A Comprehensive Security Framework for Wireless Sensor Networks using SHA۲۵۶ and CNNs

Publish Year: 1404
نوع سند: مقاله ژورنالی
زبان: English
View: 21

This Paper With 18 Page And PDF Format Ready To Download

  • Certificate
  • من نویسنده این مقاله هستم

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این Paper:

شناسه ملی سند علمی:

JR_IJE-38-1_019

تاریخ نمایه سازی: 2 مهر 1403

Abstract:

Wireless Sensor Networks (WSNs) serve as vital infrastructure across various domains; yet face escalating cyber threats that challenge their security and integrity. Current security approaches exhibit limitations, such as inadequate granularity in addressing node and cluster head vulnerabilities, and a lack of cohesive prevention-detection strategies. In response, this research proposes a novel two-phase security method tailored for WSNs. The first phase employs Convolutional Neural Networks (CNNs) optimized with the Emperor Penguin algorithm for precise intrusion detection at the node level. Enhanced data security is ensured through integration of the SHA۲۵۶ hashing algorithm, bolstering both prevention and detection strategies. Subsequently, the second phase extends this approach to cluster heads, forming a cohesive security framework informed by the first phase's output. This comprehensive methodology not only addresses current challenges but also represents a significant leap forward in WSN security, promising robust protection against evolving threats. The obtained results indicate that the proposed method not only enhance the security of both nodes and clusterheads, but also integrating SHA۲۵۶ can improve preventation without harming the detection phase.

Authors

K. Al-fatlawi

Faculty of Electrical and Computer Engineering, Babol Noshirvani University of Technology, Babol, Iran

J. Kazemitabar

Faculty of Electrical and Computer Engineering, Babol Noshirvani University of Technology, Babol, Iran

مراجع و منابع این Paper:

لیست زیر مراجع و منابع استفاده شده در این Paper را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود Paper لینک شده اند :
  • Fuchsberger A. Intrusion detection systems and intrusion prevention systems. Information ...
  • Haseeb K, Islam N, Almogren A, Din IU. Intrusion prevention ...
  • Chandre PR, Mahalle P, Shinde G. Intrusion prevention system using ...
  • Krishnan R, Krishnan RS, Robinson YH, Julie EG, Long HV, ...
  • Alsahli MS, Almasri MM, Al-Akhras M, Al-Issa AI, Alawairdhi M. ...
  • Sarkunavathi A, Srinivasan V, Ramalingam M. Dense Net RNN–An Intrusion ...
  • Choudhary D, Pahuja R, editors. Prevention of intrusion attacks via ...
  • Babu T, Jayalakshmi V. Conglomerate energy efficient Elgamal encryption based ...
  • Arkan A, Ahmadi M. An unsupervised and hierarchical intrusion detection ...
  • Karthic S, Kumar SM. Hybrid optimized deep neural network with ...
  • Biswas P, Samanta T, Sanyal J. Intrusion detection using graph ...
  • Sood T, Prakash S, Sharma S, Singh A, Choubey H. ...
  • Gowdhaman V, Dhanapal R. An intrusion detection system for wireless ...
  • Safaldin M, Otair M, Abualigah L. Improved binary gray wolf ...
  • Pan J-S, Fan F, Chu S-C, Zhao H-Q, Liu G-Y. ...
  • Tan X, Su S, Huang Z, Guo X, Zuo Z, ...
  • Otair M, Ibrahim OT, Abualigah L, Altalhi M, Sumari P. ...
  • Bhushan B, Sahoo G, editors. A hybrid secure and energy ...
  • Zare F, Mahmoudi-Nasr P. Feature Engineering Methods in Intrusion Detection ...
  • Gupta PK, Singh NK, Mahajan V. Intrusion detection in cyber-physical ...
  • Kia G, Hassanzadeh A. HYREP: A hybrid low-power protocol for ...
  • Saputra D, Gaol FL, Abdurachman E, Sensuse DI, Matsuo T. ...
  • Singh S, Rosak-Szyrocka J, Tamàndl L. Development, service-oriented architecture, and ...
  • Yaro AS, Maly F, Prazak P, Maly K. Outlier detection ...
  • Salmi S, Oughdir L. Performance evaluation of deep learning techniques ...
  • Gite P, Chouhan K, Krishna KM, Nayak CK, Soni M, ...
  • Aljebreen M, Alohali MA, Saeed MK, Mohsen H, Al Duhayyim ...
  • Ramana K, Revathi A, Gayathri A, Jhaveri RH, Narayana CL, ...
  • Subbiah S, Anbananthen KSM, Thangaraj S, Kannan S, Chelliah D. ...
  • Ahmadi M, Jameii S. A secure routing algorithm for underwater ...
  • Premkumar M, Ashokkumar S, Jeevanantham V, Mohanbabu G, Anupallavi S. ...
  • Jiang S, Zhao J, Xu X. SLGBM: An intrusion detection ...
  • Otoum S, Kantarci B, Mouftah HT, editors. A novel ensemble ...
  • Devi M, Nandal P, Sehrawat H. A novel rule-based intrusion ...
  • García R, Algredo-Badillo I, Morales-Sandoval M, Feregrino-Uribe C, Cumplido R. ...
  • Gowthaman A, Sumathi M. Performance study of enhanced SHA-۲۵۶ algorithm. ...
  • Suman RR, Mondal B, Mandal T. A secure encryption scheme ...
  • Gueron S, Johnson S, Walker J, editors. SHA-۵۱۲/۲۵۶. ۲۰۱۱ Eighth ...
  • Hu J, Liu C, Cui Y. An improved CNN approach ...
  • Hubel DH, Wiesel TN. Receptive fields and functional architecture of ...
  • Yamashita R, Nishio M, Do RKG, Togashi K. Convolutional neural ...
  • O'Shea K. An introduction to convolutional neural networks. arXiv preprint ...
  • Mohammadpour L, Ling TC, Liew CS, Aryanfar A. A survey ...
  • Harifi S, Khalilian M, Mohammadzadeh J, Ebrahimnejad S. Emperor Penguins ...
  • Gautami A, Shanthini J, Karthik S. A Quasi-Newton Neural Network ...
  • Zhang W, Han D, Li K-C, Massetto FI. Wireless sensor ...
  • نمایش کامل مراجع