4 research outputs found

    An Energy Aware Unequal Clustering Algorithm using Fuzzy Logic for Wireless Sensor Networks

    Get PDF
    In wireless sensor networks, clustering provides an effective way of organising the sensor nodes to achieve load balancing and increasing the lifetime of the network. Unequal clustering is an extension of common clustering that exhibits even better load balancing. Most existing approaches do not consider node density when clustering, which can pose significant problems. In this paper, a fuzzy-logic based cluster head selection approach is proposed, which considers the residual energy, centrality and density of the nodes. In addition, a fuzzy-logic based clustering range assignment approach is used, which considers the suitability and the position of the nodes in assigning the clustering range. Furthermore, a weight function is used to optimize the selection of the relay nodes. The proposed approach was compared with a number of well known approaches by simulation. The results showed that the proposed approach performs better than the other algorithms in terms of lifetime and other metrics

    Mathematical model on distributed denial of service attack through Internet of things in a network

    No full text
    Internet of Things (IoT) opens up the possibility of agglomerations of different types of devices, Internet and human elements to provide extreme interconnectivity among them towards achieving a completely connected world of things. The mainstream adaptation of IoT technology and its widespread use has also opened up a whole new platform for cyber perpetrators mostly used for distributed denial of service (DDoS) attacks. In this paper, under the influence of internal and external nodes, a two - fold epidemic model is developed where attack on IoT devices is first achieved and then IoT based distributed attack of malicious objects on targeted resources in a network has been established. This model is mainly based on Mirai botnet made of IoT devices which came into the limelight with three major DDoS attacks in 2016. The model is analyzed at equilibrium points to find the conditions for their local and global stability. Impact of external nodes on the over-all model is critically analyzed. Numerical simulations are performed to validate the vitality of the model developed
    corecore