Malicious Cluster Head Detection Mechanism in Wireless Sensor Networks

被引:0
|
作者
Asima Ismail
Rashid Amin
机构
[1] University of Engineering and Technology,
来源
Wireless Personal Communications | 2019年 / 108卷
关键词
Intrusion detection system (IDS); MANET; Sensor/wireless network; Watchdog; Cluster heads (CH); Black hole attack;
D O I
暂无
中图分类号
学科分类号
摘要
In wireless ad hoc network, all nodes participate for the transmission of data within the network and responsible for designing network topology. Suspicious and malicious activities can be detected by different techniques like IDS that is dynamic in nature. In clustering environment all the communication is carried out through cluster heads, we are having two cluster heads a primary cluster head (PCH) and secondary cluster heads (SCH) where SCHs communicate via PCH and if one of the secondary cluster head is compromised the entire network will be affected so malfunctioning of cluster head must be detected and identified. To handle this issue, we proposed a secure mechanism that provides security by minimum utilization of the resources after detection and identification the malicious Cluster Head. The proposed mechanism based on two level thresholds for the detection and identification of malicious cluster head that is dropping packets because of some attack. We used watchdog technique for initial monitoring. An agent is launched for detection and identification of the packets dropping problem. It is specially designed for secure UDP traffic transmission and fake report detection done by any of the malicious SCH to PCH.
引用
收藏
页码:2117 / 2135
页数:18
相关论文
共 50 条
  • [1] Malicious Cluster Head Detection Mechanism in Wireless Sensor Networks
    Ismail, Asima
    Amin, Rashid
    WIRELESS PERSONAL COMMUNICATIONS, 2019, 108 (04) : 2117 - 2135
  • [2] Emerging network communication for malicious node detection in wireless multimedia sensor networks
    Jayadhas, S. Arockia
    Roslin, S. Emalda
    Florin, W.
    OPTICAL AND QUANTUM ELECTRONICS, 2024, 56 (01)
  • [3] Mitigating Packet Dropping Problem and Malicious Node Detection Mechanism in Ad Hoc Wireless Networks
    Sonekar, Shrikant V.
    Kshirsagar, Manali M.
    PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON FRONTIERS IN INTELLIGENT COMPUTING: THEORY AND APPLICATIONS (FICTA) 2015, 2016, 404 : 317 - 328
  • [4] A Loom for Revealing Selfish and Malicious Node in Cluster Based Adhoc Wireless Networks
    Sonekar, Shrikant V.
    Kshirsagar, Manali
    2015 2ND INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT (INDIACOM), 2015, : 370 - 375
  • [5] A Novel Technique to Detect Malicious Packet Dropping Attacks in Wireless Sensor Networks
    Terence, J. Sebastian
    Purushothaman, Geethanjali
    JOURNAL OF INFORMATION PROCESSING SYSTEMS, 2019, 15 (01): : 203 - 216
  • [6] An Intrusion Detection System for Wireless Sensor Networks
    Ioannou, Christiana
    Vassiliou, Vasos
    Sergiou, Charalampos
    PROCEEDINGS OF THE 24TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS (ICT 2017), 2017,
  • [7] Performance Analysis of Energy Efficient Cluster Based Heterogeneous Wireless Sensor Network against Malicious Attack
    Lakshmi, M.
    Prashanth, C. R.
    2018 3RD INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS, COMMUNICATION, COMPUTER, AND OPTIMIZATION TECHNIQUES (ICEECCOT - 2018), 2018, : 241 - 248
  • [8] A Survey of Intrusion Detection Systems in Wireless Sensor Networks
    Butun, Ismail
    Morgera, Salvatore D.
    Sankar, Ravi
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2014, 16 (01): : 266 - 282
  • [9] Detection and Prevention of Blackhole Attacks in Wireless Sensor Networks
    Kaur, Gurjinder
    Jain, V. K.
    Chaba, Yogesh
    INTELLIGENT, SECURE, AND DEPENDABLE SYSTEMS IN DISTRIBUTED AND CLOUD ENVIRONMENTS (ISDDC 2017), 2017, 10618 : 118 - 126
  • [10] A survey of Intrusion Detection Systems for Wireless Sensor Networks
    Farooqi, Ashfaq Hussain
    Khan, Farrukh Aslam
    INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2012, 9 (02) : 69 - 83