| dc.contributor.supervisor | Madhav, Kuthadi Venu | |
| dc.contributor.author | Marope, Modisaotsile | |
| dc.date.accessioned | 2022-02-01T07:19:14Z | |
| dc.date.available | 2022-02-01T07:19:14Z | |
| dc.date.issued | 2021-09 | |
| dc.identifier.citation | Marope, M. (2021) BA-LEACHC: biphase authentication based LEACH-C protocol for wireless sensor networks, Master's Thesis, Botswana International University of Science and Technology: Palapye. | en_US |
| dc.identifier.uri | http://repository.biust.ac.bw/handle/123456789/399 | |
| dc.description | Thesis (Msc Computer Science and Software Engineering) --Botswana International University of Science and Technology, 2021 | en_US |
| dc.description.abstract | The intention in Wireless Sensor Networks (WSNs) is to group sensed raw facts from geographical area under monitoring. Yet, sensor nodes sometimes report tempered (falsified) information resulting from malicious nodes. Hence, various studies recommend pre-identification of malicious node as essential for reliable and healthy networks. Different techniques have been proposed to deal with bogus sensor nodes in WSNs, ranging from authentication to trust based approaches. In this research, a recent lightweight scheme called Biphase Authentication Scheme (BAS) is utilised with genetic algorithm (GA) to integrate with (LEACH-C) Low Energy Adaptive Clustering Hierarchy Centralized clustering approach for identification as well as disjoin bogus nodes in WSN. BAS offers small-scale authentication based on unique identity number, master key, key generation based algorithm plus pairwise key. The LEACH-C genetic algorithm utilized with BAS successfully cross examine paths for all nodes connected to failed cluster head therefore, enabling for easy identification of sensor node linked to unsafe path and finally allowing for authentication process to isolate malicious node. The objective fitness approximation of GA in our work might appropriate basing on, extremely high calculation time of single solution, missing of the accurate model for fitness calculation and uncertainty of fitness function or distortion. The proposed approach (BA LEACHC) is more effective and resistant against denial of service attacks (DoS) due to successful bogus node identification and removal. Moreover, the envisioned protocol is able to provide security with minimal power consumption of 10.6 joules lower than its comparatives. | en_US |
| dc.language.iso | en | en_US |
| dc.publisher | Botswana International University of Science and Technology (BIUST) | en_US |
| dc.subject | BA-LEACHC | en_US |
| dc.subject | Wireless Sensor Network | en_US |
| dc.subject | Wireless Sensor Network Security | en_US |
| dc.subject | Biphase Authentication Scheme | en_US |
| dc.subject | Genetic Algorithm | en_US |
| dc.title | BA-LEACHC: biphase authentication based LEACH-C protocol for wireless sensor networks | en_US |
| dc.description.level | msc | en_US |
| dc.description.accessibility | unrestricted | en_US |
| dc.description.department | cis | en_US |