IMNTV-Identifying Malicious Nodes using Trust Value in Wireless Sensor Networks
Subject Areas : Network SecuritySwathi B H 1 , Megha V 2 , Gururaj H L 3 , Hamsaveni M 4 , Janhavi V 5
1 - Vidyavardhaka College of Engineering
2 - Vidyavardhaka College of Engineering
3 - Vidyavardhaka College of Engineering
4 - Vidyavardhaka College of Engineering
5 - Vidyavardhaka College of Engineering
Keywords: bad mouthing attack, Packet modification, Packet fake routing, WSN, Packet Dropping,
Abstract :
Security is the major area of concern in communication channel. Security is very crucial in wireless sensor networks which are deployed in remote environments. Adversary can disrupt the communication within multi hop sensor networks by launching the attack. The common attacks which disrupt the communication of nodes are packet dropping, packet modification, packet fake routing, badmouthing attack and Sybil attack. In this paper we considered these attacks and presented a solution to identify the attacks. Many approaches have been proposed to diminish these attacks, but very few methods can detect these attacks effectively. In this simple scheme, every node selects a parent node to forward the packet towards base station or sink. Each node append its unique identity and trust to the parent as a path marker. It encrypts the bytes using a secret key generated and shared among the sink. The encrypted packet is then forwarded to the parent node. Base station can identify the malicious nodes by using these unique identity and trust value.
[1]. GhazalehTahandowt, FatehmanGhasseuri, An adaptive sinkhole algorithm in wireless neural networks- Elsevier2017.
[2]. A.R Dhalene and P.N Chatur, Detailed Survey on attacks in wireless sensor network, Proceedings of the International conference on data engineering and communication technology. Advances in Intelligent systems and computing 469, 2017.
[3].BharathBhushan, Gadharsahoo, Recent advances in attacks, Technical challenges, Vulnerabilities and their countermeasures in Wireless sensor networks, 2017.
[4].Noor Alsaedi, Fazirul Hisyam Hashim, A.Sali, Fakheul Z Rokhani- Detecting Sybil attacks in clustered wireless sensor network based on energy test system(ETS)- Elsevier 2017.
[5] PrathapU,Deepa ShenoyP,Venugopal K P,"CMNTS:Catching Malicious Nodes with Trust Support in Wireless Sensor Networks",IEEE Region 10 symposium ,December 2016
[6] PrathapU,DeepaShenoyP,Venugopal K P,"CPMTS:Catching Packet Modifiers with Trust Support in Wireless Sensor Networks",IEEE International WIE Conference on Electronical and Computer Engineering, December 2015.
[7] Nirupama A.S., Ch.VijayaBhaskar and Sudarson Jena, An Efficient Protocol to Identify Packet Droppers and Modifiers to Improve QoS in Wireless Sensor Network(WSN) IEEE ICCSP conference 2015.
[8] Chuang W, Taiming F, Jinsook K, Guiling W, and Wensheng Z, ”Catching Packet Droppers and Modifiers in Wireless Sensor Networks,” In IEEE Transactions on Parallel and DistributedSystems, volume 23, pages 835–843, May 2012.
[9] Issa M. Khalil, ”ELMO: Energy Aware Local Monitoring inSensor Networks,” In IEEE Transactions on dependable andsecure computing, volume 8, pages 523–536, August 2011.
[10] R. Mavropodi, P. Kotzanikolaou, and C. Douligeris, ”SECMRa Secure Multipath Routing Protocol for Ad Hoc Networks,” In Ad Hoc Networks, volume 5, pages 87–99, 2007.
[11] M. Kefayati, H.R. Rabiee, S.G. Miremadi, and A. Khonsari, ”Misbehavior Resilient Multi-Path Data Transmission in Mobile Ad-Hoc Networks,” In Proc. Fourth ACM Workshop Security ofAd Hoc and Sensor Networks (SASN 06), 2006.
[12] V. Bhuse, A. Gupta, and L. Lilien, ”DPDSN: Detection of Packet-Dropping Attacks for Wireless Sensor Networks,” In Proc. Fourth Trusted Internet Workshop, 2005.
[13] F. Ye, H. Luo, S. Lu, and L. Zhang, ”Statistical En-Route Filtering of Injected False Data in Sensor Networks,” In Proc.IEEE INFOCOM,, 2004.
[14] S. Zhu, S. Setia, S. Jajodia, and P. Ning, ”An Interleaved Hopby- Hop Authentication Scheme for Filtering False Data in Sensor Networks,” In Proc. IEEE Symp. Security and Privacy, 2004.
[15] H. Chan and A. Perrig, ”Security and Privacy in Sensor Networks,” In Computer, volume 36, pages 103–105, Oct 2003.
[16] C. Karlof and D. Wagner, ”Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures,” In Proc. IEEE FirstIntl Workshop Sensor Network Protocols and Applications, 2003.