Performance Analysis of Heterogeneous Wireless Sensor Network in Environmental Attack

Similar documents
Impact of Black Hole and Sink Hole Attacks on Routing Protocols for WSN

A Survey On Attacks, Challenges and Security Mechanisms In Wireless Sensor Network

DETECTING, DETERMINING AND LOCALIZING MULTIPLE ATTACKS IN WIRELESS SENSOR NETWORK - MALICIOUS NODE DETECTION AND FAULT NODE RECOVERY SYSTEM

Modified Low Energy Adaptive Clustering Hierarchy for Heterogeneous Wireless Sensor Network

Selective Forwarding Attacks Detection in WSNs

An Improved Gateway Based Multi Hop Routing Protocol for Wireless Sensor Network

A REVIEW PAPER ON DETECTION AND PREVENTION OF WORMHOLE ATTACK IN WIRELESS SENSOR NETWORK

Blackhole Attack Detection in Wireless Sensor Networks Using Support Vector Machine

Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures

Defending Against Resource Depletion Attacks in Wireless Sensor Networks

Detection and Suppression of Blackhole Attack in Leach based Sensor Network

Multi-Hop Clustering Protocol using Gateway Nodes in Wireless Sensor Network

Security of Mobile Ad Hoc and Wireless Sensor Networks

ALL ABOUT DATA AGGREGATION IN WIRELESS SENSOR NETWORKS

Hierarchical Routing Algorithm to Improve the Performance of Wireless Sensor Network

Communication Layer, Attacks and Security Mechanisms of Wireless Sensor Network

Wireless Sensor Networks: Security Issues, Challenges and Solutions

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol

Secured Routing Protocols for Wireless & ATM Networks : An Analysis

Detection of Attacks on Application and Routing Layer in Tactical MANETs

MultiHop Routing for Delay Minimization in WSN

Fig. 2: Architecture of sensor node

Detection of Wormhole Attacks in Wireless Sensor Networks

International Journal of Advanced Research in Computer Science and Software Engineering

A Modified LEACH Protocol for Increasing Lifetime of the Wireless Sensor Network

Efficient Detection and Elimination of Vampire Attacks in Wireless Ad-Hoc Sensor Networks

International Journal of Advance Research in Computer Science and Management Studies

Index terms Wireless Mesh networks, Selective forwarding attacks, Route Reply Packet, Fuzzy Logic, Detection threshold.

Ameliorate Threshold Distributed Energy Efficient Clustering Algorithm for Heterogeneous Wireless Sensor Networks

An Energy Efficient Intrusion Detection System in MANET.

Int. J. Advanced Networking and Applications Volume: 04 Issue: 04 Pages: (2013) ISSN :

Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs

Design and Implementation of TARF: A Trust Aware Routing Framework WSN s

There into, Ei : Residual energy of each node in I round; Er : average energy of rest nodes in I round;

Mobile Sink to Track Multiple Targets in Wireless Visual Sensor Networks

AN EFFICIENT DETECTION AND PREVENTION OF DDoS ATTACK IN WSN

Wireless Sensor Networks applications and Protocols- A Review

A Pigeon Agents based Analytical Model to Optimize Communication in Delay Tolerant Network

ComparisonofPacketDeliveryforblackholeattackinadhocnetwork. Comparison of Packet Delivery for Black Hole Attack in ad hoc Network

Comparison of TDMA based Routing Protocols for Wireless Sensor Networks-A Survey

Security Issues In Mobile Ad hoc Network Routing Protocols

Secure and Efficient Routing Mechanism in Mobile Ad-Hoc Networks

Catching BlackHole Attacks in Wireless Sensor Networks

A Secure Routing Method for Detecting False Reports and Wormhole Attacks in Wireless Sensor Networks *

EXPERIMENTAL EVALUATION TO MITIGATE BYZANTINE ATTACK IN WIRELESS MESH NETWORKS

Study on Wireless Sensor Networks Challenges and Routing Protocols

Variation in Wireless Sensor Network Performance Parameters under Black Hole Attack and It s Mitigation

K-SEP: A more stable SEP using K-Means Clustering and Probabilistic Transmission in WSN

CMNTS:Catching Malicious Nodes with Trust Support in Wireless Sensor Networks

Trusted Routing in IoT

ENSF: ENERGY-EFFICIENT NEXT-HOP SELECTION METHOD USING FUZZY LOGIC IN PROBABILISTIC VOTING-BASED FILTERING SCHEME

Energy Efficient Homogeneous and Heterogeneous System for Wireless Sensor Networks

Weighted trust evaluation-based malicious node detection for wireless sensor networks

International Journal of Scientific & Engineering Research, Volume 5, Issue 9, September ISSN

Intrusion Detection for Routing Attacks in Sensor Networks

Efficient Cluster Based Data Collection Using Mobile Data Collector for Wireless Sensor Network

A Hybrid Intrusion Detection System of Cluster-based Wireless Sensor Networks

A METHOD FOR DETECTING FALSE POSITIVE AND FALSE NEGATIVE ATTACKS USING SIMULATION MODELS IN STATISTICAL EN- ROUTE FILTERING BASED WSNS

An Energy-Efficient Hierarchical Routing for Wireless Sensor Networks

A NOVEL CLUSTER BASED WORMHOLE AVOIDANCE ALGORITHM FOR MOBILE AD- HOC NETWORKS

ESRP: Energy Sensitive Routing Protocol for Wireless Sensor Networks

[Nitnaware *, 5(11): November 2018] ISSN DOI /zenodo Impact Factor

Efficient Cluster Head Selection Method Based On K-means Algorithm to Maximize Energy of Wireless Sensor Networks

IMPROVING WIRELESS SENSOR NETWORK LIFESPAN THROUGH ENERGY EFFICIENT ALGORITHMS

Detection of Insider Selective Forwarding Attack Based on Monitor Node and Trust Mechanism in WSN

International Journal of Research in Advent Technology Available Online at:

High Speed Data Collection in Wireless Sensor Network

Security in Mobile Ad-hoc Networks. Wormhole Attacks

ENERGY PROFICIENT CLUSTER BASED ROUTING PROTOCOL FOR WSN 1

Gateway Based WSN algorithm for environmental monitoring for Energy Conservation

Comparative study on dynamic key-management techniques for cluster-based sensor networks

Secured Dynamic Source Routing Protocol for Mobile Sensor Networks

A Review Paper on Routing Protocols in Wireless Sensor Networks

A REVIEW ON LEACH-BASED HIERARCHICAL ROUTING PROTOCOLS IN WIRELESS SENSOR NETWORK

Security Issues & Challenging Attributes in Mobile Ad-Hoc Networks (MANET)

Zonal based Deterministic Energy Efficient Clustering Protocol for WSNs

A ROUTING OPTIMIZATION AND DATA AGGREGATION SCHEME BASED ON RF TARANG MODULE IN WSN

Security Mechanisms for Selective Forwarding Attack in Wireless Sensor Networks: Review and Analysis

AN ENHANCED SECURE ROUTING ALGORITHM AGAINST SINKHOLE ATTACK IN WIRELESS SENSOR NETWORKS

Chapter 55 Elimination of Black Hole and False Data Injection Attacks in Wireless Sensor Networks

Detection of Malicious Node in Wireless Sensor Network under Byzantine Attack

SCH-BASED LEACH ALGORITHM TO ENHANCE THE NETWORK LIFE TIME IN WIRELESS SENSOR NETWORK (WSN)

Heterogeneous LEACH Protocol for Wireless Sensor Networks

Pritesh Jain Asst Professor, Department of CSE, Patel College of Science & Technology, Indore, Madhya Pradesh, India

ABSTRACT I. INTRODUCTION. Anju Bala Research Scholar, Department of Computer Science and Applications M.D. University, Rohtak, Haryana, India

Energy Efficient Routing Protocols in Wireless Sensor Network

Cost Based Efficient Routing for Wireless Body Area Networks

ABSTRACT I. INTRODUCTION II. PROPOSED FRAMEWORK

An Improvised Hierarchical Black Hole Detection Algorithm In Wireless Sensor Networks

Analysis and Performance evaluation of Traditional and Hierarchal Sensor Network

A Research Paper on Security Enhancement In Leach Protocol

Performance Comparison of Energy Efficient Clustering Protocol in Heterogeneous Wireless Sensor Network

Density controlled-divide and Rule Scheme for Energy Efficient Routing in WSNs

Intrusion Detection System to Detect Sinkhole Attack on RPL Protocol in Internet of Things

CLUSTER HEAD SELECTION USING QOS STRATEGY IN WSN

Link-Based Wormhole Detection in Wireless Sensor Networks

Comparative Analysis of EDDEEC & Fuzzy Cost Based EDDEEC Protocol for WSNs

Genetic Algorithm Enabled Prevention of Sybil Attacks for LEACH-E

Sleep Deprivation Attack Detection in Wireless Sensor Network

ISSN: ISO 9001:2008 Certified International Journal of Engineering Science and Innovative Technology (IJESIT) Volume 3, Issue 4, July 2014

Transcription:

International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 3, Number 5 (2013), pp. 451-458 International Research Publications House http://www. irphouse.com /ijict.htm Performance Analysis of Heterogeneous Wireless Sensor Network in Environmental Attack Manali Singh 1, Khushbu Babbar 2 and Kusum Lata Jain 3 Computer Science Department, Banasthali University C-62, Sarojini Marg, C-Scheme, Jaipur, India. Abstract Wireless sensor networks have gained considerable attention in the past few years. They are being used in the domains of battlefield communication, homeland security, pollution sensing, and traffic monitoring. In wireless sensor network (WSN), nodes can be easily compromised by the attacker when deployed in a hostile environment due to the constraints such as limited battery lifetime, memory space and computing capability. This paper presents a performance analysis of a heterogeneous wireless network when attacker changes the environmental values by an artificial event or a miscellaneous node. An attacker forces the node to transmit more sensed data to base station. Attacker produces an event in environment due to which nodes have to sense the environment more than once in the same round that increase the power consumption of the node. This interrupts reduces the network life time and network nodes are not able to perform their function of data collection and reporting to Base Station properly. This paper presents the simulation results on MATLAB. Simulation results show that network lifetime is decreases as the event occur in network. Keywords: WSN, environmental attack, network lifetime, power consumption, base station. 1. Introduction Wireless Sensor networks (WSNs) is a new paradigm of ambient monitoring with many potential applications in the field of mass public and military. The sensing technology combined with processing power and wireless communication makes it

452 Manali Singh et al lucrative for being exploited in abundance in future. This network is formed by thousands of small dimension nodes which communicate to Base Station using ad-hoc wireless network and are very much limited by computational, memory and energy resources. The main objective of the sensor nodes is to collect information from its surrounding environment and transmit it to sink, called base station (BS). BS analyzes the gathered information. Fig. 1: Overview of Wireless Sensor Network. Because nodes are generally deployed in harsh and hostile terrain so are at risk of physical distortion. Due to this intrinsic nature of networks, WSN becomes vulnerable to many security attacks. This paper presents an attack where intruder forces the sensors to remain awake even after completing their work of sensing environment once in each round so that these sensors waste their energy. Here the attacker changes the environmental values by an artificial event or a miscellaneous node and forces the nodes to transmit more sensed data to base station. So there is large power consumption by limited powered sensor nodes. This interrupt reduces the network life time and network nodes are not able to perform their function of data collection and reporting to Base Station properly because they sense wrong data and also they get dead in very early stages of network life time. This gives rise to DoS (Denial of Service) through Denial of Sleep. This paper presents the simulation result of different scenario for network. The rest of the paper is structured as follows. In section 2, we briefly review the need of security and approaches for detecting malicious WSN node detection. Section 3 describes the simulation parameters and assumptions made. Section 4 presents the experimental setup and simulation results. Section 5 concludes this paper by describing the summary of results obtained. 2. Related Work Energy is one of the most crucial resources for battery powered in wireless sensor network. Sensor nodes can use up their limited supply of energy performing computations and transmitting information in a wireless environment. Various protocols are available to route the data from node to base station in WSN in an energy

Performance Analysis of Heterogeneous Wireless Sensor Network 453 efficient way, enhancing the network survivability. Once the node uses up all its energy, it can no longer perform sensing task and is termed as dead node. WSN are often deployed in a hostile environment and work without human supervision, individual nodes can be easily compromised due to limitations of computational, memory and energy resources. There are number of attacks that can be launched against a WSN when certain number of sensor nodes has been compromised. some of these attacks are HELLO flooding attack, sink hole attacks, Sybil attack, black hole attack, worm hole attacks, Dos attacks. So security in WSN is one of the most important topics in WSN research community. It becomes critical to detect and isolate compromised nodes in order to avoid being misled by the falsified information injected by the adversary and also work in power saving mode. Researchers have suggested detecting malicious node using signal strength. In this every node monitors its surroundings and whenever a transmission is detected by a sensor node, it would check if the signal strength of the transmitting node is compatible with originator node s geographical position. But this approach introduces large overhead so is not efficient. Karlof and Wagner suggested to construct efficient random sampling mechanism and interactive proofs, then user can verify that the answer given by the aggregator is good approximation of the true value even when a fraction of sensor nodes are compromised. 3. Network Preliminaries for the Proposed Work Simulation is performed in MATLAB. In simulation network 100 nodes are deployed in uniform random distribution. The network is a heterogeneous network in terms of energy. Each of these nodes is assigned with random energy to create a heterogeneous WSN. The network works in rounds. In each round the nodes send the sensed data to the base station. Energy model is used as LEACH. A malicious environment node is introduced in the system on random basis. This malicious node produces an event in environment due to which nodes need to sense the environment more than once in a round that increase the power consumption of the node. The number of rounds in which this intrusion effect is forced on nodes is selected randomly. This interrupts reduces the network life. Network lifetime is round in which first dead node occurs in the network and used as performance criteria. The nodes get dead at early stages of network life time and also falsified information is injected by the adversary.

454 Manali Singh et al 4. Simulation Parameters Table 1 shows the simulation parameters. Table 1: Simulation Parameters. Parameter Values Simulation Round 1000 Topology Size 200 x 200 Number of nodes 100 Initial node power Random Nodes Distribution Nodes are uniformly randomly distributed Energy for Transmission (ETX) 50*0.000000001 Energy for Reception (ERX)/ 50*0.000000001 Sensing Energy Energy for Data Aggregation 5*0.000000001 (EDA) 5. Simulation Results Simulation shows the following results in different scenario 5.1 When number of rounds in which intrusion occurs varies: In 10 runs of simulation scenario with the malicious environment simulation results shows that network life is decreases as the number of random round is increased. Table 2 and Fig.2 shows the result of effect on first dead node by varying the intruded rounds. Simulation run Table 2: First dead node round number with variation in intrusion rounds. First dead when no malicious environment introduced When malicious environment is introduced First dead for 100 First dead for 200 random rounds of random rounds of intrusion intrusion 1 463 77 93 55 2 396 81 84 70 3 307 52 85 68 4 345 72 72 66 5 276 130 80 73 6 301 51 57 85 7 279 62 64 90 First dead for 300 random rounds of intrusion

Performance Analysis of Heterogeneous Wireless Sensor Network 455 8 368 56 87 71 9 466 95 72 67 10 277 80 61 64 round number in which first node died 500 450 400 350 300 250 200 150 100 50 0 1 2 3 4 5 6 7 8 9 101112 first dead first dead(100) first dead(200) first dead(300) Simulation Runs Fig. 2: First dead node round number with variation in intrusion rounds. 5.2 When number of time malicious event is sensed by nodes: In this scenario, attacker forces all the nodes to sense data more than once instead of one. Table 3 and Fig 3. Shows the result of effect on first dead by varying number of times malicious event is sensed. Simulation run Table 3: Effect on first dead node by varying times of event sensing. First dead when no malicious environment When malicious environment is introduced First dead for 5 First dead for 4 times event times event sensing sensing 1 463 77 75 220 2 396 81 76 112 3 307 52 84 218 4 345 72 60 201 5 276 130 72 154 First dead for 3 times event sensing

456 Manali Singh et al 6 301 51 143 123 7 279 62 99 180 8 368 56 88 184 9 466 95 69 166 10 277 80 89 101 round number in which first node dies 500 450 400 350 300 250 200 150 100 50 0 1 2 3 4 5 6 7 8 9 10 11 Simulation Runs first dead first dead(5 times) first dead(4 times) first dead(3times) Fig. 3: Effect on first dead node by varying times of event sensing. 6. Conclusion In this paper, we have shown the effect of malicious environment on heterogeneous WSN. The basic idea is that when malicious event is introduced, working of sensors gets interrupted because of which the sensors are not able to perform their work of data collection properly and die in very early stages of network life. According to results obtained, it is observed that when no malicious environment was introduced, the first node died at minimum of 276 round and maximum of 466 round but after introducing malicious environment, first node died at minimum 51, 57 and 55 round number and maximum 130, 93 and 90 round number for 100,200 and 300 random rounds respectively in which interruption occurred. And first dead node was obtained at minimum 51, 60 and 101round number and maximum of130, 143 and 220 round number for varying number of times event was sensed as 5 times, 4 times and 3 times respectively. This means that a node has been compromised or is out of function which compromises the security of data also.

Performance Analysis of Heterogeneous Wireless Sensor Network 457 References [1] B.Sun, K.Wu and U. Pooch(2002), Secure Routing against Black-hole Attack in Mobile Ad Hoc Networks, Proceedings of Communication and Computer Networks [2] C. Karlof and D. Wagner(2003), Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures, Journal of Ad Hoc Networks, Elsevier. [3] Idris M.Atakli, Hongbing Hu, Yu Chen,Wei-Shinn Ku and Zhou Su(2008), Malicious node detection in Wireless Sensor Networks using Weighted Trusted Evaluation, SpringSim [4] J.Newsome, E.Shi, D.Song and A. Perrig(2004), The Sybil Attack in Sensor Networks: Analysis and Defense, International Symposium on Information Processing in Sensor Networks, 1. [5] OMKAR Pattnaik, Sasmita Pani(2012), Application of IDS in WSN: a survey, IJRCCT, 7, 1, [6] Meena Malik, Dr. Yudhvir Singh and Anshu Arora(2013), Analysis of LEACH protocol in Wireless Sensor Networks, International Journal of Advanced Research in Computer Science and Software Engineering, 3, 2. [7] M.S. Islam and S.A. Rahman(2011), Anomaly intrusion detection system in wireless sensor networks: security threats and existing approaches, International Journal of Advanced Sciences and Technology, 36, pp 1-8 [8] Nabil Ali Alrejah, S.Khan and Bibal Shams (2013), Intrusion Detection Systems in Wireless Sensor Networks: a review, International Journal of Distributed Sensor Networks. [9] Raymond and David R.(2008), Denial-of-service in Wireless Sensor Networks: Attacks and Defenses, Pervasive Computing, IEEE, 7, 1. [10] Siebe Datema(2005), A case study of Wireless Sensor Network attacks, Delft University of Technology. [11] S. Khan, K. K. Loo, and Z. U. Din(2010), Framework for intrusion detection in IEEE 802.11 wireless mesh networks, International Arab Journal of Information Technology, 7, 4, pp. 435 440. [12] W.Junior, T. Figueriredo, H.C. Wong and A. Lourier(2004), Malicious Node Detection in wireless Sensor Networks, the 18 th International Parallel and Distributed Processing Symposium (IPDPS 04). [13] Y.Hu, A.Perrig and D.johnson(2003), Packet Leashes: A Defense against Wormhole Attacks in Wireless Ad Hoc Networks, IEEE INFOCOM.

458 Manali Singh et al