Open Access Open Access  Restricted Access Subscription or Fee Access

Providing Security to Wireless Sensor Networks by Identifying and Preventing Malicious Node

A. Asha Joshia, I. Shahanaz Begumb

Abstract


Wireless Sensor Networks consist of set of nodes which are randomly deployed in a region. Wireless Networks are infrastructure-less networks, hence there is a possibility for the malicious node to retrieve the information of data packets.  Now a days in wireless sensor networks there may occur most vulnerable attacks such as sinkhole attack and the wormhole attack, etc. Both these attacks may cause the problem of network failure and it makes the sensor node unable to communicate. The Wormhole attack is particularly challenging to deal with since the adversary does not need to compromise any nodes. This paper introduces an easy and effective method to detect and prevent these attacks. The malicious node gives the alternate path for the source node and the forwarded packets will not reach the correct destination. In order to provide the secure way communication in wireless sensor networks our proposed algorithm is a routing algorithm. In this paper, we present a secure routing algorithm against these attacks based on mobile agents designed for mobile wireless sensor networks (MWSN) and show how it can be configured to avoid these attacks. Agent updates the information dynamically. In order to reduce the overhead, our algorithm maintains a counter to protect from the attack. The performance is enhanced for selected metrics and implemented in Network Simulator (Ns2).

 


Keywords


Wireless Sensor Networks, Sinkhole Attack, Wormhole Attack

Full Text:

PDF

References


Akyildiz F,Su W,Sankarasubramaniam Y,”A survey on sensornetworks”,IEEE Commun Mag.,2002,8:102-114

Edith C. H. Ngai, Jiangchuan Liu and Michael R. Lyu, “On the Intruder Detection for Sinkhole Attack in Wireless Sensor Networks”.

Majid Meghdadi, Suat Ozdemir and Inan Guler, ”On the Intruder Detection for Sinkhole Attack inWireless Sensor Networks”.

Ngai, E.C.H., Liu, J., Lyu, M.R.,“On the intruder detection for sinkhole attack in wireless sensor networks”. In: ICC 2006Proceedings of the IEEE International.

Hu, Y.C., Perrig, A., Johnson, D.B.,” Packet leashes: A defense against wormhole attacks in wireless ad hoc networks”, In: INFOCOM 2003 Proceedings of the Twenty- Second Annual Joint Conference of the IEEE Computer and Communications Societies,San Francisco,CA, USA (2003)

Mario Cagalj, Srdjan Capkun, Jean-Pierre Hubaux,”Wormhole-Based Anti-Jamming Techniques in Sensor Networks”.

John Paul Walters, Zhengqiang Liang, Weisong Shi, and Vipin Chaudhary, “Wireless Sensor Network Security: A Survey “.

Karlof,C.,Wagner,D.:”Secure routing in wireless sensor networks:Attacks and countermeasures”,AdHoc Networks Journal 1(2–3),293–315(2003)

W.Heinzelman and et al.,“Adaptive Protocol for infor-mationDissemination in Wireless Sensor Network,”inProc.MobiCom,WA,1999.

W.Heinzelman,J.Kulik,and Balakrishman,“Energy-efficientCommunication Protocol Routing for Wireless Sensor Networks,”inProc.of the Hawaii International Conference System Sciences,2000.

Ioannis Krontiris, Thanassis Giannetsos, Tassos Dimitriou ,“Launching a Sinkhole Attack in WirelessSensor Networks; the Intruder Side”,IEEE International Conference on Wireless & Mobile Computing, Networking & Communication.

Karlof and D.Wagner, “Secure Routing in Sensor Networks: Attacks and countermeasures”, Adhoc Networks Journal, Vol.1, pp.293-315,September 2003


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.