Open Access   Article Go Back

A Trust Election based Mechanism for finding selfish node and preventing them from Attack

Priya Mishra1 , Ompal Singh2 , Abhishek Bhatt3

Section:Research Paper, Product Type: Journal Paper
Volume-7 , Issue-2 , Page no. 223-229, Feb-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7i2.223229

Online published on Feb 28, 2019

Copyright © Priya Mishra, Ompal Singh, Abhishek Bhatt . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Priya Mishra, Ompal Singh, Abhishek Bhatt , “A Trust Election based Mechanism for finding selfish node and preventing them from Attack,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.2, pp.223-229, 2019.

MLA Style Citation: Priya Mishra, Ompal Singh, Abhishek Bhatt "A Trust Election based Mechanism for finding selfish node and preventing them from Attack." International Journal of Computer Sciences and Engineering 7.2 (2019): 223-229.

APA Style Citation: Priya Mishra, Ompal Singh, Abhishek Bhatt , (2019). A Trust Election based Mechanism for finding selfish node and preventing them from Attack. International Journal of Computer Sciences and Engineering, 7(2), 223-229.

BibTex Style Citation:
@article{Mishra_2019,
author = {Priya Mishra, Ompal Singh, Abhishek Bhatt },
title = {A Trust Election based Mechanism for finding selfish node and preventing them from Attack},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {2 2019},
volume = {7},
Issue = {2},
month = {2},
year = {2019},
issn = {2347-2693},
pages = {223-229},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=3646},
doi = {https://doi.org/10.26438/ijcse/v7i2.223229}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i2.223229}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=3646
TI - A Trust Election based Mechanism for finding selfish node and preventing them from Attack
T2 - International Journal of Computer Sciences and Engineering
AU - Priya Mishra, Ompal Singh, Abhishek Bhatt
PY - 2019
DA - 2019/02/28
PB - IJCSE, Indore, INDIA
SP - 223-229
IS - 2
VL - 7
SN - 2347-2693
ER -

VIEWS PDF XML
517 278 downloads 186 downloads
  
  
           

Abstract

Wireless sensor network is an important communication resource in wireless area. It enable to recognize many resources and file data such as temperature, humidity and many other dynamic functional data which needed observation. In many remote areas where the different terminology adaption is difficult while dealing with opposite situations wireless sensor network help in establish a proper communication between them. A proper network and communication also get disadvantage of intruder and anomaly within the network. WSN deals with attack resistance and finding such node which participate in such activity. Many algorithm used for finding such selfish attack nodes and preventing data from them. In this paper the proposed algorithm shown is proposed for the selfish node detection and prevention. The approach is performed using NS-2 simulation tool with dynamic node number selection model. The observe outcome while running the script observe high performance over existing scenario.

Key-Words / Index Term

Wireless Sensor Networks (WSN), MANET (Mobile AD-Hoc Networks), Selfish node, network failure, data packet transmission

References

[1] Pushpendu Kar, Student Member, IEEE and Sudip Misra, Senior Member, IEEE, Reliable and Efficient Data Acquisition in Wireless Sensor Networks in the Presence of Transfaulty Nodes, 1932-4537 (c) 2015 IEEE.
[2] Abdul Razaque, M. Abdulghafour, Meer Jaro Khan, Detection of Selfish Attack over Wireless Body Area Networks, 2017 IEEE Conference on Open Systems (ICOS), November 13-14, 2017, Miri, Sarawak, Malaysia.
[3] JaydipSen, and Kaustav Goswami2, an Algorithm for Detection of Selfish Nodes in Wireless Mesh Networks, Oct. 28-30, 2009.
[4] Naveen Kumar Gupta, **Ashish Kumar Sharma, Abhishek Gupta, Selfish Behaviour Prevention and Detection in Mobile Ad-Hoc Network Using Intrusion Prevention System (IPS), Volume-1 Issue-2, September 2012.
[5] SonaTaheri, Musa Mammadov , Learning The Naive Bayes Classifier With Optimization Models, Vol. 23, No. 4, 787–795 DOI: 10.2478/amcs-2013-0059.
[6] Peng Jiang, A New Method for Node Fault Detection in Wireless Sensor Networks, 24 February 2009.
[7] AbolfazlAkbari, NedaBeikmahdavi, Ali khosrozadeh, OmidPanah, A Survey Cluster-Based and Cellular Approach to Fault Detection and Recovery in Wireless Sensor Networks, Journal 8 (1): 76-85, 2010.
[8] Meenakshi Panda, Pabitra Mohan Khilar, Distributed Soft Fault Detection Algorithm in Wireless Sensor Networks using Statistical Test, 2012 2nd IEEE International Conference on Parallel, Distributed and Grid Computing.
[9] Amol Shende1, Prof. Vikrant Chole2, A Review on Improving Packet Analysis in Wireless Sensor Network using Bit Rate Classifier, Vol.5 Issue.6, June- 2016, pg. 102-107.
[10] Charles E. Perkins, Ad-hoc On-Demand Distance Vector Routing.
[11] G. Vigna, S. Gwalani, K. Srinivasan, E.M. Belding-Royer, and R.A. Kemmerer, “An intrusion detection tool for AODV-based ad hoc wireless networks,” in Proc of Annual Comp. Sec. Appl. Conf (ACSAC) 2004, pp. 16-27.
[12] A. Pirzada and C. McDonald, “Establishing trust in pure ad hoc networks,” in Proceedings of the 27th Australian Conference on Computer Science, 2004, pp. 181-199.
[13] M. Conti, E. Gregori, and G. Maselli, “Reliable and efficient forwarding in MANETs,” Ad Hoc Networks Journal, Vol 4, No 3, 2006, pp. 398-415.
[14] L. Santhanam et al, “Distributed self-policing architecture for fostering node cooperation in wireless mesh networks,” in Proc. of PWC 2006, Vol 4217, pp. 147-158. [15] D. Johnson, C. Perkins, J. Arkko, Mobility Support in IPv6, RFC 3775, June 2004
[16] V. Devarapalli, R. Wakikawa, A. Petrescu, P. Thubert, Network Mobility (NEMO) Basic Support Protocol, RFC 3963, January 2005
[17] T. Ernst, H-Y. Lach, Network Mobility Support Terminology, draftietf-nemo-terminology-04.txt, October, 2005
[18] A.Vani ,Detection and Elimination of Wormhole Attacks in a MANET ,Int. J. Sci. Res. in Computer Science and Engineering Vol-5(5), Oct 2017,
[19] Dipali Koshtiand Supriya Kamoji ,Comparative study of Techniques used for Detection of Selfish Nodes in Mobile Ad hoc Networks IJSCE Volume-1, Issue-4, September 2011
[20] Neenavath Veeraiah, Dr.B.T.Krishna Selfish ,Node Detection IDSM Based Approach Using Individual Master Cluster Node in Proceedings of the Second International Conference on Inventive Systems and Control (ICISC 2018) IEEE