首页    期刊浏览 2025年02月20日 星期四
登录注册

文章基本信息

  • 标题:A crossbreed protectedrouting and monitoring structure in IoT based wireless sensor networks
  • 本地全文:下载
  • 作者:C.NithyaPraba ; D.Kalaivani
  • 期刊名称:International Journal of Advances in Engineering and Management
  • 电子版ISSN:2395-5252
  • 出版年度:2022
  • 卷号:4
  • 期号:5
  • 页码:284-288
  • DOI:10.35629/5252-040414601463
  • 语种:English
  • 出版社:IJAEM JOURNAL
  • 摘要:Internet of Things (IoT) has advanced its ubiquity across the world for the expansion of smart networks. It is aimed to dispose network bound that permit smart services and computing for the IoT devices. In addition, this distribution would not only improve the user knowledge but also provide service flexibility in case of any adversity. In IoT applications, the margin computing deed assigned architecture and closeness of end-users to provide faster response and better quality of service. However, the security regard is mainly transmit to resist the vulnerability of attacks (VoA). Existing methodologies deal only with static wireless sensor web to deduce the intrusions in which the sensor nodes are deployed in a uniform manner to retain the constancy. Since the sensor nodes are constantly being in question through different transmission regions with several levels of velocities, selection of sensor monitoring nodes or guard nodes has become a challenging job in recent research. In addition, the adversaries are also moving from one location to another to explore its specific chores around the network. Thus, to provide flexible security, we propose a secure routing and monitoring protocol with multi-variant tuples using Two-Fish (TF) symmetric key approach to discover and prevent the adversaries in the global sensor network. The proposed approach is designed on the basis of the Authentication and Encryption Model (ATE). Using Eligibility Weight Function (EWF), the sensor guard nodes are selected and it is hidden with the help of complex symmetric key approach. A secure hybrid routing protocol is chosen to be built by inheriting the properties of both Multipath Optimized Link State Routing (OLSR) and Ad hoc OnDemand Multipath Distance Vector (AOMDV) protocols. The result of the proposed approach is shown that it has a high percentage of monitoringnodes in comparison with the existing routing schemes. Moreover, the proposed routing mechanism is resilient to multiple mobile adversaries; and hence it ensures multipath delivery.
  • 关键词:vector;protocols;cyber-attacks;routing
国家哲学社会科学文献中心版权所有