Swarm-based defense technique for tampering and cheating attack in WSN using CPHS

被引:0
|
作者
S. Periyanayagi
V. Sumathy
机构
[1] Ramco Institute of Technology,Department of ECE
[2] Government College of Engineering,Department of ECE
[3] Bodiyanayakkanu,undefined
来源
关键词
Wireless sensor networks; Tampering and cheating attack; Petrinets;
D O I
暂无
中图分类号
学科分类号
摘要
Nowadays, Wireless Sensor Networks (WSN) have been seen as one of the most essential technologies which play a vital role in several important areas, such as healthcare, military, critical infrastructure monitoring, environment monitoring, and manufacturing. The desirable nature of WSN introduces many security challenges which have necessitated the introduction of several classical security methodologies over the last few years for various security attacks. A defense technique using Swarm Based Trusted Node for Tampering and Cheating Attack (SBTN-TC) model has been proposed to identify the physical layer attacks in a WSN. This model, first selects a trusted node (TN) within the network for identifying the tampered or cheating nodes using swarm intelligence. The trusted node monitors and processes the nodes session receipts involved in the transmission session to extract the contextual information such as broken links, frequent packet droppers, and fair and cheating sessions. Based on the session receipts, the trusted node renews the nodes certificate and ignores the tampered node or cheating node. In order to maintain a secure communication of contextual information between node and trusted node, a Cryptographic Puzzle Hiding Scheme (CPHS) is used for submitting the session receipts to trusted node. The effectiveness of the proposed method has been proved from the simulation results based on packet delivery ratio, packet drop, residual energy, and overhead.
引用
收藏
页码:1165 / 1179
页数:14
相关论文
共 50 条
  • [1] Swarm-based defense technique for tampering and cheating attack in WSN using CPHS
    Periyanayagi, S.
    Sumathy, V.
    PERSONAL AND UBIQUITOUS COMPUTING, 2018, 22 (5-6) : 1165 - 1179
  • [2] Swarm-based counter UAV defense system
    Brust M.R.
    Danoy G.
    Stolfi D.H.
    Bouvry P.
    Discover Internet of Things, 2021, 1 (01):
  • [3] An Efficient Approach for Tampering Attack Detection in WSN Using Blockchain
    Yasin, Muhammad Rehan
    Syed, Hassan Jamil
    Shuja, Junaid
    20TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE, IWCMC 2024, 2024, : 156 - 161
  • [4] A Novel Image Classification Algorithm Using Swarm-Based Technique for Image Database
    Wahid, Noorhaniza
    UBIQUITOUS COMPUTING AND MULTIMEDIA APPLICATIONS, PT II, 2011, 151 : 460 - 470
  • [5] Feature selection using swarm-based relative reduct technique for fetal heart rate
    Inbarani, H. Hannah
    Banu, P. K. Nizar
    Azar, Ahmad Taher
    NEURAL COMPUTING & APPLICATIONS, 2014, 25 (3-4): : 793 - 806
  • [6] An Efficient Swarm-Based Multicast Routing Technique-Review
    Kumari, Priyanka
    Sahana, Sudip Kumar
    COMPUTATIONAL INTELLIGENCE IN DATA MINING, 2019, 711 : 123 - 134
  • [7] Feature selection using swarm-based relative reduct technique for fetal heart rate
    H. Hannah Inbarani
    P. K. Nizar Banu
    Ahmad Taher Azar
    Neural Computing and Applications, 2014, 25 : 793 - 806
  • [8] Assessing the Performance of a Swarm-based Biclustering Technique for Data Imputation
    Veroneze, Rosana
    de Franca, Fabricio O.
    Von Zuben, Fernando J.
    2011 IEEE CONGRESS ON EVOLUTIONARY COMPUTATION (CEC), 2011, : 386 - 393
  • [9] Clustering Categorical Data Using a Swarm-based Method
    Izakian, Hesam
    Abraham, Ajith
    Snasel, Vaclav
    2009 WORLD CONGRESS ON NATURE & BIOLOGICALLY INSPIRED COMPUTING (NABIC 2009), 2009, : 1719 - +
  • [10] Prediction of Sybil attack on WSN using Bayesian network and swarm intelligence
    Muraleedharan, Rajani
    Ye, Xiang
    Osadciw, Lisa Ann
    WIRELESS SENSING AND PROCESSING III, 2008, 6980