Abstract
Wireless Sensor Network due to their Adhoc nature have emerged as a popular technology driving the growth of Internet of Things and Cyber Physical Systems. Wireless Sensor Networks due to their self-configuring nature are more vulnerable to attacks at all layers of the OSI model. Malicious attacks include packet drops, change in the data structure and mimicking other devices to destabilize the network. This work proposed an Intelligent Control Mechanism to secure WSN based on the principles of Distributed Automaton. Simulations carried out show the effectiveness of the proposed technique in not only improving the network performance but also reduction in time space complexities. The proposed techniques performs well even in heterogenous network by using the clustered behavior.
Similar content being viewed by others
References
Xie, M., Han, S., Tian, B., Parvin, S.: Anomaly detection in wireless sensor networks: a survey. J. Netw. Comput. Appl. 34(4), 1302–1325 (2011)
Mahmood, M.A., Seah, W.K.G., Welch, I.: Reliability in wireless sensor network: a survey and challenges ahead. Comp Netw. 1–55 (2014)
Newsome, J., Shi, E., Song, D., Perrig, A.: The Sybil attack in sensor networks: analysis & defenses. In: Proceedings of the 3rd International Symposium On Information Processing In Sensor Networks. April 26–27. (2004)
Raymond, D.R., Midkiff, S.F.: Denial of service in wireless sensor network: attacks and defenses. IEEE Pervasive Comput. 7(1), 74–81 (2008)
Yi, P., Dai, Z., Zhong, Y., Zhang, S.: Resisting flooding attacks in adhoc networks. In: Proceeding Int’l Conf. Information Technology: Coding and Computing, vol. 2, pp. 657–662. (2005)
Parno, B., Perrig, A., Gligor, V.: Distributed detection of node replication attacks in sensor networks. In: Proceedings of IEEE Symposium on Security and Privacy, pp.49–63 (2005)
Hu, Y.C., Perrig, A., Johnson, D.B.: Packet leashes: a defense against wormhole attacks in wireless adhoc networks. In: Proceedings of IEEE Infocomm (2003)
Michiardi, P., Molva, R.: Core: a collaborative reputation mechanism to enforce node cooperation in mobile adhoc networks. In: Advanced Communications and Multimedia Security. IFIP, The International Federation for Information Processing, vol. 100. Springer (2002)
Karlof, C., Wagner, D.: Secure routing in wireless sensor networks: attacks and countermeasures. Adhoc Netw. 1, 293–315 (2003)
Alrajeh, N.A., Khan, S., Shams, B.: Intrusion detection systems in wireless sensor networks: a review. Int. J. Distrib. Sens. Netw. 2013, 1–7 (2013)
Vasilomanolakis, E., Fischer, M., Max, M., Ebinger, P., Kikiras, P., Schmerl, S.: Collaborative intrusion detection in smart energy grids. In: Proceedings of the International Symposium for ICS & SCADA Cyber Security, Electronic Workshops in Computing (eWiC). pp. 97–100. (2013)
Lei, Y., Zhang, Y., Zhao, Y.: The research of coverage problems in wireless sensor network. In: Proceedings of International Conference On Wireless Networks And Information Systems, pp. 31–34. (2009)
Yavuz, F., Zhao, J., Yagan, O., Gligor, V.:On secure and reliable communications in wireless sensor networks: towards k-connectivity under a random pairwise key pre distribution scheme. In: IEEE International Symposium On Information Theory. pp. 2371–2375 (2014)
Kaplantzis, S., Shilton, A., Mani, N., Ahmet, Y.:Detecting selective forwarding attacks in wireless sensor networks using support vector machines: In: 3rd International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP) pp. 335–340 (2007)
Roman, R., Zhou, J., Lopez, J.:Applying intrusion detection systems to wireless sensor networks. In: Proceeding of the 3rd IEEE Consumer Communications and Networking Conference (CCNC), vol. 1, pp. 640–644. (2006)
Huang, Y., Fan,W., Lee, W., Yu, P.S. (2003) Cross-feature analysis for detecting adhoc routing anomalies. In: Proceedings of IEEE International Conference on Distributed Computing Systems (ICDCS), pp. 478–487. (2003)
Conti, M., Giordano, S.: Mobile adhoc networking: milestones, challenges, and new research directions. IEEE Commun. Mag. 52(1), 85–96 (2014)
Harrop, P.:Wireless sensor networks and the new Internet of things. Energy Harvest J. http://www.energyharvestingjournal.com (2012)
Rawat, P., Deep, K., Chaouchi, H., Marie, J.: Wireless sensor networks: a survey on recent developments and potential synergies. J Supercomput. 68, 1–48 (2014)
Gungor, V.C., Lu, B., Member, S., Hancke, G.P., Member, S.: Opportunities and challenges of wireless sensor networks in smart grid. IEEE Trans. Ind. Electron. 57(10), 3557–3564 (2010)
Ferdoush, S., Li, X.:Wireless sensor network system design using raspberry pi and arduino for environmental monitoring Applications. In: The 9th International Conference on Future Networks and Communications, Procedia Computer Science, vol. 34, pp. 103–110. (2014)
Gutie, J.A.: On the use of IEEE std. 802. 15. 4 to enable wireless sensor networks in building automation. Int. J. Wirel. Inf. Netw. 14(4), 295–301 (2007)
Abbasi, A.Z., Islam, N., Shaikh, Z.A.: A review of wireless sensors and networks’ applications in agriculture. Comput. Stand. Interfaces 36(2), 263–270 (2014)
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Venkatraman, S., Arun Raj Kumar, P. Improving Adhoc wireless sensor networks security using distributed automaton. Cluster Comput 22 (Suppl 6), 14551–14557 (2019). https://doi.org/10.1007/s10586-018-2352-3
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10586-018-2352-3