用于无线传感器网络中传感器节点安全路由的基于多属性的增强型可信抗攻击(EMBTR)

IF 1.9 4区 计算机科学 Q3 TELECOMMUNICATIONS Wireless Personal Communications Pub Date : 2024-08-02 DOI:10.1007/s11277-024-11504-6
A. B. Feroz Khan
{"title":"用于无线传感器网络中传感器节点安全路由的基于多属性的增强型可信抗攻击(EMBTR)","authors":"A. B. Feroz Khan","doi":"10.1007/s11277-024-11504-6","DOIUrl":null,"url":null,"abstract":"<p>High-level security is crucial for protecting sensitive information transmitted across wireless sensor networks (WSNs). Secure routing plays a key role in preventing impersonation attacks within the network. Although numerous state-of-the-art routing models based on trusted metrics aim to enhance WSN security, challenges remain due to the network's dynamic nature. This paper introduces an enhanced multi-attribute-based trusted attack resistance (EMBTR) algorithm designed to securely manage routing using nodes' trust values. The proposed approach leverages Quality of Service (QoS) parameters such as stability rate (SR), reliability rate (RR), and elapsed time (ET) to improve network performance and combat trust-related attacks. By isolating misbehaving nodes based on their trust metrics, the algorithm establishes a reliable communication route. Comparisons with existing routing algorithms like TSRM (Trust-based Secure Routing Model) and TARF (Trust-aware Routing Framework for WSNs) demonstrate that the EMBTR algorithm effectively detects and eliminates malicious nodes, providing secure routing with higher detection rates and limited energy consumption compared to current solutions.</p>","PeriodicalId":23827,"journal":{"name":"Wireless Personal Communications","volume":null,"pages":null},"PeriodicalIF":1.9000,"publicationDate":"2024-08-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"An Enhanced Multi Attribute Based Trusted Attack Resistance (EMBTR) for the Secure Routing of Sensor Nodes in Wireless Sensor Network\",\"authors\":\"A. B. Feroz Khan\",\"doi\":\"10.1007/s11277-024-11504-6\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<p>High-level security is crucial for protecting sensitive information transmitted across wireless sensor networks (WSNs). Secure routing plays a key role in preventing impersonation attacks within the network. Although numerous state-of-the-art routing models based on trusted metrics aim to enhance WSN security, challenges remain due to the network's dynamic nature. This paper introduces an enhanced multi-attribute-based trusted attack resistance (EMBTR) algorithm designed to securely manage routing using nodes' trust values. The proposed approach leverages Quality of Service (QoS) parameters such as stability rate (SR), reliability rate (RR), and elapsed time (ET) to improve network performance and combat trust-related attacks. By isolating misbehaving nodes based on their trust metrics, the algorithm establishes a reliable communication route. Comparisons with existing routing algorithms like TSRM (Trust-based Secure Routing Model) and TARF (Trust-aware Routing Framework for WSNs) demonstrate that the EMBTR algorithm effectively detects and eliminates malicious nodes, providing secure routing with higher detection rates and limited energy consumption compared to current solutions.</p>\",\"PeriodicalId\":23827,\"journal\":{\"name\":\"Wireless Personal Communications\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":1.9000,\"publicationDate\":\"2024-08-02\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Wireless Personal Communications\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://doi.org/10.1007/s11277-024-11504-6\",\"RegionNum\":4,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q3\",\"JCRName\":\"TELECOMMUNICATIONS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Wireless Personal Communications","FirstCategoryId":"94","ListUrlMain":"https://doi.org/10.1007/s11277-024-11504-6","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"TELECOMMUNICATIONS","Score":null,"Total":0}
引用次数: 0

摘要

高级别安全对于保护无线传感器网络(WSN)中传输的敏感信息至关重要。安全路由在防止网络内的假冒攻击方面发挥着关键作用。尽管许多基于可信度标的先进路由模型旨在增强 WSN 的安全性,但由于网络的动态特性,挑战依然存在。本文介绍了一种基于多属性的增强型可信抗攻击(EMBTR)算法,旨在利用节点的信任值安全地管理路由。所提出的方法利用服务质量(QoS)参数,如稳定率(SR)、可靠率(RR)和经过时间(ET),来提高网络性能并对抗与信任相关的攻击。该算法根据节点的信任度来隔离行为不端的节点,从而建立可靠的通信路由。与 TSRM(基于信任的安全路由模型)和 TARF(用于 WSN 的信任感知路由框架)等现有路由算法的比较表明,EMBTR 算法能有效检测并消除恶意节点,与现有解决方案相比,它能以更高的检测率和有限的能耗提供安全路由。
本文章由计算机程序翻译,如有差异,请以英文原文为准。

摘要图片

查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
An Enhanced Multi Attribute Based Trusted Attack Resistance (EMBTR) for the Secure Routing of Sensor Nodes in Wireless Sensor Network

High-level security is crucial for protecting sensitive information transmitted across wireless sensor networks (WSNs). Secure routing plays a key role in preventing impersonation attacks within the network. Although numerous state-of-the-art routing models based on trusted metrics aim to enhance WSN security, challenges remain due to the network's dynamic nature. This paper introduces an enhanced multi-attribute-based trusted attack resistance (EMBTR) algorithm designed to securely manage routing using nodes' trust values. The proposed approach leverages Quality of Service (QoS) parameters such as stability rate (SR), reliability rate (RR), and elapsed time (ET) to improve network performance and combat trust-related attacks. By isolating misbehaving nodes based on their trust metrics, the algorithm establishes a reliable communication route. Comparisons with existing routing algorithms like TSRM (Trust-based Secure Routing Model) and TARF (Trust-aware Routing Framework for WSNs) demonstrate that the EMBTR algorithm effectively detects and eliminates malicious nodes, providing secure routing with higher detection rates and limited energy consumption compared to current solutions.

求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
Wireless Personal Communications
Wireless Personal Communications 工程技术-电信学
CiteScore
5.80
自引率
9.10%
发文量
663
审稿时长
6.8 months
期刊介绍: The Journal on Mobile Communication and Computing ... Publishes tutorial, survey, and original research papers addressing mobile communications and computing; Investigates theoretical, engineering, and experimental aspects of radio communications, voice, data, images, and multimedia; Explores propagation, system models, speech and image coding, multiple access techniques, protocols, performance evaluation, radio local area networks, and networking and architectures, etc.; 98% of authors who answered a survey reported that they would definitely publish or probably publish in the journal again. Wireless Personal Communications is an archival, peer reviewed, scientific and technical journal addressing mobile communications and computing. It investigates theoretical, engineering, and experimental aspects of radio communications, voice, data, images, and multimedia. A partial list of topics included in the journal is: propagation, system models, speech and image coding, multiple access techniques, protocols performance evaluation, radio local area networks, and networking and architectures. In addition to the above mentioned areas, the journal also accepts papers that deal with interdisciplinary aspects of wireless communications along with: big data and analytics, business and economy, society, and the environment. The journal features five principal types of papers: full technical papers, short papers, technical aspects of policy and standardization, letters offering new research thoughts and experimental ideas, and invited papers on important and emerging topics authored by renowned experts.
期刊最新文献
Capacity Analysis of a WLAN Cell Using VoWiFi Service for CBR Traffic Telecardiology in “New Normal” COVID-19: Efficacy of Neuro-Metaheuristic Session Key (NMSK) and Encryption Through Bipartite New State-of-Art Sharing A Robust Bias Reduction Method with Geometric Constraint for TDOA-Based Localization Variable Speed Drive Applications Performing Effectively with ANN Technique HE-AO: An Optimization-Based Encryption Approach for Data Delivery Model in A Multi-Tenant Environment
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1