Improve secure based multi-path routing to mitigate the intrusion endurance in heterogeneous wireless sensor networks

 
 
 
  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract


    Wireless Sensor Networks (WSNs) have many potential applications. Multi-path routing is widely used in WSN to achieve reliability and perform Fault Tolerance. Multi-path routing determines and assigns multiple routes from a given sensor node to the sink. The transmission of data among the multi-path brings path redundancy, which increases the reliability and reduces the network congestion. In this research work, a dynamic redundancy management algorithm is proposed. To exploit multi-path routing in order to process the user request with existence of defective and malicious nodes. The objective of this work is to analyze the trade-off between energy consumption and Quality of Service (QoS) gain in security and reliability in order to increase the lifetime. The optimized redundancy level of multipath routing is determined dynamically which is used to improve the query response while extending the network lifetime and also for detecting intrusions and send alert to the system through Intrusion Detection System (IDS). Then, a voting-based distributed Intrusion Detection (ID) algorithm is proposed to detect and remove malicious nodes in a sensor network. The malicious node has been determined through number of voters using voting-based distributed ID algorithm. The efficient redundancy management of a clustered Heterogeneous Wireless Sensor Network (HWSN) is to increase the network lifetime in the presence of unreliable and malicious nodes. Therefore, the reliability improved dramatically.

     

     


  • Keywords


    Multipath Routing; Energy Conservation; Heterogeneous Wireless Sensor Networks; Intrusion Detection; Security.

  • References


      [1] Akkaya K. and Younis M., "A Survey of Routing Protocols in Wireless Sensor Networks, " in the Elsevier Ad Hoc Network Journal, Vol. 3/3 pp. 325-349, 2005.

      [2] Ammari H. M. and Das S. K., "Promoting Heterogeneity, Mobility, and Energy-Aware Voronoi Diagram in Wireless Sensor Networks," IEEE Trans. Parallel Distrib. Syst., vol. 19, no. 7, pp. 995-1008, 2008.https://doi.org/10.1109/TPDS.2008.31.

      [3] Azad Azadmanesh, Alireza Farahani, and Lotfi Najjar, "Fault Tolerant Weighted Voting Algorithms International Journal of Network Security", Vol.7, No.2, PP.240-248, 2008.

      [4] Bandyopadhyay S. and Coyle E. J., "An energy efficient hierarchical clustering algorithm for wireless sensor networks ", 22nd Conf. of IEEE Computer and Communications, pp. 1713-1723, 2003.

      [5] Bao F., Chen I. R., Chang M., and Cho J., "Hierarchical Trust Management for Wireless Sensor Networks and its Applications to Trust-Based Routing and Intrusion Detection," IEEE Trans. Netw. Service Manga. vol. 9, no. 2, pp. 161-183, 2012.https://doi.org/10.1109/TCOMM.2012.031912.110179.

      [6] Bhuse V. and Gupta A., "Anomaly intrusion detection in wireless sensor networks," J. High Speed Netw., vol. 15, no. 1, pp. 33-51, 2006.

      [7] Bravos G. In addition, Kanatas A. G., "Energy consumption and trade-offs on wireless sensor networks," 16th IEEE Int. Symp. On Personal, Indoor and Mobile Radio Communications pp. 1279-1283, 2005.

      [8] Chen.I.R. Speer.A.P. In addition, Eltoweissy.M. "Adaptive Fault-Tolerant QoS Control Algorithms for Maximizing System Lifetime of Query-Based Wireless Sensor Networks," IEEE Trans. on Dependable and Secure Computing, vol. 8, no. 2, pp. 161-176, 2011.https://doi.org/10.1109/TDSC.2009.54.

      [9] Cheng S. T., Chen C. M., and Chen I. R., "Performance evaluation of an admission control algorithm: dynamic threshold with negotiation, "Performance Evaluation, vol. 52, no. 1, pp. 1-13, 2003.https://doi.org/10.1016/S0166-5316(02)00128-1.

      [10] Cho J. H., Chen I. R., and Feng P. G., "Effect of Intrusion Detection on Reliability of Mission-Oriented Mobile Group Systems in Mobile Ad Hoc Networks," IEEE Trans. Rel., vol. 59, no. 1, pp. 231-241, 2010.https://doi.org/10.1109/TR.2010.2040534.

      [11] Dagon D., Qin X., Gu G. , Lee W., Grizzard J., Levine J., and Owen H., “Honeystat: local worm detection using honeypots," Recent Advances in Intrusion Detection. Springer, pp. 39-58, 2004.

      [12] Deb B., Bhatnagar S., and Nath B., "ReInForM: reliable information forwarding using multiple paths in sensor networks," 28th IEEE Local Computer Networks, Bonn, Germany, pp. 406-415, 2003.

      [13] Felemban.E.Chang-Gun.L.In addition,Ekici.E. "MMSPEED: multipath Multi-SPEED protocol for QoS guarantee of reliability and. Timeliness in wireless sensor networks," IEEE Trans. Mobile Comput., vol. 5, no. 6, pp. 738-754, 2006.https://doi.org/10.1109/TMC.2006.79.

      [14] Kang K. D., Liu K., and Abu-Ghazaleh N., "Securing Geographic Routing in Wireless Sensor Networks," ninth Annu. Cyber Security Conf. on Information Assurance, Albany, NY, USA, 2006.

      [15] Jie Wang and Xue-ming Wang,“ An Improved Clustering Protocol for Energy Heterogeneous WSN”, 2nd International Conference on Wireless Communication and Network Engineering (WCNE 2017) ISBN: 978-1-60595-531-5, 2017

      [16] Santosh V. Purkar and R. S. Deshpande, “Energy Efficient Clustering Protocol to Enhance Performance of Heterogeneous Wireless Sensor Network: EECPEP-HWSN”, Journal of Computer Networks and Communications,Vol. 2018,PP:1- 12.


 

View

Download

Article ID: 17957
 
DOI: 10.14419/ijet.v7i4.17957




Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.