CASER Protocol Using DCFN Mechanism in Wireless Sensor Network

Similar documents
Cost-Aware SEcure Routing (CASER) Protocol Design for Wireless Sensor Networks

ISSN Vol.04,Issue.12, September-2016, Pages:

A COMPARITIVE STUDY ON COST AWARE SECURE ROUTING (CASER) PROTOCOL WITH SLEEP WAKE STATE ROUTING PROTOCOL (SWSR)

Mobile Agent Driven Time Synchronized Energy Efficient WSN

Survey on Reliability Control Using CLR Method with Tour Planning Mechanism in WSN

An Algorithm for Dynamic SDN Controller in Data Centre Networks

Performance Evaluation of Various Routing Protocols in MANET

ISSN Vol.04,Issue.11, August-2016, Pages:

The Impact of Clustering on the Average Path Length in Wireless Sensor Networks

Contending Against Energy Debilitating Attacks in Wireless Ad Hoc Sensor Networks

DETECTING, DETERMINING AND LOCALIZING MULTIPLE ATTACKS IN WIRELESS SENSOR NETWORK - MALICIOUS NODE DETECTION AND FAULT NODE RECOVERY SYSTEM

IJREAT International Journal of Research in Engineering & Advanced Technology, Volume 1, Issue 2, April-May, 2013 ISSN:

Figure 1. Clustering in MANET.

End-To-End Delay Optimization in Wireless Sensor Network (WSN)

Impact of Black Hole and Sink Hole Attacks on Routing Protocols for WSN

CHAPTER 4 IMPACT OF ROUTING ATTACKS IN LOCATION BASED ROUTING PROTOCOL

Vaibhav Jain 2, Pawan kumar 3 2,3 Assistant Professor, ECE Deptt. Vaish College of Engineering, Rohtak, India. Rohtak, India

Performance Analysis and Enhancement of Routing Protocol in Manet

Energy Conservation through Sleep Scheduling in Wireless Sensor Network 1. Sneha M. Patil, Archana B. Kanwade 2

Energy aware geographic routing in wireless sensor networks with anchor nodes. Mircea Cretu Stancu Utrecht University Computing Science May 2013

COST-AWARE SECURE PROTOCOL DESIGN AND ANALYSIS. Di Tang

Reliable and Energy Efficient Protocol for Wireless Sensor Network

SUMMERY, CONCLUSIONS AND FUTURE WORK

A REVIEW PAPER ON DETECTION AND PREVENTION OF WORMHOLE ATTACK IN WIRELESS SENSOR NETWORK

Sleep Scheduling Technique for Geographic Routing in MANET

A Review Paper on Routing Protocols in Wireless Sensor Networks

Quadratic Route Factor Estimation Technique for Routing Attack Detection in Wireless Adhoc Networks

Catching BlackHole Attacks in Wireless Sensor Networks

Defending Against Resource Depletion Attacks in Wireless Sensor Networks

DISTANCE BASED CLUSTER FORMATION FOR ENHANCING THE NETWORK LIFE TIME IN MANETS

Nodes Energy Conserving Algorithms to prevent Partitioning in Wireless Sensor Networks

Mitigating Hot Spot Problems in Wireless Sensor Networks Using Tier-Based Quantification Algorithm

Novel Cluster Based Routing Protocol in Wireless Sensor Networks

An Iterative Greedy Approach Using Geographical Destination Routing In WSN

Efficient Cluster Based Data Collection Using Mobile Data Collector for Wireless Sensor Network

An Energy-Efficient Hierarchical Routing for Wireless Sensor Networks

Chapter 7 CONCLUSION

Quadratic Route Factor Estimation Technique for Routing Attack Detection in Wireless Adhoc Networks

Comparative analysis of centralized and distributed clustering algorithm for energy- efficient wireless sensor network

Maximizing the Lifetime of Clustered Wireless Sensor Network VIA Cooperative Communication

Clustering in Wireless Sensor Networks: Performance Comparison of EAMMH and LEACH Protocols using MATLAB

Chapter 5 Ad Hoc Wireless Network. Jang Ping Sheu

Fig. 2: Architecture of sensor node

ENERGY SAVING IN WIRELESS SENSOR NETWORK WITH SPIN PROTOCOL

A ROUTING OPTIMIZATION AND DATA AGGREGATION SCHEME BASED ON RF TARANG MODULE IN WSN

Impact of IEEE MAC Packet Size on Performance of Wireless Sensor Networks

MultiHop Routing for Delay Minimization in WSN

Simulation and Performance Analysis of Throughput and Delay on Varying Time and Number of Nodes in MANET

Maximum Coverage Range based Sensor Node Selection Approach to Optimize in WSN

6367(Print), ISSN (Online) Volume 4, Issue 2, March April (2013), IAEME & TECHNOLOGY (IJCET)

Optimizing Performance of Routing against Black Hole Attack in MANET using AODV Protocol Prerana A. Chaudhari 1 Vanaraj B.

Detection of Malicious Node in Wireless Sensor Network under Byzantine Attack

Fault Tolerant, Energy Saving Method for Reliable Information Propagation in Sensor Network

A Novel Broadcasting Algorithm for Minimizing Energy Consumption in MANET

Mobile Sensor Swapping for Network Lifetime Improvement

Efficient Detection and Elimination of Vampire Attacks in Wireless Ad-Hoc Sensor Networks

Cost Based Efficient Routing for Wireless Body Area Networks

Computer Based Image Algorithm For Wireless Sensor Networks To Prevent Hotspot Locating Attack

Subject: Adhoc Networks

Energy Efficiency and Latency Improving In Wireless Sensor Networks

An Efficient Data-Centric Routing Approach for Wireless Sensor Networks using Edrina

Clustering Based Certificate Revocation Scheme for Malicious Nodes in MANET

CHAPTER 5 ANT-FUZZY META HEURISTIC GENETIC SENSOR NETWORK SYSTEM FOR MULTI - SINK AGGREGATED DATA TRANSMISSION

Using Mobile Relays to Prolong the Lifetime of Wireless Sensor Networks. Wang Wei Vikram Srinivasan Chua Kee-Chaing

SEAR: SECURED ENERGY-AWARE ROUTING WITH TRUSTED PAYMENT MODEL FOR WIRELESS NETWORKS

Challenges in Mobile Ad Hoc Network

ALL ABOUT DATA AGGREGATION IN WIRELESS SENSOR NETWORKS

INTELLIGENT OPPORTUNISTIC ROUTING IN WIRELESS SENSOR NETWORK

Routing protocols in WSN

Study on Wireless Sensor Networks Challenges and Routing Protocols

Performance Analysis of Aodv Protocol under Black Hole Attack

Figure 1: Ad-Hoc routing protocols.

PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS

AN ENERGY EFFICIENT AND RELIABLE TWO TIER ROUTING PROTOCOL FOR TOPOLOGY CONTROL IN WIRELESS SENSOR NETWORKS

DISCOVERING OPTIMUM FORWARDER LIST IN MULTICAST WIRELESS SENSOR NETWORK

International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: Issue 2, Volume 2 (February 2015)

Outline. CS5984 Mobile Computing. Dr. Ayman Abdel-Hamid, CS5984. Wireless Sensor Networks 1/2. Wireless Sensor Networks 2/2

ComparisonofPacketDeliveryforblackholeattackinadhocnetwork. Comparison of Packet Delivery for Black Hole Attack in ad hoc Network

SECURED KEY MANAGEMENT ALGORITHM FOR DATA TRANSMISSION IN MOBILE ADHOC NETWORKS

Routing Protocols in MANETs

Middle in Forwarding Movement (MFM): An efficient greedy forwarding approach in location aided routing for MANET

Selective Forwarding Attacks Detection in WSNs

Energy Efficient Routing Using Sleep Scheduling and Clustering Approach for Wireless Sensor Network

Detection of Sybil Attack in Wireless Sensor Network

Data gathering using mobile agents for reducing traffic in dense mobile wireless sensor networks

Energy Aware Node Placement Algorithm for Wireless Sensor Network

ABSTRACT I. INTRODUCTION II. PROPOSED FRAMEWORK

IMPROVING WIRELESS SENSOR NETWORK LIFESPAN THROUGH ENERGY EFFICIENT ALGORITHMS

An Energy Efficient Clustering in Wireless Sensor Networks

Geographical Routing Algorithms In Asynchronous Wireless Sensor Network

Performance Analysis of AODV Routing Protocol with and without Malicious Attack in Mobile Adhoc Networks

Wireless Sensor Network Optimization using multiple Movable Sensors for Data Gathering

WSN NETWORK ARCHITECTURES AND PROTOCOL STACK

ENERGY EFFICIENT MULTIPATH ROUTING FOR MOBILE AD HOC NETWORKS

Optimized Coverage and Efficient Load Balancing Algorithm for WSNs-A Survey P.Gowtham 1, P.Vivek Karthick 2

Review on Packet Forwarding using AOMDV and LEACH Algorithm for Wireless Networks

Wireless Sensor Networks (WSN) Tanyar Pooyeh Intelligent Robotics - winter semester 2013/14 Nov 11, 2013

PRESERVING SOURCE-LOCATION PRIVACY IN WIRELESS SENSOR NETWORKS

Chapter 55 Elimination of Black Hole and False Data Injection Attacks in Wireless Sensor Networks

An Energy Efficient Intrusion Detection System in MANET.

Transcription:

Volume 118 No. 7 2018, 501-505 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu CASER Protocol Using DCFN Mechanism in Wireless Sensor Network A.Shirly Edward Department of ECE, SRM IST, Vadapalani, Chennai, India edward.s@vdp.srmuniv.ac.in M.S.Bhuvaneswari Department of ECE, SRM IST, Vadapalani, Chennai, India Bhuvaneswari.ms@vdp.srmuniv.ac.in S.G.Vijayakumari Department of ECE, SRM IST, Vadapalani, Chennai, India Vijayakumari.g@vdp.srmuniv.ac.in Abstract This paper proposes Cost Aware SEcure Routing Protocol using Denial Contradictions with Fictitious Node mechanism to address the two conflicting issues in Wireless Sensor Networks. They are energy consumption and security. Energy efficient transferring of packets is a major issue in a wireless sensor network. This is achieved by CASER which utilizes random walk strategy to balance the energy consumption in the network. Random walk strategy provides chance for every node to participate in the data transmission, thereby avoiding any node to completely drain out of energy which maximizes the network lifetime. For information collection and monitoring the critical infrastructure wireless sensor networks are widely used. Hence secured data transmission is achieved through DCFN mechanism which relays on internal knowledge of every node participating in the network. The results obtained from simulation demonstrate that the proposed scheme is very efficient in balancing the energy consumption of the network and can achieve a secured data transmission. Keywords Energy balance, Network Lifetime, Routing, Security, Sensor Networks I. INTRODUCTION In recent days, wireless sensor networks (WSNs) are extensively used in civilian and military applications, like monitoring of critical infrastructures, atmospheric conditions and precious species. The main features of those networks are that each of the networks consist of a large number of unthethered and unattended sensor nodes. Limited energy resources are often available in these nodes, which causes energy to be a vital design issue for these networks [1]. Another challenging main design issue for WSNs is security. Therefore, a precisely designed routing protocol must have low energy consumption for message delivery and high message delivery ratio, and also ensure security. The main contributions of this paper are as follows: They are a secure and energy efficient Cost-Aware SEcure Routing (CASER) protocol using DCFN mechanism for WSNs is proposed. A quantitative scheme to balance the energy consumption is suggested so that the sensor network lifetime can be maximized. Security is quantitatively analyzed for the proposed routing algorithm. Energy consumption is balanced by utilizing random walk strategy for available sensor networks. Security is achieved by utilizing Denial Contradictions with Fictitious Node mechanism. II. OVERVIEW OF THE EXISTING SCHEME A. Energy balancing Batteries employed in sensor nodes become a critical constraint on sensors networks. A second constraint is that a large number of sensors will be deployed unattended, and therefore it becomes difficult in the sensors to change or recharge batteries. In order to determine the life time of the battery, energy consumption of the active node must be measured in a network. Therefore power consumption must be minimized for all systems, processes in the system and communication protocols for sensors and sensor networks. The communications performed inside wireless sensor networks (WSNs) is controlled by limited energy capacity of sensor nodes. Finite-energy resources must be made use of properly by WSN protocols [2]. Typically, due to high transmission power required to achieve a reliable transmission, sensor nodes avoid direct communication with a far-off destination. Rather, sensor nodes send messages by creating a multi-hop network to forward messages to the collector node, which is additionally called the sink node. The network lifetime is assumed to be the first node in the network to fail and a good routing protocol will gradually and uniformly drain the energy across nodes, leading to the death of all nodes nearly at the same time. Phantom routing protocol is a representative example of a routing-based protocol which utilizes designed directed path to transmit the data. There are two phases in Phantom routing, they are random walk and subsequent flooding/single path routing. From the 501

real source the message is routed to a phantom source through a designed directed path or random path, in the random walking phase. And also from the real source the phantom source is expected to be remote, which leads to trace the real source s location to be hard by the adversaries. Anyway from the analysis it can be found that if the message is routed h hops randomly, then it is far fairly possible that the distance between the real source and phantom source is within h/5. To solve this problem, designed directed walk was proposed. First of all, the source node determines the direction of the message. The header stores the direction information of the message. The message will be forwarded on the path to its neighbor in the similar path dictated by the source node. Consequently, the directed walk determines the phantom source that is located away from the real source. Unfortunately, on the pre-determined walk path, once the message is captured, the opponents are able to retrieve the information about the direction stored in the header of the message [3]. Since transmission takes in a pre-determined path, we observe that energy of the nodes participating in the data transmission keeps draining fast while energy in other nodes still remains the same. Even if a single node is completely drained fully, it affects the sensor network s lifetime. Ideally a routing protocol should not drain the sensor node faster [4]. If routing happens through the same path energy will get depleted from the sensor nodes. Sensor Networks in future will be a combination of large number of densely deployed sensors. These networks have nodes that are untethered and unattended. Therefore, an important design consideration is the energy efficiency for these networks. In Wireless Sensor Networks (WSNs) node deployment is a basic issue which has to be solved. Reduction of the complexity of problems can be done with a proper node deployment scheme in WSNs, for example, data fusion, routing, communication, etc. Consequently, it extends the lifetime by minimizing energy consumption in WSNs. B. Security The main problem in wireless sensor network is that they are prone to vulnerable attacks. Delivering messages between nodes in a WSN is important and difficult. In literature routing algorithms can be grouped into two categories. They are Greedy algorithms that apply greedy path finding heuristic which does not guarantee that a whether the packet reaches all of its destinations. One such example is the geographic distance routing (GEDIR) algorithm. Flooding algorithms use controlled packet duplication mechanism to verify that at least one copy of the original packet is received at every destination. Location-aided routing (LAR) protocols are used to exemplify this algorithm. In order for flooding algorithms to terminate, the packets previously seen must be remembered by the network. Hence we have implemented DCFN mechanism in order to provide security to the network. III. PROPOSED CASER ROUTING PROTOCOL USING DCFN MECHANISM A. Random Walk Strategy In random walk strategy, source sensor node generates a packet and it performs random motion till it reaches a sink node where it is collected. Equal initial energy is allotted to each deployed sensor node. The CASER algorithm is designed in such a way it can balance the overall energy consumption of all nodes of the sensor network by controlling energy spending from the same sensor nodes with low energy levels. The life time of the sensor network can be extended by this way. When messages are forwarded by the sensor node the energy level decreases. CASER utilizes random walking strategy to forward a message from one node to another. The sender chooses a random path to forward the data to the destination. Utilization of random walking path provides every node a chance to participate in the data transmission, thereby every node consumes energy to some extent. During next data transmission, CASER utilizes another random node and hence we can prevent the same node consuming more energy which will increase the sensor s network lifetime. Wireless sensor networks (WSNs) need a good sensor deployment. In order to prolong network lifetime and to improve the initial deployment, the sensors are relocated in different densities which may vary with the distance to the sink. Sensors near the sink should have higher density because they are involved in more data forwarding. B. DCFN Mechanism Denial contradictions with Fictitious Node Mechanism (DCFN) depend on the application of a special type of node called fictitious nodes and the internal knowledge acquired by each node during routine routing. Any attack occurred in the network is detected and it finds such attacker node and completely eradicates from the network and a new path to the delivery of packets to the destination is found. From the source node to the destination node a data packet has to be transmitted successfully. All possible paths to reach the sink node from the source node are found. For prompt delivery of the packets a new node called MPR node is chosen. Among the one hop neighbors an MPR node is found through which all the two hop neighbors of the source node can be found.destination is reached earlier on transmission through MPR. Data packet will not reach the destination if there is an attack. It is confirmed that an attack has occurred after waiting for a timeout period,the attacker node is completely thrown out of the network. Initially, sender broadcasts HELLO message to all other nodes. The malicious node is detected and completely removed from the network if any contradictions are observed during transmission. The information about malicious node is also conveyed [5]. 502

IV. FLOW DIAGRAM FOR THE PROPOSED SCHEME Figure 1 shows the flow chart of the proposed scheme. Our proposed system can be simulated in NS2 by randomly deploying the nodes first in which a fictitious node is selected. Initially, sender is made to broadcast HELLO message to other nodes in the network. If there are any contradictions observed in any of the node, that node is considered to be the malicious node. There are various circumstances during which a node can become malicious. It might perform eavesdropping of data or provide wrong destination route or forward the data to already affected node. Once the malicious nodes are identified, fictitious nodes alert all other nodes in the network, thereby eliminating the malicious nodes during data transmission. Now the actual data transmission takes place in a random walk strategy, providing opportunity for all the nodes in the network to participate in the data transmission, thereby balancing the overall sensor network s lifetime. Start Nodes are randomly deployed in the sensor network Fictitious node is declared Figure 2 Energy consumption graph of the existing system B. Representation of Energy consumption in proposed system Sender node broadcasts HELLO messages to other nodes in the network Malicious nodes are detected Sender transmits data through random path eliminating malicious nodes Stop Figure 1. Flowchart of the proposed Scheme V. ANALYSIS A. Representation of Energy consumption in existing system Figure 2 shows that the energy consumption of the entire sensor network is very high in phantom routing as every data is transmitted in the same path, thereby reducing the sensor network s lifetime. Figure 3 Energy consumption of the proposed system Figure 3 shows that the energy consumption of the network is consistent as data is transmitted through random path which avoids any node to completely drain. This extends the lifetime of the network. 503

VI. CONCLUSION In this paper, we presented a secure and energy efficient Cost Aware SEcure Routing Protocol using Denial Contradictions with Fictitious Node Mechanism for Wireless Sensor Networks to balance the energy consumption and to provide security. Our proposed system extends the lifetime of the network while increasing routing security. Security in the network is achieved through a new solution to overcome the attacks called DCFN mechanism. This method differs from all the other methods in the manner that data in the network needed to be protected from attacks completely depend only on the internal knowledge of the nodes and does not need a third party for this purpose. The usage of fictitious node applies the basic knowledge of the network topology to suspect the attack nodes and evacuate those nodes for data transmission. REFERENCES.Di Tang, Tongtong Li, Jian Ren, Jie Wu, Cost-Aware SEcure Routing (CASER) Protocol Design for Wireless Sensor Networks, IEEE Transactions on Parallel and Distributed Systems, Vol.26, No.4, 2015, pp.960-973. [1] F.Bouabdallah, N.Bouabdallah and R.Boutaba, On Balancing Energy Consumption in Wireless Sensor networks, IEEE Transactions on Vehicular Technology,Vol.58, Issue. 6, 2009,pp.2909-2924. [2] Yun Li, Leron Lightfoot, Jian Ren, Routing-Based Source-Location Privacy Protection in Wireless Sensor Networks, IEEE International Conference on Electro/Information Technology, June 2009. [3] U.Datta, P.K. Sahu and S. Kundu, Lifetime of a CDMA wireless sensor network with route diversity, 2013 Annual IEEE India Conference(INDICON), December 2013. [4] R. Bama, K. Vigneshvarun, J. Jeyant and S. Rajasekar, Recovery from Attacks Involving Refusal of Service in Manets by DCFN Mechanism, Middle-East Journal of Scientific Research, Vol.24, No.4, 2016,pp.1513-1516. 504

505

506