Anomalous Cluster Heads and Nodes in Wireless Sensor Networks Pages 66-73

The majority of wireless sensor network (WSN) security protocols state that a direct connection from an attacker can give them total control of a sensor node. A high level of security is necessary for the acceptance and adoption of sensor networks in a variety of applications. In order to clarify th...

Full description

Saved in:
Bibliographic Details
Main Authors: Sare Gorgbandi, Reza Brangi
Format: Article
Language:English
Published: University of science and culture 2022-01-01
Series:International Journal of Web Research
Subjects:
Online Access:https://ijwr.usc.ac.ir/article_156424_3f5343969d3b585fced5a0b0420dded7.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841554996452130816
author Sare Gorgbandi
Reza Brangi
author_facet Sare Gorgbandi
Reza Brangi
author_sort Sare Gorgbandi
collection DOAJ
description The majority of wireless sensor network (WSN) security protocols state that a direct connection from an attacker can give them total control of a sensor node. A high level of security is necessary for the acceptance and adoption of sensor networks in a variety of applications. In order to clarify this issue, the current study focuses on identifying abnormalities in nodes and cluster heads as well as developing a method to identify new cluster heads and find anomalies in cluster heads and nodes. We simulated our suggested method using MATLAB tools and the Database of the Intel Research Laboratory. The purpose of the performed simulation is to identify the faulty sensor. Using the IBRL database, sensors that fail over time and their failure model is the form that shows the beats in the form of pulses, we find out that the sensor is broken and is of no value. Of course, this does not mean that the sensor is invasive or intrusive. We have tried by clustering through Euclidean distance that identify disturbing sensors. But in this part of the simulation, we didn't have any data that shows disturbing sensors, it only shows broken sensors. We have placed the sensors randomly in a 50 x 50 space and we want to identify the abnormal node.
format Article
id doaj-art-32f0a671db46480ca783f98e888fb1bc
institution Kabale University
issn 2645-4343
language English
publishDate 2022-01-01
publisher University of science and culture
record_format Article
series International Journal of Web Research
spelling doaj-art-32f0a671db46480ca783f98e888fb1bc2025-01-08T07:19:15ZengUniversity of science and cultureInternational Journal of Web Research2645-43432022-01-0151667310.22133/ijwr.2022.343273.1114Anomalous Cluster Heads and Nodes in Wireless Sensor Networks Pages 66-73Sare Gorgbandi0Reza Brangi1Faculty of Electrical Engineering, Iran University of Science and Technology, Tehran, IranFaculty of Electrical Engineering, Iran University of Science and Technology, Tehran, IranThe majority of wireless sensor network (WSN) security protocols state that a direct connection from an attacker can give them total control of a sensor node. A high level of security is necessary for the acceptance and adoption of sensor networks in a variety of applications. In order to clarify this issue, the current study focuses on identifying abnormalities in nodes and cluster heads as well as developing a method to identify new cluster heads and find anomalies in cluster heads and nodes. We simulated our suggested method using MATLAB tools and the Database of the Intel Research Laboratory. The purpose of the performed simulation is to identify the faulty sensor. Using the IBRL database, sensors that fail over time and their failure model is the form that shows the beats in the form of pulses, we find out that the sensor is broken and is of no value. Of course, this does not mean that the sensor is invasive or intrusive. We have tried by clustering through Euclidean distance that identify disturbing sensors. But in this part of the simulation, we didn't have any data that shows disturbing sensors, it only shows broken sensors. We have placed the sensors randomly in a 50 x 50 space and we want to identify the abnormal node.https://ijwr.usc.ac.ir/article_156424_3f5343969d3b585fced5a0b0420dded7.pdfcluster headclusteringanomalywireless sensor networksecuritynod
spellingShingle Sare Gorgbandi
Reza Brangi
Anomalous Cluster Heads and Nodes in Wireless Sensor Networks Pages 66-73
International Journal of Web Research
cluster head
clustering
anomaly
wireless sensor network
security
nod
title Anomalous Cluster Heads and Nodes in Wireless Sensor Networks Pages 66-73
title_full Anomalous Cluster Heads and Nodes in Wireless Sensor Networks Pages 66-73
title_fullStr Anomalous Cluster Heads and Nodes in Wireless Sensor Networks Pages 66-73
title_full_unstemmed Anomalous Cluster Heads and Nodes in Wireless Sensor Networks Pages 66-73
title_short Anomalous Cluster Heads and Nodes in Wireless Sensor Networks Pages 66-73
title_sort anomalous cluster heads and nodes in wireless sensor networks pages 66 73
topic cluster head
clustering
anomaly
wireless sensor network
security
nod
url https://ijwr.usc.ac.ir/article_156424_3f5343969d3b585fced5a0b0420dded7.pdf
work_keys_str_mv AT saregorgbandi anomalousclusterheadsandnodesinwirelesssensornetworkspages6673
AT rezabrangi anomalousclusterheadsandnodesinwirelesssensornetworkspages6673