Security to wireless sensor networks against malicious attacks using Hamming residue method.

2019 
Wireless sensor networks (WSNs) consist of small sensor nodes with limited energy. Such nodes have the ability to monitor the physical conditions and communicate information among the nodes without the requirement of the physical medium. WSNs are autonomous and are distributed in space. Due to the absence of central authority and random deployment of nodes in the network, WSN is prone to security threats. Well-known attacks in WSN are a malicious attack (such as compromised node imitating as one of the network nodes, misleading other nodes). In the art of work, various methods are developed to overcome these attacks either by cryptographic approaches or by time synchronization. But these methods may fail because of WSN autonomous structure. In this paper, an efficient approach called Hamming residue method (HRM) is presented to mitigate the malicious attacks. The experimental results validate the presented approach.
    • Correction
    • Source
    • Cite
    • Save
    • Machine Reading By IdeaReader
    17
    References
    20
    Citations
    NaN
    KQI
    []