Intelligent channel aware malicious free data forwarding scheme over wireless sensor networks

  • Authors

    • Mohammad Sirajuddin
    2017-12-28
    https://doi.org/10.14419/ijet.v7i1.2.9061
  • , Wireless Sensor Network, WSN, Intelligent-Channel-Aware-Reputation Scheme, ICARS, RREQ, RREP, Modified Rijndael Algorithm, MRA.
  • In the communicative world each and every individual needs to perform global communication with failure-free intelligent model. Wireless Sensor Network, a medium which provides efficient communication modes to clients to satisfy their communication needs. However, this kind of wireless network channels are also facing lots of communication issues by means of several fault strategies, such as: link failures, node failures, bandwidth inefficiency, poor energy level, attacks and many more. So that, a fast growing network scheme is required as well as it provides lots of features to communication strategies and routing protocols, called Intelligent-Channel-Aware-Reputation Scheme [ICARS]. In the proposed system, the main objective is to provide the strong and failure-free wireless communication medium over networking with multiple numbers of nodes. As well as to provide high-level of security while the data is communicating from source to destination. For that powerful cryptographic algorithm is employed, called Modified Rijndael Algorithm (MRA) and to clearly state that the attack-free wireless communication channel with the help of intelligent routing strategies such as Route Request (RREQ) and Route Response (RREP).

  • References

    1. [1] I. Butun, S. Morgera, and R. Sankar, “A survey of intrusion detection systems in wireless sensor networks,†IEEE Commun. Surv. & Tutor. vol. 16, no. 1, pp. 266–282, 2014. https://doi.org/10.1109/SURV.2013.050113.00191.

      [2] Y. Zou, X. Wang, and W. Shen, “Physical-layer security with multiuser scheduling in cognitive radio networks,†IEEE Trans. Commun., vol. 61, no. 12, pp. 5103–5113, 2013. https://doi.org/10.1109/TCOMM.2013.111213.130235.

      [3] B. Xiao, B. Yu, and C. Gao, “Chemas: Identify suspect nodes in selective forwarding attacks,†J. Parallel Distributed Comput., vol. 67, no. 11, pp. 1218–1230, 2007. https://doi.org/10.1016/j.jpdc.2007.04.014.

      [4] Y. Zhang, L. Lazos, and W. Kozma, “Amd: Audit-based misbehavior detection in wireless ad hoc networks,†IEEE Trans. Mob. Comput., prePrints, published online in Sept. 2013.

      [5] S. Ozdemir, “Functional reputation based reliable data aggregation and transmission for wireless sensor networks,†Comput. Commun, vol. 31, no. 17, pp. 3941–3953, 2008. https://doi.org/10.1016/j.comcom.2008.07.017.

      [6] D. Hao, X. Liao, A. Adhikari, K. Sakurai, and M. Yokoo, “A repeated game approach for analyzing the collusion on selective forwarding in multihop wireless networks,†Comput. Commun, vol. 35, no. 17, pp. 2125–2137, 2012. https://doi.org/10.1016/j.comcom.2012.07.006.

      [7] X. Liang, X. Lin, and X. Shen, “Enabling trustworthy service evaluation in service-oriented mobile social networks,†IEEE Trans. Parallel Distr. Sys., vol. 25, no. 2, pp. 310–320, 2014. https://doi.org/10.1109/TPDS.2013.37.

      [8] J. Ren, Y. Zhang, K. Zhang, and X. Shen, “Sacrm: Social aware crowdsourcing with reputation management in mobile sensing,†Computer Commun., vol. 65, no. 15, pp. 55–65, 2015. https://doi.org/10.1016/j.comcom.2015.01.022.

      [9] L. Yu, S. Wang, K. Lai, and Y. Nakamori, “Time series forecasting with multiple candidate models: selecting or combining,†J. Sys. Sci. Complexity, vol. 18, no. 1, pp. 1–18, 2005.

      [10] J. Ren, Y. Zhang, K. Zhang, and X. Shen, “Exploiting channel-aware reputation system against selective forwarding attacks in wsns,†in Proc. IEEE GLOBECOM, 2014, pp. 330–335. https://doi.org/10.1109/GLOCOM.2014.7036829.

      [11] S. Djahel, F. Nait-Abdesselam, and Z. Zhang, “Mitigating packet dropping problem in mobile ad hoc networks: proposals and challenges,†IEEE Commun. Surv. & Tutor. vol. 13, no. 4, pp. 658–672, 2011. https://doi.org/10.1109/SURV.2011.072210.00026.

      [12] K. Liu, J. Deng, P. Varshney, and K. Balakrishnan, “An acknowledgment-based approach for the detection of routing misbehavior in manets,†IEEE Trans. Mob. Comput, vol. 6, no. 5, pp. 536–550, 2007. https://doi.org/10.1109/TMC.2007.1036.

      [13] E. Mahmoud and X. Shen, “An integrated stimulation and punishment mechanism for thwarting packet dropping attack in multihop wireless networks,†IEEE Trans. Vehic. Tech., vol. 60, no. 8, pp. 3947–3962, 2011. https://doi.org/10.1109/TVT.2011.2162972.

      [14] E. Shakshuki, N. Kang, and T. Sheltami, “Eaacka secure intrusiondetection system for manets,†IEEE Trans. Ind. Electro., vol. 60, no. 3, pp. 1089–1098, 2013. https://doi.org/10.1109/TIE.2012.2196010.

      [15] T. Shu and M. Krunz, “Detection of malicious packet dropping in wireless ad hoc networks based on privacy-preserving public auditing,†in Proc. ACM WiSec, 2012, pp. 87–98. https://doi.org/10.1145/2185448.2185460.

      [16] S. Marti, T. J. Giuli, K. Lai, and M. Baker, “Mitigating routing misbehavior in mobile ad hoc networks,†in Proc. ACM MobiCom, 2000, pp. 255–265. https://doi.org/10.1145/345910.345955.

      [17] X. Li, R. Lu, X. Liang, and X. Shen, “Side channel monitoring: packet drop attack detection in wireless ad hoc networks,†in Proc. IEEE ICC, 2011, pp. 1–5.

      [18] T. Shu, M. Krunz, and S. Liu, “Secure data collection in wireless sensor networks using randomized dispersive routes,†IEEE Trans. Mob. Comput, vol. 9, no. 7, pp. 941–954, 2010. https://doi.org/10.1109/TMC.2010.36.

      [19] A. Liu, Z. Zheng, C. Zhang, Z. Chen, and X. Shen, “Secure and energyefficient disjoint multipath routing for wsns,†IEEE Trans. Vehic. Tech., vol. 61, no. 7, pp. 3255–3265, 2012. https://doi.org/10.1109/TVT.2012.2205284.

      [20] S. Li, S. Zhao, X. Wang, K. Zhang, and L. Li, “Adaptive and secure load-balancing routing protocol for service-oriented wireless sensor networks,†IEEE Sys. Journal, vol. 8, no. 3, pp. 858–867, 2014. https://doi.org/10.1109/JSYST.2013.2260626.

  • Downloads

  • How to Cite

    Sirajuddin, M. (2017). Intelligent channel aware malicious free data forwarding scheme over wireless sensor networks. International Journal of Engineering & Technology, 7(1.2), 178-180. https://doi.org/10.14419/ijet.v7i1.2.9061