Co-operative Detection for Malicious Nodes in Under-Attack WSN

Authors

  • Shweta Ranjan Vikas

  • B Priyalakshmi

  • Nikita Gautam

  • Sairam Potti

How to Cite

Ranjan Vikas, S., Priyalakshmi, B., Gautam, N., & Potti, S. (2018). Co-operative Detection for Malicious Nodes in Under-Attack WSN. International Journal of Engineering and Technology, 7(2.24), 489-491. https://doi.org/10.14419/ijet.v7i2.24.12143

Received date: April 25, 2018

Accepted date: April 25, 2018

Published date: April 25, 2018

DOI:

https://doi.org/10.14419/ijet.v7i2.24.12143

Keywords:

Fusion Center, Sensor Node Data Falsification, Wireless Sensor Networks, Ad-Hoc On- Demand Distance Vector Protocol.

Abstract

The network security must be taken into consideration in wireless sensor networks. In our project, we take sensor node data falsification (SNDF) attack using malicious nodes and co-operative detection is used. Fusioncentre collects information from the nodes created in a cluster environment and makes a global decision. The protocol used here is Ad-hoc-on demand distance vector[5] (AODV) and the performance analysis is done using parameters such as throughput and End-to-end delay. The stimulation is done in NS2 using network animator and graphical results are taken.The throughput will be increased compared to the existing system whereas End-to-End delay will be decreased.

 

 

References

  1. [1] VP.Illiano, and EC.Lupu: Detecting Malicious Data Injections in Wireless Sensor Networks: A Survey, ACM Comput.Surv., Vol. 48, No. 2, Article 24 (2004).

    [2] S. Prasanna, and S. Rao: An Overview of Wireless Sensor Networks, IJSCE, Vol. 2, Issue. 2, pp. 538-540 (2012).

    [3] H. Chan, and A. Perrig: Security and Privacy in Sensor Networks, IEEE C.S., Vol. 36, Issue. 10, pp. 103-105 (2003).

    [4] X.Du and H.Chen: SECURITY IN WIRELESS SENSOR NETWORKS, IEEE wirel. commun., pp. 60-66 (2008).

    [5] KamarularifinAbdjalil, Zaid Ahmad et.al, "Securing Routing Table update in AODV Routing Protocol", 2011 IEEE conference on open system.

    [6] Y. Cho, G. Qu, and Y. Wu: Insider Threats against Trust Mechanism with Watchdog and Defending Approaches in Wireless Sensor Networks,S!uP, pp. 134-141 (2012).

    [7] A.Aikebaier, M. Jibiki, Y. Teranishi, and N. Nishinaga: Proposal and Evaluation of a Cooperative Malicious Node Isolation, IEICE Technical Report IA, 2013-73, pp. 31-36 (2014)

    [8] JaydipSen: A Survey on Wireless Sensor Network Security, IJCNIS, Vol. 1, No. 2, pp. 55-78 (2009).

    [9] A. Perrig, R. Szewczyk, J. D. Tygar, V. Wen, and D. E. Culler: SPINS: Security protocols for sensor networks, Wire l. Netw., Vol. 8, Issue. 5, pp. 521-534, (2002).

    [10] A. Ailixier, J. Masahiro, T. Yuuichi, and N. Nozomu: A Proposal of Cooperative Malicious Behavior Node Isolation Mechanism for Wireless Sensor, IPSJSIGTechnical Reports, Vol. 2013-EIP-61, No. 9, pp. 1-7 (2013).

    [11] T. Karygiannis and L. Owens, “Wireless network security,†NIST special publication, 2002.

Downloads

How to Cite

Ranjan Vikas, S., Priyalakshmi, B., Gautam, N., & Potti, S. (2018). Co-operative Detection for Malicious Nodes in Under-Attack WSN. International Journal of Engineering and Technology, 7(2.24), 489-491. https://doi.org/10.14419/ijet.v7i2.24.12143

Received date: April 25, 2018

Accepted date: April 25, 2018

Published date: April 25, 2018