2014 IEEE Students' Conference on Electrical, Electronics and Computer Science 2014
DOI: 10.1109/sceecs.2014.6804506
|View full text |Cite
|
Sign up to set email alerts
|

A random key distribution based Artificial Immune System for security in clustered wireless sensor networks

Abstract: Wireless sensor networks are associated with risk due to the threats of security vulnerabilities. In this context, we propose a scheme, which uses random key distribution based Artificial Immune System (AIS) for detecting spoofing attacks. The prospective method is for clustered sensor networks and as an example, the algorithm is executed on LEACH protocol. The simulation results prove that the design is energy efficient than the other widely used cryptographic methods while providing robust security in the ne… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 10 publications
(4 citation statements)
references
References 5 publications
0
4
0
Order By: Relevance
“…The technique used is a random key hopping based approach. The randomness creates difficulty in altering the network operation by spoofing unwanted packets as the malicious nodes will be unaware of it [71]. The security issues arise in the context of Mobile Ad-hoc Network (MANET) in 5G, which is a radio system aimed at extremely high data rates and lower latency, energy, and cost [72].…”
Section: Area Of Use Description Solution Referencesmentioning
confidence: 99%
“…The technique used is a random key hopping based approach. The randomness creates difficulty in altering the network operation by spoofing unwanted packets as the malicious nodes will be unaware of it [71]. The security issues arise in the context of Mobile Ad-hoc Network (MANET) in 5G, which is a radio system aimed at extremely high data rates and lower latency, energy, and cost [72].…”
Section: Area Of Use Description Solution Referencesmentioning
confidence: 99%
“…Simulations using software environments or actual nodes need to be carried out in order to evaluate the performance of the protocol in practical conditions [3] The focus of this paper was on the protocol flexibility against deceptive nodes within the network that disrupt communications. Earlier studies have presented that, routing protocols are made increasingly resilient by the additionof randomness and methods of data duplication.…”
Section: Existing Studiesmentioning
confidence: 99%
“…The base station chooses the cluster head according to the routing algorithm [8] [9]. The base station knows the complete topology of a network.…”
Section: Symmetric Key Generation Using Genetic Algorithmmentioning
confidence: 99%