Reactive Security Scheme using Behavioral Aspects of Attacks for Wireless Sensor Networks

被引:0
|
作者
Ahmed, Roshan Zameer [1 ]
Anigol, Anusha [1 ]
Biradar, R. C. [1 ]
机构
[1] Reva Inst Technol & Management, Bangalore, Karnataka, India
关键词
Wireless Sensor Network; Security; Sink Node; Reactive Mechanism;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Wireless Sensor Networks(WSN) are vulnerable to many types of hackers who might get into the network with the intent of fetching its significant data and destroying the network. The sink node in WSN that maintains the database of entire network is also prone to security violations and there is no such security mechanism devised for communicating the data to other nodes. Hence, there is a need to design security scheme with the capabilities to protect the network and the sink node on the occurrence of attack. In this paper, we aim to provide security with a reactive security scheme that includes studying the behavioral aspect of attacks and congregating the security demands. This scheme successively conglomerates the security and the network rescue mechanism free from attacks and their impacts on the network. The simulation results such as Packet Delivery Ratio(PDR), Malicious node activity, Delay, Transmission power depict various attack behaviours in WSN along with the Reception power rate observed by the sink node and the Packet loss.
引用
收藏
页码:1023 / 1028
页数:6
相关论文
共 50 条
  • [31] An Authentication Scheme to Healthcare Security under Wireless Sensor Networks
    Hsiao, Tsung-Chih
    Liao, Yu-Ting
    Huang, Jen-Yan
    Chen, Tzer-Shyong
    Horng, Gwo-Boa
    JOURNAL OF MEDICAL SYSTEMS, 2012, 36 (06) : 3649 - 3664
  • [32] An Authentication Scheme to Healthcare Security under Wireless Sensor Networks
    Tsung-Chih Hsiao
    Yu-Ting Liao
    Jen-Yan Huang
    Tzer-Shyong Chen
    Gwo-Boa Horng
    Journal of Medical Systems, 2012, 36 : 3649 - 3664
  • [33] A group-based security scheme for wireless sensor networks
    Md. Abdul Hamid
    A. M. Jehad Sarkar
    annals of telecommunications - annales des télécommunications, 2012, 67 : 455 - 469
  • [34] A Profile Based Scheme for Security in Clustered Wireless Sensor Networks
    Brumancia, E.
    Sylvia, A.
    2015 INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND SIGNAL PROCESSING (ICCSP), 2015, : 823 - 827
  • [35] A group-based security scheme for wireless sensor networks
    Hamid, Md. Abdul
    Sarkar, A. M. Jehad
    ANNALS OF TELECOMMUNICATIONS, 2012, 67 (9-10) : 455 - 469
  • [36] Security enhancement of user authentication scheme for wireless sensor networks
    Lee, Yung-Cheng
    Hsieh, Yi-Chih
    You, Peng-Sheng
    Lee, Pei-Ju
    ICIC Express Letters, Part B: Applications, 2014, 5 (02): : 327 - 332
  • [37] Quarantine region scheme to mitigate spam attacks in wireless sensor networks
    Coskun, Vedat
    Cayirci, Erdal
    Levi, Albert
    Sancak, Serdar
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2006, 5 (08) : 1074 - 1086
  • [38] A Distributed Scheme to Detect Wormhole Attacks in Mobile Wireless Sensor Networks
    Simsek, Oya
    Levi, Albert
    COMPUTER AND INFORMATION SCIENCES II, 2012, : 157 - 163
  • [39] Security monitoring using wireless sensor networks
    Chehri, Abdellah
    Fortier, Paul
    Tardif, Pierre-Martin
    CNSR 2007: PROCEEDINGS OF THE FIFTH ANNUAL CONFERENCE ON COMMUNICATION NETWORKS AND SERVICES RESEARCH, 2007, : 13 - +
  • [40] Security in Wireless Sensor Networks using ECC
    Saqib, Najmus
    Iqbal, Ummer
    2016 IEEE INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTER APPLICATIONS (ICACA), 2016, : 270 - 274