Two Step Verification technique For Detection of Malicious Nodes in Wireless Sensor Networks

被引:0
作者
Kumar, Mandeep [1 ]
Ali, Jahid [2 ]
机构
[1] IKG Punjab Tech Univ, Kapurthala, Punjab, India
[2] SSICMIT, Pathankot, Punjab, India
来源
JOURNAL OF MECHANICS OF CONTINUA AND MATHEMATICAL SCIENCES | 2019年 / 14卷 / 01期
关键词
wireless sensor network; sensor node; Sybil attack; malicious nodes; observer node; network performance;
D O I
10.26782/jmcms.2019.02.00032
中图分类号
O3 [力学];
学科分类号
08 ; 0801 ;
摘要
The wireless sensor network is the application oriented network which performs task of monitoring and object tracking. The wireless sensor node has the architecture which involves wireless interface for the communication. The design of the wireless sensor network depends upon the significant of application, cost and type of hardware. The architecture of WSN is dynamic due to which security and energy consumption are the major constraints. The Sybil attack is the attack which is possible in wireless sensor networks and it affect network performance. The attacker node generates multiple identities to attract network traffic and leads to denial of service in the network. In this research work, two step verification technique is proposed for the detection of malicious nodes from the network. In the two step verification technique, the cluster heads detect the node as untrusted if its energy consumption is abnormal. The extra observer nodes are deployed in the network, which observe network traffic. On the basis of network traffic observations, the node is declared as trusted or untrusted. When the cluster head and observer node both declare on node as untrusted node, then that sensor node will be considered as malicious node. The experiment is conducted is NS2 by considering certain simulation parameters. It is analyzed that two step verification technique detect malicious nodes successfully and it also leads to improve network performance in terms of Delay, PDR and Packetloss.
引用
收藏
页码:444 / 468
页数:25
相关论文
共 50 条
[11]   Malicious Node Detection in Wireless Sensor Networks Using Support Vector Machine [J].
Jaint, Bhavnesh ;
Indu, S. ;
Pandey, Neeta ;
Pahwa, Khushbu .
2019 3RD INTERNATIONAL CONFERENCE ON RECENT DEVELOPMENTS IN CONTROL, AUTOMATION & POWER ENGINEERING (RDCAPE), 2019, :247-252
[12]   A Novel Algorithm for Improving Malicious Node Detection Effect in Wireless Sensor Networks [J].
Hongyu Yang ;
Xugao Zhang ;
Fang Cheng .
Mobile Networks and Applications, 2021, 26 :1564-1573
[13]   A Novel Algorithm for Improving Malicious Node Detection Effect in Wireless Sensor Networks [J].
Yang, Hongyu ;
Zhang, Xugao ;
Cheng, Fang .
MOBILE NETWORKS & APPLICATIONS, 2021, 26 (04) :1564-1573
[14]   Glider assisted schemes to deploy sensor nodes in Wireless Sensor Networks [J].
Vikrant, Sharma ;
Patel, R. B. ;
Bhadauria, H. S. ;
Prasad, D. .
ROBOTICS AND AUTONOMOUS SYSTEMS, 2018, 100 :1-13
[15]   Secure Efficient Geocast Protocol for Sensor Networks with Malicious Nodes [J].
Shim, Young-Chul .
EHAC'09: PROCEEDINGS OF THE 8TH WSEAS INTERNATIONAL CONFERENCE ON ELECTRONICS, HARDWARE, WIRELESS AND OPTICAL COMMUNICATIONS, 2009, :179-184
[16]   A survey on trust based detection and isolation of malicious nodes in ad-hoc and sensor networks [J].
Ahmed, Adnan ;
Abu Bakar, Kamalrulnizam ;
Channa, Muhammad Ibrahim ;
Haseeb, Khalid ;
Khan, Abdul Waheed .
FRONTIERS OF COMPUTER SCIENCE, 2015, 9 (02) :280-296
[17]   A Statistical Trust for Detecting Malicious Nodes in IoT Sensor Networks [J].
Wang, Fang ;
Wei, Zhe .
IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2021, E104A (08) :1084-1087
[18]   A survey on trust based detection and isolation of malicious nodes in ad-hoc and sensor networks [J].
Adnan Ahmed ;
Kamalrulnizam Abu Bakar ;
Muhammad Ibrahim Channa ;
Khalid Haseeb ;
Abdul Waheed Khan .
Frontiers of Computer Science, 2015, 9 :280-296
[19]   Pattern Matching Intrusion Detection Technique for Wireless Sensor Networks [J].
Kalnoor, Gauri ;
Agarkhed, Jayashree .
PROCEEDINGS OF THE 2016 IEEE 2ND INTERNATIONAL CONFERENCE ON ADVANCES IN ELECTRICAL & ELECTRONICS, INFORMATION, COMMUNICATION & BIO INFORMATICS (IEEE AEEICB-2016), 2016, :724-728
[20]   The impact of malicious nodes on the performance of wireless Ad-hoc networks [J].
Hallani, Houssein ;
Shahrestani, Seyed A. .
MANAGING INFORMATION IN THE DIGITAL ECONOMY: ISSUES & SOLUTIONS, 2006, :596-+