Jensen-Shannon Divergence Based Independent Component Analysis to Detect and Prevent Black Hole Attacks in Healthcare WSN

被引:19
作者
Sunder, A. John Clement [1 ]
Shanmugam, A. [2 ]
机构
[1] Bannari Amman Inst Technol, Dept Elect & Commun Engn, Sathyamangalam, Tamil Nadu, India
[2] SNS Coll Technol, Dept Elect & Commun Engn, Coimbatore, Tamil Nadu, India
关键词
Black hole attack; Cooperative count; Energy; Healthcare WSN; Isolation; Jensen-Shannon Divergence; Sensor node; Trust value;
D O I
10.1007/s11277-019-06347-5
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
The black hole attack is an adverse issue in Wireless Sensor Networks (WSNs). Research for detection and circumvention of the black hole attack is underway. However, the false alarm rate, amount of time required to identify the black hole attack nodes in network has not reduced. To overcome such limitations, the Jensen-Shannon Divergence Based Independent Component Analysis (JDICA) technique is proposed in this paper. This technique is introduced with the application of Jensen-Shannon Divergence estimation in Independent Component Analysis model on the contrary to existing works, in order to achieve higher black hole detection accuracy in healthcare WSN. The JDICA technique identifies the black hole attack by analyzing the physiological data gathered from biomedical sensors. The proposed JDICA technique carries out attack detection based on sensor nodes behaviors such as energy, trust and cooperative count. It determines the dependence among the nodes, based on the independent probability distribution functions and mutual probability function by using the Jensen-Shannon Divergence. The divergence result enables JDICA technique to detect black hole attacks with greater accuracy, and helps to quarantine the malicious node from the network by broadcasting the isolation message to all sensor nodes in the network. Hence, JDICA technique enhances the detection of black hole attack nodes as compared to state-of-the-art works, thereby increasing the packet delivery ratio and reducing delay. The JDICA technique simulation is done considering the metrics such as detection rate, detection time, false alarm rate, and packet delivery ratio with respect to a varied number of sensor nodes and data packets. Simulation results makes it apparent that the JDICA technique improves the detection rate and minimizes the detection time of the black hole attack when compared to state-of-the-art works.
引用
收藏
页码:1607 / 1623
页数:17
相关论文
共 18 条
[1]  
Aljumah A, 2017, INT J COMPUT SCI NET, V17, P194
[2]  
[Anonymous], 2015, IEEE INT C INNOVATIO
[3]  
[Anonymous], 2014, 2014 WIR TEL S
[4]  
Arya M, 2014, INT J ENG TRENDS TEC, V14, P29, DOI [10.14445/22315381/IJETT-V14P207, DOI 10.14445/22315381/IJETT-V14P207]
[5]  
Babu M. Rajesh, 2015, SCI WORLD J
[6]  
Kumar S, 2015, INT J ADV RES COMPUT, V4, P557, DOI [10.17148/IJARCCE.2015.45119, DOI 10.17148/IJARCCE.2015.45119]
[7]   A Global Hybrid Intrusion Detection System for Wireless Sensor Networks [J].
Maleh, Yassine ;
Ezzati, Abdellah ;
Qasmaoui, Youssef ;
Mbida, Mohamed .
6TH INTERNATIONAL CONFERENCE ON AMBIENT SYSTEMS, NETWORKS AND TECHNOLOGIES (ANT-2015), THE 5TH INTERNATIONAL CONFERENCE ON SUSTAINABLE ENERGY INFORMATION TECHNOLOGY (SEIT-2015), 2015, 52 :1047-1052
[8]   Defence against Black Hole and Selective Forwarding Attacks for Medical WSNs in the IoT [J].
Mathur, Avijit ;
Newe, Thomas ;
Rao, Muzaffar .
SENSORS, 2016, 16 (01)
[9]   Machine Learning Methods for Attack Detection in the Smart Grid [J].
Ozay, Mete ;
Esnaola, Inaki ;
Vural, Fatos Tunay Yarman ;
Kulkarni, Sanjeev R. ;
Poor, H. Vincent .
IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS, 2016, 27 (08) :1773-1786
[10]   Analyzing, quantifying, and detecting the blackhole attack in infrastructure-less networks [J].
Panos, Christoforos ;
Ntantogian, Chirstoforos ;
Malliaros, Stefanos ;
Xenakis, Christos .
COMPUTER NETWORKS, 2017, 113 :94-110