A NOVEL APPROACH FOR DETECTING COMPROMISED NODES IN WIRELESS SENSOR NETWORKS
|
|
- Stella Long
- 6 years ago
- Views:
Transcription
1 International Journal of Wireless Communications and Networking 3(1), 2011, pp A NOVEL APPROACH FOR DETECTING COMPROMISED NODES IN WIRELESS SENSOR NETWORKS P. Vijayalakshmi 1, D. Somasundareswari 2 and V. Duraisamy 1 1 Hindusthan College of Engineering and Technology Coimbatore, India, vijihicet@gmail.com 2 Adithya Institute of Technology, Coimbatore, India, dsomasundareswari@yahoo.com Abstract: Increased interest in the field of wireless sensor networks has proved that wireless sensor networks can have a broad variety of applications. Current applications of wireless sensor networks are in the fields of medical care, battlefield monitoring, environment monitoring, surveillance and disaster prevention. Many of these applications require that the sensor network be deployed in an area that is hostile, inaccessible and mission critical. However, since sensor nodes are inexpensive devices, which could be easily compromised and controlled by an adversary, the compromised nodes could report false sensed results and degrade the reliability of the whole network. Therefore, how to identify these compromised nodes in a wireless sensor network is a very important security issue. In this paper we propose a novel approach using genetic algorithm to logically identify the anomalous behavior of compromised nodes in an efficient and effective way. Keywords: Wireless sensor network, security, identify compromised nodes, Genetic algorithm I. INTRODUCTION Wireless sensor networking has been subject to extensive research efforts in recent years, and has been well recognized as a ubiquitous and general approach for some emerging applications ranging from the civilian domain, such as environmental monitoring, to the military domain, such as battlefield surveillance]. A wireless sensor network (WSN) is usually composed of a large number of sensor nodes which use wireless links to perform distributed sensing tasks. Here, each sensor node is cheap with low battery power and computation capacity, but is equipped with sensing, data processing, and communicating components. Since a WSN is usually deployed in a harsh environment and each low-cost sensor node could be easily compromised, the security becomes a major concern. For example, when some sensor nodes are compromised and controlled by an adversary, they could behave abnormally and randomly report true / false sensing results to the sink, by which the reliability of the whole network is seriously degraded. Therefore, it will be a critical issue to develop an effective strategy for the sink to detect and identify these compromised nodes. Assume that a WSN consists of n sensor nodes, where the compromised nodes are less than the normal nodes, and each normal node can know other nodes trust status by adopting the similar techniques in [23], [24]. Then, a straightforward way for the sink to identify the compromised nodes is that the sink inquiries each senor node with n 1 queries on other nodes. In such a way, after total n(n 1) queries, the sink can logically identify all compromised nodes based on these returned results. Although this approach is effective, but it is not efficient because the n(n 1) queries could consume a significant amount of the sensor nodes energy. In this paper, in order to reduce the query number, we propose a novel approach to Identify Compromised Nodes using genetic algorithm in wireless sensor networks. II. PRELIMINARIES In this section, we describe our sensor network model, provide a brief overview on the trust assumptions, and define our design goal. A. Network Model We consider a simple abstraction of a WSN consisting of a fixed sink S and a number of sensor nodes N = {N 1,, Nn}, where n 3, deployed at a remote area (around one or more hop neighborhood of the sink), as shown in Figure 1. Note that such an abstraction can be taken as a
2 16 International Journal of Wireless Communications and Networking building block of a large-scale WSN. The sink S is a data collection unit, which could be a powerful workstation with plentiful resources. However, the sensor nodes N = {N 1,,Nn} are inexpensive, low power devices which have limited resources, memory space, computation capability, and communication bandwidth. Once such a WSN is deployed and the corresponding data paths are established, the sink S can inquire each sensor node Ni N with a certain query, and then the sensor node Ni reports its sensing results back to the sink S over the pre-defined path. Additionally, in order to provide confidentiality to the sensing results, a pre-shared key between each Ni N and S is assumed and used to encrypt/decrypt the sensing results. We assume that the compromised nodes will be excluded from the network if the nodes resist to forward data for the other nodes. While identifying the compromised nodes under a Denial of Service (Dos) attack is not our focus, we concentrate on the case where the compromised nodes still forward data but could falsely report the sensing results. Figure 1: B. Assumptions A Wireless Sensor Network The sink S equipped with tamper-proof devices is trustworthy and unassailable. All sensor nodes N = {N 1,,Nn} will be able to report their sensing results to the sink S through the pre-defined routes. Each sensor node Ni N is inexpensive, and easily compromised by an adversary. Once the sensor node Ni is compromised and controlled by an adversary, Ni will behave abnormally and may randomly report true / false sensing results to sink S. With the passing of time, nc sensor nodes are compromised by an adversary, and form compromised-set Nc = {N *1, N *1,,N *nc }; and the rest nd sensor nodes keep normal and form normal set Nd = {N 1, N 2,, N nd }. Then, we will have N = Nc Nd. As in the most application scenarios, it is reasonable for us to assume the normal-set Nd is larger than the compromised-set Nc. Then, we will have the following relations: Nc < Nd Nc + Nd = N In the WSN abstraction, the sink S can clearly know the network topology and properly reconfigure the data path connecting each sensor node, and each normal sensor node Ni Nd can exchange their local information and get to know all nodes trust status within its communication range. C. Design Goal As the compromised nodes report the true / false sensing results randomly, the reliability of the whole network will be seriously impaired. Therefore, undoubtedly, it is of ultimate importance for the sink S to exactly know each sensor node s trust status. Based on the above assumptions, we design a novel algorithm to help the sink S to identify the compromised nodes. Compared with the straightforward approach where n(n 1) queries are required, the proposed approaches are much more efficient. III. PROPOSED ALGORITHM The proposed algorithm aims to distinguish the compromised nodes from the normal ones with the lowest number of queries. Genetic Algorithm (GA) has been used to solve many optimization problems. In this a initial population is randomly generated and is evaluated with a fitness function. With higher probability of fitness is being chosen to create the next generation. The size of the population is same for all the iterations and the process is iterated until a predefined threshold value is met or a maximum number of iterations are reached. A. Overview Genetic algorithm used to evolve simple rules for network traffic. Initially the genes should be represented as different data types like byte, integer,
3 Caching in Wireless Sensor Networks based on Grids 17 float etc., and the data range of the genes should be generated, in each iteration randomly. Then the genetic algorithm uses set of rules for the network of the form If {condition} then {act} B. Genetic Algorithm Parameters The general structure of the genetic algorithm for the proposed search of compromised node is given in Figure 2. simulation process, there were several parameters altered for different runs to determine what kind of effect they had on various performance measures that were taken for consideration. Figure 3 shows that the number of messages that are transmitted using GA are more compared to conventional methods. Figure 3: Analysis of Number of Messages Figure 2: Structure of Genetic Algorithm The fitness function will compute the best solutions from the information mentioned from the initial population. The selection operators like mutation and crossover form the most effective parts in the algorithm when they involve in operation of the each iteration. On completion of a single iteration the best individual is selected. Selection operation has two procedures. Firstly, computing fitness value; secondly, queuing it from the smallest to the biggest. Then the min fitness value is the best individual, selecting the best individual as father-individual, the selection probability of each individual is proportional to its fitness value, the selected probability is higher when the individual fitness value is bigger. The two chromosomes chosen for crossover should have at least one common gene (node), but there is no requirement that they be located at the same locus. The population undergoes mutation by an actual change or flipping of one of the genes of the candidate chromosomes, which keeping away from local optima The smaller networks take less time than the larger networks for two main reasons. The obvious reason is that there are more compromised nodes in the larger networks, so more times is needed to find all of them. The second reason is that there is more traffic generated in the larger networks, so it takes longer for the base station to process all the requests. Figure 4 shows the average number of packets sent by a compromised node once it has been IV. PERFORMANCE ANALYSIS The NS-2 simulator was chosen to simulate the designed algorithm for detecting compromised nodes in a wireless sensor network. To begin the Figure 4: Analysis of Packet Delivery Ratio
4 18 International Journal of Wireless Communications and Networking injected into the network. Here that the number of compromised nodes is dependent on the network size. For example, the network with 40 nodes will include 4 compromised nodes. The algorithm works efficiently since only a few packets at most are sent compared to the hundreds of valid packets. Figure 5 shows that the delay is reduced to a considerable level on using GA Figure 5: Analysis of Delay during Transmission Figure 6 shows that the message over-head is reduced on using GA compared to conventional techniques. The results have shown a good improvement in number of messages transmitted, delay, packet delivery ratio and message overhead. Figure 6: Analysis of Message Over-head VI. CONCLUSIONS We have presented an algorithm to detect the compromised nodes in wireless sensor networks. The base station is alerted to claims of abnormal behavior and verifies them by checking the difference in packet transmission times of the suspected node. Simulations are conducted to demonstrate the performance metrics. We believe that a base station that has more computation and power resources would further decrease the detection time. The concept implementation has proved that the rules generated by GA have the potential capability to detect the compromised nodes effectively in wireless sensor network environment. The purpose of the work reported in the paper is to analysis the performance metric using genetic algorithm. The future work is to extend the scope of the rules involved REFERENCES [1] I. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, A survery on sensor networks, IEEE Communications Magazine, Vol. 40, No. 8, pp , [2] I. Akyildiz and I. Kasimoglu, Wireless sensor and actor networks: research challenges, Ad Hoc Networks, Vol. 2, No. 4, pp , [3] I. Akyildiz and E. Stuntebeck, Wireless underground sensor networks :research challenges, Ad Hoc Networks, Vol. 4, No. 6, pp , [4] A. Perrig, R. Szewczyk, J. D. Tygar, V. Wen, and D. Culler SPINS:security protocols for sensor networks, Wireless Networks, Vol. 8, No. 5, pp , [5] W. Du, J. Deng, Y. Han, and P. Varshney, A key predistribution scheme for sensor networks using deployment knowledge, IEEE Transactions on Dependable and Secure Computing, Vol. 3, No. 1, pp , [6] A. Perrig, J. Stankovic, and D. Wagner, Security in wireless sensor networks, Communications of the ACM, Vol. 47, No. 6, pp , [7] H. Chan, A. Perrig, and D. Song, Random key predistribution schemes for sensor networks, in Proc. Symposium on Security and Privacy 2003, May 2003, pp [8] S. Zhu, S. Setia, and S. Jajodia, LEAP: efficient security mechanisms for large-scale distributed sensor networks, in Proc. ACM CCS 2003, October 2003, pp
5 Caching in Wireless Sensor Networks based on Grids 19 [9] B. Przydatek, D. Song, and A. Perrig, SIA: secure information aggregation in sensor networks, in Proc. Conference on Embedded Networked Sensor System 2003, November 2003, pp [10] X. Lin, H. Zhu, B. Lin, P.-H. Ho, and X. Shen, A novel voting mechanism for compromised node revocation in wireless ad hoc networks, in IEEE Global Communications Conference (GLOBECOM 06), San Francisco, Nov. 27-Dec. 1, [11] X. Lin, P.-H. Ho, and X. Shen, Towards compromise-resilient localized authentication architecture for wireless mesh networks, in Proc. Of QShine 2007, Vancouver, British Columbia, August 14-17, [12] H. Yang, F. Ye, Y. Yuan, S. Lu, and W. Arbaugh, Toward resilient security in wireless sensor networks, in Proc. ACM Mobihoc 2005, May 2005, pp [13] F. Ye, H. Luo, S. Lu, and L. Zhang, Statistical enroute filtering of injected false data in sensor networks, in Proc. IEEE Infocom 2004, March 2004, pp [14] W. Du, R. Wang, and P. Ning, An efficient scheme for authenticating public keys in sensor networks, in Proc. ACM Mobihoc 2005, May 2005, pp [15] W. Zhang, H. Song, S. Zhu, and G. Cao, Least privilege and privilege deprivation: towards tolerating mobile sink compromises in wireless sensor networks, in Proc. ACM Mobihoc 2005, May 2005, pp [16] W. Yu and K. Liu, Secure cooperative mobile ad hoc networks against injecting traffic attacks, in Proc. IEEE SECON 2005, September 2005, pp [17] W. Zhang, S. Das, and Y. Liu, A trust based framework for secure data aggregation in wireless sensor networks, in Proc. IEEE SECON 2006, September [18] F. Delgosha and F. Fekri, Threshold keyestablishment in distributed sensor networks using a multivariate scheme, in Proc. IEEE Infocom 2006, April [19] M. Miller and N. Vaidya, Leveraging channel diversity for key establishment in wireless sensor networks, in Proc. IEEE Infocom 2006, April [20] X. Lin, R. Lu, H. Zhu, P.-H. Ho, X. Shen and Z. Cao, SRPAKE: An Anonymous Secure Routing Protocol with Authenticated Key Exchange for Wireless Ad Hoc Networks, in Proc. IEEE ICC 2007, June [21] K. Ren, W. Lou, and Y. Zhang, LEDS: providing location-aware end-toend data security in wireless sensor networks, in Proc. IEEE Infocom 2006, April 2006, pp [22] K. Ren, W. Lou, and Y. Zhang, Multi-user broadcast authentication in wireless sensor networks, in Proc. IEEE SECON 2007, June [23] A. P. da Silva, M. Martins, B. Roacha, A. Loureiro, L. Ruiz, and H. Wong, Decentralized intrusion detection in wireless sensor networks, in ACM Q2SWinet 05, [24] Y. Huang and W. Lee, A cooperative intrusion detection system for ad hoc networks, in ACM SASN 03, October [25] Intrusion-Detection. /wiki/ intrusion-detection. [26] Biswanth Mukherjee, L. Todd Heberlein and Karl N. Levitt, Network Intrusion Detection, IEEE Networks, May/June 1994, pp [27] T. Ozyer, R. Alhaji, and K. Barker, Intrusion detection by integrating boosting genetic fuzzy classifier and data mining criteria for rule prescreening, Journal of Network and Computer Applications, pp , [28] Sartid Vongpradhip and Wichet Plaimart, Survival Architecture for Distributed Intrusion Detection System using Mobile Agent, Sixth IEEE International Symposium on Network Computing and Applications (NCA 2007), IEEE Computer Society, 2007.
Dynamic Key Ring Update Mechanism for Mobile Wireless Sensor Networks
Dynamic Key Ring Update Mechanism for Mobile Wireless Sensor Networks Merve Şahin Sabancı University Istanbul, Turkey mervesahin@sabanciuniv.edu Abstract Key distribution is an important issue to provide
More informationEnergy and Memory Efficient Clone Detection in Wireless Sensor Networks
Energy and Memory Efficient Clone Detection in Wireless Sensor Networks Chennai) 1 Vladymir.F, 2 J.Sivanesa Selvan, 3 Mr.Prabhu.D 1 (Information Technology, Loyola Institute of Technology, Chennai) ( Email:
More informationA Distributed Cross-Layer Compromise Detection Mechanism for Wireless Sensor Networks
Journal of Network Intelligence c 2017 ISSN 2414-8105(Online) Taiwan Ubiquitous Information Volume 2, Number 1, February 2017 A Distributed Cross-Layer Compromise Detection Mechanism for Wireless Sensor
More informationSelective Forwarding Attacks Detection in WSNs
Selective Forwarding Attacks Detection in WSNs Naser M. Alajmi and Khaled M. Elleithy Computer Science and Engineering Department, University of Bridgeport, Bridgeport, CT, USA nalajmi@my.bridgeport.edu,
More informationA Secure Routing Method for Detecting False Reports and Wormhole Attacks in Wireless Sensor Networks *
Wireless Sensor Network, 2013, 5, 33-40 http://dx.doi.org/10.4236/wsn.2013.53005 Published Online March 2013 (http://www.scirp.org/journal/wsn) A Secure Routing Method for Detecting False Reports and Wormhole
More informationSELECTING VOTES FOR ENERGY EFFICIENCY IN PROBABILISTIC VOTING-BASED FILTERING IN WIRELESS SENSOR NETWORKS USING FUZZY LOGIC
SELECTING VOTES FOR ENERGY EFFICIENCY IN PROBABILISTIC VOTING-BASED FILTERING IN WIRELESS SENSOR NETWORKS USING FUZZY LOGIC Su Man Nam and Tae Ho Cho College of Information and Communication Engineering,
More informationESTABLISHMENT OF SECURE COMMUNICATION IN WIRELESS SENSOR NETWORKS
ESTABLISHMENT OF SECURE COMMUNICATION IN WIRELESS SENSOR NETWORKS Ms.T P Rani 1, Dr. C Jaya Kumar 2 1 Research Scholar, Anna University of Technology,Chennai 1 ranitp.2010@gmail.com 2 Department of Computer
More informationComputer Based Image Algorithm For Wireless Sensor Networks To Prevent Hotspot Locating Attack
Computer Based Image Algorithm For Wireless Sensor Networks To Prevent Hotspot Locating Attack J.Anbu selvan 1, P.Bharat 2, S.Mathiyalagan 3 J.Anand 4 1, 2, 3, 4 PG Scholar, BIT, Sathyamangalam ABSTRACT:
More informationA Genetic Algorithm-Based Approach for Energy- Efficient Clustering of Wireless Sensor Networks
A Genetic Algorithm-Based Approach for Energy- Efficient Clustering of Wireless Sensor Networks A. Zahmatkesh and M. H. Yaghmaee Abstract In this paper, we propose a Genetic Algorithm (GA) to optimize
More informationRandom Key Pre-distribution Schemes using Multi-Path in Wireless Sensor Networks
ISSN (e): 2250 3005 Vol, 05 Issue, 01 January 2015 International Journal of Computational Engineering Research (IJCER) Random Key Pre-distribution Schemes using Multi-Path in Wireless Sensor Networks Si-Gwan
More informationUnpredictable Software-based Attestation Solution for Node Compromise Detection in Mobile WSN
Unpredictable Software-based Attestation Solution for Node Compromise Detection in Mobile WSN Xinyu Jin, Rodrigo Jose Salmeron, Pasd Putthapipat, Niki Pissinou, Deng Pan, Jeffrey Fan Florida International
More informationCMNTS:Catching Malicious Nodes with Trust Support in Wireless Sensor Networks
CMNTS:Catching Malicious Nodes with Trust Support in Wireless Sensor Networks Prathap U, Deepa Shenoy P and Venugopal K R Department of Computer Science and Engineering University Visvesvaraya College
More informationKey establishment in sensor networks
Key establishment in sensor networks -- introduction to wireless sensor networks -- needed key types -- LEAP -- random key pre-distribution (c) Levente Buttyán (buttyan@crysys.hu) Wireless sensor networks
More informationAnalysis of Cluster-Based Energy-Dynamic Routing Protocols in WSN
Analysis of Cluster-Based Energy-Dynamic Routing Protocols in WSN Mr. V. Narsing Rao 1, Dr.K.Bhargavi 2 1,2 Asst. Professor in CSE Dept., Sphoorthy Engineering College, Hyderabad Abstract- Wireless Sensor
More informationENSF: ENERGY-EFFICIENT NEXT-HOP SELECTION METHOD USING FUZZY LOGIC IN PROBABILISTIC VOTING-BASED FILTERING SCHEME
ENSF: ENERGY-EFFICIENT NEXT-HOP SELECTION METHOD USING FUZZY LOGIC IN PROBABILISTIC VOTING-BASED FILTERING SCHEME Jae Kwan Lee 1 and Tae Ho Cho 2 1, 2 College of Information and Communication Engineering,
More informationKey establishment in sensor networks
Security and Cooperation in Wireless Networks http://secowinet.epfl.ch/ key types; establishment of link keys using a shortterm master key; random key predistribution: - the basic scheme, and - some improvements;
More informationA METHOD FOR DETECTING FALSE POSITIVE AND FALSE NEGATIVE ATTACKS USING SIMULATION MODELS IN STATISTICAL EN- ROUTE FILTERING BASED WSNS
A METHOD FOR DETECTING FALSE POSITIVE AND FALSE NEGATIVE ATTACKS USING SIMULATION MODELS IN STATISTICAL EN- ROUTE FILTERING BASED WSNS Su Man Nam 1 and Tae Ho Cho 2 1 College of Information and Communication
More informationAn Enhanced Scheme to Defend against False-Endorsement-Based DoS Attacks in WSNs
IEEE International Conference on Wireless & Mobile Computing, Networking & Communication An Enhanced Scheme to Defend against False-Endorsement-Based DoS Attacks in WSNs Christoph Krauß, Markus Schneider,
More informationENERGY-EFFICIENT PATH CONFIGURATION METHOD FOR DEF IN WSNS
ENERGY-EFFICIENT PATH CONFIGURATION METHOD FOR DEF IN WSNS Jae Kwon Lee, Su Man Nam and Tae Ho Cho School of Information and Communication Engineering Sungkyunkwan University, Su-won, 440-476, Republic
More informationImproved Resilience against False Data Injection Attacks using PCRE Filtering Scheme
Improved Resilience against False Data Injection Attacks using PCRE Filtering Scheme J. Mamsa A. Kalaiarasi Mrs. S. Kalpana Devi Dept. of CSE Dept. of CSE Dept. of CSE Abstract - Cyber physical system
More informationREPUTATION BASED ZONE TRUST DETECTION AND SWATT REVOCATION METHOD USING SPRT IN SENSOR NETWORKS
REPUTATION BASED ZONE TRUST DETECTION AND SWATT REVOCATION METHOD USING SPRT IN SENSOR NETWORKS Rakshith Upparige K R 1, Sateesh Kumar H C 2 PG Scholar, Department of Telecommunication Engineering, Dayananda
More informationUse of Symmetric And Asymmetric Cryptography in False Report Filtering in Sensor Networks
Use of Symmetric And Asymmetric Cryptography in False Report Filtering in Sensor Networks Aleksi Toivonen Helsinki University of Technology Aleksi.Toivonen@tkk.fi Abstract Sensor networks are easily deployable
More informationTDMA-Based Detection of Packet Modification Attacks in Wireless Sensor Networks 1
, pp.40-46 http://dx.doi.org/10.14257/astl.2016.142.07 TDMA-Based Detection of Packet Modification Attacks in Wireless Sensor Networks 1 Hae Young Lee and Hyung-Jong Kim Department of Information Security
More informationBlackhole Attack Detection in Wireless Sensor Networks Using Support Vector Machine
International Journal of Wireless Communications, Networking and Mobile Computing 2016; 3(5): 48-52 http://www.aascit.org/journal/wcnmc ISSN: 2381-1137 (Print); ISSN: 2381-1145 (Online) Blackhole Attack
More informationA Feedback-based Multipath Approach for Secure Data Collection in. Wireless Sensor Network.
A Feedback-based Multipath Approach for Secure Data Collection in Wireless Sensor Networks Yuxin Mao School of Computer and Information Engineering, Zhejiang Gongshang University, Hangzhou 310018, P.R
More informationCONCEALED CLIENT DATA AGGREGATION FOR DATABASE-AS-SERVICE (DAS)
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 2, February 2014,
More informationPerformance Analysis of Heterogeneous Wireless Sensor Network in Environmental Attack
International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 3, Number 5 (2013), pp. 451-458 International Research Publications House http://www. irphouse.com /ijict.htm Performance
More informationAbstract. 1. Introduction
SOOAWSN: A complete framework for Wireless Sensor Networks Graduate Student Paper Mohammed A. Abuhelaleh and Khaled M. Elleithy School of Engineering University Of Bridgeport, Bridgeport, CT {mabuhela,
More informationOptimally-balanced Hash Tree Generation in Ad Hoc Networks
African Journal of Information and Communication Technology, Vol. 6, No., September Optimally-balanced Hash Tree Generation in Ad Hoc Networks V. R. Ghorpade, Y. V. Joshi and R. R. Manthalkar. Kolhapur
More informationRegression Based Cluster Formation for Enhancement of Lifetime of WSN
Regression Based Cluster Formation for Enhancement of Lifetime of WSN K. Lakshmi Joshitha Assistant Professor Sri Sai Ram Engineering College Chennai, India lakshmijoshitha@yahoo.com A. Gangasri PG Scholar
More informationResearch Article MFT-MAC: A Duty-Cycle MAC Protocol Using Multiframe Transmission for Wireless Sensor Networks
Distributed Sensor Networks Volume 2013, Article ID 858765, 6 pages http://dx.doi.org/10.1155/2013/858765 Research Article MFT-MAC: A Duty-Cycle MAC Protocol Using Multiframe Transmission for Wireless
More information@IJMTER-2016, All rights Reserved ,2 Department of Computer Science, G.H. Raisoni College of Engineering Nagpur, India
Secure and Flexible Communication Technique: Implementation Using MAC Filter in WLAN and MANET for IP Spoofing Detection Ashwini R. Vaidya 1, Siddhant Jaiswal 2 1,2 Department of Computer Science, G.H.
More informationA Time-Based Key Management Protocol for Wireless Sensor Networks
A Time-Based Key Management Protocol for Wireless Sensor Networks Jiyong Jang 1, Taekyoung Kwon 2, and Jooseok Song 1 1 Department of Computer Science, Yonsei University {souljang, jssong}@emerald.yonsei.ac.kr.
More informationSource Anonymous Message Authentication and Source Privacy using ECC in Wireless Sensor Network
Source Anonymous Message Authentication and Source Privacy using ECC in Wireless Sensor Network 1 Ms.Anisha Viswan, 2 Ms.T.Poongodi, 3 Ms.Ranjima P, 4 Ms.Minimol Mathew 1,3,4 PG Scholar, 2 Assistant Professor,
More informationChord-based Key Establishment Schemes for Sensor Networks
Chord-based Key Establishment Schemes for Sensor Networks Fan Zhang, Zhijie Jerry Shi, Bing Wang Department of Computer Science and Engineering, University of Connecticut, Storrs, CT 06269 Abstract Because
More informationWSN LIFETIME EXTENSION USING GA OPTIMISED FUZZY LOGIC
International Journal of Computer Science & Information Technology (IJCSIT) Vol 9, No 5, October 2017 WSN LIFETIME EXTENSION USING GA OPTIMISED FUZZY LOGIC Sang-Hyeok Lim 1 and Tae-Ho Cho 2 1 College of
More informationAN APPROACH TO DETECT NODE REPLICATION IN MOBILE SENSOR NETWORKS- SURVEY
AN APPROACH TO DETECT NODE REPLICATION IN MOBILE SENSOR NETWORKS- SURVEY P. Edith Linda 1, R.Sangeetha 2 Assistant Professor, Department of Computer Science, G.R.Damodaran College of Science, Coimbatore,
More informationNode Clone Detection in Wireless Sensor Networks
International Journal of Research Studies in Science, Engineering and Technology Volume 1, Issue 8, November 2014, PP 23-29 ISSN 2349-4751 (Print) & ISSN 2349-476X (Online) G. Hanumantha Rao 1, K. S. Krishnakanth
More information[Nitnaware *, 5(11): November 2018] ISSN DOI /zenodo Impact Factor
[Nitnaware *, 5(11): November 218] ISSN 2348 834 DOI- 1.5281/zenodo.1495289 Impact Factor- 5.7 GLOBAL JOURNAL OF ENGINEERING SCIENCE AND RESEARCHES INVESTIGATION OF DETECTION AND PREVENTION SCHEME FOR
More informationEFFICIENT CLONE NODE DETECTION AND ELIMINATION IN WIRELESS SENSOR NETWORKS
EFFICIENT CLONE NODE DETECTION AND ELIMINATION IN WIRELESS SENSOR NETWORKS V.Lincy Shobika PG research scholar Department of Computer Science S.N.R Sons College,CBE-06 lincyshobika@gmail.com Dr.N.Sumathi
More informationAn Agent Based Approach for Sinkhole Preventive Route formation in Mobile Network
An Agent Based Approach for Sinkhole Preventive Route formation in Mobile Network Rekha 1, Radhika Garg 2 1 Research Scholar, M.Tech, 2 Assistant Professor, Deptt. Of Computer Sc. & Engineering, Vaish
More informationA Novel Approach for Preventing Black-Hole Attack in MANETs Rashmi 1, Ameeta Seehra 2
A Novel Approach for Preventing Black-Hole Attack in MANETs Rashmi 1, Ameeta Seehra 2 Department of Electronics and Communication Engineering, Guru Nanak Dev Engineering College, Ludhiana, Punjab, India
More informationDETECTION OF NODE CAPTURE ATTACKS IN WIRELESS SENSOR NETWORKS
DETECTION OF NODE CAPTURE ATTACKS IN WIRELESS SENSOR NETWORKS S.Pavaimalar *, G.ShenbagaMoorthy ** * II-M.E, Department of CSE, A.S.L. Pauls College of Engineering and Technology, Coimbatore, India. **
More informationViTAMin: A Virtual Backbone Tree Algorithm for Minimal Energy Consumption in Wireless Sensor Network Routing
ViTAMin: A Virtual Backbone Tree Algorithm for Minimal Energy Consumption in Wireless Sensor Network Routing Jaekwang Kim Department of Electrical and Computer Engineering, Sungkyunkwan University, Suwon,
More informationE±cient Detection Of Compromised Nodes In A Wireless Sensor Network
E±cient Detection Of Compromised Nodes In A Wireless Sensor Network Cheryl V. Hinds University of Idaho cvhinds@vandals.uidaho.edu Keywords: Compromised Nodes, Wireless Sensor Networks Abstract Wireless
More informationNode Clone Detection in Wireless Sensor Networks
International Journal of Research Studies in Science, Engineering and Technology Volume 1, Issue 9, December 2014, PP 161-168 ISSN 2349-4751 (Print) & ISSN 2349-476X (Online) Nagabotu Vimala 1, K. Venkateswara
More informationEnd-To-End Delay Optimization in Wireless Sensor Network (WSN)
Shweta K. Kanhere 1, Mahesh Goudar 2, Vijay M. Wadhai 3 1,2 Dept. of Electronics Engineering Maharashtra Academy of Engineering, Alandi (D), Pune, India 3 MITCOE Pune, India E-mail: shweta.kanhere@gmail.com,
More informationCHAPTER 5 ENERGY MANAGEMENT USING FUZZY GENETIC APPROACH IN WSN
97 CHAPTER 5 ENERGY MANAGEMENT USING FUZZY GENETIC APPROACH IN WSN 5.1 INTRODUCTION Fuzzy systems have been applied to the area of routing in ad hoc networks, aiming to obtain more adaptive and flexible
More informationComparison of Energy-Efficient Data Acquisition Techniques in WSN through Spatial Correlation
Comparison of Energy-Efficient Data Acquisition Techniques in WSN through Spatial Correlation Paramvir Kaur * Sukhwinder Sharma # * M.Tech in CSE with specializationl in E-Security, BBSBEC,Fatehgarh sahib,
More informationDeepti Jaglan. Keywords - WSN, Criticalities, Issues, Architecture, Communication.
Volume 5, Issue 8, August 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Study on Cooperative
More informationDetection of Wormhole Attacks in Wireless Sensor Networks
Detection of Wormhole Attacks in Wireless Sensor Networks Ms Shweta Dalke RGPV: Electronics & Communication,Truba College of Engineering & Technology,Indore,INDIA Ms Pallavi Pahadiya RGPV: Electronics
More informationComparison of TDMA based Routing Protocols for Wireless Sensor Networks-A Survey
Comparison of TDMA based Routing Protocols for Wireless Sensor Networks-A Survey S. Rajesh, Dr. A.N. Jayanthi, J.Mala, K.Senthamarai Sri Ramakrishna Institute of Technology, Coimbatore ABSTRACT One of
More informationAn Efficient Data Transmission in VANET Using Clustering Method
INTL JOURNAL OF ELECTRONICS AND TELECOMMUNICATIONS, 2017, VOL. 63, NO. 3, PP. 309-313 Manuscript received April 29, 2016; revised July, 2017. DOI: 10.1515/eletel-2017-0045 An Efficient Data Transmission
More informationMs A.Naveena Electronics and Telematics department, GNITS, Hyderabad, India.
Dynamic Training Intrusion Detection Scheme for Blackhole Attack in MANETs Ms A.Naveena Electronics and Telematics department, GNITS, Hyderabad, India. Dr. K.Rama Linga Reddy Electronics and Telematics
More informationIMPROVING WIRELESS SENSOR NETWORK LIFESPAN THROUGH ENERGY EFFICIENT ALGORITHMS
IMPROVING WIRELESS SENSOR NETWORK LIFESPAN THROUGH ENERGY EFFICIENT ALGORITHMS 1 M.KARPAGAM, 2 DR.N.NAGARAJAN, 3 K.VIJAIPRIYA 1 Department of ECE, Assistant Professor, SKCET, Coimbatore, TamilNadu, India
More informationCatching BlackHole Attacks in Wireless Sensor Networks
Catching BlackHole Attacks in Wireless Sensor Networks Ashish M 1 and Mr. Jason Martis 2 1 M. Tech, Department Of ISE, NMAM Institute of Technology, Nitte 2 Asst. Prof, Department Of ISE, NMAM Institute
More informationA Fuzzy System based Approach to Extend Network Lifetime for En-Route Filtering Schemes in WSNs
A Fuzzy System based Approach to Extend Network Lifetime for En-Route Filtering Schemes in WSNs M.K. Shahzad, Member, IEEE, L. Nkenyereye, Member, IEEE, S. M. Riazul Islam, Member, IEEE 1 Authors' Affiliations
More informationEnergy Conservation through Sleep Scheduling in Wireless Sensor Network 1. Sneha M. Patil, Archana B. Kanwade 2
Energy Conservation through Sleep Scheduling in Wireless Sensor Network 1. Sneha M. Patil, Archana B. Kanwade 2 1 Student Department of Electronics & Telecommunication, SITS, Savitribai Phule Pune University,
More informationMODELING AND SIMULATION OF THRESHOLD ANALYSIS FOR PVFS IN WIRELESS SENSOR NETWORKS
Science MODELING AND SIMULATION OF THRESHOLD ANALYSIS FOR PVFS IN WIRELESS SENSOR NETWORKS Tae Ho Cho *1, Su Man Nam 2 *1 College of Software, Sungkyunkwan University, KOREA 2 College of Information and
More informationSecurity of Aggregated Data in Wireless Sensor Network
Security of Aggregated Data in Wireless Sensor Network Surabhi Singhal Abstract A Wireless Sensor Network can be defined as a group of sensors which are distributed spatially to monitor physical or spatial
More informationRouting Scheme in Energy efficient based Protocols for Wireless Sensor Networks
Routing Scheme in Energy efficient based Protocols for Wireless Sensor Networks 1 Chiranjeevi Rampilla, 2 Pallikonda Anil Kumar, 1 Student, DEPT.OF CSE, PVPSIT, KANURU, VIJAYAWADA. 2 Asst.Professor, DEPT.OF
More informationIndex terms Wireless Mesh networks, Selective forwarding attacks, Route Reply Packet, Fuzzy Logic, Detection threshold.
Volume 4, Issue 3, March 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Fuzzy Logic
More informationDetecting Selective Forwarding Attacks in Wireless Sensor Networks
Detecting Selective Forwarding Attacks in Wireless Sensor Networks Bo Yu 1,2 Bin Xiao 1 1 Hong Kong Polytechnic University 2 Fudan University Dept. of Computing Dept. of Computer Science and Engineering
More informationCACHING IN WIRELESS SENSOR NETWORKS BASED ON GRIDS
International Journal of Wireless Communications and Networking 3(1), 2011, pp. 7-13 CACHING IN WIRELESS SENSOR NETWORKS BASED ON GRIDS Sudhanshu Pant 1, Naveen Chauhan 2 and Brij Bihari Dubey 3 Department
More informationCLUSTER BASED ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORKS
CLUSTER BASED ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORKS M.SASIKUMAR 1 Assistant Professor, Dept. of Applied Mathematics and Computational Sciences, PSG College of Technology, Coimbatore, Tamilnadu,
More informationCHAPTER 5 ANT-FUZZY META HEURISTIC GENETIC SENSOR NETWORK SYSTEM FOR MULTI - SINK AGGREGATED DATA TRANSMISSION
CHAPTER 5 ANT-FUZZY META HEURISTIC GENETIC SENSOR NETWORK SYSTEM FOR MULTI - SINK AGGREGATED DATA TRANSMISSION 5.1 INTRODUCTION Generally, deployment of Wireless Sensor Network (WSN) is based on a many
More informationInternational Journal of Computer Science Trends and Technology (IJCST) Volume 2 Issue 4, Jul-Aug 2014
RESEARCH ARTICLE OPEN ACCESS Detection and Prevention of Black-Hole Attack in MANETS Rashmi 1, Ameeta Seehra 2 Department of Electronics and Communication Engineering, Guru Nanak Dev Engineering College,
More informationSleep/Wake Aware Local Monitoring (SLAM)
Sleep/Wake Aware Local Monitoring (SLAM) Issa Khalil, Saurabh Bagchi, Ness Shroff Dependable Computing Systems Lab (DCSL) & Center for Wireless Systems and Applications (CWSA) School of Electrical and
More informationDETECTING WORMHOLE ATTACKS IN WIRELESS SENSOR NETWORKS
Chapter 14 DETECTING WORMHOLE ATTACKS IN WIRELESS SENSOR NETWORKS Yurong Xu, Guanling Chen, James Ford and Fillia Makedon Abstract Wormhole attacks can destabilize or disable wireless sensor networks.
More informationMobile Agent Driven Time Synchronized Energy Efficient WSN
Mobile Agent Driven Time Synchronized Energy Efficient WSN Sharanu 1, Padmapriya Patil 2 1 M.Tech, Department of Electronics and Communication Engineering, Poojya Doddappa Appa College of Engineering,
More informationAn Efficient Key Management Scheme for Heterogeneous Sensor Networks
An Efficient Key Management Scheme for Heterogeneous Sensor Networks S.Gandhi,D.Indira Department of Computer Science and Engineering Gudlavalleru Engineering College Gudlavalleru 521356 Abstract Previous
More informationComputer Communications
Computer Communications 34 (2011) 591 597 Contents lists available at ScienceDirect Computer Communications journal homepage: www.elsevier.com/locate/comcom Energy-efficient and high-accuracy secure data
More informationAN EFFICIENT MAC PROTOCOL FOR SUPPORTING QOS IN WIRELESS SENSOR NETWORKS
AN EFFICIENT MAC PROTOCOL FOR SUPPORTING QOS IN WIRELESS SENSOR NETWORKS YINGHUI QIU School of Electrical and Electronic Engineering, North China Electric Power University, Beijing, 102206, China ABSTRACT
More informationCompromised nodes in wireless sensor network 1
Compromised nodes in wireless sensor network 1 Lin Zhi-Ting, Qu Yu-Gui, Li Jing, Zhao Bao-Hua MOE-Microsoft Key Laboratory of Multimedia Computing and Communication, Department of Electronic Engineering
More informationPerformance Analysis of Mobile Ad Hoc Network in the Presence of Wormhole Attack
Performance Analysis of Mobile Ad Hoc Network in the Presence of Wormhole Attack F. Anne Jenefer & D. Vydeki E-mail : annejenefer@gmail.com, vydeki.d@srmeaswari.ac.in Abstract Mobile Ad-Hoc Network (MANET)
More informationMeasure of Impact of Node Misbehavior in Ad Hoc Routing: A Comparative Approach
ISSN (Print): 1694 0814 10 Measure of Impact of Node Misbehavior in Ad Hoc Routing: A Comparative Approach Manoj Kumar Mishra 1, Binod Kumar Pattanayak 2, Alok Kumar Jagadev 3, Manojranjan Nayak 4 1 Dept.
More informationA Review Paper On The Performance Analysis Of LMPC & MPC For Energy Efficient In Underwater Sensor Networks
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 4 Issue 5 May 2015, Page No. 12171-12175 A Review Paper On The Performance Analysis Of LMPC & MPC For Energy
More informationAnalysis of Black-Hole Attack in MANET using AODV Routing Protocol
Analysis of Black-Hole Attack in MANET using Routing Protocol Ms Neha Choudhary Electronics and Communication Truba College of Engineering, Indore India Dr Sudhir Agrawal Electronics and Communication
More informationSurvivability Evaluation in Wireless Sensor Network
2011 3rd International Conference on Advanced Management Science IPEDR vol.19 (2011) (2011) IACSIT Press, Singapore Survivability Evaluation in Wireless Sensor Network Vahid Mavaji 1, Bahareh Abbasi 2
More informationKeywords Mobile Ad hoc Networks, Multi-hop Routing, Infrastructure less, Multicast Routing, Routing.
Volume 4, Issue 7, July 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Study on Various
More informationJournal of Electronics and Communication Engineering & Technology (JECET)
Journal of Electronics and Communication Engineering & Technology (JECET) JECET I A E M E Journal of Electronics and Communication Engineering & Technology (JECET)ISSN ISSN 2347-4181 (Print) ISSN 2347-419X
More informationLIGHTWEIGHT KEY MANAGEMENT SCHEME FOR HIERARCHICAL WIRELESS SENSOR NETWORKS
LIGHTWEIGHT KEY MANAGEMENT SCHEME FOR HIERARCHICAL WIRELESS SENSOR NETWORKS Mohammed A. Al-taha 1 and Ra ad A. Muhajjar 2 1 Department of Computer Science, College of Science, Basrah University, Iraq 2
More informationA REVIEW ON LEACH-BASED HIERARCHICAL ROUTING PROTOCOLS IN WIRELESS SENSOR NETWORK
A REVIEW ON LEACH-BASED HIERARCHICAL ROUTING PROTOCOLS IN WIRELESS SENSOR NETWORK Md. Nadeem Enam 1, Ozair Ahmad 2 1 Department of ECE, Maulana Azad College of Engineering & Technology, Patna, (India)
More informationImpact of Black Hole and Sink Hole Attacks on Routing Protocols for WSN
Impact of Black Hole and Sink Hole Attacks on Routing Protocols for WSN Padmalaya Nayak V. Bhavani B. Lavanya ABSTRACT With the drastic growth of Internet and VLSI design, applications of WSNs are increasing
More informationProviding Transparent Security Services to Sensor Networks
1 Providing Transparent Security Services to Sensor Networks Hamed Soroush, Mastooreh Salajegheh and Tassos Dimitriou Athens Information Technology Email: {hsor,msal,tdim}@ait.edu.gr Abstract In this paper
More informationOpportunistic Transmission Based QoS Topology Control. QoS; Wireless Sensor Networks
Opportunistic Transmission Based QoS Topology Control in Wireless Sensor Networks Jian Ma, Chen Qian, Qian Zhang, and Lionel M. Ni Hong Kong University of Science and Technology {majian, cqian, qianzh,
More informationEnsuring Trustworthiness and Security during Data Transmission in Multihop Wireless Networks
Ensuring Trustworthiness and Security during Data Transmission in Multihop Wireless Networks 1 S.Nandhini, 2 Mr.S.Franson Varun Richo, 1 PG Student, 2 Assistant professor, Francis Xavier Engineering college,
More informationAn Energy-Efficient Hierarchical Routing for Wireless Sensor Networks
Volume 2 Issue 9, 213, ISSN-2319-756 (Online) An Energy-Efficient Hierarchical Routing for Wireless Sensor Networks Nishi Sharma Rajasthan Technical University Kota, India Abstract: The popularity of Wireless
More informationCommunication Layer, Attacks and Security Mechanisms of Wireless Sensor Network
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 5, May 2015, pg.432
More informationMobility Control for Complete Coverage in Wireless Sensor Networks
Mobility Control for Complete Coverage in Wireless Sensor Networks Zhen Jiang Computer Sci. Dept. West Chester University West Chester, PA 9383, USA zjiang@wcupa.edu Jie Wu Computer Sci. & Eng. Dept. Florida
More informationContending Against Energy Debilitating Attacks in Wireless Ad Hoc Sensor Networks
Contending Against Energy Debilitating Attacks in Wireless Ad Hoc Sensor Networks Vidya.M Department of Computer Science and Engineering, Atria Institute of Technology, Bangalore, India Vidya.M1389@gmail.com
More informationISSN: ISO 9001:2008 Certified International Journal of Engineering Science and Innovative Technology (IJESIT) Volume 3, Issue 4, July 2014
Vampire Attack Detection in Wireless Sensor Network Jose Anand 1, K. Sivachandar 2 1. Associate Professor, 2. Assistant Professor Department of Electronics and Communication Engineering, K.C.G. College
More informationAn Energy Efficient Data Dissemination Algorithm for Wireless Sensor Networks
, pp.135-140 http://dx.doi.org/10.14257/astl.2014.48.22 An Energy Efficient Data Dissemination Algorithm for Wireless Sensor Networks Jin Wang 1, Bo Tang 1, Zhongqi Zhang 1, Jian Shen 1, Jeong-Uk Kim 2
More informationLecture 8 Wireless Sensor Networks: Overview
Lecture 8 Wireless Sensor Networks: Overview Reading: Wireless Sensor Networks, in Ad Hoc Wireless Networks: Architectures and Protocols, Chapter 12, sections 12.1-12.2. I. Akyildiz, W. Su, Y. Sankarasubramaniam
More informationEfficient Detection and Elimination of Vampire Attacks in Wireless Ad-Hoc Sensor Networks
Efficient Detection and Elimination of Vampire Attacks in Wireless Ad-Hoc Sensor Networks K.Sivakumar 1, P.Murugapriya 2 II-M.TECH, Department of IT, Sasurie College of Engineering, Vijayamangalam, Tirupur,
More informationFig. 2: Architecture of sensor node
Volume 4, Issue 11, November 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com To Reduce
More informationApproach Using Genetic Algorithm for Intrusion Detection System
Approach Using Genetic Algorithm for Intrusion Detection System 544 Abhijeet Karve Government College of Engineering, Aurangabad, Dr. Babasaheb Ambedkar Marathwada University, Aurangabad, Maharashtra-
More informationBalanced Load Sharing Protocol for Wireless Sensor Networks
Balanced Load Sharing Protocol for Wireless Sensor Networks Maytham Safarª, Rabie Al-Mejbas b ªCollege of Engineering and Petroleum Kuwait University, Kuwait State ªE-mail: maytham@me.com, b mejbas@hotmail.com
More informationEffective Cluster Based Certificate Revocation with Vindication Capability in MANETS Project Report
Effective Cluster Based Certificate Revocation with Vindication Capability in MANETS Project Report Mandadapu Sravya M.Tech, Department of CSE, G. Narayanamma Institute of Technology and Science. Ch.Mandakini
More informationDuplicate Node Detection Using Distributed Protocols (3D-NUP) in WSN
Duplicate Node Detection Using Distributed Protocols (3D-NUP) in WSN Saravanan.D 1, Jeba Moses.T 2, Arthibala.A 3 1,2 Assistant Professor, 3 Senior Lecturer Dept of Information Technology, IFET College
More information