numerous fields. Though it has effectiveness towards its applications likewise it is susceptible to two different kinds of attacks (i.e.) external attacks and internal attacks existence of constrained reckoning resources, low memory, inadequate battery lifetime, handling control, and nonexistence of interfere resilient packet. Handle internal attacks such as selective forwarding attacks (SFAs) and black hole attacks (BHA) are considered to be the most common security extortions in wireless sensor networks. The attacker nodes will execute mischievous activities during data communication by creating traffic load, delaying packet delivery, dropping packets selectively or dropping all packets, energy consumption, and depleting all network resources. These attacks can be handled efficiently by implementing the proposed methodology for detecting, preventing, and recovering Cluster Heads (CHs), Cluster Members (CMs), and Transient Nodes (TNs) from SFAs and BHA in intra-cluster multi-hop. It is accomplished by proposing a robust strategy for overcoming internal attacks on cluster head, cluster member, and transient node. The Fuzzy C-Means clustering is used to discover the prominent cluster head. The uncertainty entropy model is used to detect internal attacks by removing the malicious node from the transition path. The intermediate node is been selected based on the degree and dimension. The experimental results of the proposed Robust Tristate Security Mechanism (RTSSM) against SFAs and BHA are evaluated with packet delivery ratio, throughput, and packet drop and the results prove the effectiveness of the proposed methodology and it also aids in the extension of the network lifetime.\",\"PeriodicalId\":36485,\"journal\":{\"name\":\"International Journal of Computer Networks and Applications\",\"volume\":\" \",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-06-30\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Computer Networks and Applications\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.22247/ijcna/2023/221900\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q4\",\"JCRName\":\"Computer Science\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Computer Networks and Applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.22247/ijcna/2023/221900","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"Computer Science","Score":null,"Total":0}
引用次数: 0

摘要

–安全性是无线传感器网络(WSN)中需要解决的最重要问题。WSN占主导地位,因为它在许多领域都有有效的应用。尽管它对其应用同样有效,但它容易受到两种不同类型的攻击(即外部攻击和内部攻击)——存在受限的计算资源、低内存、电池寿命不足、处理控制和不存在干扰弹性分组。处理内部攻击,如选择性转发攻击(SFAs)和黑洞攻击(BHA)被认为是无线传感器网络中最常见的安全勒索。攻击者节点会在数据通信过程中通过创建流量负载、延迟数据包传递、选择性丢弃数据包或丢弃所有数据包、能耗和耗尽所有网络资源来执行恶意活动。通过实现所提出的用于在簇内多跳中从SFA和BHA检测、预防和恢复簇头(CH)、簇成员(CM)和瞬态节点(TN)的方法,可以有效地处理这些攻击。它是通过提出一种强大的策略来克服对簇头、簇成员和瞬态节点的内部攻击来实现的。模糊C均值聚类用于发现显著的簇头。不确定性熵模型用于通过从转移路径中移除恶意节点来检测内部攻击。中间节点是根据阶数和尺寸选择的。针对SFAs和BHA,对所提出的鲁棒三态安全机制(RTSSM)的实验结果进行了分组传递率、吞吐量和分组丢弃的评估,结果证明了所提出方法的有效性,并有助于延长网络寿命。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Robust Tristate Security Mechanism to Protect Against Selective Forwarding Attack and Black Hole Attack in Intra-Cluster Multi-Hop Communication
– Security is the most vital issue to be addressed in Wireless Sensor Networks (WSNs). The WSN dominates since it has an effectiveness of applications in numerous fields. Though it has effectiveness towards its applications likewise it is susceptible to two different kinds of attacks (i.e.) external attacks and internal attacks existence of constrained reckoning resources, low memory, inadequate battery lifetime, handling control, and nonexistence of interfere resilient packet. Handle internal attacks such as selective forwarding attacks (SFAs) and black hole attacks (BHA) are considered to be the most common security extortions in wireless sensor networks. The attacker nodes will execute mischievous activities during data communication by creating traffic load, delaying packet delivery, dropping packets selectively or dropping all packets, energy consumption, and depleting all network resources. These attacks can be handled efficiently by implementing the proposed methodology for detecting, preventing, and recovering Cluster Heads (CHs), Cluster Members (CMs), and Transient Nodes (TNs) from SFAs and BHA in intra-cluster multi-hop. It is accomplished by proposing a robust strategy for overcoming internal attacks on cluster head, cluster member, and transient node. The Fuzzy C-Means clustering is used to discover the prominent cluster head. The uncertainty entropy model is used to detect internal attacks by removing the malicious node from the transition path. The intermediate node is been selected based on the degree and dimension. The experimental results of the proposed Robust Tristate Security Mechanism (RTSSM) against SFAs and BHA are evaluated with packet delivery ratio, throughput, and packet drop and the results prove the effectiveness of the proposed methodology and it also aids in the extension of the network lifetime.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
International Journal of Computer Networks and Applications
International Journal of Computer Networks and Applications Computer Science-Computer Science Applications
CiteScore
2.30
自引率
0.00%
发文量
40
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信