Redirigiendo al acceso original de articulo en 22 segundos...
ARTÍCULO
TITULO

Securing Ad Hoc Wireless Sensor Networks under Byzantine Attacks by Implementing Non-Cryptographic Methods

Shabir Ahmad Sofi    
Roohie Naaz    

Resumen

Ad Hoc wireless sensor network (WSN) is a collection of nodes that do not need to rely on predefined infrastructure to keep the network connected. The level of security and performance are always somehow related to each other, therefore due to limited resources in WSN, cryptographic methods for securing the network against attacks is not feasible. Byzantine attacks disrupt the communication between nodes in the network without regard to its own resource consumption. This paper discusses the performance of cluster based WSN comparing LEACH with Advanced node based clusters under byzantine attacks. This paper also proposes an algorithm for detection and isolation of the compromised nodes to mitigate the attacks by non-cryptographic means. The throughput increases after using the algorithm for isolation of the malicious nodes, 33% in case of Gray Hole attack and 62% in case of Black Hole attack.

 Artículos similares

       
 
Jing Liu and Yong Zhong    
As a structural indicator of dense subgraphs, k-core has been widely used in community search due to its concise and efficient calculation. Many community search algorithms have been expanded on the basis of k-core. However, relevant algorithms often set... ver más
Revista: Applied Sciences

 
He Lan and Xiaoxue Ma    
Seafarers? unsafe acts as the direct causes of maritime accidents are considered to be the result of the interaction between complex and dynamic influencing factors. Identifying the risk evolution characteristics and paths of seafarers? unsafe acts has a... ver más
Revista: Applied Sciences

 
Puya Li and Chunchang Zhang    
Aiming at the communication network optimization problem of the Internet of Inland Vessels, this work presented a network model and deployment strategy with shore-based cooperative units as network nodes. Firstly, the system architecture and communicatio... ver más

 
Jifeng Zhu, Xiaohe Pan, Zheng Peng, Mengzhuo Liu, Jingqian Guo and Jun-Hong Cui    
The establishment of the Underwater Internet of Things (UIoT) and the realization of interconnection between heterogeneous underwater intelligent devices are urgent global challenges. Underwater acoustic networking is the most suitable technology to achi... ver más

 
Konstantin Gaipov, Daniil Tausnev, Sergey Khodenkov, Natalya Shepeta, Dmitry Malyshev, Aleksey Popov and Lev Kazakovtsev    
Rapid growth in the volume of transmitted information has lead to the emergence of new wireless networking technologies with variable heterogeneous topologies. With limited radio frequency resources, optimal routing problems arise, both at the network de... ver más
Revista: Algorithms