In recent scenario of Wireless Sensor Networks (WSNs), there are many application developed for handling sensitive and private data such as military information, surveillance data, tracking, etc. Hence, the sensor nodes of WSNs are distributed in an intimidating region, which is non-rigid to attacks. The recent research domains of WSN deal with models to handle the WSN communications against malicious attacks and threats. In traditional models, the solution has been made for defending the networks, only to specific attacks. However, in real-time applications, the kind of attack that is launched by the adversary is not known. Additionally, on developing a security mechanism for WSN, the resource constraints of sensor nodes are also to be considered. With that note, this paper presents an Enhanced Security Model with Improved Defensive Routing Mechanism (IDRM) for defending the sensor network from various attacks. Moreover, for efficient model design, the work includes the part of feature evaluation of some general attacks of WSNs. The IDRM also includes determination of optimal secure paths and Node security for secure routing operations. The performance of the proposed model is evaluated with respect to several factors; it is found that the model has achieved better security levels and is efficient than other existing models in WSN communications. It is proven that the proposed IDRM produces 74% of PDR in average and a minimized packet drop of 38% when comparing with the existing works.
As wireless sensor network"s (WSN"s) consists of large number of nodes which are deployed in unattended/hostile environments and are exposed to different types of attacks due to compromisation of node or group of nodes. Usually, security designs provide a hop-by-hop security paradigm and are vulnerable to many types of Denial of Service (DoS) attacks, such as report disruption and selective forwarding, puts data availability at stake. In this paper, we overcome these vulnerabilities for large-scale static WSN"s by using Location aware multifunctional key management framework. Sensors will be deployed in some area in a grid type model and knows its position based on X and Y coordinates in the grid. Further, embed the location information of each sensor into few of its secret keys which are owned by that sensor node and location-aware property effectively limits the impact of compromised nodes only to their vicinity without affecting end-to-end data security. This framework assures both node-to-sink and node-to-node authentication along the report forwarding routes and demonstrates that this design is highly resilient against an increasing number of compromised nodes and effective in energy savings by avoiding DoS attacks.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.