Two Step Verification technique For Detection of Malicious Nodes in Wireless Sensor Networks

被引:0
|
作者
Kumar, Mandeep [1 ]
Ali, Jahid [2 ]
机构
[1] IKG Punjab Tech Univ, Kapurthala, Punjab, India
[2] SSICMIT, Pathankot, Punjab, India
来源
JOURNAL OF MECHANICS OF CONTINUA AND MATHEMATICAL SCIENCES | 2019年 / 14卷 / 01期
关键词
wireless sensor network; sensor node; Sybil attack; malicious nodes; observer node; network performance;
D O I
10.26782/jmcms.2019.02.00032
中图分类号
O3 [力学];
学科分类号
08 ; 0801 ;
摘要
The wireless sensor network is the application oriented network which performs task of monitoring and object tracking. The wireless sensor node has the architecture which involves wireless interface for the communication. The design of the wireless sensor network depends upon the significant of application, cost and type of hardware. The architecture of WSN is dynamic due to which security and energy consumption are the major constraints. The Sybil attack is the attack which is possible in wireless sensor networks and it affect network performance. The attacker node generates multiple identities to attract network traffic and leads to denial of service in the network. In this research work, two step verification technique is proposed for the detection of malicious nodes from the network. In the two step verification technique, the cluster heads detect the node as untrusted if its energy consumption is abnormal. The extra observer nodes are deployed in the network, which observe network traffic. On the basis of network traffic observations, the node is declared as trusted or untrusted. When the cluster head and observer node both declare on node as untrusted node, then that sensor node will be considered as malicious node. The experiment is conducted is NS2 by considering certain simulation parameters. It is analyzed that two step verification technique detect malicious nodes successfully and it also leads to improve network performance in terms of Delay, PDR and Packetloss.
引用
收藏
页码:444 / 468
页数:25
相关论文
共 50 条
  • [1] Distributed Malicious Nodes Detection in Wireless Sensor Networks
    Zhang Zhaohui
    Hu Mingming
    Li Dong
    Qi Xiaogang
    COMPUTER AND INFORMATION TECHNOLOGY, 2014, 519-520 : 1243 - 1246
  • [2] Identifying malicious nodes in wireless sensor networks based on correlation detection
    Lai, Yingxu
    Tong, Liyao
    Liu, Jing
    Wang, Yipeng
    Tang, Tong
    Zhao, Zijian
    Qin, Hua
    COMPUTERS & SECURITY, 2022, 113
  • [3] Convolutional technique for enhancing security in wireless sensor networks against malicious nodes
    Alghamdi, Turki Ali
    HUMAN-CENTRIC COMPUTING AND INFORMATION SCIENCES, 2019, 9 (01)
  • [4] Detection and Location of Malicious Nodes Based on Homomorphic Fingerprinting in Wireless Sensor Networks
    Zhang, Zhiming
    Yang, Yu
    Yang, Wei
    Wu, Fuying
    Li, Ping
    Xiong, Xiaoyong
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [5] Localized Identification of Malicious Nodes in Wireless Sensor Networks
    Akram, Vahid Khalilpour
    Erten, Yusuf Murat
    2020 28TH SIGNAL PROCESSING AND COMMUNICATIONS APPLICATIONS CONFERENCE (SIU), 2020,
  • [6] Cooperative Detection for Falsification and Isolation of Malicious Nodes for Wireless Sensor Networks in Open Environment
    Nii, Eiji
    Kitanouma, Takamasa
    Adachi, Naotoshi
    Takizawa, Yasuhisa
    2017 IEEE ASIA PACIFIC MICROWAVE CONFERENCE (APMC), 2017, : 521 - 524
  • [7] Countering Intelligent-Dependent Malicious Nodes in Target Detection Wireless Sensor Networks
    Althunibat, Saud
    Antonopoulos, Angelos
    Kartsakli, Elli
    Granelli, Fabrizio
    Verikoukis, Christos
    IEEE SENSORS JOURNAL, 2016, 16 (23) : 8627 - 8639
  • [8] Malicious Node Detection in Wireless Sensor Networks
    Atassi, Alaa
    Sayegh, Naoum
    Elhajj, Imad
    Chehab, Ali
    Kayssi, Ayman
    2013 IEEE 27TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS (WAINA), 2013, : 456 - 461
  • [9] Security Enhancement by Detection and Penalization of Malicious Nodes in Wireless Networks
    Kukreja, Deepika
    Miglani, Mohit
    Dhurandher, S. K.
    Reddy, B. V. R.
    2014 INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND INTEGRATED NETWORKS (SPIN), 2014, : 275 - 280
  • [10] Study on Automatic Positioning of Malicious Mobile Nodes in Wireless Sensor Networks
    Zheng Wen-Kui
    Liu Kun
    PROCEEDINGS OF THE 2017 5TH INTERNATIONAL CONFERENCE ON FRONTIERS OF MANUFACTURING SCIENCE AND MEASURING TECHNOLOGY (FMSMT 2017), 2017, 130 : 1495 - 1499