Co-operative Detection for Malicious Nodes in Under-Attack WSN

  • Authors

    • Shweta Ranjan Vikas
    • B Priyalakshmi
    • Nikita Gautam
    • Sairam Potti
    2018-04-25
    https://doi.org/10.14419/ijet.v7i2.24.12143
  • Fusion Center, Sensor Node Data Falsification, Wireless Sensor Networks, Ad-Hoc On- Demand Distance Vector Protocol.
  • The network security must be taken into consideration in wireless sensor networks. In our project, we take sensor node data falsification (SNDF) attack using malicious nodes and co-operative detection is used. Fusioncentre collects information from the nodes created in a cluster environment and makes a global decision. The protocol used here is Ad-hoc-on demand distance vector[5] (AODV) and the performance analysis is done using parameters such as throughput and End-to-end delay. The stimulation is done in NS2 using network animator and graphical results are taken.The throughput will be increased compared to the existing system whereas End-to-End delay will be decreased.

     

     
  • References

    1. [1] VP.Illiano, and EC.Lupu: Detecting Malicious Data Injections in Wireless Sensor Networks: A Survey, ACM Comput.Surv., Vol. 48, No. 2, Article 24 (2004).

      [2] S. Prasanna, and S. Rao: An Overview of Wireless Sensor Networks, IJSCE, Vol. 2, Issue. 2, pp. 538-540 (2012).

      [3] H. Chan, and A. Perrig: Security and Privacy in Sensor Networks, IEEE C.S., Vol. 36, Issue. 10, pp. 103-105 (2003).

      [4] X.Du and H.Chen: SECURITY IN WIRELESS SENSOR NETWORKS, IEEE wirel. commun., pp. 60-66 (2008).

      [5] KamarularifinAbdjalil, Zaid Ahmad et.al, "Securing Routing Table update in AODV Routing Protocol", 2011 IEEE conference on open system.

      [6] Y. Cho, G. Qu, and Y. Wu: Insider Threats against Trust Mechanism with Watchdog and Defending Approaches in Wireless Sensor Networks,S!uP, pp. 134-141 (2012).

      [7] A.Aikebaier, M. Jibiki, Y. Teranishi, and N. Nishinaga: Proposal and Evaluation of a Cooperative Malicious Node Isolation, IEICE Technical Report IA, 2013-73, pp. 31-36 (2014)

      [8] JaydipSen: A Survey on Wireless Sensor Network Security, IJCNIS, Vol. 1, No. 2, pp. 55-78 (2009).

      [9] A. Perrig, R. Szewczyk, J. D. Tygar, V. Wen, and D. E. Culler: SPINS: Security protocols for sensor networks, Wire l. Netw., Vol. 8, Issue. 5, pp. 521-534, (2002).

      [10] A. Ailixier, J. Masahiro, T. Yuuichi, and N. Nozomu: A Proposal of Cooperative Malicious Behavior Node Isolation Mechanism for Wireless Sensor, IPSJSIGTechnical Reports, Vol. 2013-EIP-61, No. 9, pp. 1-7 (2013).

      [11] T. Karygiannis and L. Owens, “Wireless network security,†NIST special publication, 2002.

  • Downloads

  • How to Cite

    Ranjan Vikas, S., Priyalakshmi, B., Gautam, N., & Potti, S. (2018). Co-operative Detection for Malicious Nodes in Under-Attack WSN. International Journal of Engineering & Technology, 7(2.24), 489-491. https://doi.org/10.14419/ijet.v7i2.24.12143