Security Scheme to Identify Malicious Maneuver of Flooding Attack for WSN in 6G

2021 
Energy-efficient consumption is essential in sensor networks because sensor node replacement and charging of batteries in some places are not possible, like in heavy flooding areas and areas of expected explosive volcanoes. This paper proposes a new security scheme for flooding attacks in 6G communication for sensor networks. The sensor nodes are also communicating with each other with a high data rate. The Security scheme identified a Malicious Maneuver of Flooding attack (SIMMF) for WSN in the 6G network. The WSN nodes have limited bandwidth. The selection of cluster head (CH) is based on the higher remaining energy, and the rest of the Cluster Members (CM) are transferring information outside the cluster with the help of CH. The 6G data rate is at least ten times faster than the 5G communication. In each group (GCr) having a separate CH and CM. The performance of the LEACH protocol is affected by flooding attacker and proposed SIMMF detect the attacker’s malicious functioning and block its presence. The previous scheme performance is based on the Trust Value (TV), and TV depends on packets receiving at the destination, not on attacker flooding. In 6G communication, there is no bandwidth problem, but attacker infection increases w.r.t time continuously. The SIMMF provides a reliable routing scheme to improve network performance at a minimum energy cost. The minimum energy consumption enhances the possibility of communication, which enhances network lifetime and reduces overhead. SIMMF, TESDA, and flooding attacks are evaluated through performance metrics like energy consumption, overhead, and Unwanted fake data analysis..
    • Correction
    • Source
    • Cite
    • Save
    • Machine Reading By IdeaReader
    0
    References
    0
    Citations
    NaN
    KQI
    []