Academic Journal
EFFICIENT MALICIOUS NODE DETECTION IN WIRELESS SENSOR NETWORKS USING RABIN-KARP ALGORITHM
العنوان: | EFFICIENT MALICIOUS NODE DETECTION IN WIRELESS SENSOR NETWORKS USING RABIN-KARP ALGORITHM |
---|---|
المؤلفون: | T Devapriya, V Ganesan, S Velmurugan |
المصدر: | International Journal of Advances in Signal and Image Sciences, Vol 10, Iss 2, Pp 24-36 (2024) |
بيانات النشر: | XLESCIENCE, 2024. |
سنة النشر: | 2024 |
المجموعة: | LCC:Biotechnology LCC:Computer applications to medicine. Medical informatics |
مصطلحات موضوعية: | malicious node detection, wireless sensor networks, rabin-karp algorithm, data integrity, energy efficiency, Biotechnology, TP248.13-248.65, Computer applications to medicine. Medical informatics, R858-859.7 |
الوصف: | The resource-constrained nature of Wireless Sensor Networks (WSNs) makes efficient identification of rogue nodes a significant problem. A scalable, lightweight algorithm that can detect and mitigate harmful behavior is the goal of this effort to improve network security. The Rabin-Karp method, well-known for its pattern-matching efficiency, is modified to verify transmitted data packets using hashes. To guarantee the integrity of data flow inside the network, the technique uses hash comparisons to identify inconsistencies suggestive of rogue nodes. Maintaining high detection accuracy while reducing computing overhead, false positives, and energy consumption is the goal of the approach to be designed. To optimize network performance, the algorithm runs at the level of the cluster heads and filters packets before they reach the base station. The objective is to provide a dependable, scalable, and energy-efficient solution for WSN security. This will ensure that data remains intact and that rogue nodes cannot disrupt the network. This method improves the reliability of WSNs and guarantees continuous monitoring, making them ideal for mission-critical applications. Incorporating the Rabin-Karp algorithm solves the urgent problem of trustworthy malicious node identification in contemporary WSNs by striking a compromise between computational efficiency and effective security. |
نوع الوثيقة: | article |
وصف الملف: | electronic resource |
اللغة: | English |
تدمد: | 2457-0370 |
Relation: | https://xlescience.org/index.php/IJASIS/article/view/176; https://doaj.org/toc/2457-0370 |
DOI: | 10.29284/ijasis.10.2.2024.24-36 |
URL الوصول: | https://doaj.org/article/b958bd3c317f45068982019ef8d4ed2b |
رقم الانضمام: | edsdoj.b958bd3c317f45068982019ef8d4ed2b |
قاعدة البيانات: | Directory of Open Access Journals |
تدمد: | 24570370 |
---|---|
DOI: | 10.29284/ijasis.10.2.2024.24-36 |