MACBT Algorithm: Two-Layer Security in WSN

Santosh Anand,Thilagaraj T,Seema Firdose,Bharath B C

Published 2024 in 2024 Second International Conference on Emerging Trends in Information Technology and Engineering (ICETITE)

ABSTRACT

WSN is deployed in several critical places to monitor specific parameters such as border monitoring systems and others. If any unauthorized devices are placed or inserted into this network, then it will lead to huge information loss or threat. Several works are done in this field of study, including fake node detection, encryption, malicious node detection, etc. With the help of physical and analytical redundancy (spatial redundancy) in the system, error recovery can be made if the sensor node gets corrupted (fake node) and still sends authentic data. Several methodologies are implemented on wireless sensor networks to improve security, such as Conditional Random Field, Hidden Markov models (HMMs), SDN gateway, the hybrid model combines blockchain technology with CNF and HMM. Recently, encryption techniques have been used in the implementation of blockchain technology to improve security.

PUBLICATION RECORD

  • Publication year

    2024

  • Venue

    2024 Second International Conference on Emerging Trends in Information Technology and Engineering (ICETITE)

  • Publication date

    2024-02-22

  • Fields of study

    Not labeled

  • Identifiers
  • External record

    Open on Semantic Scholar

  • Source metadata

    Semantic Scholar

CITATION MAP

EXTRACTION MAP

CLAIMS

  • No claims are published for this paper.

CONCEPTS

  • No concepts are published for this paper.

REFERENCES

Showing 1-34 of 34 references · Page 1 of 1

CITED BY