Secure Intruder Information Sharing in Wireless Sensor Network for Attack Resilient Routing

被引:0
|
作者
Rao, Venkateswara M. [1 ]
Malladi, Srinivas [1 ]
机构
[1] Koneru Lakshmaiah Educ Fdn, Dept Comp Sci & Engn, Vaddeswaram, Andhra Pradesh, India
关键词
Flooding; malicious zone; network overhead; overhearing rate; packet delivery ratio;
D O I
10.14569/IJACSA.2021.0120263
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Securing the routing process against attacks in wireless sensor network (WSN) is a vital factor to ensure the reliability of the network. In the existing system, a secure attack resilient routing for WSN using zone-based topology is proposed against message drops, message tampering and flooding attacks. The secure attack resilient routing provides a protection against attacks by skipping the routing towards less secure zones. However, the existing work did not consider the detection and isolation of the malicious nodes in the zone based wireless sensor network. To solve this issue, we proposed enhanced attack resilient routing by detecting malicious zones and isolating the malicious nodes. We proposed a three-tire framework by adopting sequential probability test to detect and isolate malicious nodes. Attacker information is shared in a secure manner in the network, so that routing selection decision can be made locally in addition to attack resiliency route selection provided at the sink. Overhearing rate is calculated for all nodes in each zone to detect blackhole attackers. Simulation results shows that the proposed Three Tier Frame work provides more security, reduced network overhead and improved Packet delivery ratio in WSNs by comparing with the existing works.
引用
收藏
页码:504 / 510
页数:7
相关论文
共 50 条
  • [21] Secure Management of Trust Information in Wireless Sensor Network
    Zhou, Yongkai
    Zhao, Yimeng
    Zhi, Xue
    Li, Jianhua
    [J]. INTERNATIONAL CONFERENCE ON COMPUTATIONAL AND INFORMATION SCIENCES (ICCIS 2014), 2014, : 326 - 333
  • [22] Combating against Wormhole Attack in Trust and Energy Aware Secure Routing Protocol (TESRP) in Wireless Sensor Network
    Shukla, Ranu
    Jain, Rekha
    Vyavahare, P. D.
    [J]. 2017 INTERNATIONAL CONFERENCE ON RECENT INNOVATIONS IN SIGNAL PROCESSING AND EMBEDDED SYSTEMS (RISE), 2017, : 555 - 561
  • [23] SPAMR: a Secure Routing Protocol of Wireless Mesh Network to Prevent Wormhole Attack
    Liao Junguo
    Lian Xiaoxu
    [J]. 2011 INTERNATIONAL CONFERENCE ON COMPUTER, ELECTRICAL, AND SYSTEMS SCIENCES, AND ENGINEERING (CESSE 2011), 2011, : 226 - 232
  • [24] Detection of Wormhole Attack and Secure Path Selection in Wireless Sensor Network
    N. Tamilarasi
    S. G. Santhi
    [J]. Wireless Personal Communications, 2020, 114 : 329 - 345
  • [25] Detection of Wormhole Attack and Secure Path Selection in Wireless Sensor Network
    Tamilarasi, N.
    Santhi, S. G.
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2020, 114 (01) : 329 - 345
  • [26] Secure Routing in Wireless Sensor Networks
    Sahoo, Soumyashree
    Mishra, Pradipta Kumar
    Satpathy, Rabi Narayan
    [J]. International Journal of Computer Science Issues, 2012, 9 (1 1-2): : 187 - 191
  • [27] A Secure Routing Protocol with Trust and Energy Awareness for Wireless Sensor Network
    Ahmed, Adnan
    Abu Bakar, Kamalrulnizam
    Channa, Muhammad Ibrahim
    Khan, Abdul Waheed
    [J]. MOBILE NETWORKS & APPLICATIONS, 2016, 21 (02): : 272 - 285
  • [28] A Secure Routing Protocol with Trust and Energy Awareness for Wireless Sensor Network
    Adnan Ahmed
    Kamalrulnizam Abu Bakar
    Muhammad Ibrahim Channa
    Abdul Waheed Khan
    [J]. Mobile Networks and Applications, 2016, 21 : 272 - 285
  • [29] Secure Ant-Based Routing Protocol for Wireless Sensor Network
    Alrajeh, Nabil Ali
    Alabed, Mohamad Souheil
    Elwahiby, Andmohamed Shaaban
    [J]. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2013,
  • [30] Trust Based Cluster and Secure Routing Scheme for Wireless Sensor Network
    Thenmozhi, E.
    Audithan, S.
    [J]. SECOND INTERNATIONAL CONFERENCE ON CURRENT TRENDS IN ENGINEERING AND TECHNOLOGY (ICCTET 2014), 2014, : 489 - 494