Wireless sensor networks of battlefields hotspot: Challenges and solutions

In recent years, a lot of research is focused on wireless sensor network applications, which is focused on field of performance, security, and energy. This paper addressed the difficulties and challenges facing the wireless sensor networks on the battlefield. Which is often vulnerable to attackerpsilas networks either in the data or corrupting control devices and attempt to consume a lot of energy by sending a large quantity of useless packets, which contributes to excessive consumption of energy and leads to exit nodes from work. Since technology has become widespread on battlefields at the present time, then the sensor nodes are vulnerable to attackers from both sides. This research discussed many challenges and gave appropriate solutions. The simulations showed that these solutions can help secure data and saved 40% of energy consumed.

[1]  Mario Gerla,et al.  Multicluster, mobile, multimedia radio network , 1995, Wirel. Networks.

[2]  C C. Chiang,et al.  Routing in Clustered Multihop, Mobile Wireless Networks With Fading Channel , 1997 .

[3]  Stefano Basagni,et al.  Distributed clustering for ad hoc networks , 1999, Proceedings Fourth International Symposium on Parallel Architectures, Algorithms, and Networks (I-SPAN'99).

[4]  Wendi Heinzelman,et al.  Proceedings of the 33rd Hawaii International Conference on System Sciences- 2000 Energy-Efficient Communication Protocol for Wireless Microsensor Networks , 2022 .

[5]  Peter Kruus,et al.  CONSTRAINTS AND APPROACHES FOR DISTRIBUTED SENSOR NETWORK SECURITY , 2000 .

[6]  J.A. Stankovic,et al.  Denial of Service in Sensor Networks , 2002, Computer.

[7]  John R. Douceur,et al.  The Sybil Attack , 2002, IPTPS.

[8]  Mingyan Liu,et al.  Analysis of energy consumption and lifetime of heterogeneous wireless sensor networks , 2002, Global Telecommunications Conference, 2002. GLOBECOM '02. IEEE.

[9]  Edward J. Coyle,et al.  An energy efficient hierarchical clustering algorithm for wireless sensor networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[10]  C. Karlof,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[11]  Leonidas J. Guibas,et al.  Discrete Mobile Centers , 2003, Discret. Comput. Geom..

[12]  Guillermo A. Francia A Wireless Sensor Network , 2003, International Conference on Wireless Networks.

[13]  Elaine Shi,et al.  The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.

[14]  Michael S. Hsiao,et al.  Denial-of-service attacks on battery-powered mobile computers , 2004, Second IEEE Annual Conference on Pervasive Computing and Communications, 2004. Proceedings of the.

[15]  John A. Stankovic,et al.  Security in wireless sensor networks , 2004, SASN '04.

[16]  Shivakant Mishra,et al.  Defending against path-based DoS attacks in wireless sensor networks , 2005, SASN '05.

[17]  M. Brownfield,et al.  Wireless sensor network denial of sleep attack , 2005, Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop.