Abstract

A network system called Wireless Sensor Network is made up of wireless sensor node devices that are spread at random (WSN). WSNs are a critical paradigm for the Internet of Things' evolution (IoT). Strong security measures must be done to protect the network from security threats and malicious assaults in order to make it more efficient. To identify and isolate hostile sensor nodes in a cloud-assisted WSN-IoT system, the Trusted Anonymous Lightweight Attacker Detection (TALAD) scheme is presented. The TALAD strategy creates a routing path to the cloud with highly trusted nodes, subject to a desired path length limit. Using the binomial algebraic theorem, the node identities are formed with bogus identities, and the original identity is hidden from the other nodes in the network. If only the forward key and the reverse key string are matched, the nodes' original identities are exposed. The forward and reverse keys are mapped using a context-free grammar rule. Even when a major chunk of the network drops to forward packets, TALAD successfully avoids incursions, according to the simulation results.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call