To Identify the Untrustworthy Leader of a Hierarchical Wireless Sensor Network Using Received Signal Strength

##plugins.themes.bootstrap3.article.main##

Authors

Md. Ibrahim abdullah
Md. atiqur Rahman
Mohammad alamgir Hossain
Md. shohidul Islam
Md. shamim Hossain

Abstract

There are a multitude of privacy and safety  concerns that arise as a result of wireless sensor nodes  being carelessly put in potentially hazardous regions.  An adversary has the capability of either seizing a node  that is located in an area that is not under their control  or introducing a node that is acting under the guise of  a genuine node. The lack of adequate security in sensor  networks presents a substantial barrier to many potential  applications. A form of protection known as intrusion  detection can be utilized to thwart attacks of this nature.  Because of this, traditional methods of intrusion detection  cannot be utilized in a sensor network due to the restricted  resources of individual nodes. In this paper, we offer a  method for detecting intrusions in hierarchical wireless  sensor networks using a sensor fusion algorithm. This  method is intended to be utilized in situations in which  malevolent nodes are performing the duties of Cluster  Head. Clustering is an approach that sensor networks  take in order to produce their detections. A technique  that only requires a modest amount of communication  yet is nevertheless capable of thwarting an attack on a  hierarchical routing system has been described.

##plugins.themes.bootstrap3.article.details##

Section

Articles