dc.contributor.supervisor |
Madhav, Kuthadi Venu |
|
dc.contributor.author |
Marope, Modisaotsile |
|
dc.date.accessioned |
2022-02-01T07:19:14Z |
|
dc.date.available |
2022-02-01T07:19:14Z |
|
dc.date.issued |
2021-09 |
|
dc.identifier.citation |
Marope, M. (2021) BA-LEACHC: biphase authentication based LEACH-C protocol for wireless sensor networks, Master's Thesis, Botswana International University of Science and Technology: Palapye. |
en_US |
dc.identifier.uri |
http://repository.biust.ac.bw/handle/123456789/399 |
|
dc.description |
Thesis (Msc Computer Science and Software Engineering) --Botswana International University of Science and Technology, 2021 |
en_US |
dc.description.abstract |
The intention in Wireless Sensor Networks (WSNs) is to group sensed raw facts from geographical
area under monitoring. Yet, sensor nodes sometimes report tempered (falsified) information
resulting from malicious nodes. Hence, various studies recommend pre-identification of malicious
node as essential for reliable and healthy networks. Different techniques have been proposed to
deal with bogus sensor nodes in WSNs, ranging from authentication to trust based approaches. In
this research, a recent lightweight scheme called Biphase Authentication Scheme (BAS) is utilised
with genetic algorithm (GA) to integrate with (LEACH-C) Low Energy Adaptive Clustering Hierarchy
Centralized clustering approach for identification as well as disjoin bogus nodes in WSN. BAS offers
small-scale authentication based on unique identity number, master key, key generation based
algorithm plus pairwise key. The LEACH-C genetic algorithm utilized with BAS successfully cross
examine paths for all nodes connected to failed cluster head therefore, enabling for easy
identification of sensor node linked to unsafe path and finally allowing for authentication process
to isolate malicious node. The objective fitness approximation of GA in our work might appropriate
basing on, extremely high calculation time of single solution, missing of the accurate model for
fitness calculation and uncertainty of fitness function or distortion. The proposed approach (BA
LEACHC) is more effective and resistant against denial of service attacks (DoS) due to successful
bogus node identification and removal. Moreover, the envisioned protocol is able to provide
security with minimal power consumption of 10.6 joules lower than its comparatives. |
en_US |
dc.language.iso |
en |
en_US |
dc.publisher |
Botswana International University of Science and Technology (BIUST) |
en_US |
dc.subject |
BA-LEACHC |
en_US |
dc.subject |
Wireless Sensor Network |
en_US |
dc.subject |
Wireless Sensor Network Security |
en_US |
dc.subject |
Biphase Authentication Scheme |
en_US |
dc.subject |
Genetic Algorithm |
en_US |
dc.title |
BA-LEACHC: biphase authentication based LEACH-C protocol for wireless sensor networks |
en_US |
dc.description.level |
msc |
en_US |
dc.description.accessibility |
unrestricted |
en_US |
dc.description.department |
cis |
en_US |