Open Access Open Access  Restricted Access Subscription or Fee Access

CBDRP: A Systematic Approach for Detection and Localization of Attacks in Wireless Communities

M. Premkumar, Dr. T.V.P. Sundararajan

Abstract


Wireless Sensor Networks (WSN) has recently attracted much attention because of their wide range of application in robotic exploration, commercial, military, environmental and health-related areas. This kind of network is easily prone to various types of attacks due to its open nature.. Because of different attacks, it suffers the operational lifetime of the sensor nodes and also reduces the security of the sensor nodes. This paper describes an energy efficient cluster based dynamic routing protocol (CBDRP) to identify the black hole attacks and increase the life span of the WSN. Performance should be measured in terms of different network parameters such as packet delivery ratio, energy consumption, overhead and end-to-end delay.


Keywords


Cluster Based Routing, Wireless Sensor Network, Black Hole Attacks

Full Text:

PDF

References


Al-Sakib Khan Pathan. 2006, “Security in Wireless Sensor Networks: Issues and Challenges”, ISBN 89-5519-129-4, pp.1043-1048, Feb.20- 22, ICACT.

J. Bellardo and S. Savage.2003, “802.11 denial-of-service attacks: Real vulnerabilities and practical solutions,” in Proc. USENIX Security Symp., pp. 15–2.

Fabrice Colas and PavelBrazdi.2006, “Comparison of SVM and Some Older Classification Algorithms in Text Classification Tasks,” ACM/Springer Wireless Networks, Volume 217, pp.169-178.

Hu, Y.-C., Perrig, A., and Johnson, D.B.2003, “Packet leashes: a defense against wormhole attacks in wireless networks”, Twenty-Second Annual Joint Conference of the IEEE Computer and Communications Societies. IEEE INFOCOM 2003, Vol. 3, pp. 1976 – 1986.

Jie Yang, Yingying Chen, Wade Trappe and Jerry Cheng.2013, “Detection and Localization of Multiple Spoofing Attackers in Wireless Networks,” IEEE Transactions on Parallel and Distributed systems, Volume. 24.

C. Karlof, N. Sastry, and D. Wagner. 2004, “Tinysec: A link layer security architecture for wireless sensor networks,” in Proceedings of the 2nd international conference on Embedded networked sensor systems,Sen- Sys ’04, pp. 162 175.

Parameswaran A, Husain M. I, and Upadhyaya S. 2009, “Is RSSI a reliable parameter in sensor localization algorithms: An experimental study”, in Proc. F2DA.

Patil, N.S., Patil, P.R. 2010, “Data aggregation in wireless sensor network”. IEEE Int. Conf. Computational Intelligence and Computing Research.

Roy, S., Conti, M., Setia, S., Jajodia, S. 2012, “Secure data aggregation in wireless sensor networks”, IEEE Trans. Inf. Forensics Sec., 7, (3).

Sheng Y, Tan K, Chen G, Kotz D, and Campbell A. 2010, “Detecting 802.11 MAC Layer Spoofing Using Received Signal Strength”, Proc. IEEE INFOCOM.

Y. Sheng, K. Tan, G. Chen, D. Kotz, and A. Campbell.2008, “Detecting 802.11 MAC Layer Spoofing Using Received Signal Strength,” Proc. IEEE INFOCOM.

A. Wool. 2005, “Nightlight Key Management for IEEE 802.11 Wireless Lanes with Key Refresh and Host Revocation,” ACM/Springer Wireless Networks, vol. 11, no. 6, pp. 677-686.

Xiao Zhenghong1, Chen Zhigang 2010, “A Secure Routing Protocol With Intrusion Detection For Clustering Wireless Sensor Network”, International Forum on Information Technology and Application, pp. 230-23.

J. Yang, Y. Chen, and W. Trappe. 2009, “Detecting Spoofing Attacks in Mobile Wireless Environments,” Proc. Ann. IEEE Comm. Soc. Conf. Sensor, Mesh and Ad Hoc Comm. and Networks (SECON).

Yingying Chen, Jie Yang, Wade Trappe and Richard P. Martin, “Detecting and Localizing Identity-Based Attacks in Wireless and Sensor Networks”, IEEE Transactions ON Vehicular Technology, Vol. 59, No.5.

Yong Wang, GarhanAttebury, and Byrav Ramamurthy, 2006, “A survey of security issues in wireless sensor networks”, IEEE communication surveys, volume 8, NO. 2.

Network Simulator 2, available at http://www.isi.edu/nsnam/ns/.

M. Premkumar, M. Kathiravan &R. Thirukkumaran, 2012, “Efficient Broadcast Authentication using TSG Algorithm for WSN”, International Journal of Computer Applications (0975 – 8887) Volume 58– No.4.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.