Wireless Sensor Networks (WSNs) are widely used in environmental monitoring, military surveillance, healthcare, and smart cities. However, due to their distributed nature and limited resources, WSNs are highly vulnerable to various security threats, especially forwarding attacks, where malicious nodes selectively drop or alter data packets to disrupt communication. This paper proposes an efficient method for identifying forwarding attacks using multiple resources, such as node reputation, energy consumption, transmission delay, and packet delivery ratio. By integrating these parameters, the system can accurately detect abnormal behaviors and isolate compromised nodes without significantly affecting network performance. The proposed approach enhances the reliability, security, and lifetime of the network while maintaining low computational overhead. Simulation results demonstrate that the multi-resource detection model provides better accuracy and faster response compared to conventional trust-based or single-parameter techniques. This method contributes to building a more secure and resilient WSN infrastructure for critical real-time applications.
100
75
43
100
75
43
100
75
43
Copyright © 2019, This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC-BY-NY-SA). The use, distribution or reproduction in other forums is permitted, provided the original author(s) and the copyright owner(s) are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.
*Corresponding Author: K.S.N.V Someswara Rao, someswararaok@diet.edu.in
Disclaimer: All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article or claim that may be made by its manufacturer is not guaranteed or endorsed by the publisher.
Conflict of interest: The author declares that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.
Publisher’s note: All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article, or claim that may be made by its manufacturer, is not guaranteed or endorsed by the publisher.
Or share your Opinion
The rapid growth of digital education has led to increased demand for scalable and flexible learning solutions. This...
Cryogenics is the branch of science that deals with the production, behavior, and application of materials at extremely...
The rapid advancement of the Internet of Things (IoT) has revolutionized traditional agricultural practices by enabling real-time monitoring,...
Medical image segmentation is a crucial step in computer-aided diagnosis, treatment planning, and biomedical image analysis. This paper...
The exponential growth of social media platforms has generated massive amounts of unstructured text data, offering valuable insights...
Comments(0)