Prakash, K. and Sathya, S. (2023) A Deep Learning-based Multi-Path Routing Protocol for Improving Security using Encryption in Underwater Wireless Sensor Networks. In: 2023 4th International Conference on Electronics and Sustainable Communication Systems (ICESC), Coimbatore, India.
![[thumbnail of A Deep Learning-based Multi-Path Routing Protocol for Improving Security using Encryption in Underwater Wireless Sensor Networks _ IEEE Conference Publication _ IEEE Xplore.pdf]](https://ir.vistas.ac.in/style/images/fileicons/archive.png)
A Deep Learning-based Multi-Path Routing Protocol for Improving Security using Encryption in Underwater Wireless Sensor Networks _ IEEE Conference Publication _ IEEE Xplore.pdf
Download (400kB)
Abstract
Underwater Wireless Sensor Networks (UWSN) is an interesting topic today in both scientific research and commercial applications. Major challenges of UASN design constraints are unreliable network lifetime and low battery power of underwater sensor nodes. In addition, sensor nodes may generate sensitive data that needs to be hidden. Therefore, encryption ciphers maintain security by encrypting the data before sending it. However, encryption methods require more computation and energy, and network lifetime is reduced. A key issue in this research area is that due to the complexity of underwater environments and slow transmission rates, inefficient architectures for multi-path variable data transmission are a security measure combined with encryption to prevent overate attacks with high delay tolerance. To overcome these issues, in this work proposed the method Multi-path Routing Protocol (MRP) based on Spectral Social Spider optimization (SSSO) feature selection. Initially, collected the sensor network dataset from standard repository using for classification to avoid the delay and improving the transmission using best features. The first step is to remove redundant data for each cluster head by applying a pre-processing step that uses data redundancy elimination techniques to reduce unbalanced data and missing values. Second-stage feature selection is based on the maximum weightage features using maximum threshold limits based on Spectral Social Spider optimization(SSSO). SSSO algorithm for analysis relay method for dependable packet delivery. After feature selection to sending and receiving the data based on the features using Improved Data Encryption Standard (I-DES) by analysing the cipher text to identify the encryption algorithm, focused cryptanalysis methods can be used. Before classification evaluating the features metrics based on Softmax Neuron Classifier (SNC) using for estimating the features weights validation. The final classification stage using Recurs...
Item Type: | Conference or Workshop Item (Paper) |
---|---|
Subjects: | Computer Science > Computer Networks |
Divisions: | Computer Science |
Depositing User: | Mr IR Admin |
Date Deposited: | 23 Sep 2024 06:20 |
Last Modified: | 23 Sep 2024 06:20 |
URI: | https://ir.vistas.ac.in/id/eprint/6866 |