Open Access Open Access  Restricted Access Subscription or Fee Access

Hierarchical Cluster Based Efficient Data Acquisition and Detection of Smart Attackers Using IDS

V. Bharathi, A. Gokila

Abstract


Energy consumption and security are major issues in designing Wireless Sensor Network (WSN). In which, Smart attack and selective capture is one of the most important security issues in WSN which cripples the basic data delivery functionality of a base station in the network. In order to overcome this issue, existing Adaptive Defense Management Network (ADMN) utilizes multipath communication and radio range adjustment to improve data acquisition.   However it consumes more energy and detection of smart attack is poor.  In the proposed Hierarchical Cluster based Efficient Defense Network (HCEDN) the nodes are grouped into cluster. The node near the cluster head will have IDS (Intrusion Detection System) to detect the attackers. The cluster heads in the lower level will vote for cluster heads communicating with Base station to identify smart attackers. In HCEDN, data acquisition is secured between each cluster and base station using IDS and voting for identifying smart attacks. It also overcomes smart attacks by radio frequency adjustment and optimized multipath communication. Hence, the proposed HCEDN optimizes energy level of each node by clustering which increases network life time, throughput and reduces energy consumption compared with existing ADMN.


Keywords


Wireless Sensor Networks, Smart Attacks, Selective Capture, Clusters, Intruder Detection System, Hierarchical Cluster Based Efficient Defense Network, Radio Frequency Adjustment, Multipath Communication, Optimal Path Communication

Full Text:

PDF

References


Wei-Peng Chen, Jennifer C. Hou and Lui Sha,“Dynamic Clustering for Acoustic Target Tracking in Wireless Sensor Networks”, IEEE Transactions on Mobile Computing, vol. 3, no.3, PP. 258-271, Jul 2004.

Jetendra Joshi, Amrit Bagga, Abhinandan Bhargava, Abhinav Goel, Divya Sara Kurian and Urijit Kurulkar, “Secured and Energy Efficient Architecture for Sensor Networks”, Proceedings of IEEE Conference on Computational Intelligence and Virtual Environments for Measurement Systems and Applications, PP. 27-28, Jun 2016.

Sami Alsemairi and Mohamed Younis, “Clustering-based Mitigation of Anonymity Attacks in Wireless Sensor Networks”, Proceedings of IEEE Global Communication Conference, PP. 1-7, Dec 2015.

Jing Chen, Ruiying Du, Qian Wang, Shixiong Yao, “Secure Routing Based on Network Coding in Wireless Sensor Networks”, Proceedings of IEEE International Conference on Trust, Security and Privacy in Computing and Communications, PP. 58-64, Dec 2013.

Alaa Atassi Naoum Sayegh Imad Elhajj Ali Chehab Ayman Kayssi “Malicious Node Detection in Wireless Sensor Networks”, Proceedings of IEEE International Conference on Advanced Information Networking and Applications Workshops, PP. 450-461, Mar 2013.

Hamid Al-Hamadi and Ing-Ray Chen, “Redundancy Management of Multipath Routing for Intrusion Tolerance in Heterogeneous Wireless Sensor Networks”, IEEE Transaction on Network and Service Management, vol.10, no. 2, PP. 189-203, Jun 2013.

S.Anbuchelian, Selvamani.K, Chandarasekar.A , “An energy efficient multipath routing scheme by preventing threats in Wireless Sensor Networks”, Proceedings of IEEE Canadian Conference on Electrical and Computer Engineering (CCECE), PP. 1-6, May 2014.

Wenjing Lou and Younggoo Kwon, “H-SPREAD: a hybrid multipath scheme for secure and reliable data collection in wireless sensor networks”, IEEE Transactions on Vehicular Technology, vol. 55, no. 4, PP. 1320-1330, 2006.

Dhanalakshmi Somasundaram, Rajaram Marimuthu, “A Multipath Reliable Routing for detection and isolation of malicious nodes in MANET”, Proceedings of IEEE International Conference on Computing, Communication and Networking, PP. 1-8, Dec 2008.

Budhaditya Deb, Sudeept Bhatnagar and Badri Nath, “ReInForM: reliable information forwarding using multiple paths in sensor networks”, Proceedings of IEEE International Conference on Local Computer Networks, 2003. PP. 406-415, Oct 2003.

Riaz Ahmed Shaikh, Hassan Jameel, Brian J. d’Auriol, “Group-Based Trust Management Scheme for Clustered Wireless Sensor Networks”, vol. 20, no.11, PP. 1698-1712, Nov 2009.

Jetendra Joshi, Prakhar Awasthi, Sibeli Mukherjee, Rishabh Kumar, Divya Sara Kurian and Manash Jyoti Deka, ”SEED: Secure and energy efficient data transmission in Wireless Sensor Networks”, Proceedings of IEEE International Conference on Information and Communication Technology (ICoICT), PP. 1-6, May 2016.

Muhammad Ahmed, Xu Huang, Dharmendra Sharma, and Li Shutao. “Wireless Sensor Network Internal Attacker Identification with Multiple Evidence by Dempster-Shafer Theory”, Proceedings of IEEE International Symposium on Communications and Information Technologies, PP. 198-203, Sep 2013.

George Theodorakopoulos and John S. Baras, “On Trust Models and Trust Evaluation Metrics”, IEEE Journal on selected areas of communication, vol.24, no.2, PP. 318-328, Feb 2006.

Byunggil Lee, Seungjo Bae and Dongwon Han, “Design of Network Management Platform and Security Framework for WSN”, Proceedings of IEEE International Conference on Signal Image Technology and Internet Based Systems, PP. 640-645, Dec 2008.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.