Intrusion-Tolerant Sink Configuration: A Key to Prolonged Lifetime in Wireless Sensor Networks

Vaibhav Kapil Kanuru*, Deva Kumar Kunchapu**, Bandela Kalyan Krishna***, Saida Rao****
*-**** Department of Computer Science and Engineering, Vasireddy Venkatadri Institute of Technology, Andhra Pradesh, India.
Periodicity:July - December'2024
DOI : https://doi.org/10.26634/jwcn.13.1.20888

Abstract

This study investigates the pivotal role of sink configuration in enhancing the lifetime of Wireless Sensor Networks (WSNs). A comparative analysis between configurations employing 2 sinks and 3 sinks reveals that the latter significantly outperforms the former in terms of network longevity. The study delves into the integration of an intrusion-aware protocol, providing resilience during security breaches. This protocol stabilizes network lifetime amidst intrusion attacks, which is crucial for maintaining system efficiency. This work introduces a novel machine learning model tailored for WSNs, exhibiting superior accuracy on a WSN-specific dataset. Through these combined efforts, it presents a comprehensive approach to improving WSN lifetime, encompassing sink configuration optimization, intrusion tolerance, and innovative machine learning techniques.

Keywords

Multi-Sink Wireless Sensor Network, Precision Agriculture, Intrusion-tolerance, Sink Configuration, Network Longevity.

How to Cite this Article?

Kanuru, V. K., Kunchapu, D. K., Krishna, B. K., and Rao, S. (2024). Intrusion-Tolerant Sink Configuration: A Key to Prolonged Lifetime in Wireless Sensor Networks. i-manager’s Journal on Wireless Communication Networks, 13(1), 31-41. https://doi.org/10.26634/jwcn.13.1.20888

References

[1]. Ananthakumar, A., Ganediwal, T., & Kunte, A. (2015). Intrusion detection system in wireless sensor networks: A review. International Journal of Advanced Computer Science and Applications, 6(12), 131-139.
[7]. Ferentinos, K. P., Tsiligiridis, T. A., & Arvanitis, K. G. (2005, July). Energy optimization of wireless sensor networks for environmental measurements. In Proceedings of the International Conference on Computational Intelligence for Measurment Systems and Applicatons (CIMSA) (Vol. 51, pp. 1031-1051).
[12]. Rathod, V., & Mehta, M. (2011). Security in wireless sensor network: A survey. Ganpat University Journal of Engineering & Technology, 1(1), 35-44.
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.