EURASIP Journal on Wireless Communications and Networking | |
Security to wireless sensor networks against malicious attacks using Hamming residue method | |
Majid Alotaibi1  | |
[1] Department of Computer Engineering, College of Computer and Information Systems, Umm Al Qura University; | |
关键词: WSN; Malicious attacks; Rival nodes; PDR; NS2; Hamming residue method; | |
DOI : 10.1186/s13638-018-1337-5 | |
来源: DOAJ |
【 摘 要 】
Abstract Wireless sensor networks (WSNs) consist of small sensor nodes with limited energy. Such nodes have the ability to monitor the physical conditions and communicate information among the nodes without the requirement of the physical medium. WSNs are autonomous and are distributed in space. Due to the absence of central authority and random deployment of nodes in the network, WSN is prone to security threats. Well-known attacks in WSN are a malicious attack (such as compromised node imitating as one of the network nodes, misleading other nodes). In the art of work, various methods are developed to overcome these attacks either by cryptographic approaches or by time synchronization. But these methods may fail because of WSN autonomous structure. In this paper, an efficient approach called Hamming residue method (HRM) is presented to mitigate the malicious attacks. The experimental results validate the presented approach.
【 授权许可】
Unknown