Malicious Cluster Head Detection Mechanism in Wireless Sensor Networks

被引:0
|
作者
Asima Ismail
Rashid Amin
机构
[1] University of Engineering and Technology,
来源
Wireless Personal Communications | 2019年 / 108卷
关键词
Intrusion detection system (IDS); MANET; Sensor/wireless network; Watchdog; Cluster heads (CH); Black hole attack;
D O I
暂无
中图分类号
学科分类号
摘要
In wireless ad hoc network, all nodes participate for the transmission of data within the network and responsible for designing network topology. Suspicious and malicious activities can be detected by different techniques like IDS that is dynamic in nature. In clustering environment all the communication is carried out through cluster heads, we are having two cluster heads a primary cluster head (PCH) and secondary cluster heads (SCH) where SCHs communicate via PCH and if one of the secondary cluster head is compromised the entire network will be affected so malfunctioning of cluster head must be detected and identified. To handle this issue, we proposed a secure mechanism that provides security by minimum utilization of the resources after detection and identification the malicious Cluster Head. The proposed mechanism based on two level thresholds for the detection and identification of malicious cluster head that is dropping packets because of some attack. We used watchdog technique for initial monitoring. An agent is launched for detection and identification of the packets dropping problem. It is specially designed for secure UDP traffic transmission and fake report detection done by any of the malicious SCH to PCH.
引用
收藏
页码:2117 / 2135
页数:18
相关论文
共 50 条
  • [21] A Rule Based Approach for Attribute Selection and Intrusion Detection in Wireless Sensor Networks
    Anand, K.
    Ganapathy, S.
    Kulothungan, K.
    Yogesh, P.
    Kannan, A.
    INTERNATIONAL CONFERENCE ON MODELLING OPTIMIZATION AND COMPUTING, 2012, 38 : 1658 - 1664
  • [22] An intrusion detection system for wireless sensor networks using deep neural network
    V. Gowdhaman
    R. Dhanapal
    Soft Computing, 2022, 26 : 13059 - 13067
  • [23] Detection of Intruder using KMP Pattern Matching Technique in Wireless Sensor Networks
    Kalnoor, Gauri
    Agarkhed, Jayashree
    6TH INTERNATIONAL CONFERENCE ON SMART COMPUTING AND COMMUNICATIONS, 2018, 125 : 187 - 193
  • [24] A Barrier-Based Machine Learning Approach for Intrusion Detection in Wireless Sensor Networks
    Marhoon, Haydar Abdulameer
    Sagban, Rafid
    Oudah, Atheer Y.
    Ahmed, Saadaldeen Rashid
    CMC-COMPUTERS MATERIALS & CONTINUA, 2025, 82 (03): : 4181 - 4218
  • [25] A Game Theory Based Multi Layered Intrusion Detection Framework for Wireless Sensor Networks
    Subba B.
    Biswas S.
    Karmakar S.
    International Journal of Wireless Information Networks, 2018, 25 (4) : 399 - 421
  • [26] A Method of Choosing Important Features Used to Intrusion Detection System in Wireless Sensor Networks
    Wang Shu
    Sha Jia Xiang
    Yu Gui Xiang
    Yu Sheng Qin
    Yu Sheng Chen
    MATERIALS SCIENCE AND INFORMATION TECHNOLOGY, PTS 1-8, 2012, 433-440 : 6350 - +
  • [27] An accurate and precise malicious node exclusion mechanism for ad hoc networks
    Ferraz, Lyno Henrique G.
    Velloso, Pedro B.
    Duarte, Otto Carlos M. B.
    AD HOC NETWORKS, 2014, 19 : 142 - 155
  • [28] OPTIMIZATION OF WATCHDOG SELECTION IN WIRELESS SENSOR NETWORKS
    Kumar, Praveen
    Joshi, Shashank
    IIOAB JOURNAL, 2018, 9 (02) : 94 - 100
  • [29] An Efficient Hybrid Anomaly Detection Scheme Using K-Means Clustering for Wireless Sensor Networks
    Wazid, Mohammad
    Das, Ashok Kumar
    WIRELESS PERSONAL COMMUNICATIONS, 2016, 90 (04) : 1971 - 2000
  • [30] NL-IDS: Trust Based Intrusion Detection System for Network layer in Wireless Sensor Networks
    Ghugar, Umashankar
    Pradhan, Jayaram
    2018 FIFTH INTERNATIONAL CONFERENCE ON PARALLEL, DISTRIBUTED AND GRID COMPUTING (IEEE PDGC), 2018, : 512 - 516