Co-operative Detection for Malicious Nodes in Under-Attack WSN
-
2018-04-25 https://doi.org/10.14419/ijet.v7i2.24.12143 -
Fusion Center, Sensor Node Data Falsification, Wireless Sensor Networks, Ad-Hoc On- Demand Distance Vector Protocol. -
Abstract
The network security must be taken into consideration in wireless sensor networks. In our project, we take sensor node data falsification (SNDF) attack using malicious nodes and co-operative detection is used. Fusioncentre collects information from the nodes created in a cluster environment and makes a global decision. The protocol used here is Ad-hoc-on demand distance vector[5] (AODV) and the performance analysis is done using parameters such as throughput and End-to-end delay. The stimulation is done in NS2 using network animator and graphical results are taken.The throughput will be increased compared to the existing system whereas End-to-End delay will be decreased.
Â
 -
References
[1] VP.Illiano, and EC.Lupu: Detecting Malicious Data Injections in Wireless Sensor Networks: A Survey, ACM Comput.Surv., Vol. 48, No. 2, Article 24 (2004).
[2] S. Prasanna, and S. Rao: An Overview of Wireless Sensor Networks, IJSCE, Vol. 2, Issue. 2, pp. 538-540 (2012).
[3] H. Chan, and A. Perrig: Security and Privacy in Sensor Networks, IEEE C.S., Vol. 36, Issue. 10, pp. 103-105 (2003).
[4] X.Du and H.Chen: SECURITY IN WIRELESS SENSOR NETWORKS, IEEE wirel. commun., pp. 60-66 (2008).
[5] KamarularifinAbdjalil, Zaid Ahmad et.al, "Securing Routing Table update in AODV Routing Protocol", 2011 IEEE conference on open system.
[6] Y. Cho, G. Qu, and Y. Wu: Insider Threats against Trust Mechanism with Watchdog and Defending Approaches in Wireless Sensor Networks,S!uP, pp. 134-141 (2012).
[7] A.Aikebaier, M. Jibiki, Y. Teranishi, and N. Nishinaga: Proposal and Evaluation of a Cooperative Malicious Node Isolation, IEICE Technical Report IA, 2013-73, pp. 31-36 (2014)
[8] JaydipSen: A Survey on Wireless Sensor Network Security, IJCNIS, Vol. 1, No. 2, pp. 55-78 (2009).
[9] A. Perrig, R. Szewczyk, J. D. Tygar, V. Wen, and D. E. Culler: SPINS: Security protocols for sensor networks, Wire l. Netw., Vol. 8, Issue. 5, pp. 521-534, (2002).
[10] A. Ailixier, J. Masahiro, T. Yuuichi, and N. Nozomu: A Proposal of Cooperative Malicious Behavior Node Isolation Mechanism for Wireless Sensor, IPSJSIGTechnical Reports, Vol. 2013-EIP-61, No. 9, pp. 1-7 (2013).
[11] T. Karygiannis and L. Owens, “Wireless network security,†NIST special publication, 2002.
-
Downloads
-
How to Cite
Ranjan Vikas, S., Priyalakshmi, B., Gautam, N., & Potti, S. (2018). Co-operative Detection for Malicious Nodes in Under-Attack WSN. International Journal of Engineering & Technology, 7(2.24), 489-491. https://doi.org/10.14419/ijet.v7i2.24.12143Received date: 2018-04-25
Accepted date: 2018-04-25
Published date: 2018-04-25