Computer Networks and Distributed Systems
Behzad Seif; mohammad goodarzi
Volume 7, Issue 2 , May 2021, , Pages 93-102
Abstract
Today, the use of wireless sensor networks has become very popular in many applications. Due to the connection in wireless sensor networks, it is done wirelessly, so they are naturally insecure and prone to various types of attacks. In the past, various solutions were offered in this regard, each of ...
Read More
Today, the use of wireless sensor networks has become very popular in many applications. Due to the connection in wireless sensor networks, it is done wirelessly, so they are naturally insecure and prone to various types of attacks. In the past, various solutions were offered in this regard, each of which had its problems. Therefore, in this proposed solution, an attempt was made to solve these problems. The proposed solution for securing sensor nodes uses authentication based on the ZKP protocol, which has been improved with Interlock, and game theory has also been used to more quickly identify intrusive nodes. One of the most important benefits of the proposed solution is to prevent attacks such as sleep deprivation. The proposed algorithm is able to detect quickly and is able to prevent network damage in the fastest possible time. The proposed solution was implemented and reviewed in MATLAB environment and the studies showed a very good performance of the proposed method.