Open Access Open Access  Restricted Access Subscription or Fee Access

Detecting Misbehaving Forwarders in Wireless Sensor Networks Using Hierarchical Algorithm

P. Mugilan, Dr.M. Rajesh Babu

Abstract


Wireless Sensor Networks (WSNs) consists of large number of sensing nodes used for sensing, computational and transmission power. Generally in a typical deployment of sensor networks, the sensor nodes are randomly deployed in a two dimensional area. One of the major challenges that wireless sensor networks face today is security. As sensors have limited power and computational capability, any security mechanism for sensor network must be energy efficient and should not be computational intensive. Packet dropping and modification are common attacks that can be initiated to interrupt communication in wireless multi-hop sensor networks. Many methods have been proposed to endure such attacks but only few can successfully identify the intruders. To overcome this problem, a simple effective method has been proposed using hierarchical algorithm, which identifies misbehaving forwarders that drop or modify packets then eliminate them and choose the alternative path for data transmission. Extensive analysis and simulations have been conducted to verify the effectiveness and efficiency of this method.


Keywords


AODV Protocol, Packet Dropping, Packet Modification and Wireless Sensor Networks.

Full Text:

PDF

References


Farzaneh Pakzad, “Intrusion Detection Techniques for Detecting Misbehaving Nodes,” Published by Canadian Center of Science and Education, Vol. 4, No. 1; January 2011.

David Antolino Rivas, José M. Barceló-Ordinas, Manel Guerrero Zapata, Julián D. Morillo-Pozo, “Security on VANETs: Privacy, misbehaving nodes, false information and secure data aggregation,” Journal of Network and Computer Applications, Volume 34, Issue 6, November 2011, Pages 1942-1955.

Laura gheorghe1,“security infrastructure for wireless sensor networks” U.P.B. Sci. Bull., Series C, Vol. 73, Iss. 2, 2011

Chuang Wang and Taiming Feng, “Catching Packet Droppers and Modifiers in Wireless Sensor Networks,” IEEE Transaction, April 2011.

Abhishek Pandey, R.C. Tripathi, “Survey on Wireless Sensor NetworksSecurity,” International Journal of Computer Applications (0975 – 8887), Volume 3 – No.2, June 2010.

F. Ye, H. Yang, and Z. Liu, “Catching Moles in Sensor Networks,” IEEE International Conference on Distributed Computing Systems (ICDCS), June 2007.

S. Lee and Y. Choi, “A resilient packet-forwarding scheme against maliciously packet-dropping nodes in sensor networks,” Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks (SASN), pp. 59–70, 2006.

R. Roman, J. Zhou, and J. Lopez, “Applying intrusion detection systems to wireless sensor networks,” Third IEEE Annual Consumer Communications and Networking Conference (CCNC), pp. 640–644, Jan. 2006.

Z. Yu and Y. Guan, “A Dynamic En-route Scheme for Filtering False Data in Wireless Sensor Networks,” IEEE Infocom 2006, April 2006.

H. Yang, F. Ye, Y. Yuan, S. Lu, and W. Arbaugh, “Toward Resilient Security in Wireless Sensor Networks,” ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc), May 2005.

Q. Li and D. Rus, “Global clock synchronization in sensor networks,” IEEE INFOCOM, 2004.

F. Ye, H. Luo, S. Lu, and L. Zhang, “Statistical En-route Filtering of Injected False Data in Sensor Networks,” IEEE INFOCOM, March 2004.

S. Zhu, S. Setia, S. Jajodia, and P. Ning, “An Interleaved Hop-by-Hop Authentication Scheme for Filtering False Data in Sensor Networks,” IEEE Symposium on Security and Privacy, 2004.

Sungha Pete Kim Bo-Cheng Charles Lai, David D. Hwang, “Reducing radio energy consumption of key management protocols for wireless sensor networks,” ACM 1-58113-929-2/04/0008, pages 911, August 2004.

S. Marti, T. Giuli, K. Lai, and M. Baker, “Mitigating Routing Misbehavior in Mobile Ad Hoc Networks,” ACM MobiCom, August 2000.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.