mobile wireless sensor networks
Recently Published Documents


TOTAL DOCUMENTS

577
(FIVE YEARS 89)

H-INDEX

26
(FIVE YEARS 4)

2022 ◽  
Vol 2022 ◽  
pp. 1-12
Author(s):  
Xia Xu ◽  
Jin Tang ◽  
Hua Xiang

With the rapid development of the Internet in recent years, people are using the Internet less and less frequently. People publish and obtain information through various channels on the Internet, and online social networks have become one of the most important channels. Many nodes in social networks and frequent interactions between nodes create great difficulties for privacy protection, and some of the existing studies also have problems such as cumbersome computational steps and low efficiency. In this paper, we take the complex environment of social networks as the research background and focus on the key issues of mobile wireless sensor network reliability from the mobile wireless sensor networks that apply to large-scale, simpler information, and delay tolerance. By introducing intelligent learning methods and swarm intelligence bionic optimization algorithms, we address reliability issues such as mobile wireless sensor network fault prediction methods and topology reliability assessment methods in industrial application environments, the impact of mobile path optimization of mobile wireless sensor networks on data collection efficiency and network reliability, reliable data transmission based on data fusion methods, and intelligent fault tolerance strategies for multipath routing to ensure mobile wireless sensor networks operate energy-efficiently and reliably in complex industrial application environments.


Mobile wireless sensor networks are made up of resource-constrained sensor nodes.The nodes in Mobile wireless sensor networks tend to move wirelessly from one location to another. In physically unattended and insecure areas, these networks are installed where they are vulnerable to numerous security threats, including physical security threats.Clone node attack is a physical attack in which the adversary physically compromises legitimate nodes and copies their data onto fake nodes to create clones of captured nodes. In static wireless sensor networks, comprehensive work isalready done to mitigate and detect the underlying attack. Mitigating and detecting this assault on mobile wireless sensor networks, however, remains a critical issue. To our knowledge, there is no framework-based method for bolstering multiple attacks onmobile wireless sensor networks.Consequently, this article proposes a framework-based approach that mitigates multiple attacks on mobile WSNs. To provide proof-of-concept for the framework, along with clone node attacks solution to jamming attacks is alsoincorporated in the framework. The implementation of the framework is done with the COOJA simulator and Contiki OS.


Sign in / Sign up

Export Citation Format

Share Document