SEC-MAC: A Secure Wireless Sensor Network Based on Cooperative Communication
Guardado en:
| Publicado en: | International Journal of Advanced Computer Science and Applications vol. 16, no. 1 (2025) |
|---|---|
| Autor principal: | |
| Publicado: |
Science and Information (SAI) Organization Limited
|
| Materias: | |
| Acceso en línea: | Citation/Abstract Full Text - PDF |
| Etiquetas: |
Sin Etiquetas, Sea el primero en etiquetar este registro!
|
MARC
| LEADER | 00000nab a2200000uu 4500 | ||
|---|---|---|---|
| 001 | 3168740472 | ||
| 003 | UK-CbPIL | ||
| 022 | |a 2158-107X | ||
| 022 | |a 2156-5570 | ||
| 024 | 7 | |a 10.14569/IJACSA.2025.0160108 |2 doi | |
| 035 | |a 3168740472 | ||
| 045 | 2 | |b d20250101 |b d20251231 | |
| 100 | 1 | |a PDF | |
| 245 | 1 | |a SEC-MAC: A Secure Wireless Sensor Network Based on Cooperative Communication | |
| 260 | |b Science and Information (SAI) Organization Limited |c 2025 | ||
| 513 | |a Journal Article | ||
| 520 | 3 | |a Wireless Sensor Networks (WSNs) are essential for a wide range of applications, from environmental monitoring to security systems. However, challenges such as energy efficiency, throughput, and packet delivery delay need to be addressed to enhance network performance. This paper introduces a novel Medium Access Control (MAC) protocol that utilizes cooperative communication strategies to improve these critical metrics. The proposed protocol enables source nodes to leverage intermediate nodes as relays, facilitating efficient data transmission to the access point. By employing a cross-layer approach, the protocol optimizes the selection of relay nodes based on factors like transmission time and residual energy, ensuring optimal end-to-end paths. The protocol's performance is rigorously evaluated using a simulation environment, demonstrating significant improvements over existing methods. Specifically, the protocol enhances throughput by 12%, boosts energy efficiency by 50%, and reduces average packet delivery delay by approximately 48% than IEEE 802.11b. These results indicate that the protocol not only extends the lifespan of sensor nodes by conserving energy but also improves the overall reliability and efficiency of the WSN, making it a robust solution for modern wireless sensor networks. Security in Wireless Sensor Networks (WSNs) is crucial due to vulnerabilities like eavesdropping, data tampering, and denial of service attacks. Our proposed MAC protocol addresses these challenges by incorporating authentication techniques, such as the handshaking protocol. These measures protect data integrity, confidentiality, and availability, ensuring reliable and secure data transmission across the network. This approach enhances the resilience of WSNs, making them more secure and trustworthy for critical applications such as healthcare and security monitoring. | |
| 653 | |a Residual energy | ||
| 653 | |a System reliability | ||
| 653 | |a Performance evaluation | ||
| 653 | |a Wireless communications | ||
| 653 | |a Security systems | ||
| 653 | |a Network reliability | ||
| 653 | |a Environmental monitoring | ||
| 653 | |a Handshaking protocols | ||
| 653 | |a Wireless sensor networks | ||
| 653 | |a Nodes | ||
| 653 | |a Access control | ||
| 653 | |a Denial of service attacks | ||
| 653 | |a Data transmission | ||
| 653 | |a Cooperative control | ||
| 653 | |a Computer science | ||
| 653 | |a Communication | ||
| 653 | |a Energy consumption | ||
| 653 | |a Data integrity | ||
| 653 | |a Confidentiality | ||
| 653 | |a Sensors | ||
| 653 | |a Computer engineering | ||
| 653 | |a Design | ||
| 653 | |a Energy efficiency | ||
| 653 | |a Data encryption | ||
| 653 | |a Algorithms | ||
| 653 | |a Surveillance | ||
| 773 | 0 | |t International Journal of Advanced Computer Science and Applications |g vol. 16, no. 1 (2025) | |
| 786 | 0 | |d ProQuest |t Advanced Technologies & Aerospace Database | |
| 856 | 4 | 1 | |3 Citation/Abstract |u https://www.proquest.com/docview/3168740472/abstract/embedded/L8HZQI7Z43R0LA5T?source=fedsrch |
| 856 | 4 | 0 | |3 Full Text - PDF |u https://www.proquest.com/docview/3168740472/fulltextPDF/embedded/L8HZQI7Z43R0LA5T?source=fedsrch |