Improving Adhoc wireless sensor networks security using distributed automaton

Article
  • 26 Downloads

Abstract

Wireless Sensor Network due to their Adhoc nature have emerged as a popular technology driving the growth of Internet of Things and Cyber Physical Systems. Wireless Sensor Networks due to their self-configuring nature are more vulnerable to attacks at all layers of the OSI model. Malicious attacks include packet drops, change in the data structure and mimicking other devices to destabilize the network. This work proposed an Intelligent Control Mechanism to secure WSN based on the principles of Distributed Automaton. Simulations carried out show the effectiveness of the proposed technique in not only improving the network performance but also reduction in time space complexities. The proposed techniques performs well even in heterogenous network by using the clustered behavior.

Keywords

Cluster behavior Control mechanism Distributed automaton Malicious behaviour detection State space model 

References

  1. 1.
    Xie, M., Han, S., Tian, B., Parvin, S.: Anomaly detection in wireless sensor networks: a survey. J. Netw. Comput. Appl. 34(4), 1302–1325 (2011)CrossRefGoogle Scholar
  2. 2.
    Mahmood, M.A., Seah, W.K.G., Welch, I.: Reliability in wireless sensor network: a survey and challenges ahead. Comp Netw. 1–55 (2014)Google Scholar
  3. 3.
    Newsome, J., Shi, E., Song, D., Perrig, A.: The Sybil attack in sensor networks: analysis & defenses. In: Proceedings of the 3rd International Symposium On Information Processing In Sensor Networks. April 26–27. (2004)Google Scholar
  4. 4.
    Raymond, D.R., Midkiff, S.F.: Denial of service in wireless sensor network: attacks and defenses. IEEE Pervasive Comput. 7(1), 74–81 (2008)CrossRefGoogle Scholar
  5. 5.
    Yi, P., Dai, Z., Zhong, Y., Zhang, S.: Resisting flooding attacks in adhoc networks. In: Proceeding Int’l Conf. Information Technology: Coding and Computing, vol. 2, pp. 657–662. (2005)Google Scholar
  6. 6.
    Parno, B., Perrig, A., Gligor, V.: Distributed detection of node replication attacks in sensor networks. In: Proceedings of IEEE Symposium on Security and Privacy, pp.49–63 (2005)Google Scholar
  7. 7.
    Hu, Y.C., Perrig, A., Johnson, D.B.: Packet leashes: a defense against wormhole attacks in wireless adhoc networks. In: Proceedings of IEEE Infocomm (2003)Google Scholar
  8. 8.
    Michiardi, P., Molva, R.: Core: a collaborative reputation mechanism to enforce node cooperation in mobile adhoc networks. In: Advanced Communications and Multimedia Security. IFIP, The International Federation for Information Processing, vol. 100. Springer (2002)Google Scholar
  9. 9.
    Karlof, C., Wagner, D.: Secure routing in wireless sensor networks: attacks and countermeasures. Adhoc Netw. 1, 293–315 (2003)Google Scholar
  10. 10.
    Alrajeh, N.A., Khan, S., Shams, B.: Intrusion detection systems in wireless sensor networks: a review. Int. J. Distrib. Sens. Netw. 2013, 1–7 (2013)CrossRefGoogle Scholar
  11. 11.
    Vasilomanolakis, E., Fischer, M., Max, M., Ebinger, P., Kikiras, P., Schmerl, S.: Collaborative intrusion detection in smart energy grids. In: Proceedings of the International Symposium for ICS & SCADA Cyber Security, Electronic Workshops in Computing (eWiC). pp. 97–100. (2013)Google Scholar
  12. 12.
    Lei, Y., Zhang, Y., Zhao, Y.: The research of coverage problems in wireless sensor network. In: Proceedings of International Conference On Wireless Networks And Information Systems, pp. 31–34. (2009)Google Scholar
  13. 13.
    Yavuz, F., Zhao, J., Yagan, O., Gligor, V.:On secure and reliable communications in wireless sensor networks: towards k-connectivity under a random pairwise key pre distribution scheme. In: IEEE International Symposium On Information Theory. pp. 2371–2375 (2014)Google Scholar
  14. 14.
    Kaplantzis, S., Shilton, A., Mani, N., Ahmet, Y.:Detecting selective forwarding attacks in wireless sensor networks using support vector machines: In: 3rd International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP) pp. 335–340 (2007)Google Scholar
  15. 15.
    Roman, R., Zhou, J., Lopez, J.:Applying intrusion detection systems to wireless sensor networks. In: Proceeding of the 3rd IEEE Consumer Communications and Networking Conference (CCNC), vol. 1, pp. 640–644. (2006)Google Scholar
  16. 16.
    Huang, Y., Fan,W., Lee, W., Yu, P.S. (2003) Cross-feature analysis for detecting adhoc routing anomalies. In: Proceedings of IEEE International Conference on Distributed Computing Systems (ICDCS), pp. 478–487. (2003)Google Scholar
  17. 17.
    Conti, M., Giordano, S.: Mobile adhoc networking: milestones, challenges, and new research directions. IEEE Commun. Mag. 52(1), 85–96 (2014)CrossRefGoogle Scholar
  18. 18.
    Harrop, P.:Wireless sensor networks and the new Internet of things. Energy Harvest J. http://www.energyharvestingjournal.com (2012)
  19. 19.
    Rawat, P., Deep, K., Chaouchi, H., Marie, J.: Wireless sensor networks: a survey on recent developments and potential synergies. J Supercomput. 68, 1–48 (2014)CrossRefGoogle Scholar
  20. 20.
    Gungor, V.C., Lu, B., Member, S., Hancke, G.P., Member, S.: Opportunities and challenges of wireless sensor networks in smart grid. IEEE Trans. Ind. Electron. 57(10), 3557–3564 (2010)CrossRefGoogle Scholar
  21. 21.
    Ferdoush, S., Li, X.:Wireless sensor network system design using raspberry pi and arduino for environmental monitoring Applications. In: The 9th International Conference on Future Networks and Communications, Procedia Computer Science, vol. 34, pp. 103–110. (2014)Google Scholar
  22. 22.
    Gutie, J.A.: On the use of IEEE std. 802. 15. 4 to enable wireless sensor networks in building automation. Int. J. Wirel. Inf. Netw. 14(4), 295–301 (2007)CrossRefGoogle Scholar
  23. 23.
    Abbasi, A.Z., Islam, N., Shaikh, Z.A.: A review of wireless sensors and networks’ applications in agriculture. Comput. Stand. Interfaces 36(2), 263–270 (2014)CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2018

Authors and Affiliations

  1. 1.National Institute of Technology PuducherryKaraikalIndia

Personalised recommendations