Loading…

A trusted effective approach for forecasting the failure of data link and intrusion in wireless sensor networks

Wireless sensor network (WSN) is often utilised in many different industries for a variety of purposes. The improved network access area and quick network setup make it an excellent technology. However, certain eradicating problems will also be present, slowing the expansion of the network. The fore...

Full description

Saved in:
Bibliographic Details
Published in:Theoretical computer science 2023-01, Vol.941, p.1-13
Main Authors: Srividya, Putty, Nirmala Devi, Lavadya, Nageswar Rao, A.
Format: Article
Language:English
Subjects:
Citations: Items that this one cites
Items that cite this one
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Wireless sensor network (WSN) is often utilised in many different industries for a variety of purposes. The improved network access area and quick network setup make it an excellent technology. However, certain eradicating problems will also be present, slowing the expansion of the network. The forecasting of connection failure is still thought to be a mystery in the WSN area. The suggested method provides a thorough understanding of connection failure. This method introduces the proficient trustworthy Node ID dependent resource reservation protocol (PTN-RRP). Then, using technique weighted on end-to-end latency, the shortest path is identified. Major issues with WSN include data link failure and intrusions. This method might increase the rate of detection since it determines the shortest route from a particular preliminary point to the target. The hop address and sequence number are added to the protocol by determining the shortest path. Following the discovery of the shortest path, the likelihood of connection failure is calculated. The established trustworthy etiquette adopted has a link failure structure that can foresee and resolve connection failure-related problems. After that, a posterior probability evaluation approach is used to determine the type of assault in order to determine the attack reason intended for the connection failure. Finally, a simulation study is used to evaluate the performance of the suggested strategy. The simulation's results show that the proposed technique is extremely successful in identifying link breaks, and the developed algorithm for recognising the shortest path will shorten the time required to find the shortest way. To demonstrate the usefulness of the suggested methodology, the performance result is contrasted with currently used procedures. •It is a promising technology due to its higher range of the network connectivity and the fast set up of the network.•The proposed technique offers a detailed idea on the failure of link.•The shortest path from a specifi preliminary position to the traget is identified thus enhacing detection rate.•Highly effective in the link breakage detection and impletemented algorithm for shortest path recognition.
ISSN:0304-3975
1879-2294
DOI:10.1016/j.tcs.2022.08.004