CINXE.COM
{"title":"Detecting and Secluding Route Modifiers by Neural Network Approach in Wireless Sensor Networks","authors":"C. N. Vanitha, M. Usha","volume":121,"journal":"International Journal of Electronics and Communication Engineering","pagesStart":43,"pagesEnd":47,"ISSN":"1307-6892","URL":"https:\/\/publications.waset.org\/pdf\/10006115","abstract":"<p>In a real world scenario, the viability of the sensor networks has been proved by standardizing the technologies. Wireless sensor networks are vulnerable to both electronic and physical security breaches because of their deployment in remote, distributed, and inaccessible locations. The compromised sensor nodes send malicious data to the base station, and thus, the total network effectiveness will possibly be compromised. To detect and seclude the Route modifiers, a neural network based Pattern Learning predictor (PLP) is presented. This algorithm senses data at any node on present and previous patterns obtained from the en-route nodes. The eminence of any node is upgraded by their predicted and reported patterns. This paper propounds a solution not only to detect the route modifiers, but also to seclude the malevolent nodes from the network. The simulation result proves the effective performance of the network by the presented methodology in terms of energy level, routing and various network conditions.<\/p>\r\n","references":"[1]\tKyoungsoo Bok,1 Yunjeong Lee,2 Junho Park,3 and Jaesoo Yoo.\u201d An Energy-Efficient Secure Scheme in Wireless Sensor Networks\u201d, Hindawi, Journal of Sensors, Article ID 1321079, 11 pages, Volume 2016 (2016).\r\n[2]\tC. Zhu, L. Shu, T. Hara, L. Wang, S. Nishio, and L. T. Yang, \u201cA survey on communication and data management issues in mobile sensor networks\u201d, Wireless Communications and Mobile Computing, vol. 14, no. 1, pp. 19\u201336, 2014.\r\n[3]\tTao Li; Pingyi Fan; Zhengchuan Chen; Khaled Ben Letaief, \u201cOptimum Transmission Policies for Energy Harvesting Sensor Networks Powered by a Mobile Control Center\u201d, IEEE Transactions on Wireless Communications, Volume: 15, Issue: 9 Pages: 6132 - 6145, 2016.\r\n[4]\tP. Annadurai, S. Vijayalakshmi, \u201cIdentifying malicious node using trust value in cluster based MANET (IMTVCM), IEEE, International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT), 2014 .\r\n[5]\tNirav J. Patel, Rutvij H. Jhaveri ,\u201dDetecting packet dropping nodes using machine learning techniques in Mobile ad-hoc network: A survey\u201d, IEEE International Conference on Signal Processing And Communication Engineering Systems (SPACES), 2015.\r\n[6]\tJheena Rathore, Venkataramana Badarla, Supratim shit \u201cConsensus- Aware Sociopsychological Trust model for wireless sensor networks\u201d, ACM Transactions on sensor networks(TOSN), Volume 12, Issue 3, August 2016.\r\n[7]\tCN Vanitha, M Usha,\u201d An Improved Version of Data filtration using Enhanced Routing Control Protocol in Wireless Sensor Networks\u201d, International journal of Applied Engineering and Research, Volume 10, Issue No.46, pp.32036-32043, 2015.\r\n[8]\tM. Usha, C. N. Vanitha, \u201cPruning Route Modifiers in Wireless Sensor Networks, Springer, Wireless Personal Communications, Volume 89, Issue 1, pp 27\u201343, July 2016.\r\n[9]\tKyung-Ah Shim,\u201d A Survey of Public-Key Cryptographic Primitives in Wireless Sensor Networks\u201d, IEEE Communications Surveys & Tutorials, Volume: 18, Issue: 1, 2016.\r\n[10]\tJ. Sengathir, R. Manoharan, \u201cSelfish Conscious Mathematical Model based on Reliable Conditional Survivability Co-efficient in MANET Routing\u201d, Elsevier, 2013.","publisher":"World Academy of Science, Engineering and Technology","index":"Open Science Index 121, 2017"}