Two Step Verification technique For Detection of Malicious Nodes in Wireless Sensor Networks

Authors:

Mandeep Kumar,Jahid Ali,

DOI NO:

https://doi.org/10.26782/jmcms.2019.02.00032

Keywords:

wireless sensor network,sensor node,Sybil attack,malicious nodes,observer node,network performance,

Abstract

The wireless sensor network is the application oriented network which performs task of monitoring and object tracking. The wireless sensor node has the architecture which involves wireless interface for the communication. The design of the wireless sensor network depends upon the significant of application, cost and type of hardware. The architecture of WSN is dynamic due to which security and energy consumption are the major constraints. The Sybil attack is the attack which is possible in wireless sensor networks and it affect network performance. The attacker node generates multiple identities to attract network traffic and leads to denial of service in the network. In this research work, two step verification technique is proposed for the detection of malicious nodes from the network. In the two step verification technique, the cluster heads detect the node as untrusted if its energy consumption is abnormal. The extra observer nodes are deployed in the network, which observe network traffic. On the basis of network traffic observations, the node is declared as trusted or untrusted. When the cluster head and observer node both declare on node as untrusted node, then that sensor node will be considered as malicious node. The experiment is conducted is NS2 by considering certain simulation parameters. It is analyzed that two step verification technique detect malicious nodes successfully and it also leads to improve network performance in terms of Delay, PDR and Packetloss.

Refference:

I.Akyildiz, I.F., Su, W., Sankarasubramaniam, y., Cyirci, E., ‘Wireless sensor networks: a survey. Computer Networks’, Vol. 38 no.4: p. 393-422, 2002.

II.Abirami, K., Santhi, B. (2013). ‘ Sybil attack in wireless sensor network’, International Journal of Engineering and Technology, 5 (2), pp. 620-623.

III.Abirami, K., Santhi, B. , ‘Sybil attack in wireless sensor network’. International Journal of Engineering and Technology, 5 (2), pp. 620-623.

IV.Alsaedi N, Hashim F, and Sali A. ‘Energy Trust System for Detecting Sybil Attack in Clustered Wireless Sensor Networks’. IEEE 12th Malaysia International Conference on Communications (MICC), Kuching, Malaysia, Nov 2015.

V.Cheng, C., Qian, Y., & Zhang, D. , ‘An Approach Based on Chain Key Predistribution against Sybil Attack in Wireless Sensor Networks’. International Journal of Distributed Sensor Networks, 2013.

VI.Cheikhrouhou O., ‘Secure Group Communication in Wireless Sensor Networks: A survey’, Journal of Network and Computer Applications, Feb. 2016, vol. 61, pp. 115–132.

VII.Douceur J. R., ‘The sybil attack’, in Proc. 1st Int. Workshop Peerto-Peer Syst., London, UK, Mar., 2002, pp. 252−260.

VIII.Demirbas Murat, Song Youngwhan, ‘An RSSI-based Scheme for Sybil Attack Detection in Wireless Sensor Networks’, Proceedings of WoWMoM 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks, 2006. 5 pp. –570.

IX.Di Pietro R., Mancini L. V., Soriente C., Spognardi A.,

X.Dhanalakshmi T.G., Bharathi Dr.N., Monisha M., ‘Safety concerns of Sybil attack in WSN’, IEEE 2014.

XI.Demirbas M. and Song Y., ‘An RSSI-based scheme for sybil attack detection in wireless sensor networks’, Proceedings of the 2006 International Symposium on on World of Wireless, Mobile and Multimedia Networks, 2006, pp.564-570.

XII.Eschenauer L., ‘On Trust Establishment in Mobile Ad-hoc Networks’, in Department of Electrical and Computer Engineering, vol. Master of Science: University of Maryland, College Park, 2002, pp. 45.

XIII.Ganeriwal S., Balzano L. K. and Srivastava M. B., ‘Reputation-based Framework for High Integrity Sensor Networks’, ACM Transactions on Sensor Networks, vol. v, 2007.

XIV.Hsu, K., Leung, M. K., & Su, B., ‘Security Analysis on Defenses against Sybil Attacks in Wireless Sensor Networks’. IEEE Journal.

XV.Karlof, C., Wagner, D., ‘Secure routing in wireless sensor networks: Attacks and Countermeasures’, Ad hoc Networks Journal (Elsevier) 1(2–3) (2003) 293–315.

XVI.Kavitha T.,Sridharan D., ‘Security vulnerabilities in wireless sensor networks: a survey’, J. Inform. Assurance Security , 2010, vol. 5, pp. 31–44.

XVII.Kaschel H., Mardones J., and Quezada G., ‘Safety in wireless sensor networks: types of attacks and solutions’, Stud. Informatics Control, Sept., 2013, vol. 22, no. 3, pp. 323−329.

XVIII.Liu Z., Joy A. W. and Thompson R. A., ‘A Dynamic Trust Model for Mobile Ad-hoc Networks’, in The 10th IEEE International Workshop on Future Trends of Distributed Computing Systems (FTDCS ’04), 2004.

XIX.Levine B. N., Shields C., and Margolin N. B., ‘A survey of solutions to the Sybil attack’,University of Massachusetts Amherst, Amherst, MA,2006.

XX.Leopold M., ‘Sensor network motes: portability and performance’,Ph.D. dissertation, Dept. Comput. Sci., Copenhagen Univ.,Denmark, 2008.

XXI.Muraleedharan R., Yan Y., and Osadciw L. A., ‘Detecting sybil attacks in image senor network using cognitive intelligence’, Proceedings of the First ACM workshop on Sensor and actor networks, 2007, pp. 59-60.

XXII.Prasanna S., Rao S., ‘An Overview of Wireless Sensor Networks Applications and Security’, IJSCE,vol-2(2), May 2012, ISSN: 2231–2307.

XXIII.Putra G.D., Sulistyo S, ‘Trust Based Approach in Adjacent Vehicles to Mitigate Sybil Attacks in VANET’, Proceedings of the 2017 International Conference on Software and e-Business, (ICSEB ‘17) 2017, pp. 117-122.

XXIV.PaulA, Sinha S, and Pal S. ‘An Efficient Method to Detect Sybil Attack using Trust based Model’. Proc. of Int. Conf. on Advances in Computer Science, AETACS, Elsevier, 2013.

XXV.Rathod V., Mehta M., ‘Security in wireless sensor network: a survey’, Ganpat University Journal of Engineering & Technology, vol. 1, pp. 35–44, 2011.

XXVI.Rakesh G.V., Rangaswamy S., Hegde V., Shoba G., ‘A Survey of techniques to defend against Sybil attacks in Social Networks’, IJARSCCE, 2014.

XXVII.Raghunathan V., Schurgers C., Park. S, and Srivastava M. B., ‘Energy-aware wireless microsensor networks’. IEEE Signal Processing Magazine 2002, Volume: 19 Issue: 2, Page(s): 40 –50.

XXVIII.Rashidibajgan S., ‘A trust structure for detection of sybil attacks in opportunistic networks’, 11th International Conference for Internet Technology and Secured Transactions (ICITST) 2016.

XXIX.Sujatha V., Mary Anita E.A., ‘An efficient trust based method for Sybil node detection in mobile wireless sensor network’, Proceedings of the 3rdInternational Conference on Applied Science and Technology (ICAST’18) AIP Conference Proceedings, 2018.

XXX.Singh, Kumar Shio, Singh M. P., and Singh D. K., ‘A survey on network security and attack defense mechanism for wireless sensor networks’, International journal of computer trends and technology 2011, Vol1, no. 2, pp. 9-17.

XXXI.Singh R., Singh J., and Singh R., ‘A novel sybil attack detection technique for wireless sensor networks’, Advances in Computational Sciences and Technology 2017, vol. 10, pp. 185−202.

XXXII.Tsudik G., ‘Data security in unattended wireless sensor networks’,IEEE Trans. Comput., Nov., 2009, vol. 58, no. 11, pp. 1500−1511.

XXXIII.Wang Q., Balasingham I., ‘Wireless Sensor Networks –An Introduction, Wireless Sensor Networks: Application-Centric Design’, 2010.

XXXIV.Wang G, Musau F, Guo S, and Abdullahi M B. ‘Neighbor Similarity Trust against Sybil Attack in P2P E-Commerce’. IEEE Transactions o Parallel and Distributed Systems, December 2013.

XXXV.. Younis, O., &Fahmy, S. ‘HEED: a hybrid, energy-efficient, distributed clustering approach for ad hoc sensor networks’. Mobile Computing, IEEE Transactions on 2004, Vol 3(4), pp. 366-379.

XXXVI.Zhang H, Xu C, and Zhang J. ‘Exploiting Trust and Distrust Information to Combat Sybil Attack in Online Social Networks’. 8th IFIP WG 11.11 International Conference, IFIPTM 2014 Singapore, July 7-10, 2014.

Mandeep Kumar, Jahid Ali View Download