Swarm-based defense technique for tampering and cheating attack in WSN using CPHS

被引:0
|
作者
S. Periyanayagi
V. Sumathy
机构
[1] Ramco Institute of Technology,Department of ECE
[2] Government College of Engineering,Department of ECE
[3] Bodiyanayakkanu,undefined
来源
关键词
Wireless sensor networks; Tampering and cheating attack; Petrinets;
D O I
暂无
中图分类号
学科分类号
摘要
Nowadays, Wireless Sensor Networks (WSN) have been seen as one of the most essential technologies which play a vital role in several important areas, such as healthcare, military, critical infrastructure monitoring, environment monitoring, and manufacturing. The desirable nature of WSN introduces many security challenges which have necessitated the introduction of several classical security methodologies over the last few years for various security attacks. A defense technique using Swarm Based Trusted Node for Tampering and Cheating Attack (SBTN-TC) model has been proposed to identify the physical layer attacks in a WSN. This model, first selects a trusted node (TN) within the network for identifying the tampered or cheating nodes using swarm intelligence. The trusted node monitors and processes the nodes session receipts involved in the transmission session to extract the contextual information such as broken links, frequent packet droppers, and fair and cheating sessions. Based on the session receipts, the trusted node renews the nodes certificate and ignores the tampered node or cheating node. In order to maintain a secure communication of contextual information between node and trusted node, a Cryptographic Puzzle Hiding Scheme (CPHS) is used for submitting the session receipts to trusted node. The effectiveness of the proposed method has been proved from the simulation results based on packet delivery ratio, packet drop, residual energy, and overhead.
引用
收藏
页码:1165 / 1179
页数:14
相关论文
共 50 条
  • [31] An energy-aware clustering method in the IoT using a swarm-based algorithm
    Mahyar Sadrishojaei
    Nima Jafari Navimipour
    Midia Reshadi
    Mehdi Hosseinzadeh
    Mehmet Unal
    Wireless Networks, 2022, 28 : 125 - 136
  • [32] EFFICIENT, SWARM-BASED PATH FINDING IN UNKNOWN GRAPHS USING REINFORCEMENT LEARNING
    Aurangzeb, Muhammad
    Lewis, Frank L.
    Huber, Manfred
    CONTROL AND INTELLIGENT SYSTEMS, 2014, 42 (03) : 238 - 246
  • [33] Learning-Based Security Technique for Selective Forwarding Attack in Clustered WSN
    Singh, Surinder
    Saini, Hardeep Singh
    WIRELESS PERSONAL COMMUNICATIONS, 2021, 118 (01) : 789 - 814
  • [34] A Cluster Based Intrusion Detection and Prevention Technique for Misdirection Attack inside WSN
    Sachan, Roshan Singh
    Wazid, Mohammad
    Katal, Avita
    Singh, D. P.
    Goudar, R. H.
    2013 INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND SIGNAL PROCESSING (ICCSP), 2013, : 795 - 801
  • [35] Simultaneous Clustering and Visualization of Web Usage Data using Swarm-based Intelligence
    Saka, Esin
    Nasraoui, Olfa
    20TH IEEE INTERNATIONAL CONFERENCE ON TOOLS WITH ARTIFICIAL INTELLIGENCE, VOL 1, PROCEEDINGS, 2008, : 539 - 546
  • [36] Learning-Based Security Technique for Selective Forwarding Attack in Clustered WSN
    Surinder Singh
    Hardeep Singh Saini
    Wireless Personal Communications, 2021, 118 : 789 - 814
  • [37] A Multilayered Clustering Framework to build a Service Portfolio using Swarm-based algorithms
    Joe, I. R. Praveen
    Varalakshnni, P.
    AUTOMATIKA, 2019, 60 (03) : 294 - 304
  • [38] Discretized Data Pattern for Mango Ripeness Classification Using Swarm-Based Discretization Algorithm
    Helmee, Nurnisa
    Yacob, Yasmin Mohd
    Husin, Zulkifli
    Mavi, Mohd Farid
    Keong, Tan Wei
    4TH INNOVATION AND ANALYTICS CONFERENCE & EXHIBITION (IACE 2019), 2019, 2138
  • [39] A self-scheduling model for NASA swarm-based exploration missions using ASSL
    Vassev, Emil
    Hinchey, Mike
    Paquet, Joey
    PROCEEDINGS OF THE FIFTH IEEE INTERNATIONAL WORKSHOP ON ENGINEERING OF AUTONOMIC & AUTONOMOUS SYSTEMS (EASE 2008), 2008, : 54 - +
  • [40] A new swarm-based efficient data clustering approach using KHM and fuzzy logic
    Yogesh Gupta
    Ashish Saini
    Soft Computing, 2019, 23 : 145 - 162