全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

An Energy-Efficient Cross-Layer Approach for Wireless Sensor Networks Security

DOI: 10.4236/jst.2025.151002, PP. 14-25

Keywords: WSN, Cross-Layer Approach, Intrusion Detection System, Security, Energy Efficiency

Full-Text   Cite this paper   Add to My Lib

Abstract:

Wireless sensor networks (WSN) represent an emerging technology that aims to offer major innovations in terms of capabilities. Their use is set to grow steadily in many areas. However, the resource limitations of sensor nodes are a major constraint, especially in terms of security. For this reason, extensive work has been conducted on designing security protocols, making a compromise between the level of security and resource consumption. Most of this work has been based on single-layer approaches that address the security problem at the level of a single layer of the OSI (Open Systems Interconnection) model. In this article, we address the security problem of WSN networks using cross-layer methodology to propose a multi-layer solution. In this solution, the principle is based on the interaction and collaboration of three adjacent layers (physical layer, link layer and network layer). It implements two intrusion detection agents: a local intrusion detection agent and a global intrusion detection agent. The solutions algorithm includes an initialization phase and a detection phase. Several simulations were carried out to demonstrate the feasibility and efficiency of this solution in terms of packet transmission rate and energy consumption in a network of twenty-two sensor nodes. By comparing our solution with those in the literature, we obtained a minimum packet transmission rate and energy consumption.

References

[1]  Akyildiz, I.F., Su, W.L., Sankarasubramaniam, Y. and Cayirci, E. (2002) A Survey on Sensor Networks. IEEE Communications Magazine, 40, 102-114.
https://doi.org/10.1109/mcom.2002.1024422
[2]  Aura, T., Nikander, P. and Leiwo, J. (2001) Dos-resistant Authentication with Client Puzzles. In: Christianson, B., Malcolm, J.A., Crispo, B. and Roe, M., Eds., Security Protocols. Security Protocols 2000, Springer, 170-177.
https://doi.org/10.1007/3-540-44810-1_22
[3]  Dimitriou, T. (2005) Efficient Mechanisms for Secure Inter-Node and Aggregation Processing in Sensor Networks. In: Syrotiuk, V.R. and Chávez, E., Eds., Ad-Hoc, Mobile, and Wireless Networks, Springer, 18-31.
https://doi.org/10.1007/11561354_4
[4]  Deng, H.M., Li, W. and Agrawal, D.P. (2002) Routing Security in Wireless Ad Hoc Networks. IEEE Communications Magazine, 40, 70-75.
https://doi.org/10.1109/mcom.2002.1039859
[5]  Brownfield, M.I., Mehrjoo, K., Fayez, A.S. and Davis, N.J. (2006) Wireless Sensor Network Energy-Adaptive Mac Protocol. CCNC 2006. 2006 3rd IEEE Consumer Communications and Networking Conference, 2006, Las Vegas, 8-10 January 2006, 778-782.
https://doi.org/10.1109/ccnc.2006.1593145
[6]  Eschenauer, L. and Gligor, V.D. (2002) A Key-Management Scheme for Distributed Sensor Networks. Proceedings of the 9th ACM Conference on Computer and Communications Security, Washington DC, 18-22 November 20024, 1-47.
https://doi.org/10.1145/586110.586117
[7]  Misra, S., Bhattarai, K. and Xue, G. (2011) Bambi: Blackhole Attacks Mitigation with Multiple Base Stations in Wireless Sensor Networks. 2011 IEEE International Conference on Communications (ICC), Kyoto, 5-9 June 2011, 1-5.
https://doi.org/10.1109/icc.2011.5962856
[8]  Srivastava, V. and Motani, M. (2005) Cross-Layer Design: A Survey and the Road Ahead. IEEE Communications Magazine, 43, 112-119.
https://doi.org/10.1109/mcom.2005.1561928
[9]  Rahhal, H.A., Ali, I.A. and Shaheen, S.I. (2011) A Novel Trust-Based Cross-Layer Model for Wireless Sensor Networks. 2011 28th National Radio Science Conference (NRSC), Cairo, 26-28 April 2011, 1-10.
https://doi.org/10.1109/nrsc.2011.5873629
[10]  Harbin, J.R., et al. (2012) The Sybil Attack in Sensor Networks: Analysis Defenses. Proceedings of the 3rd International Symposium on Information Processing in Sensor Networks (IPSN04), Berkeley, 26-27 April 2004, 259-268.
[11]  Monnet, Q. and Mokdad, L. (2015) Dos Detection in WSNs: Energy Efficient Designs and Modeling Tools for Choosing Monitoring Nodes. In: Obaidat, M.S., Nicopolitidis, P. and Zarai, F., Eds., Modeling and Simulation of Computer Networks and Systems, Elsevier, 795-840.
https://doi.org/10.1016/b978-0-12-800887-4.00028-6

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133