EFFECTIVE CLUSTERING AND CERTIFICATELESS ENCRYPTION TECHNIQUES IN THE MILITARY DOMAIN FOR ATTACK DETECTION
Abstract
The goal of a wireless sensor network (WSN) is to connect numerous nodes via a multi-hop self-organizing network. A variety of sensor nodes are arranged and positioned in relation to other nodes to provide safe data exchange. Sensor nodes watch as a sink node processes the data. The network includes a variety of assaults, including floods, wormhole, black hole, sinkhole, and so on. One of the most challenging tasks in WSN is secure routing because of the existence of attacks. The technology of attack detection is employed to identify attacks and enhances the security of data transmission. It provides a way to ignore network threats, enabling secure communication. Most recent efforts have been focused on implementing secure data communication in wireless sensor networks. However, the more accurate detection attack was not achieved. Numerous intrusion attackers are available to compromise network data packet communication. To provide better data distribution amongst soldiers in a combat environment, this wireless network invader node needs to be identified. Hence, in a WSN context, data transmission with a military scenario entails armed men engaged in combat, such as fighter aircraft, tankers, and shot ships. Finding intrusion attackers is a difficult task, especially in the highly dynamic military wireless sensor network. Therefore, different techniques are developed in WSN for achieving attack detection accuracy with minimal delay and maximum data delivery rate.

Authors
S. Rajesh1, M.S. Premapriya2, A. Jayasmruthi3, V. Muthu Lakshmi4
Sri Ramakrishna Institute of Technology, India1,3, Anna University Regional Campus, Coimbatore, India2, Sri Ramakrishna Engineering College, India4

Keywords
WSN, Secure Routing, Black Hole Attack Detection, Floods, Sink Hole Wormhole, Certificateless Signcryption Secure Communication
Yearly Full Views
JanuaryFebruaryMarchAprilMayJuneJulyAugustSeptemberOctoberNovemberDecember
000000004200
Published By :
ICTACT
Published In :
ICTACT Journal on Communication Technology
( Volume: 15 , Issue: 3 , Pages: 3248 - 3253 )
Date of Publication :
September 2024
Page Views :
43
Full Text Views :
6

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.