Skip to main content

Study and Simulation of Protocols of WSN Using NS2

  • Conference paper
Transactions on Engineering Technologies

Abstract

Wireless sensor networks are becoming significantly vital to many applications, and they were initially used by the military for surveillance purposes. One of the biggest concerns of WSNs is that they are defenseless to security threats. Due to the fact that these networks are susceptible to hackers; it is possible for one to enter and render a network. However, WSN presents many challenges. These networks are prone to malicious users attack, because any device within the frequency range can get access to the WSN. There is a need for security mechanisms aware of the sensor challenges (low energy, computational resources, memory, etc.). Thus, this work aims to simulate a secure routing protocol for WSN by using trusted frame works called SAODV. The Trust Scheme evaluates the behavior of all nodes by establishing a trust value for each node in the network that represents the trustworthiness of each one thereby identifies and eliminates the malicious nodes. It also observes node’s mobility, number of neighbors each node has, number of packets generated and forwarded by the neighboring nodes, and the past activity of the node.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Ibrihich, Ouafaa, Krit, Salah-ddine, Laassiri, Jalal, Hajji, Said El: In: Comparative Analysis of secure routing in WSN, Proceedings of the World Congress on Engineering 2014, vol. I, WCE 2014, pp. 734–738. London 2–4 July 2014

    Google Scholar 

  2. Ilyas, M.: The Handbook of Ad-Hoc Wireless Networks. CRC Press, Florida (2008)

    Google Scholar 

  3. Huda Bader Hubboub.: Denial of Service Attack in Wireless Sensors Networks (2010)

    Google Scholar 

  4. Boyle, D. Newe. T.: Securing Wireless Sensor Networks: Security Architectures, vol. 3, no. 1, January 2008

    Google Scholar 

  5. Jain, S., Dr. Jain, S.: Detection and prevention of wormhole attack in mobile Ad hoc networks. Int. J. Comput. Theory Eng. 2(1), 78–86 (2010). February

    Google Scholar 

  6. Kessler, G.C.: Defences Against Distributed Denial of Service Attacks. November 2000. http://www.garykessler.net/library/ddos.html. Retrieved 30 Oct 2008

  7. Wood, A.D., Stankovic, J.A.: Denial of service in sensor networks. Computer 35(10), 54–62 (2002)

    Article  Google Scholar 

  8. Blackert, W.J., Gregg, D.M., Castner, A.K., Kyle, E.M., Hom, R.L., Jokerst, R.M.: Analyzing interaction between distributed denial of service attacks and mitigation technologies. In: Proceedings of DARPA Information Survivability Conference and Exposition, vol. 1, pp. 26–36. April 2003

    Google Scholar 

  9. Halim, T., Islam, Md. R.: A study on the security issues in WSN. Int. J. Comput. Appl. (0975–8887). 53(1), (2012). Available: http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.258.5658&rep=rep1&type=pdf

  10. Fall, K., Varadhan, K.: Editors ns notes and documentation. The VINT Project, UC Berkeley, LBL, USC/ISI, and Xerox PARC, 4 Nov 2011. Available: http://www.isi.edu/nsnam/ns/doc/ns_doc.pdf

  11. Panc Pancardo, P., Dueñas, J.C.: A proposal for System Architecture to Integrate Scarce resources Wireless Sensors Networks into Ubiquitous Environments [Online]. Available http://ftp.informatik.rwth-aachen.de/Publications/CEUR-WS/Vol-208/paper23.pdf

  12. Mistry, M., Jinwala, D.C.: Improving AODV protocol against black hole attacks. In: Proceedings of the International Multi Conference of Engineers and Computer Scientists, vol. II (2010)

    Google Scholar 

  13. Sreedhar Dr, C., Madhusudhana Verma, S., Kasiviswanath Dr, N.: Potential security attacks on wireless networks and their countermeasure. Int. J. Comput. Sci. Inf. Technol. 2(5), 76–89 (2010)

    Google Scholar 

  14. Vigneswari, P., Jayashree, R.: Comparative analysis of AODV and trusted AODV (TAODV) in MANET. Int. J. Adv. Inf. Sci. Technol. 10(10), 49–56 (2013)

    Google Scholar 

  15. Huang, J., Shahnasser, H.: A preprocessor Tcl script generator for NS-2 communication network simulation. International Conference on Communications and Information Technology (ICCIT 2011), San Francisco State University, San Francisco, pp. 184–187, 2011

    Google Scholar 

  16. Haboub, R., Ouzzif, M.: Secure routing in WSN. Int. J. Distrib. Parallel Syst. 2(6), (2011)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ouafaa Ibrihich .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer Science+Business Media Dordrecht

About this paper

Cite this paper

Ibrihich, O., Krit, Sd., Laassiri, J., El Hajji, S. (2015). Study and Simulation of Protocols of WSN Using NS2. In: Yang, GC., Ao, SI., Gelman, L. (eds) Transactions on Engineering Technologies. Springer, Dordrecht. https://doi.org/10.1007/978-94-017-9804-4_32

Download citation

  • DOI: https://doi.org/10.1007/978-94-017-9804-4_32

  • Publisher Name: Springer, Dordrecht

  • Print ISBN: 978-94-017-9803-7

  • Online ISBN: 978-94-017-9804-4

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics