WSN is deployed in several critical places to monitor specific parameters such as border monitoring systems and others. If any unauthorized devices are placed or inserted into this network, then it will lead to huge information loss or threat. Several works are done in this field of study, including fake node detection, encryption, malicious node detection, etc. With the help of physical and analytical redundancy (spatial redundancy) in the system, error recovery can be made if the sensor node gets corrupted (fake node) and still sends authentic data. Several methodologies are implemented on wireless sensor networks to improve security, such as Conditional Random Field, Hidden Markov models (HMMs), SDN gateway, the hybrid model combines blockchain technology with CNF and HMM. Recently, encryption techniques have been used in the implementation of blockchain technology to improve security.
MACBT Algorithm: Two-Layer Security in WSN
Santosh Anand,Thilagaraj T,Seema Firdose,Bharath B C
Published 2024 in 2024 Second International Conference on Emerging Trends in Information Technology and Engineering (ICETITE)
ABSTRACT
PUBLICATION RECORD
- Publication year
2024
- Venue
2024 Second International Conference on Emerging Trends in Information Technology and Engineering (ICETITE)
- Publication date
2024-02-22
- Fields of study
Not labeled
- Identifiers
- External record
- Source metadata
Semantic Scholar
CITATION MAP
EXTRACTION MAP
CLAIMS
- No claims are published for this paper.
CONCEPTS
- No concepts are published for this paper.
REFERENCES
Showing 1-34 of 34 references · Page 1 of 1
CITED BY
Showing 1-1 of 1 citing papers · Page 1 of 1