An active detection of compromised nodes based on en-route trap in wireless sensor network

2021 ◽  
Vol 17 (8) ◽  
pp. 155014772110403
Author(s):  
Jiang-Tao Wang ◽  
Zhi-Xiong Liu

With the development and wide use of wireless sensor network, security arises as an essential issue since sensors with restrict resources are deployed in wild areas in an unattended manner. Most of current en-route filtering schemes could filter false data effectively; however, the compromised nodes could take use of the filtering scheme to launch Fictitious False data Dropping attack, the detection of this attack is extremely difficult since the previous hop node is unable to distinguish whether the forwarding node dropt a false data report with incorrect Message Authentication Codes or a legitimate report. This is the first attempt to address the Fictitious False data Dropping attack; in this article, we propose an Active Detection of compromised nodes based on En-route Trap to trap compromised nodes in the scenario of a false data dropping. A trust model is used to evaluate trust level of neighbor nodes with respect to their authentication behaviors. A detecting algorithm of compromised node is used to detect compromised nodes. Simulation results showed that our scheme can address the Fictitious False data Dropping attack and detect 60% of compromised nodes with a low false positive rate; consequently, the packet accuracy of an Active Detection of compromised nodes based on En-route Trap increases rapidly and reaches to 86%.

2014 ◽  
Vol 989-994 ◽  
pp. 4832-4836
Author(s):  
Tao Liu ◽  
Shao Yu Liu ◽  
Dan Wei ◽  
Jie Cui

In this paper, we propose an intrusion detection program based on improved Ant-Miner (AM). The proposal needs to collecting out the node data, using intrusion detection module to test, compared with other wireless sensor network intrusion detection scheme, this scheme saves energy consumption of the sensor node effectively. Through the network simulation, this scheme proposed has a lower false positive rate and a higher true positive rate comparing with the current typical wireless sensor network testing program.


Author(s):  
Manjunatha R C ◽  
Rekha K R ◽  
Nataraj K R

<p>Wireless sensor networks are usually left unattended and serve hostile environment, therefore can easily be compromised. With compromised nodes an attacker can conduct several inside and outside attacks. Node replication attack is one of them which can cause severe damage to wireless sensor network if left undetected. This paper presents fuzzy based simulation framework for detection and revocation of compromised nodes in wireless sensor network. Our proposed scheme uses PDR statistics and neighbor reports to determine the probability of a cluster being compromised. Nodes in compromised cluster are then revoked and software attestation is performed.Simulation is carried out on MATLAB 2010a and performance of proposed scheme is compared with conventional algorithms on the basis of communication and storage overhead. Simulation results show that proposed scheme require less communication and storage overhead than conventional algorithms.</p>


Author(s):  
Manjunatha R C ◽  
Rekha K R ◽  
Nataraj K R

<p>Wireless sensor networks are usually left unattended and serve hostile environment, therefore can easily be compromised. With compromised nodes an attacker can conduct several inside and outside attacks. Node replication attack is one of them which can cause severe damage to wireless sensor network if left undetected. This paper presents fuzzy based simulation framework for detection and revocation of compromised nodes in wireless sensor network. Our proposed scheme uses PDR statistics and neighbor reports to determine the probability of a cluster being compromised. Nodes in compromised cluster are then revoked and software attestation is performed.Simulation is carried out on MATLAB 2010a and performance of proposed scheme is compared with conventional algorithms on the basis of communication and storage overhead. Simulation results show that proposed scheme require less communication and storage overhead than conventional algorithms.</p>


2019 ◽  
Vol 8 (4) ◽  
pp. 11730-11737

Wireless sensor network (WSN) is a noteworthy division in present day correspondence frameworks and faith detecting steering convention is utilized to improve security in WSN. Already, Trust Sensing based Secure Routing Mechanism (TSSRM) was projected which will diminish the overhead steering and improve the unwavering quality of information transmission over the system. In any case, the security tool of this technique might be invalid, if the system steering convention is modified. Hence, in this work, a Parameter and Distributed Trust Based Intrusion Detection System (PDTB-IDS) with a safe correspondence structure with a trust the board framework for remote sensor systems are proposed. The significant commitment is to distinguish different parameters and trust factors that impact trust in WSN is conveyed among different factors, for example, vitality, unwavering quality, information, and so on. Subsequently coordinate believe, proposal believe and circuit trust from those components are determined and the general trust estimation of the sensor hub is evaluated by joining the individual trust esteems. The trust model can decide whether or not the specific hub is pernicious or not by looking at trust got from the proposed method. The numerical assessment of the research work is completed with the help of NS2 simulation environment from which it is proved that the projected strategy provides enhanced outcome than the present TSSRM method.


2021 ◽  
Vol 9 (1) ◽  
pp. 1225-1229
Author(s):  
Dr. Senthilkumar A, Dr. Lekashri S, Abhay Chaturvedi, Dr. R. Manikandan

Trust is an essential parameter among sensor nodes to provide secured and successful communication. Many trust management schemes have been proposed earlier for large scale Wireless Sensor Network (WSN) however not cooperates well in terms of low dependability, memory overheads, large communication etc, therefore a system called Data Traffic Trust Scheme (DTTS) for clustered WSN is proposed here. Here the trust nodes are identified through the data traffic sampling rate. The trust rate is identified through the number of sent and receive data packets and the malicious packets are diagnosed through the un-matching packet rate. The simulation results are evaluated to show the efficiency for the proposed scheme.


Sign in / Sign up

Export Citation Format

Share Document