Abstract
A wireless sensor network is a set of sensor nodes used to identify the environment and the corresponding object. It collects all the data of the situation and transmits this detected data to the central node through a wireless network. However, some challenges are encountered in wireless sensor networks i.e., the efficient deployment of sensor nodes in an environment. Some of the issues are limited sources of energy, limited transmission bandwidth, short coverage, data distribution, data persistence, faulty node, and data security redundancy. The Discovery Configuration Protocol (DCP) has been signed for a period of time to monitor the applications. It is required for alternate use, which is very important to recreate the correct data source. Recently, Source Location Privacy (SLP) security at the WSN has attracted a way to prevent opponents from pursuing a backtracking strategy to capture the data source. Delivery of messages from different source nodes to sink nodes is done through an end-to-end location privacy process. With location-based services, data must be retrieved by users who do not have information about the data’s location. So, introduce a proposed Adaptive Trust Sector-Based Authenticated System (ATSAS), which is meant to evaluate the trust confidence value of each node with the help of agent sinks node. When the joining nodes discover their neighbors, they exchange information about the number of single-hop neighbors. The updated confidence value of the node is formed in the network algorithm. The first stage is done using the Honey Encryption (HE) for message authentication and packet encryption to provide security in WSN. These encryptions are making Distribution-Transforming Encoder (DTE) for space of the un-encrypted plain text message into the seed space of n-bit string. The output encryption point is the input to feedback for key generation. To the next level, both direct and indirect observations, such as its neighbor’s trust value, are calculated based on two sources of information. This protocol thereby increases secure communication in a hierarchical WSN. The trust rate control of the network at the source of the packet, which helps drive the time control mechanism. Such Network Control Point (NCP) system development methods provide security and reduce the occurrence of overload on distributed sensor nodes. The theoretical analysis and test results demonstrate that the proposed method improves security, reduces directional attacks, and increases the network’s longevity.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
More From: Journal of Ambient Intelligence and Humanized Computing
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.