Two Step Verification technique For Detection of Malicious Nodes in Wireless Sensor Networks

被引:0
|
作者
Kumar, Mandeep [1 ]
Ali, Jahid [2 ]
机构
[1] IKG Punjab Tech Univ, Kapurthala, Punjab, India
[2] SSICMIT, Pathankot, Punjab, India
来源
JOURNAL OF MECHANICS OF CONTINUA AND MATHEMATICAL SCIENCES | 2019年 / 14卷 / 01期
关键词
wireless sensor network; sensor node; Sybil attack; malicious nodes; observer node; network performance;
D O I
10.26782/jmcms.2019.02.00032
中图分类号
O3 [力学];
学科分类号
08 ; 0801 ;
摘要
The wireless sensor network is the application oriented network which performs task of monitoring and object tracking. The wireless sensor node has the architecture which involves wireless interface for the communication. The design of the wireless sensor network depends upon the significant of application, cost and type of hardware. The architecture of WSN is dynamic due to which security and energy consumption are the major constraints. The Sybil attack is the attack which is possible in wireless sensor networks and it affect network performance. The attacker node generates multiple identities to attract network traffic and leads to denial of service in the network. In this research work, two step verification technique is proposed for the detection of malicious nodes from the network. In the two step verification technique, the cluster heads detect the node as untrusted if its energy consumption is abnormal. The extra observer nodes are deployed in the network, which observe network traffic. On the basis of network traffic observations, the node is declared as trusted or untrusted. When the cluster head and observer node both declare on node as untrusted node, then that sensor node will be considered as malicious node. The experiment is conducted is NS2 by considering certain simulation parameters. It is analyzed that two step verification technique detect malicious nodes successfully and it also leads to improve network performance in terms of Delay, PDR and Packetloss.
引用
收藏
页码:444 / 468
页数:25
相关论文
共 50 条
  • [31] Study on Tradeoffs in Detection of Malicious Data Injections in Wireless Sensor Networks
    Vijayan, Nisha
    Johny, Alphonsa
    1ST GLOBAL COLLOQUIUM ON RECENT ADVANCEMENTS AND EFFECTUAL RESEARCHES IN ENGINEERING, SCIENCE AND TECHNOLOGY - RAEREST 2016, 2016, 25 : 378 - 383
  • [32] Fuzzy Trust Protocol for Malicious Node Detection in Wireless Sensor Networks
    V. Ram Prabha
    P. Latha
    Wireless Personal Communications, 2017, 94 : 2549 - 2559
  • [33] Fuzzy Trust Protocol for Malicious Node Detection in Wireless Sensor Networks
    Prabha, V. Ram
    Latha, P.
    WIRELESS PERSONAL COMMUNICATIONS, 2017, 94 (04) : 2549 - 2559
  • [34] A novel trust management scheme based on Dempster–Shafer evidence theory for malicious nodes detection in wireless sensor networks
    Wei Zhang
    Shiwei Zhu
    Jian Tang
    Naixue Xiong
    The Journal of Supercomputing, 2018, 74 : 1779 - 1801
  • [35] Distributed detection of mobile malicious node attacks in wireless sensor networks
    Ho, Jun-Won
    Wright, Matthew
    Das, Sajal K.
    AD HOC NETWORKS, 2012, 10 (03) : 512 - 523
  • [36] Detecting Malicious Data Injections in Event Detection Wireless Sensor Networks
    Illiano, Vittorio P.
    Lupu, Emil C.
    IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2015, 12 (03): : 496 - 510
  • [37] Locating Malicious Nodes for Data Aggregation in Wireless Networks
    Xu, Xiaohua
    Wang, Qian
    Cao, Jiannong
    Wan, Peng-Jun
    Ren, Kui
    Chen, Yuanfang
    2012 PROCEEDINGS IEEE INFOCOM, 2012, : 3056 - 3060
  • [38] FBMT: Fuzzy Based Merkle Technique for Detecting and Mitigating Malicious Nodes in Sensor Networks
    Sundararajan, Ranjeeth Kumar
    Arumugam, Umamakeswari
    INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2019, 16 (06) : 1106 - 1113
  • [39] A Novel Technique to Detect Malicious Packet Dropping Attacks in Wireless Sensor Networks
    Terence, J. Sebastian
    Purushothaman, Geethanjali
    JOURNAL OF INFORMATION PROCESSING SYSTEMS, 2019, 15 (01): : 203 - 216
  • [40] Nodes scheduling for approximate event detection in wireless sensor networks
    Gao, Jing
    Li, Jian-Zhong
    Ruan Jian Xue Bao/Journal of Software, 2014, 25 : 11 - 18