Secure Intruder Information Sharing in Wireless Sensor Network for Attack Resilient Routing

被引:0
|
作者
Rao, Venkateswara M. [1 ]
Malladi, Srinivas [1 ]
机构
[1] Koneru Lakshmaiah Educ Fdn, Dept Comp Sci & Engn, Vaddeswaram, Andhra Pradesh, India
关键词
Flooding; malicious zone; network overhead; overhearing rate; packet delivery ratio;
D O I
10.14569/IJACSA.2021.0120263
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Securing the routing process against attacks in wireless sensor network (WSN) is a vital factor to ensure the reliability of the network. In the existing system, a secure attack resilient routing for WSN using zone-based topology is proposed against message drops, message tampering and flooding attacks. The secure attack resilient routing provides a protection against attacks by skipping the routing towards less secure zones. However, the existing work did not consider the detection and isolation of the malicious nodes in the zone based wireless sensor network. To solve this issue, we proposed enhanced attack resilient routing by detecting malicious zones and isolating the malicious nodes. We proposed a three-tire framework by adopting sequential probability test to detect and isolate malicious nodes. Attacker information is shared in a secure manner in the network, so that routing selection decision can be made locally in addition to attack resiliency route selection provided at the sink. Overhearing rate is calculated for all nodes in each zone to detect blackhole attackers. Simulation results shows that the proposed Three Tier Frame work provides more security, reduced network overhead and improved Packet delivery ratio in WSNs by comparing with the existing works.
引用
收藏
页码:504 / 510
页数:7
相关论文
共 50 条
  • [1] Secure Energy Efficient Attack Resilient Routing Technique for Zone based Wireless Sensor Network
    Rao, Venkateswara M.
    Malladi, Srinivas
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2020, 11 (12) : 570 - 578
  • [2] Secure Routing Against DDoS Attack in Wireless Sensor Network
    Nagar, Surendra
    Rajput, Shyam Singh
    Gupta, Avadesh Kumar
    Trivedi, Munesh Chandra
    [J]. 2017 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE & COMMUNICATION TECHNOLOGY (CICT), 2017,
  • [3] A secure routing scheme to mitigate attack in wireless adhoc sensor network
    Sajan, Isaac R.
    Jasper, J.
    [J]. COMPUTERS & SECURITY, 2021, 103
  • [4] An effective secure routing for false data injection attack in wireless sensor network
    Zhu, Zhengjian
    Tan, Qingping
    Zhu, Peidong
    [J]. MANAGING NEXT GENERATION NETWORKS AND SERVICES, PROCEEDINGS, 2007, 4773 : 457 - +
  • [5] Secure Routing Protocol for Mobile Wireless Sensor Network
    Sarma, A. Hiren Kumar Deva
    Kar, B. Avijit
    Mall, C. Rajib
    [J]. 2011 IEEE SENSORS APPLICATIONS SYMPOSIUM (SAS), 2011, : 93 - 99
  • [6] RESEARCH ON SECURE ROUTING ALGORITHM IN WIRELESS SENSOR NETWORK
    Ma, Ke
    Song, Changxin
    [J]. PROCEEDINGS OF THE 2011 3RD INTERNATIONAL CONFERENCE ON FUTURE COMPUTER AND COMMUNICATION (ICFCC 2011), 2011, : 251 - +
  • [7] Research on Secure Routing Algorithm in Wireless Sensor Network
    Zhangbo
    [J]. INTERNATIONAL CONFERENCE ON GRAPHIC AND IMAGE PROCESSING (ICGIP 2012), 2013, 8768
  • [8] Resilient System for Secure Sharing Of Information against False Data Injection Attack
    Sulochana, S.
    Manjula, V.
    [J]. 2016 INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND EMBEDDED SYSTEMS (ICICES), 2016,
  • [9] Trust-based secure routing and the prevention of vampire attack in wireless ad hoc sensor network
    Sajan, R. Isaac
    Jasper, J.
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2020, 33 (08)
  • [10] An Enhanced Multi Attribute Based Trusted Attack Resistance (EMBTR) for the Secure Routing of Sensor Nodes in Wireless Sensor Network
    Khan, A. B. Feroz
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2024, 137 (04) : 2397 - 2407