Skip to main content
Log in

Improving Adhoc wireless sensor networks security using distributed automaton

  • Published:
Cluster Computing Aims and scope Submit manuscript

Abstract

Wireless Sensor Network due to their Adhoc nature have emerged as a popular technology driving the growth of Internet of Things and Cyber Physical Systems. Wireless Sensor Networks due to their self-configuring nature are more vulnerable to attacks at all layers of the OSI model. Malicious attacks include packet drops, change in the data structure and mimicking other devices to destabilize the network. This work proposed an Intelligent Control Mechanism to secure WSN based on the principles of Distributed Automaton. Simulations carried out show the effectiveness of the proposed technique in not only improving the network performance but also reduction in time space complexities. The proposed techniques performs well even in heterogenous network by using the clustered behavior.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3

Similar content being viewed by others

References

  1. Xie, M., Han, S., Tian, B., Parvin, S.: Anomaly detection in wireless sensor networks: a survey. J. Netw. Comput. Appl. 34(4), 1302–1325 (2011)

    Article  Google Scholar 

  2. Mahmood, M.A., Seah, W.K.G., Welch, I.: Reliability in wireless sensor network: a survey and challenges ahead. Comp Netw. 1–55 (2014)

  3. Newsome, J., Shi, E., Song, D., Perrig, A.: The Sybil attack in sensor networks: analysis & defenses. In: Proceedings of the 3rd International Symposium On Information Processing In Sensor Networks. April 26–27. (2004)

  4. Raymond, D.R., Midkiff, S.F.: Denial of service in wireless sensor network: attacks and defenses. IEEE Pervasive Comput. 7(1), 74–81 (2008)

    Article  Google Scholar 

  5. Yi, P., Dai, Z., Zhong, Y., Zhang, S.: Resisting flooding attacks in adhoc networks. In: Proceeding Int’l Conf. Information Technology: Coding and Computing, vol. 2, pp. 657–662. (2005)

  6. Parno, B., Perrig, A., Gligor, V.: Distributed detection of node replication attacks in sensor networks. In: Proceedings of IEEE Symposium on Security and Privacy, pp.49–63 (2005)

  7. Hu, Y.C., Perrig, A., Johnson, D.B.: Packet leashes: a defense against wormhole attacks in wireless adhoc networks. In: Proceedings of IEEE Infocomm (2003)

  8. Michiardi, P., Molva, R.: Core: a collaborative reputation mechanism to enforce node cooperation in mobile adhoc networks. In: Advanced Communications and Multimedia Security. IFIP, The International Federation for Information Processing, vol. 100. Springer (2002)

  9. Karlof, C., Wagner, D.: Secure routing in wireless sensor networks: attacks and countermeasures. Adhoc Netw. 1, 293–315 (2003)

    Google Scholar 

  10. Alrajeh, N.A., Khan, S., Shams, B.: Intrusion detection systems in wireless sensor networks: a review. Int. J. Distrib. Sens. Netw. 2013, 1–7 (2013)

    Article  Google Scholar 

  11. Vasilomanolakis, E., Fischer, M., Max, M., Ebinger, P., Kikiras, P., Schmerl, S.: Collaborative intrusion detection in smart energy grids. In: Proceedings of the International Symposium for ICS & SCADA Cyber Security, Electronic Workshops in Computing (eWiC). pp. 97–100. (2013)

  12. Lei, Y., Zhang, Y., Zhao, Y.: The research of coverage problems in wireless sensor network. In: Proceedings of International Conference On Wireless Networks And Information Systems, pp. 31–34. (2009)

  13. Yavuz, F., Zhao, J., Yagan, O., Gligor, V.:On secure and reliable communications in wireless sensor networks: towards k-connectivity under a random pairwise key pre distribution scheme. In: IEEE International Symposium On Information Theory. pp. 2371–2375 (2014)

  14. Kaplantzis, S., Shilton, A., Mani, N., Ahmet, Y.:Detecting selective forwarding attacks in wireless sensor networks using support vector machines: In: 3rd International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP) pp. 335–340 (2007)

  15. Roman, R., Zhou, J., Lopez, J.:Applying intrusion detection systems to wireless sensor networks. In: Proceeding of the 3rd IEEE Consumer Communications and Networking Conference (CCNC), vol. 1, pp. 640–644. (2006)

  16. Huang, Y., Fan,W., Lee, W., Yu, P.S. (2003) Cross-feature analysis for detecting adhoc routing anomalies. In: Proceedings of IEEE International Conference on Distributed Computing Systems (ICDCS), pp. 478–487. (2003)

  17. Conti, M., Giordano, S.: Mobile adhoc networking: milestones, challenges, and new research directions. IEEE Commun. Mag. 52(1), 85–96 (2014)

    Article  Google Scholar 

  18. Harrop, P.:Wireless sensor networks and the new Internet of things. Energy Harvest J. http://www.energyharvestingjournal.com (2012)

  19. Rawat, P., Deep, K., Chaouchi, H., Marie, J.: Wireless sensor networks: a survey on recent developments and potential synergies. J Supercomput. 68, 1–48 (2014)

    Article  Google Scholar 

  20. Gungor, V.C., Lu, B., Member, S., Hancke, G.P., Member, S.: Opportunities and challenges of wireless sensor networks in smart grid. IEEE Trans. Ind. Electron. 57(10), 3557–3564 (2010)

    Article  Google Scholar 

  21. Ferdoush, S., Li, X.:Wireless sensor network system design using raspberry pi and arduino for environmental monitoring Applications. In: The 9th International Conference on Future Networks and Communications, Procedia Computer Science, vol. 34, pp. 103–110. (2014)

    Article  Google Scholar 

  22. Gutie, J.A.: On the use of IEEE std. 802. 15. 4 to enable wireless sensor networks in building automation. Int. J. Wirel. Inf. Netw. 14(4), 295–301 (2007)

    Article  Google Scholar 

  23. Abbasi, A.Z., Islam, N., Shaikh, Z.A.: A review of wireless sensors and networks’ applications in agriculture. Comput. Stand. Interfaces 36(2), 263–270 (2014)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to S. Venkatraman.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Venkatraman, S., Arun Raj Kumar, P. Improving Adhoc wireless sensor networks security using distributed automaton. Cluster Comput 22 (Suppl 6), 14551–14557 (2019). https://doi.org/10.1007/s10586-018-2352-3

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10586-018-2352-3

Keywords

Navigation