Trusted head node for Node Behaviour Analysis for malicious node detection in wireless sensor networks

被引:0
作者
Valluri, Bhanu Priyanka [1 ]
Sharma, Nitin [1 ]
机构
[1] Department of Electronics and Communication Engineering, Chandigarh University, Gharuan, Punjab
来源
Measurement: Sensors | 2024年 / 36卷
关键词
Communication overhead; Data loss; Malicious node; Network performance; Node behaviour; Trusted nodes; Wireless sensor networks;
D O I
10.1016/j.measen.2024.101159
中图分类号
学科分类号
摘要
There has been a rise in the use of Wireless Sensor Networks (WSNs) in several fields. Depending on the malicious actions, attacks on WSN can take many forms. This research demonstrates how to leverage request and response data from each node to pinpoint the location of malicious nodes. If a node is malevolent, it will prohibit data from being sent to other nodes. They do an excellent job of pretending to be someone else. To enhance route quality, packet dropping can be used to perform a Denial of Service (DoS) assault by rejecting data packets and cutting them off from their destinations. The primary goal of this research is to expose malicious nodes within the network. To avoid being attacked by the false information fed by the adversary through compromised nodes, it is crucial to discover and isolate the nodes that have been compromised. Unfortunately, flat topology networks are difficult to keep safe because of their limited scalability and substantial communication overhead. By computing the packet drop and throughput values with valid nodes, efficient security architecture for the WSN can be proposed, allowing for the detection of malicious activity. If sensor networks are susceptible to attacks, they will be unable to fulfill their duty in a variety of event detection applications. Malicious nodes can cause unacceptable drops in event detection effectiveness and spikes in false alarm rates by producing fake readings and deceptive information. In this research, a method for identifying malicious nodes in WSNs is proposed. This research considers a Trusted Head Node (THN) for monitoring the nodes behaviour in the network to detect the malicious actions in the network. This research proposes a Trusted Head Node for Node Behaviour Analysis for Malicious Node Detection (THN-NBA-MND) in WSN. The proposed model based on node behaviour analysis in frequent time intervals; detect the malicious nodes to improve the network performance in data transmission. The proposed model when contrasted with the existing model performs better in malicious node detection. © 2024
引用
收藏
相关论文
共 23 条
[1]  
Przydatek B., Song D., Perrig A., SIA: secure information aggregation in sensor networks, Proceedings of SenSys' 03, Nov 5–7, Los Angeles, CA, (2003)
[2]  
Cam H., Ozdemir S., Nair P., Muthuavinashiappan D., ESPDA: energy-efficient andsecure pattern based data aggregation for wireless sensor networks, Proceedings of IEEE sensors, 2, pp. 732-736, (2003)
[3]  
Hu L., Evans D., Secure aggregation for wireless networks, Proceedings of Workshop on Security and Assurance in Ad Hoc Networks, Orlando, FL, (2003)
[4]  
Ozdemir S., OzgurSanli H., Cam H., SRDA: secure reference-based data aggregationprotocol for wireless sensor networks, IEEE 60th Conference on Vehicular technology,VTC2004-Fall, 7, pp. 26-29, (2004)
[5]  
Yang Y., Wang X., Zhu S., Cao G., SDAP: a secure hop-by-hop data aggregation protocolfor sensor networks, Proceedings of the 7th ACM International Symposium on Mobile Adhoc Networking and Computing (MobiHoc ’06), pp. 356-367, (2006)
[6]  
Othman S.B., Trad A., Youssef H., Alzaid H., Secure data aggregation with MACauthentication in wireless sensor networks, 12th IEEE International Conference on Trust, Securityand Privacy in Computing and Communications, pp. 188-195, (2013)
[7]  
Rivest R., Adleman L., Dertouzos M., On data banks and privacy homomorphisms, Foundations of Secure Computation, 4, pp. 169-179, (1978)
[8]  
Girao J., Schneider M., Westhoff D., CDA: concealed data aggregation in wireless sensornetworks, IEEE International Conference on Communications, 5, pp. 3044-3049, (2005)
[9]  
Wagner D., Resilient aggregation in sensor networks, Proceedings of the 2nd ACMWorkshop on Security of Ad-Hoc and Sensor Networks, (2004)
[10]  
Perrig R.S., Tygar J.D., Wen V., Culler D.E., SPINS: security protocols for sensornetworks, Wireless Network, 8, 5, pp. 521-534, (2002)