Abstract

Wireless sensor networks (WSNs) comprise tiny devices known as sensors. These devices are frequently employed in short-range communications and can perform various operations such as monitoring, collecting, analyzing, and processing data. WSNs do not require any infrastructure, are reliable, and can withstand adverse conditions. Sensor networks are autonomous structures in which the sensor nodes can enter or leave the network at any time instant. If the entering node is attacker node it will monitor the network operation and can cause security issues in the network that can affect communication. Existing literature presents security improvements in such networks in the form of cryptography, asymmetric techniques, key distribution, and various protocols. However, these techniques may not be effective in the case of autonomous structures and can increase computational complexity. In this paper, a convolutional technique (CT) is proposed that generates security bits using convolutional codes to prevent malicious node attacks on WSNs. Different security codes are generated at different hops and the simulation results demonstrate that the proposed technique enhances network security and reduces computational complexity compared to existing approaches.

Highlights

  • Wireless sensor networks (WSNs) are used for wireless data transfer from source to destination by employing sensors as intermediate nodes

  • Kaur et al [21] presented a secure key distribution method based on a node to node interactions and segregated the attacker nodes to obtain a secure route from source to destination

  • Each node in the routing process is verified for the respective CB, and if it is matched with the security code word expressed in Eq 5 within the defined time to live (TTL), the data is transmitted to that particular node or the node is considered an attacker node

Read more

Summary

Introduction

Wireless sensor networks (WSNs) are used for wireless data transfer from source to destination by employing sensors as intermediate nodes. Kaur et al [21] presented a secure key distribution method based on a node to node interactions and segregated the attacker nodes to obtain a secure route from source to destination This approach fails when bursts of malicious nodes enter the network at any time interval and mask themselves as active nodes. In the proposed approach an encoding technique is used to secure the network as it is already available in all the digital communication systems and does not require any additional hardware and different codes are generated at different hops and there is no complexity in key distribution and power consumption is comparatively low because ex-or gates are used to generate the security codes. Each node in the routing process is verified for the respective CB, and if it is matched with the security code word expressed in Eq 5 within the defined TTL, the data is transmitted to that particular node or the node is considered an attacker node

Initial security bits
The proposed approach is evaluated at multiple hops as
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.