Performance comparison of different algorithms to secure the information for Wireless sensor Network
In WSNs “Wireless Sensor Network” and ad hoc networks, efficient and secure routing protocols are essential to ensure reliable communication and optimal resource utilization. Cluster-based routing is organizing the network into clusters, a designated cluster head manages each cluster, which improves...
Saved in:
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
EDP Sciences
2024-01-01
|
Series: | ITM Web of Conferences |
Subjects: | |
Online Access: | https://www.itm-conferences.org/articles/itmconf/pdf/2024/12/itmconf_maih2024_04005.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841554713092292608 |
---|---|
author | El Gatte Oumayma El Abbassi Ahmed Mouhib Omar Tilioua Amine |
author_facet | El Gatte Oumayma El Abbassi Ahmed Mouhib Omar Tilioua Amine |
author_sort | El Gatte Oumayma |
collection | DOAJ |
description | In WSNs “Wireless Sensor Network” and ad hoc networks, efficient and secure routing protocols are essential to ensure reliable communication and optimal resource utilization. Cluster-based routing is organizing the network into clusters, a designated cluster head manages each cluster, which improves scalability and reduces routing overhead. This approach is highly effective in balancing energy consumption and extending network lifetime, particularly in large-scale networks. Conversely, trust-based routing protocols establishing trust metrics for each node, which are used to make routing decisions in order to prioritize security. This method mitigates the risk of attacks by identifying and isolating malicious nodes, thereby ensuring the integrity and confidentiality of data transmission. The integration of blockchain technology with convolutional neural networks (CNNs) represents a promising frontier in decentralized artificial intelligence (AI). However, this fusion has led to considerable security within both the blockchain and AI communities. Through a detailed comparison of these methodologies, this paper highlights their respective advantages, limitations, and potential applications in term of security and energy. The findings suggest that while cluster-based routing is well-suited for energy-efficient networks with stable topologies, trust-based routing offers superior security features, making it ideal for environments with higher risks of node compromise, and the blockchain associated to the CNN ensure a high security. |
format | Article |
id | doaj-art-7abeaedc5e2b458989a292d7a0a453cb |
institution | Kabale University |
issn | 2271-2097 |
language | English |
publishDate | 2024-01-01 |
publisher | EDP Sciences |
record_format | Article |
series | ITM Web of Conferences |
spelling | doaj-art-7abeaedc5e2b458989a292d7a0a453cb2025-01-08T10:58:54ZengEDP SciencesITM Web of Conferences2271-20972024-01-01690400510.1051/itmconf/20246904005itmconf_maih2024_04005Performance comparison of different algorithms to secure the information for Wireless sensor NetworkEl Gatte Oumayma0El Abbassi Ahmed1Mouhib Omar2Tilioua Amine3Laboratory of Electronics Systems, Information Processing, Mechanics and energetic, faculty of sciences, Ibn Tofail University, Campus UniversitaireTeam Renewable Energies, Information Processing and Transmission Laboratory, Department of Engineering Sciences, Faculty of Sciences and Techniques Errachidia, Moulay Ismaïl University of MeknèsLaboratory of Electronics Systems, Information Processing, Mechanics and energetic, faculty of sciences, Ibn Tofail University, Campus UniversitaireResearch Team in Thermal and Applied Thermodynamics (2.T.A.), Mechanics, Energy Efficiency and Renewable Energies Laboratory, (L.M.3.E.R.). Department of Engineering Sciences, Faculty of Sciences and Techniques ErrachidiaIn WSNs “Wireless Sensor Network” and ad hoc networks, efficient and secure routing protocols are essential to ensure reliable communication and optimal resource utilization. Cluster-based routing is organizing the network into clusters, a designated cluster head manages each cluster, which improves scalability and reduces routing overhead. This approach is highly effective in balancing energy consumption and extending network lifetime, particularly in large-scale networks. Conversely, trust-based routing protocols establishing trust metrics for each node, which are used to make routing decisions in order to prioritize security. This method mitigates the risk of attacks by identifying and isolating malicious nodes, thereby ensuring the integrity and confidentiality of data transmission. The integration of blockchain technology with convolutional neural networks (CNNs) represents a promising frontier in decentralized artificial intelligence (AI). However, this fusion has led to considerable security within both the blockchain and AI communities. Through a detailed comparison of these methodologies, this paper highlights their respective advantages, limitations, and potential applications in term of security and energy. The findings suggest that while cluster-based routing is well-suited for energy-efficient networks with stable topologies, trust-based routing offers superior security features, making it ideal for environments with higher risks of node compromise, and the blockchain associated to the CNN ensure a high security.https://www.itm-conferences.org/articles/itmconf/pdf/2024/12/itmconf_maih2024_04005.pdfwireless sensor network (wsn)convolutional neural network (cnn)cluster-based routingtrust-based routingblockchain |
spellingShingle | El Gatte Oumayma El Abbassi Ahmed Mouhib Omar Tilioua Amine Performance comparison of different algorithms to secure the information for Wireless sensor Network ITM Web of Conferences wireless sensor network (wsn) convolutional neural network (cnn) cluster-based routing trust-based routing blockchain |
title | Performance comparison of different algorithms to secure the information for Wireless sensor Network |
title_full | Performance comparison of different algorithms to secure the information for Wireless sensor Network |
title_fullStr | Performance comparison of different algorithms to secure the information for Wireless sensor Network |
title_full_unstemmed | Performance comparison of different algorithms to secure the information for Wireless sensor Network |
title_short | Performance comparison of different algorithms to secure the information for Wireless sensor Network |
title_sort | performance comparison of different algorithms to secure the information for wireless sensor network |
topic | wireless sensor network (wsn) convolutional neural network (cnn) cluster-based routing trust-based routing blockchain |
url | https://www.itm-conferences.org/articles/itmconf/pdf/2024/12/itmconf_maih2024_04005.pdf |
work_keys_str_mv | AT elgatteoumayma performancecomparisonofdifferentalgorithmstosecuretheinformationforwirelesssensornetwork AT elabbassiahmed performancecomparisonofdifferentalgorithmstosecuretheinformationforwirelesssensornetwork AT mouhibomar performancecomparisonofdifferentalgorithmstosecuretheinformationforwirelesssensornetwork AT tiliouaamine performancecomparisonofdifferentalgorithmstosecuretheinformationforwirelesssensornetwork |