IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Malicious Node Detection Using Convolution Technique: Authentication in Wireless Sensor Networks (WSN)

Malicious Node Detection Using Convolution Technique: Authentication in Wireless Sensor Networks (WSN)
View Sample PDF
Author(s): Priyanka Ahlawat (National Institute of Technology, Kurukshetra, India), Pranjil Singhal (National Institute of Technology, Kurukshetra, India), Khushi Goyal (National Institute of Technology, Kurukshetra, India), Kanak Yadav (National Institute of Technology, Kurukshetra, India)and Rohit Bathla (National Institute of Technology, Kurukshetra, India)
Copyright: 2022
Pages: 18
Source title: Advances in Malware and Data-Driven Network Security
Source Author(s)/Editor(s): Brij B. Gupta (National Institute of Technology, Kurukshetra, India)
DOI: 10.4018/978-1-7998-7789-9.ch006

Purchase

View Malicious Node Detection Using Convolution Technique: Authentication in Wireless Sensor Networks (WSN) on the publisher's website for pricing and purchasing information.

Abstract

Considering the situation when the node which is entering in the network is a malicious node, it can check and record the various operations of the network which could be responsible for some serious security issues. In order to safeguard the network, the author propose an approach which is in view of the advanced encoding strategy, termed as convolution coding approach. According to the requirement of network, the initial bits are assigned, and by applying the convolution technique, the final code is generated for each and every node. Considering the fact that it is a digital method, the codes can be represented by using the binary number system. All the nodes that are a part of the network will be having their corresponding final binary code, say C. The verification of each node is carried out by matching the generated code C with the security code within a particular time period before transmitting the data. This process enables the detection of malicious or attacker node. Furthermore, to enhance the versatility and execution, the system is organized into clusters.

Related Content

Chaymaâ Boutahiri, Ayoub Nouaiti, Aziz Bouazi, Abdallah Marhraoui Hsaini. © 2024. 14 pages.
Imane Cheikh, Khaoula Oulidi Omali, Mohammed Nabil Kabbaj, Mohammed Benbrahim. © 2024. 30 pages.
Tahiri Omar, Herrou Brahim, Sekkat Souhail, Khadiri Hassan. © 2024. 19 pages.
Sekkat Souhail, Ibtissam El Hassani, Anass Cherrafi. © 2024. 14 pages.
Meryeme Bououchma, Brahim Herrou. © 2024. 14 pages.
Touria Jdid, Idriss Chana, Aziz Bouazi, Mohammed Nabil Kabbaj, Mohammed Benbrahim. © 2024. 16 pages.
Houda Bentarki, Abdelkader Makhoute, Tőkési Karoly. © 2024. 10 pages.
Body Bottom