Advertisement

An Hybrid Defense Framework for Anomaly Detection in Wireless Sensor Networks

  • S. BalajiEmail author
  • S. Subburaj
  • N. Sathish
  • A. Bharat Raj
Conference paper
Part of the Lecture Notes on Data Engineering and Communications Technologies book series (LNDECT, volume 35)

Abstract

Wireless sensor network consists of set of source, sink nodes and communication devices to interact without any support of the infrastructure. Unlike wired networks, the challenges faced in mobile ad-hoc networks possessed such as security design, network infrastructure, stringent energy resources and network security issues. The need to these security issues is much focused in overcoming the challenges in WSN. Here the perpetual work focuses on the secure communication using a novel defense framework named role based control model is proposed to analyze the network flow and to identify the misbehaving nodes. The communication is performed based on the cluster of immense size these confided in node(s) will most likely be passing on together, in the meantime allowing or section entry/correspondence of the unauthorized node(s) to continue keeping up a constant, tied down, dependable communication of versatile nodes. The simulation is performed using network simulator where the network parameters such as throughput, packet delivery ratio, delay and packet loss are analyzed to identify the malicious nodes.

Keywords

Security issues Anomaly detection Intrusion detection Cross-layer Wireless Sensor Networks 

References

  1. 1.
    Kandula, S., Katabi, D., Jacob, M., Berger, A., Botz-4-Sale: surviving organized DDOS attacks that mimic flash crowds. In: Proceedings of Second Symposium on Networked Systems Design and Implementation (NSDI) (2005)Google Scholar
  2. 2.
    CNN Technology News: Expert: Botnets No. 1 Emerging Internet Threat (2006). http://www.cnn.com/2006/TECH/internet/01/31/furst/
  3. 3.
    Freiling, F., Holz, T., Wicherski, G.: Botnet tracking: exploring a root-cause methodology to prevent distributed denial-of- service attacks. Technical report AIB-2005-07, CS Department of RWTH Aachen University (2005)Google Scholar
  4. 4.
    Cooke, E., Jahanian, F., McPherson, D.: The zombie roundup: understanding, detecting, and disrupting botnets. In: Proceedings of USENIX Workshop Steps to Reducing Unwanted Traffic on the Internet (SRUTI) (2005)Google Scholar
  5. 5.
    Xu, W., Trappe, W., Zhang, Y., Wood, T.: The feasibility of launching and detecting jamming attacks in wireless networks. In: MobiHoc 2005: Proceedings of the 6th ACM International Symposium on Mobile Ad Hoc Networking and Computing, Urbana-Champaign, IL, USA, pp. 46–57 (2005)Google Scholar
  6. 6.
    Zhao, L., Delgado-Frias, J.G.: MARS: misbehavior detection in ad hoc networks. In: Proceedings of IEEE Conference on Global Telecommunications Conference, pp. 941–945. Washington State University, USA (2007Google Scholar
  7. 7.
    Patwardhan, A., Parker, J., Iorga, M., Joshi, A., Karygiannis, T., Yesha, Y.: Threshold-based intrusion detection in adhoc networks and secure AODV. Ad Hoc Netw. J. (ADHOCNET) 6(4), 578–599 (2008)CrossRefGoogle Scholar
  8. 8.
    Madhavi, S., Kim, T.H.: An intrusion detection system in mobile adhoc networks. Int. J. Secur. Appl. 2(3), 1–17 (2008)Google Scholar
  9. 9.
    Afzal, S.R., Biswas, S., Koh, J.B., Raza, T., Lee, G., Kim, D.K.: RSRP: a robust secure routing protocol for mobile ad hoc networks. In: Proceedings of IEEE Conference on Wireless Communications and Networking, pp. 2313–2318 (2008)Google Scholar
  10. 10.
    Bhalaji, N., Sivaramkrishnan, A.R., Banerjee, S., Sundar, V., Shanmugam, A.: Trust enhanced dynamic source routing protocol for adhoc networks. In: Proceedings of World Academy of Science, Engineering and Technology, vol. 36, pp. 1373–1378 (2008)Google Scholar
  11. 11.
    Huang, Y., Lee, W.: A cooperative intrusion detection system for ad hoc networks. In: SASN 2003: Proceedings of the 1st ACM workshop on Security of Ad Hoc and Sensor Networks, Fairfax, VA, USA, pp. 135–147(2003)Google Scholar
  12. 12.
    Bellardo, J., Savage, S.: 802.11 denial-of-service attacks: real vulnerabilities and practical solutions. In: Proceedings of the 11th USENIX Security Symposium, Washington, D.C, USA, pp. 15–28 (2003)Google Scholar
  13. 13.
    Raya, M., Hubaux, J.P., Aad, I.: DOMINO: a system to detect greedy behavior in IEEE 802.11 hotspots. In: Proceedings of ACM MobiSys, Boston, MA, USA, pp. 84–97 (2004)Google Scholar
  14. 14.
    Xu, W., Trappe, W., Zhang, Y., Wood, T.: The feasibility of launching and detecting jamming attacks in wireless networks. In: MobiHoc 2005: Proceedings of the 6th ACM International Symposium on Mobile Ad Hoc Networking and Computing, Urbana-Champaign, IL, USA, pp. 46–57 (2005)Google Scholar
  15. 15.
    Zhang, Y., Lee, W., Huang, Y.A.: Intrusion detection techniques for mobile wireless networks. Wirel. Netw. 9(5), 545–556 (2003)CrossRefGoogle Scholar
  16. 16.
    Balaji, S., Sasilatha, T.: Detection of denial of service attacks by domination graph application in wireless sensor networks. Clust. Comput. J. Netw. Softw. Tools Appl. (2018).  https://doi.org/10.1007/s10586-018-2504-5. ISSN 1573-7543

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  • S. Balaji
    • 1
    Email author
  • S. Subburaj
    • 1
  • N. Sathish
    • 1
  • A. Bharat Raj
    • 1
  1. 1.Department of Computer Science and EngineeringPanimalar Engineering CollegeChennaiIndia

Personalised recommendations