Swarm-based defense technique for tampering and cheating attack in WSN using CPHS

被引:0
|
作者
S. Periyanayagi
V. Sumathy
机构
[1] Ramco Institute of Technology,Department of ECE
[2] Government College of Engineering,Department of ECE
[3] Bodiyanayakkanu,undefined
来源
关键词
Wireless sensor networks; Tampering and cheating attack; Petrinets;
D O I
暂无
中图分类号
学科分类号
摘要
Nowadays, Wireless Sensor Networks (WSN) have been seen as one of the most essential technologies which play a vital role in several important areas, such as healthcare, military, critical infrastructure monitoring, environment monitoring, and manufacturing. The desirable nature of WSN introduces many security challenges which have necessitated the introduction of several classical security methodologies over the last few years for various security attacks. A defense technique using Swarm Based Trusted Node for Tampering and Cheating Attack (SBTN-TC) model has been proposed to identify the physical layer attacks in a WSN. This model, first selects a trusted node (TN) within the network for identifying the tampered or cheating nodes using swarm intelligence. The trusted node monitors and processes the nodes session receipts involved in the transmission session to extract the contextual information such as broken links, frequent packet droppers, and fair and cheating sessions. Based on the session receipts, the trusted node renews the nodes certificate and ignores the tampered node or cheating node. In order to maintain a secure communication of contextual information between node and trusted node, a Cryptographic Puzzle Hiding Scheme (CPHS) is used for submitting the session receipts to trusted node. The effectiveness of the proposed method has been proved from the simulation results based on packet delivery ratio, packet drop, residual energy, and overhead.
引用
收藏
页码:1165 / 1179
页数:14
相关论文
共 50 条
  • [21] Maximal Component Detection in Graphs Using Swarm-Based and Genetic Algorithms
    Gonzalez-Pardo, Antonio
    Camacho, David
    INTELLIGENT DISTRIBUTED COMPUTING VI, 2013, 446 : 247 - 252
  • [22] Synthesis of hexagonal planar array using swarm-based optimization algorithms
    Chatterjee, Anirban
    Mandal, Debasis
    INTERNATIONAL JOURNAL OF MICROWAVE AND WIRELESS TECHNOLOGIES, 2015, 7 (02) : 151 - 160
  • [23] Robust medical data mining using a clustering and swarm-based framework
    Shanghooshabad, Ali Mohammadi
    Abadeh, Mohammad Saniee
    INTERNATIONAL JOURNAL OF DATA MINING AND BIOINFORMATICS, 2016, 14 (01) : 22 - 39
  • [24] Detecting compact galactic binaries using a hybrid swarm-based algorithm
    Bouffanais, Yann
    Porter, Edward K.
    PHYSICAL REVIEW D, 2016, 93 (06):
  • [25] Efficient Tuning of PID Controllers using Swarm-based Optimization Algorithms
    Xu, Jiacong
    Bhattacharyya, Shankar P.
    2021 9TH INTERNATIONAL CONFERENCE ON SYSTEMS AND CONTROL (ICSC'21), 2021, : 572 - 579
  • [26] Arabic Feature-Based Text Watermarking Technique for Sensitive Detecting Tampering Attack
    Al-Wesabi, Fahd N.
    Iskandar, Huda G.
    Alzahrani, Saleh
    Abdelmaboud, Abdelzahir
    Abdul, Mohammed
    Nemri, Nadhem
    Medani, Mohammad
    Alghamdi, Mohammed Y.
    CMC-COMPUTERS MATERIALS & CONTINUA, 2021, 68 (03): : 3789 - 3806
  • [27] Attack–defense strategy of UAV swarm based on DEP-SIQ in the active target defense scenario
    Xiaowei Fu
    Zhe Qiao
    Zhe Xu
    Soft Computing, 2024, 28 (17-18) : 10463 - 10473
  • [28] A Persian writer identification method using swarm-based feature selection approach
    Ram, Soheila Sadeghi
    Moghaddam, Mohsen Ebrahimi
    INTERNATIONAL JOURNAL OF BIOMETRICS, 2014, 6 (01) : 53 - 74
  • [29] An energy-aware clustering method in the IoT using a swarm-based algorithm
    Sadrishojaei, Mahyar
    Navimipour, Nima Jafari
    Reshadi, Midia
    Hosseinzadeh, Mehdi
    Unal, Mehmet
    WIRELESS NETWORKS, 2022, 28 (01) : 125 - 136
  • [30] Efficient, Swarm-Based Path Finding in Unknown Graphs Using Reinforcement Learning
    Aurangzeb, M.
    Lewis, F. L.
    Huber, M.
    2013 10TH IEEE INTERNATIONAL CONFERENCE ON CONTROL AND AUTOMATION (ICCA), 2013, : 870 - 877