A methodology that allows the design of secure WSNs from the first steps of the development process Dr. Fidel Ibrahim

Abstract
Current wireless sensor networks (WSNs) require effective network simulation methodologies and embedded software performance analysis because of the increasing complexity and low power constraints imposed on these networks, as well as the security feature they should have for using sensitive data in undesirable and hostile environments.
This article includes a methodology for security analysis in wireless sensor networks through the design of a built-in firewall or a set of countermeasures. This is done by modeling the attacker and simulating the attack with the performance analysis (node execution time and power consumption estimate taking into account the spread of the network components and the topology) after examining three different types of attacks that mimic most attacks on wsn, It is capable of designing hardware devices, software programs, and basic wireless channels.
The planned simulation provides developers with necessary information about the effects of a single attack or a series of multiple attacks on the network, helping them develop more secure wireless sensor systems, and the WSN attack simulator is an essential element of the built-in anti-malware development strategy Of the attack put forward in this research.

A methodology that allows the design of secure WSNs from the first steps of the development – Dr. Fidel Ibrahim

 

Leave a Reply

Your email address will not be published. Required fields are marked *