The advances in the expanse of image sensors have made it conceivable to make highresolution picture sensors easily accessible. The amelioration of wireless interactive media sensor networks are found to be greatly increased due to the day to day usage of cameras, microphones and smart devices. A secured multi-hop routing mechanism is addressed in surveillance areas which could be incorporated to the multimedia sensors that are capable of peruse the detected data comprises of recorded images and videos. Also, malevolent sensor hubs could be interjected into the vigilance area in an untrusted environment. In this contemplated venture, a novel lightweight trust decision-making framework is accomplished for QoS clustering to give secure routing in both intercluster and intracluster communication. A quantifiable aberrant trust value is the variable determined by the Cluster Head (CH) for its Cluster Member (CM) inside the cluster. The LEACH (Low Energy Adaptive Clustering Hierarchy) protocol is adopted for group formation and also for the exchange of the trust values among the master nodes, member nodes and Base station. In this way, the correspondence overhead, likelihood of dynamic assaults for example sinkhole and black hole assaults mount by eavesdroppers can be reduced by maintenance of trust values by cluster heads rather than cluster members. Besides, in wireless streaming video sensor networks this approach authorizes us to predict and counteract malicious untrusted and flawed nodes. Simulation results using NS-2 is examined and the suggested trust decision-making model escalates the dependability, elasticity and low memory aloft in comparison with the current trust models adopted for wireless video sensor network security.
SummaryMobile ad hoc networks (MANETs) own a flexible framework with the absence of a server, where conventional security components fail to compensate the level of MANET security conditions since it is confined to a particular environment, its data transfer potential, and battery and memory constrains. MANET provides a well‐grounded path and an efficiency in communication, but the confidentiality of the trust parameters remains a great challenge since it may be overheard by the impostor. This demands the need of exchanging the encrypted mathematical values. The proposed machine learning security paradigm provides firm and trustworthy network in spite of establishment over additional network platform. The QoS is improved through support vector machine for denial‐of‐service attack. The node has to be clustered to accomplish its respective task. The clustering is done with the help of LEACH protocol, where cluster head and Cluster member are fixed to transfer the data in the network. Low Energy adaptive clustering heirarchy (LEACH) propagates energy to abstain from draining of battery and malignant network. A secure framework is built along with encryption and decoding to protect from denial‐of‐service attack. Acknowledgement‐based flooding attack has been focused with the help of support vector machine algorithm. The messages are encoded in from the source node and coded again during transmission phase to obtain the original message. Defending the traditional methodologies, the proposed work provides excellent QoS when compared and tested with other protocols. The results obtained ensure its efficiency when support vector machine technique is combined with encryption scheme.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.