Wireless Sensor Network Security with the Probability Based Neighbourhood Estimation

Authors

  • Nachaat Mohamed Rabdan Academy, UAE Homeland Security, University Sains Malaysia Abu Dhabi
  • K. Sampath Kumar Professor, Department of Computer Science and Engineering, Galgotias University, Greater Noida, Uttar Pradesh, India
  • Sanskriti Sharma Electronics and telecommunication Manager @ Anshkriti Academy, Raipur, Chhattisgarh, India
  • R. Dinesh Kumar Dept. of Electronics and communication Engineering, PERI Institute of technology, Chenna, India
  • Shiv Mehta Student, Dhirubhai Ambani International School, Mumbai, India
  • Isa Mishra KIIT Deemed to be University School of Management KIIT School of Management Bhubaneswar, India

Keywords:

Wireless Sensor Network, Probability, Neighbourhood value, threshold value

Abstract

Wireless Sensor Network (WSN) is considered as the ad hic network environment in the resource-limited devices for the energy, storage, bandwidth, and computation. In WSN environment security is a significant contribution for more computation and power in the nodes. Sensor node comprises of the hostile environment for the remote management of network topology. The captured node exhibits the fundamental characteristics in the security of the WSN. The security constraints in the WSN derives significant attention towards the vast range of application for traffic monitoring in the network. Another challenge in the WSN is the mobility of the sensor nodes in which nodes are located far away between the nodes each other with the one-hop neighbors. In this paper proposed a Probability Neighbourhood Estimation (PNE) model for improved security in the WSN environment. The proposed PNE mode estimates the neighborhood estimation of the node. With the computation of the threshold value in the neighboring nodes, the probability features of the nodes are computed. The performance of the proposed PNE model is comparatively examined with the existing Pworm and RTT based approach. The analysis of the results expressed that the proposed PNE model achieves the effective performance for the throughput and PDF value of 0.99 which is a significantly higher value than the 0.91 and 0.98. The analysis expressed that the proposed model~6 – 7% than the existing models..

Downloads

Download data is not yet available.

References

Cao, C., Tang, Y., Huang, D., Gan, W., & Zhang, C. (2021). IIBE: an improved identity-based encryption algorithm for WSN security. Security and Communication Networks, 2021.

Singh, S., & Saini, H. S. (2021). Learning-based security technique for selective forwarding attack in clustered WSN. Wireless Personal Communications, 118(1), 789-814.

Qichen, W. (2022, April). Research progress on wireless sensor network (WSN) security technology. In Journal of Physics: Conference Series (Vol. 2256, No. 1, p. 012043). IOP Publishing.

Ávila, K., Sanmartin, P., Jabba, D., & Gómez, J. (2021). An analytical survey of attack scenario parameters on the techniques of attack mitigation in WSN. Wireless Personal Communications, 1-32.

Ramasamy, K., Anisi, M. H., & Jindal, A. (2021). E2DA: Energy efficient data aggregation and end-to-end security in 3D reconfigurable WSN. IEEE Transactions on Green Communications and Networking, 6(2), 787-798.

Majumdar, P., Mitra, S., & Bhattacharya, D. (2021). IoT for promoting agriculture 4.0: a review from the perspective of weather monitoring, yield prediction, security of WSN protocols, and hardware cost analysis. Journal of Biosystems Engineering, 1-22.

Hema Kumar, M., Mohanraj, V., Suresh, Y., Senthilkumar, J., & Nagalalli, G. (2021). Trust aware localized routing and class based dynamic block chain encryption scheme for improved security in WSN. Journal of Ambient Intelligence and Humanized Computing, 12(5), 5287-5295.

Sumalatha, M. S., & Nandalal, V. (2021). An intelligent cross layer security based fuzzy trust calculation mechanism (CLS-FTCM) for securing wireless sensor network (WSN). Journal of Ambient Intelligence and Humanized Computing, 12(5), 4559-4573.

Aljadani, N., & Gazdar, T. (2022). A Novel Security Architecture for WSN-Based Applications in Smart Grid. Smart Cities, 5(2), 633-649.

Soni, G., & Chandravanshi, K. (2021, August). Security scheme to identify malicious maneuver of flooding attack for WSN in 6G. In 2021 8th International Conference on Signal Processing and Integrated Networks (SPIN) (pp. 124-129). IEEE.

Kwon, D. K., Yu, S. J., Lee, J. Y., Son, S. H., & Park, Y. H. (2021). WSN-SLAP: Secure and lightweight mutual authentication protocol for wireless sensor networks. Sensors, 21(3), 936.

Jayatunga, E. H., Ranaweera, P. S., & Balapuwaduge, I. A. M. (2021). Blockchain advances and security practices in WSN, CRN, SDN, opportunistic mobile networks, delay tolerant networks. In Revolutionary Applications of Blockchain-Enabled Privacy and Access Control (pp. 1-34). IGI Global.

Butt, T. M., Riaz, R., Chakraborty, C., Rizvi, S. S., & Paul, A. (2021). Cogent and energy efficient authentication protocol for wsn in iot. Comput. Mater. Contin, 68, 1877-1898.

Rhim, H., Tamine, K., Abassi, R., Sauveron, D., & Guemara, S. (2021, March). Enhancing security using digital signature in an efficient Network Coding-enabled WSN. In 2021 18th International Multi-Conference on Systems, Signals & Devices (SSD) (pp. 70-78). IEEE.

Gulganwa, P., & Jain, S. (2022). EES-WCA: energy efficient and secure weighted clustering for WSN using machine learning approach. International Journal of Information Technology, 14(1), 135-144.

Bakshi, G., & Sahu, H. WSN Security: Intrusion Detection Approaches Using Machine Learning. In Computational Intelligence for Wireless Sensor Networks (pp. 151-174). Chapman and Hall/CRC.

Flow Chart of the PNE

Downloads

Published

19.12.2022

How to Cite

Mohamed, N. ., Kumar, K. S. ., Sharma, S. ., Kumar, R. D. ., Mehta, S. ., & Mishra, I. . (2022). Wireless Sensor Network Security with the Probability Based Neighbourhood Estimation. International Journal of Intelligent Systems and Applications in Engineering, 10(2s), 231 –. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/2390

Issue

Section

Research Article

Most read articles by the same author(s)