Skip to main content
Log in

Signature Based Vulnerability Detection Over Wireless Sensor Network for Reliable Data Transmission

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Due to the significant improvement in wireless communication technology, the need of Wireless Sensor Networks (WSN) have a vital role in the areas such as military applications, environmental monitoring, health care, home or industrial automation etc. However such type of network always been vulnerable to security threats, because the WSN has the resource constraints such as low battery life, low processing power, small memory, deployment in hostile environment and the radio links for communication are insecure. Thus, it is necessary to use effective detection mechanism to prevent WSN from routing attacks for reliable data transmission. In this paper, a signature based detection approach is proposed for detecting the routing attacks. For every known attack it has certain signature, based on this the rules are designed with the rule base which are applied for detecting various routing attacks such as wormhole, black hole and sybil attack. The simulated results show that the proposed signature based approach improves the reliability of data by measuring the parameters such as throughput and packet delivery ratio while detecting the routing attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

References

  1. Akyildiz, I. F., Su, W., Sankarasubramaniam, Y., & Cayirci, E. (2002). Wireless sensor networks: a survey. Computer Networks, 38, 393–422.

    Article  Google Scholar 

  2. Mohanty, P., Panigrahi, S., Sarma, N., & Sankar Satapathy, S. (2010). Security issues in wireless sensor network data gathering protocols: A survey. Journal of Theoretical and Applied Information Technology, 13(1), 14.

    Google Scholar 

  3. Rassam, M. A., Maarof, M. A., & Zainal, A. (2012). A survey of intrusion detection schemes in wireless sensor networks. American Journal of Applied Sciences, 9(10), 1636–1652.

    Article  Google Scholar 

  4. Padmavathi, G., & Shanmugapriya, D. (2009). A survey of attacks, security mechanisms and challenges in wireless sensor networks. International Journal of Computer Science and Information Security, 4(1–2), 1–9.

    Google Scholar 

  5. Wang, Y., Attebury, G., & Ramamurthy, B. (2006). A survey of security issues in wireless sensor networks. IEEE Communications Surveys & Tutorials, 8, 2–23.

    Article  Google Scholar 

  6. Teodoroa, P. G., Verdejo, J. D., Fernandez, G. M., & Vazquez, E. (2009). Anomaly-based network intrusion detection: techniques, systems and challenges. Computers & Security, 28, 18–28.

    Article  Google Scholar 

  7. Alrajeh, N. A., Khan, S., & Shams, B. (2013). Intrusion detection systems in wireless sensor networks: A review. International Journal of Distributed Sensor Networks, 2013, Article ID 167575.

  8. Zahariadas, T., Trakadas, P., Maniatis, S., & Karkazis, P. (2009). Efficient detection of routing attacks in wireless sensor networks. In 16th International conference, systems, signals and image processing, pp. 1–4, 2009.

  9. de Silva, A. P. R., Martins, M. H. T., Rocha, B. P. S., Loureiro, A. A. F., Ruiz, L. B., & Wong, H. C. (2005). Decentralized intrusion detection in wireless sensor networks. Montreal, QC, pp. 16–23.

  10. Hu, Y., Perring, A., & Johnson, D. B. (2003) Packet leashes: A defense against wormhole attacks in wireless networks. In Proceedings of 22nd annual conference on IEEE computer and communication society, pp. 1976–1980.

  11. Laos, L., Poovendran, R., Meadows, C., Syverson, P., & Chang, W. (2005). Preventing wormhole attacks on wireless ad hoc networks: A graph theoretic approach. IEEE Conference Wireless Communications and Networking, 2, 1193–1199.

    Google Scholar 

  12. Dong, D., Li, M., Liu, Y., Li, X.-Y., & Liao, X. (2011). Topological detection on wormholes in wireless ad hoc and sensor networks. IEEE/ACM Transactions on Networking, 19, 1787–1796.

    Article  Google Scholar 

  13. Tun, Z., & Maw, A. H. (2008). Wormhole attack detection in wireless sensor networks. World Academy of Science, Engineering and Technology, 46, 545–550.

    Google Scholar 

  14. Newsome, J., Shi, E., Song, D., & Perrig. A. (2004). The sybil attack in sensor networks: Analysis & defenses. In Proceedings on international symposium on information processing in sensor networks, 2004.

  15. Sharmila, S., & Umamaheswari, G. (2012). Detection of sybil attack in mobile wireless sensor networks. International Journal Of Engineering Science & Advanced Technology, 2, 256–262.

    Google Scholar 

  16. Tamilselvan, L., & Sankarnarayanan, V. (2007). Prevention of blackhole attack in MANET. In Proceeding from AUS- WIRELESS’07: 2nd international conference on wireless broadband and ultraband communications, Sydney, 27–30, pp. 21.

  17. Zhao, Z., Wei, B., Dong, X., Yao, L., & Gao, F. (2010) Detecting wormhole attacks in wireless sensor networks with statistical analysis. In WASE international conference on information engineering, pp. 251–254.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to N. M. Saravana Kumar.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Saravana Kumar, N.M., Deepa, S., Marimuthu, C.N. et al. Signature Based Vulnerability Detection Over Wireless Sensor Network for Reliable Data Transmission. Wireless Pers Commun 87, 431–442 (2016). https://doi.org/10.1007/s11277-015-3070-2

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-015-3070-2

Keywords

Navigation