{"title":"加密哈希签名采用区块链检测恶意节点提高WSN吞吐量","authors":"Ambika Bhuvaneswari C., E. D. Kanmani Ruby","doi":"10.17762/msea.v71i3s.9","DOIUrl":null,"url":null,"abstract":"Secured routing is the definite maneuvers in a wireless sensor network (WSN) for distributing data packets to the base station. However, attacker node outbreaks will occur throughout the routing process, exacerbating the wireless sensor network's functioning. As a result, a secure routing protocol is essential to ensure route fortification and the effectiveness of wireless sensor networks. For this reason, many studies have shown an interest in improving routing protocol security by adopting cryptographic structures and trust regulation methods. However, most secured routing protocols are dynamically awful in real-time scenarios, making it difficult to distinguish between unsecured routing node performances. In the same way, solutions for detecting and mitigating node attacks are still challenging. In this, Crypto Hash signature (CHS) token are generated for the flow accesses with a secret key belonging to each routing sensor node. The assessment metrics corresponding to average energy consumption, and throughput of token transactions is measured. Then the simulation performance of the proposed SDOR-CHS-SD method provide 18.46%, 8.37% and 26.77% higher token transactions throughput, when compared with existing method like SDOR-SSOA, SDOR-DSM and SDOR-RIL respectively.","PeriodicalId":37943,"journal":{"name":"Philippine Statistician","volume":" ","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2022-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Crypto Hash Signature Adopted Blockchain to Detect Spiteful Node to Enhance the Throughput in WSN\",\"authors\":\"Ambika Bhuvaneswari C., E. D. Kanmani Ruby\",\"doi\":\"10.17762/msea.v71i3s.9\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Secured routing is the definite maneuvers in a wireless sensor network (WSN) for distributing data packets to the base station. However, attacker node outbreaks will occur throughout the routing process, exacerbating the wireless sensor network's functioning. As a result, a secure routing protocol is essential to ensure route fortification and the effectiveness of wireless sensor networks. For this reason, many studies have shown an interest in improving routing protocol security by adopting cryptographic structures and trust regulation methods. However, most secured routing protocols are dynamically awful in real-time scenarios, making it difficult to distinguish between unsecured routing node performances. In the same way, solutions for detecting and mitigating node attacks are still challenging. In this, Crypto Hash signature (CHS) token are generated for the flow accesses with a secret key belonging to each routing sensor node. The assessment metrics corresponding to average energy consumption, and throughput of token transactions is measured. Then the simulation performance of the proposed SDOR-CHS-SD method provide 18.46%, 8.37% and 26.77% higher token transactions throughput, when compared with existing method like SDOR-SSOA, SDOR-DSM and SDOR-RIL respectively.\",\"PeriodicalId\":37943,\"journal\":{\"name\":\"Philippine Statistician\",\"volume\":\" \",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-07-19\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Philippine Statistician\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.17762/msea.v71i3s.9\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q4\",\"JCRName\":\"Mathematics\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Philippine Statistician","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.17762/msea.v71i3s.9","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"Mathematics","Score":null,"Total":0}
Crypto Hash Signature Adopted Blockchain to Detect Spiteful Node to Enhance the Throughput in WSN
Secured routing is the definite maneuvers in a wireless sensor network (WSN) for distributing data packets to the base station. However, attacker node outbreaks will occur throughout the routing process, exacerbating the wireless sensor network's functioning. As a result, a secure routing protocol is essential to ensure route fortification and the effectiveness of wireless sensor networks. For this reason, many studies have shown an interest in improving routing protocol security by adopting cryptographic structures and trust regulation methods. However, most secured routing protocols are dynamically awful in real-time scenarios, making it difficult to distinguish between unsecured routing node performances. In the same way, solutions for detecting and mitigating node attacks are still challenging. In this, Crypto Hash signature (CHS) token are generated for the flow accesses with a secret key belonging to each routing sensor node. The assessment metrics corresponding to average energy consumption, and throughput of token transactions is measured. Then the simulation performance of the proposed SDOR-CHS-SD method provide 18.46%, 8.37% and 26.77% higher token transactions throughput, when compared with existing method like SDOR-SSOA, SDOR-DSM and SDOR-RIL respectively.
期刊介绍:
The Journal aims to provide a media for the dissemination of research by statisticians and researchers using statistical method in resolving their research problems. While a broad spectrum of topics will be entertained, those with original contribution to the statistical science or those that illustrates novel applications of statistics in solving real-life problems will be prioritized. The scope includes, but is not limited to the following topics: Official Statistics Computational Statistics Simulation Studies Mathematical Statistics Survey Sampling Statistics Education Time Series Analysis Biostatistics Nonparametric Methods Experimental Designs and Analysis Econometric Theory and Applications Other Applications