EURASIP Journal on Wireless Communications and Networking (Jan 2019)

Security to wireless sensor networks against malicious attacks using Hamming residue method

  • Majid Alotaibi

DOI
https://doi.org/10.1186/s13638-018-1337-5
Journal volume & issue
Vol. 2019, no. 1
pp. 1 – 7

Abstract

Read online

Abstract Wireless sensor networks (WSNs) consist of small sensor nodes with limited energy. Such nodes have the ability to monitor the physical conditions and communicate information among the nodes without the requirement of the physical medium. WSNs are autonomous and are distributed in space. Due to the absence of central authority and random deployment of nodes in the network, WSN is prone to security threats. Well-known attacks in WSN are a malicious attack (such as compromised node imitating as one of the network nodes, misleading other nodes). In the art of work, various methods are developed to overcome these attacks either by cryptographic approaches or by time synchronization. But these methods may fail because of WSN autonomous structure. In this paper, an efficient approach called Hamming residue method (HRM) is presented to mitigate the malicious attacks. The experimental results validate the presented approach.

Keywords