Swarm-based defense technique for tampering and cheating attack in WSN using CPHS

被引:6
作者
Periyanayagi, S. [1 ]
Sumathy, V. [2 ]
机构
[1] Ramco Inst Technol, Dept ECE, Rajapalayam, India
[2] Govt Coll Engn, Dept ECE, Bodiyanayakkanu, Bodinayakkanur, India
关键词
Wireless sensor networks; Tampering and cheating attack; Petrinets; TRUST;
D O I
10.1007/s00779-018-1162-1
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Nowadays, Wireless Sensor Networks (WSN) have been seen as one of the most essential technologies which play a vital role in several important areas, such as healthcare, military, critical infrastructure monitoring, environment monitoring, and manufacturing. The desirable nature of WSN introduces many security challenges which have necessitated the introduction of several classical security methodologies over the last few years for various security attacks. A defense technique using Swarm Based Trusted Node for Tampering and Cheating Attack (SBTN-TC) model has been proposed to identify the physical layer attacks in a WSN. This model, first selects a trusted node (TN) within the network for identifying the tampered or cheating nodes using swarm intelligence. The trusted node monitors and processes the nodes session receipts involved in the transmission session to extract the contextual information such as broken links, frequent packet droppers, and fair and cheating sessions. Based on the session receipts, the trusted node renews the nodes certificate and ignores the tampered node or cheating node. In order to maintain a secure communication of contextual information between node and trusted node, a Cryptographic Puzzle Hiding Scheme (CPHS) is used for submitting the session receipts to trusted node. The effectiveness of the proposed method has been proved from the simulation results based on packet delivery ratio, packet drop, residual energy, and overhead.
引用
收藏
页码:1165 / 1179
页数:15
相关论文
共 23 条
[1]  
Baskar S., 2016, Asian Journal of Research in Social Sciences and Humanities, V6, P519, DOI DOI 10.5958/2249-7315.2016.00980.1
[2]  
Baskar S., 2012, INT J ADV RES COMPUT, V1, P816
[3]  
Baskar S., 2014, 2014 2 INT C DEVICES, P1, DOI 10.1109/ICDCSyst.2014.6926127
[4]  
Bhattachanja R, 2013, INT J RES ENG TECHNO, P72
[5]  
Capek J, 2010, INT J COMPUT COMMUN, V4, P101
[6]  
Chaudhari H.C., 2011, International Journal of Networking, Volume, V1, P04
[7]  
CHEN D, 2011, J COMPUT INF SYST, V6, P1990
[8]  
Conti M, 2007, MOBIHOC'07: PROCEEDINGS OF THE EIGHTH ACM INTERNATIONAL SYMPOSIUM ON MOBILE AD HOC NETWORKING AND COMPUTING, P80
[9]  
Deng Hongwei, 2009, P IEEE GLOB TEL C GL, P1
[10]   Towards pre-standardization of trust and reputation models for distributed and heterogeneous systems [J].
Gomez Marmol, Felix ;
Martinez Perez, Gregorio .
COMPUTER STANDARDS & INTERFACES, 2010, 32 (04) :185-196