A book was recently published for the lecturer at the Faculty of Computer Science and Information Technology Dr. Jamal Khudair Mazloum entitled (The mechanism of conscious security of mobile networks dedicated to various attacks)

Brief summary of the book:

The serious security threat arises by node capture attacks in hierarchical data aggregation where the hacker achieves full control over the sensor node through direct physical access in wireless sensor networks. It makes the confidentiality of data a high risk. 

In this book, we suggest securing node capture attacks for hierarchical data aggregation in a dedicated mobile network.

 Initially, the network is separated into a number of groups, each group is headed by a collector and the collectors are directly connected, the collector when selecting the detection nodes randomly selects a set of nodes and broadcasts a unique value containing their authentication keys, to the set of nodes specified in the first round of data collection. When any node within the group needs to transfer data, it transfers the data segments to the other nodes in that group encrypted by individual authentication keys. Each receiving node decrypts and summarizes the chipset and transfers the encrypted data to the collector. The collector collects, encrypts and encrypts data using the shared secret key and forwards it. The node set is redefined with a new set of authentication keys in the second round of aggregation. Through the simulation results, we will show that the proposed technique solves the security threat of node capture attacks. 

 Network performance is improved by integrating the side that the malicious node cannot find and using the physical key generated in the source node. The key is combined with a set of fake keys so that the attackers disguise. 

In this way, security is enhanced.