BIUSTRE

BA-LEACHC: biphase authentication based LEACH-C protocol for wireless sensor networks

Show simple item record

dc.contributor.supervisor Madhav, Kuthadi Venu
dc.contributor.author Marope, Modisaotsile
dc.date.accessioned 2022-02-01T07:19:14Z
dc.date.available 2022-02-01T07:19:14Z
dc.date.issued 2021-09
dc.identifier.citation Marope, M. (2021) BA-LEACHC: biphase authentication based LEACH-C protocol for wireless sensor networks, Master's Thesis, Botswana International University of Science and Technology: Palapye. en_US
dc.identifier.uri http://repository.biust.ac.bw/handle/123456789/399
dc.description Thesis (Msc Computer Science and Software Engineering) --Botswana International University of Science and Technology, 2021 en_US
dc.description.abstract The intention in Wireless Sensor Networks (WSNs) is to group sensed raw facts from geographical area under monitoring. Yet, sensor nodes sometimes report tempered (falsified) information resulting from malicious nodes. Hence, various studies recommend pre-identification of malicious node as essential for reliable and healthy networks. Different techniques have been proposed to deal with bogus sensor nodes in WSNs, ranging from authentication to trust based approaches. In this research, a recent lightweight scheme called Biphase Authentication Scheme (BAS) is utilised with genetic algorithm (GA) to integrate with (LEACH-C) Low Energy Adaptive Clustering Hierarchy Centralized clustering approach for identification as well as disjoin bogus nodes in WSN. BAS offers small-scale authentication based on unique identity number, master key, key generation based algorithm plus pairwise key. The LEACH-C genetic algorithm utilized with BAS successfully cross examine paths for all nodes connected to failed cluster head therefore, enabling for easy identification of sensor node linked to unsafe path and finally allowing for authentication process to isolate malicious node. The objective fitness approximation of GA in our work might appropriate basing on, extremely high calculation time of single solution, missing of the accurate model for fitness calculation and uncertainty of fitness function or distortion. The proposed approach (BA LEACHC) is more effective and resistant against denial of service attacks (DoS) due to successful bogus node identification and removal. Moreover, the envisioned protocol is able to provide security with minimal power consumption of 10.6 joules lower than its comparatives. en_US
dc.language.iso en en_US
dc.publisher Botswana International University of Science and Technology (BIUST) en_US
dc.subject BA-LEACHC en_US
dc.subject Wireless Sensor Network en_US
dc.subject Wireless Sensor Network Security en_US
dc.subject Biphase Authentication Scheme en_US
dc.subject Genetic Algorithm en_US
dc.title BA-LEACHC: biphase authentication based LEACH-C protocol for wireless sensor networks en_US
dc.description.level msc en_US
dc.description.accessibility unrestricted en_US
dc.description.department cis en_US


Files in this item

This item appears in the following Collection(s)

  • Faculty of Sciences
    This collection is made up of electronic theses and dissertations produced by post graduate students from Faculty of Sciences

Show simple item record

Search BIUSTRE


Browse

My Account