Abstract
Wireless sensor networks are becoming significantly vital to many applications, and they were initially used by the military for surveillance purposes. One of the biggest concerns of WSNs is that they are defenseless to security threats. Due to the fact that these networks are susceptible to hackers; it is possible for one to enter and render a network. However, WSN presents many challenges. These networks are prone to malicious users attack, because any device within the frequency range can get access to the WSN. There is a need for security mechanisms aware of the sensor challenges (low energy, computational resources, memory, etc.). Thus, this work aims to simulate a secure routing protocol for WSN by using trusted frame works called SAODV. The Trust Scheme evaluates the behavior of all nodes by establishing a trust value for each node in the network that represents the trustworthiness of each one thereby identifies and eliminates the malicious nodes. It also observes node’s mobility, number of neighbors each node has, number of packets generated and forwarded by the neighboring nodes, and the past activity of the node.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Ibrihich, Ouafaa, Krit, Salah-ddine, Laassiri, Jalal, Hajji, Said El: In: Comparative Analysis of secure routing in WSN, Proceedings of the World Congress on Engineering 2014, vol. I, WCE 2014, pp. 734–738. London 2–4 July 2014
Ilyas, M.: The Handbook of Ad-Hoc Wireless Networks. CRC Press, Florida (2008)
Huda Bader Hubboub.: Denial of Service Attack in Wireless Sensors Networks (2010)
Boyle, D. Newe. T.: Securing Wireless Sensor Networks: Security Architectures, vol. 3, no. 1, January 2008
Jain, S., Dr. Jain, S.: Detection and prevention of wormhole attack in mobile Ad hoc networks. Int. J. Comput. Theory Eng. 2(1), 78–86 (2010). February
Kessler, G.C.: Defences Against Distributed Denial of Service Attacks. November 2000. http://www.garykessler.net/library/ddos.html. Retrieved 30 Oct 2008
Wood, A.D., Stankovic, J.A.: Denial of service in sensor networks. Computer 35(10), 54–62 (2002)
Blackert, W.J., Gregg, D.M., Castner, A.K., Kyle, E.M., Hom, R.L., Jokerst, R.M.: Analyzing interaction between distributed denial of service attacks and mitigation technologies. In: Proceedings of DARPA Information Survivability Conference and Exposition, vol. 1, pp. 26–36. April 2003
Halim, T., Islam, Md. R.: A study on the security issues in WSN. Int. J. Comput. Appl. (0975–8887). 53(1), (2012). Available: http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.258.5658&rep=rep1&type=pdf
Fall, K., Varadhan, K.: Editors ns notes and documentation. The VINT Project, UC Berkeley, LBL, USC/ISI, and Xerox PARC, 4 Nov 2011. Available: http://www.isi.edu/nsnam/ns/doc/ns_doc.pdf
Panc Pancardo, P., Dueñas, J.C.: A proposal for System Architecture to Integrate Scarce resources Wireless Sensors Networks into Ubiquitous Environments [Online]. Available http://ftp.informatik.rwth-aachen.de/Publications/CEUR-WS/Vol-208/paper23.pdf
Mistry, M., Jinwala, D.C.: Improving AODV protocol against black hole attacks. In: Proceedings of the International Multi Conference of Engineers and Computer Scientists, vol. II (2010)
Sreedhar Dr, C., Madhusudhana Verma, S., Kasiviswanath Dr, N.: Potential security attacks on wireless networks and their countermeasure. Int. J. Comput. Sci. Inf. Technol. 2(5), 76–89 (2010)
Vigneswari, P., Jayashree, R.: Comparative analysis of AODV and trusted AODV (TAODV) in MANET. Int. J. Adv. Inf. Sci. Technol. 10(10), 49–56 (2013)
Huang, J., Shahnasser, H.: A preprocessor Tcl script generator for NS-2 communication network simulation. International Conference on Communications and Information Technology (ICCIT 2011), San Francisco State University, San Francisco, pp. 184–187, 2011
Haboub, R., Ouzzif, M.: Secure routing in WSN. Int. J. Distrib. Parallel Syst. 2(6), (2011)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer Science+Business Media Dordrecht
About this paper
Cite this paper
Ibrihich, O., Krit, Sd., Laassiri, J., El Hajji, S. (2015). Study and Simulation of Protocols of WSN Using NS2. In: Yang, GC., Ao, SI., Gelman, L. (eds) Transactions on Engineering Technologies. Springer, Dordrecht. https://doi.org/10.1007/978-94-017-9804-4_32
Download citation
DOI: https://doi.org/10.1007/978-94-017-9804-4_32
Publisher Name: Springer, Dordrecht
Print ISBN: 978-94-017-9803-7
Online ISBN: 978-94-017-9804-4
eBook Packages: EngineeringEngineering (R0)