Detection and Isolation of Malicious Nodes for Selective Forwarding Attack in Wireless Sensor Network
Reenu 1 , Amarvir Singh2
Section:Research Paper, Product Type: Journal Paper
Volume-6 ,
Issue-11 , Page no. 113-119, Nov-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i11.113119
Online published on Nov 30, 2018
Copyright © Reenu, Amarvir Singh . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: Reenu, Amarvir Singh, “Detection and Isolation of Malicious Nodes for Selective Forwarding Attack in Wireless Sensor Network,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.11, pp.113-119, 2018.
MLA Style Citation: Reenu, Amarvir Singh "Detection and Isolation of Malicious Nodes for Selective Forwarding Attack in Wireless Sensor Network." International Journal of Computer Sciences and Engineering 6.11 (2018): 113-119.
APA Style Citation: Reenu, Amarvir Singh, (2018). Detection and Isolation of Malicious Nodes for Selective Forwarding Attack in Wireless Sensor Network. International Journal of Computer Sciences and Engineering, 6(11), 113-119.
BibTex Style Citation:
@article{Singh_2018,
author = {Reenu, Amarvir Singh},
title = {Detection and Isolation of Malicious Nodes for Selective Forwarding Attack in Wireless Sensor Network},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {11 2018},
volume = {6},
Issue = {11},
month = {11},
year = {2018},
issn = {2347-2693},
pages = {113-119},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=3132},
doi = {https://doi.org/10.26438/ijcse/v6i11.113119}
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i11.113119}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=3132
TI - Detection and Isolation of Malicious Nodes for Selective Forwarding Attack in Wireless Sensor Network
T2 - International Journal of Computer Sciences and Engineering
AU - Reenu, Amarvir Singh
PY - 2018
DA - 2018/11/30
PB - IJCSE, Indore, INDIA
SP - 113-119
IS - 11
VL - 6
SN - 2347-2693
ER -
VIEWS | XML | |
682 | 446 downloads | 334 downloads |
Abstract
A wireless sensor network includes incalculable number of nodes spread over a specific region, where we have to deal with the movements proceeding there. A sensor center, generally, contains sensors, actuators, memory, a processor and they do have correspondence limit. These sorts of networks are much feeble against security attacks. Numerous sorts of dynamic and detached attacks are possible in the sensor network. Among all the possible dynamic attacks, selective forwarding attack is the most generally perceived and ruinous attack. This attack degrades network execution and prompts denial of service attack. The malicious hub activates the attack, which is accessible in the network. In this work, a novel technique has been proposed to perceive and withdraw malicious nodes from the network, which is responsible for triggering the attack. The proposed technique depends on the threshold technique for recognition of malicious nodes. The exploratory outcomes will exhibit that proposed methodology distinguishes and separate the malicious nodes from the network capably. It will upgrade network adequacy to the extent package adversity, concede and grow throughput of the network. NS2 simulator instrument will be used as a piece of it.
Key-Words / Index Term
Wireless, Sensor Network, Sink Node, Sensor Node, Blackhole Attack, Denial of Service Attack, Selective Forwarding Attack, Collision Attack, Man-In-The-Middle Attack, Misdirection Attack, Node Replication Attack, Wormhole Attack
References
[1] Ali, S., Al Balushi, T., Nadir, Z., & Hussain, O. K. (2018). WSN Security Mechanisms for CPS. In Cyber Security for Cyber Physical Systems (pp. 65-87). Springer, Cham.
[2] Padmavathi, D. G., & Shanmugapriya, M. (2009). A survey of attacks, security mechanisms and challenges in wireless sensor networks. arXiv preprint arXiv:0909.0576.
[3] Raghunandan, G. H., & Lakshmi, B. N. (2011, February). A comparative analysis of routing techniques for Wireless Sensor Networks. In Innovations in Emerging Technology (NCOIET), 2011 National Conference on (pp. 17-22). IEEE.
[4] younis Abdullah, M., Hua, G. W., & Alsharabi, N. (2008, June). Wireless sensor networks misdirection attacker challenges and solutions. In Information and Automation, 2008. ICIA 2008. International Conference on (pp. 369-373). IEEE.
[5] Sachan, R. S., Wazid, M., Singh, D. P., Katal, A., & Goudar, R. H. (2013, January). Misdirection attack in WSN: Topological analysis and an algorithm for delay and throughput prediction. In Intelligent Systems and Control (ISCO), 2013 7th International Conference on (pp. 427-432). IEEE.
[6] Akyildiz, I. F., Su, W., Sankarasubramaniam, Y., & Cayirci, E. (2002). Wireless sensor networks: a survey. Computer networks, 38(4), 393-422.
[7] Bhushan, B., & Sahoo, G. (2018). Recent Advances in Attacks, Technical Challenges, Vulnerabilities and Their Countermeasures in Wireless Sensor Networks. Wireless Personal Communications, 98(2), 2037-2077.
[8] Sharma, K., & Ghose, M. K. (2010). Wireless sensor networks: An overview on its security threats. IJCA, Special Issue on “Mobile Ad-hoc Networks” MANETs, 42-45.
[9] Sachan, R. S., Wazid, M., Singh, D. P., & Goudar, R. H. (2013, April). A cluster based intrusion detection and prevention technique for misdirection attack inside WSN. In Communications and Signal Processing (ICCSP), 2013 International Conference on (pp. 795-801). IEEE.
[10] Rani, L., & Rani, E. V. A Novel Study on Data Flow Routing with Energy Optimization under Different Attacks in WSN.
[11] Modares, H., Salleh, R., & Moravejosharieh, A. (2011, September). Overview of security issues in wireless sensor networks. In 2011 Third International Conference on Computational Intelligence, Modelling & Simulation (pp. 308-311). IEEE.
[12] Dhulkar, R., Pokharkar, A., & Pise, M. R. (2015). Survey on different attacks in Wireless Sensor Networks and their prevention system.
[13] Jadidoleslamy, H. (2011). A hierarchical intrusion detection architecture for wireless sensor networks. International Journal of Network Security & Its Applications, 3(5), 131.
[14] Wang, C. H., & Li, Y. T. (2013, July). Active black holes detection in ad-hoc wireless networks. In Ubiquitous and Future Networks (ICUFN), 2013 Fifth International Conference on (pp. 94-99). IEEE.
[15] Lupu, T. G., Rudas, I., Demiralp, M., & Mastorakis, N. (2009, September). Main types of attacks in wireless sensor networks. In WSEAS international conference. proceedings. recent advances in computer engineering (No. 9). WSEAS.
[16] Singh, V. P., Jain, S., & Singhai, J. (2010). Hello flood attack and its countermeasures in wireless sensor networks. International Journal of Computer Science Issues (IJCSI), 7(3), 23.
[17] Zhang, Y. Y., Li, X. Z., & Liu, Y. A. (2012). The detection and defence of DoS attack for wireless sensor network. The journal of china universities of posts and telecommunications, 19, 52-56.
[18] Tan, H., Ostry, D., Zic, J., & Jha, S. (2013). A confidential and DoS-resistant multi-hop code dissemination protocol for wireless sensor networks. Computers & Security, 32, 36-55.
[19] Zhan, G., Shi, W., & Deng, J. (2010, February). Tarf: A trust-aware routing framework for wireless sensor networks. In European Conference on Wireless Sensor Networks (pp. 65-80). Springer, Berlin, Heidelberg.
[20] Sachan, R. S., Wazid, M., Singh, D. P., & Goudar, R. H. (2013, April). A cluster based intrusion detection and prevention technique for misdirection attack inside WSN. In Communications and Signal Processing (ICCSP), 2013 International Conference on (pp. 795-801). IEEE.
[21] Padmavathi, D. G., & Shanmugapriya, M. (2009). A survey of attacks, security mechanisms and challenges in wireless sensor networks. arXiv preprint arXiv:0909.0576.
[22] Sharma, K., & Ghose, M. K. (2010). Wireless sensor networks: An overview on its security threats. IJCA, Special Issue on “Mobile Ad-hoc Networks” MANETs, 42-45.
[23] Lv, S., Wang, X., Zhao, X., & Zhou, X. (2008, December). Detecting the sybil attack cooperatively in wireless sensor networks. In Computational Intelligence and Security, 2008. CIS`08. International Conference on (Vol. 1, pp. 442-446). IEEE.
[24] Xin-Sheng, W., Yong-Zhao, Z., Shu-ming, X., & Liang-min, W. (2009, October). Lightweight defense scheme against selective forwarding attacks in wireless sensor networks. In Cyber-Enabled Distributed Computing and Knowledge Discovery, 2009. CyberC`09. International Conference on (pp. 226-232). IEEE.
[25] Kaplantzis, S., Shilton, A., Mani, N., & Sekercioglu, Y. A. (2007, December). Detecting selective forwarding attacks in wireless sensor networks using support vector machines. In Intelligent Sensors, Sensor Networks and Information, 2007. ISSNIP 2007. 3rd International Conference on (pp. 335-340). IEEE.
[26] Baviskar, B. R., & Patil, V. N. (2014). Black hole Attacks mitigation and prevention in wireless sensor network. International Journal of Innovative Research in Advanced Engineering (IJIRAE), 1(4), 167-169.
[27] Wang, C. H., & Li, Y. T. (2013, July). Active black holes detection in ad-hoc wireless networks. In Ubiquitous and Future Networks (ICUFN), 2013 Fifth International Conference on (pp. 94-99). IEEE.
[28] Mishra, A., Nadkarni, K., & Patcha, A. (2004). Intrusion detection in wireless ad hoc networks. IEEE wireless communications, 11(1), 48-60.
[29] young Kim, J., Caytiles, R. D., & Kim, K. J. (2012). A review of the vulnerabilities and attacks for wireless sensor networks. 9(3), 241-250.
[30] Sharma, K., & Ghose, M. K. (2010). Wireless sensor networks: An overview on its security threats. IJCA, Special Issue on “Mobile Ad-hoc Networks” MANETs, 42-45.
[31] Collins, M., Dobson, S., & Nixon, P. Securing Wireless Sensor Networks: Introducing ASLAN-A Secure Lightweight Architecture for WSNs.
[32] Mohammadi, S., & Jadidoleslamy, H. (2011). A comparison of link layer attacks on wireless sensor networks. arXiv preprint arXiv:1103.5589.
[33] Anand, C., & Gnanamurthy, R. K. (2016). Localized DoS Attack Detection Architecture for Reliable Data Transmission Over Wireless Sensor Network. Wireless Personal Communications, 90(2), 847-859.
[34] Said, O., & Elnashar, A. (2015). Scaling of wireless sensor network intrusion detection probability: 3D sensors, 3D intruders, and 3D environments. EURASIP Journal on Wireless Communications and Networking, 2015(1), 46.
[35] Biswas, S., & Adhikari, S. (2015). A survey of security attacks, defenses and security mechanisms in wireless sensor network. International Journal of Computer Applications, 131(17), 28-35.