Skip to main content
Advertisement
Browse Subject Areas
?

Click through the PLOS taxonomy to find articles in your field.

For more information about PLOS Subject Areas, click here.

< Back to Article

Table 1.

Comparative Analysis with the existing state-of-the-art methods.

More »

Table 1 Expand

Fig 1.

Proposed flow chart.

More »

Fig 1 Expand

Table 2.

Parameters.

More »

Table 2 Expand

Table 3.

Comparative analysis with existing WSN encryption methods.

More »

Table 3 Expand

Fig 2.

Definition of the parameters.

Illustrate essential parameters (e.g., Destination Port, Context Identifier, Pattern, Next, and DCI) and correlation matrix of these features for Sinkhole threat detection, emphasizing model efficiency validated through simulations and real-world datasets.

More »

Fig 2 Expand

Fig 3.

Count of normal as well as sinkhole attacks.

Displays the tally of normal nodes and the presence of sinkhole attacks, following dataset collection and parameter definition. The classification assigns two classes to nodes, distinguishing normal nodes from those exhibiting specific attacks.

More »

Fig 3 Expand

Fig 4.

Description of normal as well as sinkhole traffic.

Outlines the sinkhole attack mitigation function, involving detection by analyzing node traffic history and initiating mitigation if deviations from the typical range are identified. The figure visually depicts normal and sinkhole traffic patterns.

More »

Fig 4 Expand

Table 4.

Accuracy and mitigation rate.

More »

Table 4 Expand

Table 5.

Energy consumption.

More »

Table 5 Expand

Table 6.

Comparative table of performance metrics.

More »

Table 6 Expand

Fig 5.

WSN node simulation.

Illustrated the WSN nodes are spread across the simulation with initial topographic dimensions of 500 500 and linked to nine cluster heads. The nodes then start to travel randomly at a speed of 5 meters per second after that.

More »

Fig 5 Expand

Fig 6.

Discusses the encryption time grows linearly as the round number and block size increase.

The simulation, starting at 20 seconds, analyzes the FlexenTech cipher’s encryption time concerning the round number and block size. With block sizes from 4 to 128 bits and 128 rounds, the figure illustrates a linear growth pattern in encryption time and network lifetime.

More »

Fig 6 Expand

Fig 7.

Comparison of the AES-256 encryption technique and SFlexCrypt encryption timings for data of different sizes. Comparison is shown between SFlexCrypt and AES-256 encryption techniques for different data sizes. The results indicate that SFlexCrypt outperforms AES-256, showcasing its efficiency with variable encryption parameters.

More »

Fig 7 Expand

Fig 8.

Power consumption and residual analysis with power simulation time.

Analysis of simulation time utilizing our SFlexCrypt’s flexible selection of encryption settings and two measures of network power consumption and residual.

More »

Fig 8 Expand

Fig 9.

Energy consumption comparison of Flex and Sflex.

Comparing SFlexCrypt with fixed-parameter approaches (FlexenTech), the figure demonstrates SFlexCrypt’s ability to reduce power consumption and enhance residual power, emphasizing its efficiency over time across different network scenarios.

More »

Fig 9 Expand

Fig 10.

Network lifetime using FlexCrypt, AES, TEA and SflexCrypt.

Shows an analysis of the network’s lifespan using the FlexCrypt, AES, TEA, and SflexCrypt techniques with various starting power values.

More »

Fig 10 Expand

Fig 11.

Confusion matrix of LR and KNN, GNB, MNB, RF.

Presents the confusion matrix for logistic regression (LR), k-nearest neighbors (KNN), Gaussian Naive Bayes (GNB), Multinomial Naive Bayes (MNB), and Random Forest (RF) after threat detection, offering a comprehensive view of the classification performance.

More »

Fig 11 Expand

Fig 12.

Accuracy of LR, KNN, GNB, MNB, RF.

Displays the accuracy of LR, KNN, GNB, MNB, and RF models, providing an overview of their effectiveness in correctly classifying attack instances.

More »

Fig 12 Expand

Fig 13.

Threat detection, as well as attack mitigation.

Highlights the results of threat detection and mitigation, showcasing the proposed method’s success in accurately identifying Helloflood, Sinkhole, and Wormhole attacks with a mitigation rate of 97.31%.

More »

Fig 13 Expand

Fig 14.

Metrics comparison b/w Sflexrcypt & flexcrypt.

Compares metrics between Sflexcrypt and Flexcrypt, providing insights into their performance differences in areas like energy consumption, packet delivery ratio, packet loss, and delay.

More »

Fig 14 Expand

Fig 15.

Metrics comparison Overview b/w Sflexrcypt & flexcrypt.

Offers an overview of metric comparisons between Sflexcrypt and Flexcrypt, emphasizing Sflexcrypt’s superior performance across various categories such as energy efficiency, packet delivery ratio, packet loss, and delay based on hypothetical data.

More »

Fig 15 Expand

Table 7.

Comparative analysis with the existing state-of-the-art methods.

More »

Table 7 Expand