Affiliation:
1. Computer Science and Engineering Department, Madan Mohan Malaviya University of Technology, Gorakhpur, Uttar Pradesh 273016, India
Abstract
A wireless sensor network (WSN) can be used for various purposes, including area monitoring, health care, smart cities, and defence. Numerous complex issues arise in these applications, including energy efficiency, coverage, and intruder detection. Intruder detection is a significant obstacle in various wireless sensor network applications. It causes data fusion that jeopardizes the network’s confidentiality, lifespan, and coverage. Various algorithm has been proposed for intruder detection where each node act as an agent, or some monitoring nodes are deployed for intruder detection. The proposed protocol detects intruders by transmitting a known bit from the Cluster Head (CH) to all nodes. The legal nodes must acknowledge their identification to the CH in order to be valid; otherwise, if the CH receives an incorrect acknowledgement from a node or receives no acknowledgement at all, it is an intruder. The proposed protocol assists in protecting sensor data from unauthorized access and detecting the intruder with its location through the identity of other legal nodes. The simulation results show that the proposed protocol delivers better results for identifying intruders for various parameters.
Publisher
World Scientific Pub Co Pte Ltd
Subject
Computer Networks and Communications
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献