Abstract
Abstract
Wireless sensor networks (WSNs) comprise tiny devices known as sensors. These devices are frequently employed in short-range communications and can perform various operations such as monitoring, collecting, analyzing, and processing data. WSNs do not require any infrastructure, are reliable, and can withstand adverse conditions. Sensor networks are autonomous structures in which the sensor nodes can enter or leave the network at any time instant. If the entering node is attacker node it will monitor the network operation and can cause security issues in the network that can affect communication. Existing literature presents security improvements in such networks in the form of cryptography, asymmetric techniques, key distribution, and various protocols. However, these techniques may not be effective in the case of autonomous structures and can increase computational complexity. In this paper, a convolutional technique (CT) is proposed that generates security bits using convolutional codes to prevent malicious node attacks on WSNs. Different security codes are generated at different hops and the simulation results demonstrate that the proposed technique enhances network security and reduces computational complexity compared to existing approaches.
Publisher
Springer Science and Business Media LLC
Reference22 articles.
1. Li Y-X, Qin L, Liang Q (2010) Research on wireless sensor network security. In: International conference on computational intelligence and security, pp 493–496
2. Chen X, Makki K, Yen K, Pissinou N (2009) Sensor network security: a survey. IEEE Commun Surv Tutorials 11(2):52–73
3. Perrig A, Szewczyk R, Wen V, Cullar D, Tygar JD (2002) SPINS: security protocols for sensor networks. Int J Commun Comput Inform 8(5):521–534
4. Murat D (2014) Security analysis in wireless sensor networks. Int J Distrib Sens Netw 2014:1–9
5. Necla B, Ismail E (2012) WSNSec: a scalable data link layer security protocol forWSNs. Ad Hoc Netw 10(1):37–45
Cited by
16 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献