A secure routing scheme to mitigate attack in wireless adhoc sensor network

被引:11
|
作者
Sajan, Isaac R. [1 ]
Jasper, J. [2 ]
机构
[1] Ponjesly Coll Engn, Dept Comp Sci & Engn, Nagercoil 629003, Tamil Nadu, India
[2] Ponjesly Coll Engn, Dept Elect & Elect Engn, Nagercoil 629003, Tamil Nadu, India
关键词
False data injection; Carousal attack; Stretch attack; Malicious nodes; Trust mechanism; Secure route;
D O I
10.1016/j.cose.2021.102197
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Due to the unattended nature and deployment of wireless sensors in the hostile environment, the networks are vulnerable to carousal and stretch attack that causes Denial of Service (DoS). In addition to that, the adversary may also inject bogus data into the network through compromised nodes. This cause the Base Station (BS) to take erroneous decisions and also affects the network's lifetime. To address these issues, the Base Station Controlled Secure Routing Protocol (BSCSRP) is introduced. The proposed work aims to detect the anti nodes from safe nodes by a trust-based mechanism that secures the network from false data injection as well as provides an efficient route that is free from carousal and stretch attack. The effectiveness of BSCSRP is evaluated by comparing its performance with the existing AF-TNS, BTEM, RSA, and ERF methods. (c) 2021 Elsevier Ltd. All rights reserved.
引用
收藏
页数:14
相关论文
共 50 条
  • [1] Secure Routing Against DDoS Attack in Wireless Sensor Network
    Nagar, Surendra
    Rajput, Shyam Singh
    Gupta, Avadesh Kumar
    Trivedi, Munesh Chandra
    [J]. 2017 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE & COMMUNICATION TECHNOLOGY (CICT), 2017,
  • [2] Trust Based Cluster and Secure Routing Scheme for Wireless Sensor Network
    Thenmozhi, E.
    Audithan, S.
    [J]. SECOND INTERNATIONAL CONFERENCE ON CURRENT TRENDS IN ENGINEERING AND TECHNOLOGY (ICCTET 2014), 2014, : 489 - 494
  • [3] Enhanced Secure Multipath Routing Scheme in Mobile Adhoc and Sensor Networks
    Vijendran, AnnaSaro
    Gripsy, J. Viji
    [J]. SECOND INTERNATIONAL CONFERENCE ON CURRENT TRENDS IN ENGINEERING AND TECHNOLOGY (ICCTET 2014), 2014, : 210 - 215
  • [4] Secure Intruder Information Sharing in Wireless Sensor Network for Attack Resilient Routing
    Rao, Venkateswara M.
    Malladi, Srinivas
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2021, 12 (02) : 504 - 510
  • [5] An effective secure routing for false data injection attack in wireless sensor network
    Zhu, Zhengjian
    Tan, Qingping
    Zhu, Peidong
    [J]. MANAGING NEXT GENERATION NETWORKS AND SERVICES, PROCEEDINGS, 2007, 4773 : 457 - +
  • [6] A Secure Routing Scheme for Static Wireless Sensor Networks
    Yao, Xuanxia
    Zheng, XueFeng
    [J]. PACIIA: 2008 PACIFIC-ASIA WORKSHOP ON COMPUTATIONAL INTELLIGENCE AND INDUSTRIAL APPLICATION, VOLS 1-3, PROCEEDINGS, 2008, : 1732 - 1736
  • [7] A secure routing scheme for mobile wireless sensor networks
    Watanabe, Yuji
    Linh, Tong
    [J]. ARTIFICIAL LIFE AND ROBOTICS, 2010, 15 (03) : 302 - 305
  • [8] Robust and secure routing scheme for wireless multihop network
    Binod Vaidya
    Sang-Soo Yeo
    Dong-You Choi
    SeungJo Han
    [J]. Personal and Ubiquitous Computing, 2009, 13 : 457 - 469
  • [9] Robust and secure routing scheme for wireless multihop network
    Vaidya, Binod
    Yeo, Sang-Soo
    Choi, Dong-You
    Han, SeungJo
    [J]. PERSONAL AND UBIQUITOUS COMPUTING, 2009, 13 (07) : 457 - 469
  • [10] Secure Energy Efficient Attack Resilient Routing Technique for Zone based Wireless Sensor Network
    Rao, Venkateswara M.
    Malladi, Srinivas
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2020, 11 (12) : 570 - 578