scholarly journals A MODIFIED ALGORITHM AND PROTOCOL FOR JAMMING ATTACK PREVENTION FOR WIRELESS SENSOR NETWORK.

Wireless networks are gaining popularity to its peak nowadays, because the users need wireless connectivity regardless of their geographic position. there's an increasing threat of attacks on the Wireless sensor Network (WSN). Node jamming attack is one in all the security threat within which the traffic is redirected to such a node that really doesn't exist within the network. It’s an analogy to the Jamming within the universe within which things disappear. The node presents itself in such some way to the node that it will attack different nodes and networks knowing that it's the shortest path. WSNs should have a secure approach for transmission and communication that is kind of difficult and very important issue. so as to produce secure communication and transmission, research worker worked specifically on the security problems in WSNs, and lots of secure routing protocols and security measures inside the networks were proposed. The scope of this work is to review the effects of Jamming attack in WSN exploitation (and prevention this attack exploitation security primarily based modified. Comparative analysis of Jamming attack for each protocols is taken under consideration. The impact of Node Jamming attack on the performance of WSN is evaluated searching for that protocol is additional vulnerable to the attack and the way abundant is that the impact of the attack on each protocols. The measurements were taken within the light of packet delivery ratio, throughput, end-to-end delay and residual energy. Simulation is completed in Network simulator tool two (NS-2).

Repositor ◽  
2020 ◽  
Vol 2 (8) ◽  
Author(s):  
Hawwin Purnama Akbar ◽  
Diah Risqiwati ◽  
Diah Risqiwati

Perkembangan ilmu pengetahuan pada bidang teknologi jaringan terjadi sangat cepat karena mengikuti perkembangan kebutuhan manusia. Salah satu teknologi jaringan yang saat ini menarik perhatian masyarakat adalah teknologi Wireless Sensor Network(WSN). WSN adalah jaringan dari kumpulan sensor yang terhubung menggunakan teknologi wireless secara ad-hoc dan setiap sensor node digunakan untuk proses pengumpulan data dan menghubungkan dengan node yang lain melalui jaringan wireless.Karena pada kebanyakan kasus aplikasi WSN digunakan pada lingkungan yang ekstrem dan sensor node harus dapat beroperasi secara otomatis tanpa campur tangan manusia, jaringan ini menjadi rentan akan beberapa ancaman jaringan dan dapat mempengaruhi performa dari jaringannya. Terdapat berbagai macam jenis serangan yang dapat membahayakan jaringan wireless sensor network diantaranya yang paling umum adalah sybil attack dan hello flood attack.            Dalam penelitian ini, penulis meneliti performa WSN saat diserang oleh Sybil attack dan hello flood attack dengan cara mengukur throughput, PDR(packet delivery ratio), jitter dan delay dalam jaringan WSN. Penelitian ini juga menganalisa jumlah node yang bervariasi dari 10 node sampai 30 node dengan waktu simulasi dari 10 detik sampai 30 detik lalu dianalisa jaringan ketika jaringan normal dan diserang oleh node penyerang yang bervariasi dari 1 sampai 3 penyerang. Dengan melakukan analisa tersebut, diperoleh data berupa perbandingan dampak serangan dari Sybil attack dan hello flood attack. Dampak dari sybil attack lebih berpengaruh pada parameter throughput dan pdr yang mengalami penurunan nilai hingga 69,9% untuk pdr dan 56,4% untuk throughput. Sedangkan dampak dari hello flood attack lebih berpengaruh pada parameter delay dan jitter yang mengalami kenaikandari nilai semula 0,05 detik menjadi 0,576 detikuntuk delay dan 0,579 detik untuk jitter.AbstractThe development of science in the field of network technology occurs very quickly because it follows the development of human needs. One of the network technology that is currently attracting public attention is wireless sensor network technology (WSN). WSN is a network of connected sensors using ad-hoc wireless technology and each node sensor are used to process data collection and connect with other nodes over a wireless network. Because in most cases WSN applications are used in extreme environments and node sensors must operate automatically without human intervention, these networks become vulnerable to some network threats and may affect the performance of their networks. There are various types of attacks that can harm wireless sensor network network among the most common is sybil attack and hello flood attack.             In this study, authors examined the performance of WSN when attacked by Sybil attack and hello flood attack by measuring throughput, PDR (packet delivery ratio), jitter and delay in WSN network. This study also analyzed the number of nodes that varied from 10 nodes to 30 nodes with simulated time from 10 seconds to 30 seconds and then analyzed the network when the network was normal and attacked by the attacking nodes that varied from 1 to 3 attackers. By doing the analysis, the datacan be obtained in the form of comparison of the impact of attacks from Sybil attack and hello flood attack. The impact of the sybil attack is more influential on the parameters of throughput and pdr which has decreased the maximum value up to 69.9% for pdr and 56.4% for throughput. While the impact of hello flood attack ismore influential on the delay and jitter parameters that increased from the original value of 0.05 seconds to 0.576 seconds for delay and 0.579 seconds for jitter. 


Underwater wireless sensor network (UWSN) is an emerging technology that has been used for different applications such as warning systems for disasters, monitoring the ecosystem, drilling of the oil, defense surveillance. Although underwater communication may be accomplished using electromagnetic or optical waves, but these methods are not feasible for practical UWSN, due to signal attenuation. UWSN faces several issues like restricted bandwidth, irregular node mobility, increased delay etc. which affects the routing behavior. In this paper, an optimal delay and lifetime aware depth based routing (ODLDR) protocol is proposed. Protocol first introduced the group partitioning algorithm for cluster formation that minimizes the energy consumption of network then an efficient priority based scheduling algorithm is proposed for trust computation, which helps in finalizing the CH and routing path. The ODLDR protocol is tested with the high density nodes in Network Simulator (NS2) tool. The simulation results shows the effectiveness of the ODLDR protocol in terms of energy consumption, packet delivery ratio, positioning accuracy, end-to-end delay, throughput and network lifetime.


2020 ◽  
Vol 13 (4) ◽  
pp. 718-724
Author(s):  
Amit K. Agarwal ◽  
Munesh Chandra ◽  
S.S. Sarangdevot

Background: The Wireless Sensor Network (WSN) is a type of networks which primarily designed for the purpose of monitoring in remote areas. It consists of communicating nodes (called sensor's) which communicate each other to share their data and passing the information to the central node. In many applications like defence requires the secure communication of information. However, due to the numerous characteristics of WSN such as open shared communication channel, limited memory, and processing power of sensors, etc. these networks are vulnerable to various attacks such as black hole, gray hole, etc. Objective: The objective of the paper is to secure the AODV routing protocol in WSN using cryptography techniques. Methods: In this paper, the Ad hoc On-demand Distance Vector (AODV) routing protocol has been chosen for information routing because of their lightweight processing capability. To provide secure communication in WSN, the AODV routing protocol is secured by utilizing the RSA key generation algorithm. Here, RSA with three variables (three prime numbers) is employed instead of two variables. Results: The effectiveness of the proposed approach in handling black hole attack is being verified through the simulation results obtained from the experiments conducted using Network Simulator tool (NS2). The three popular performance metrics namely Average End-to-End Delay, Packet Delivery Ratio, and Average Throughput are used for evaluation purpose. These results are observed under different pose time and varying number of malicious nodes. Conclusion: In this paper, a new three variable RSA cryptosystem-based security model is proposed to protect the communication against the Black Hole (BH) attack in wireless sensor networks. The use of three variables instead of two variables allows our model to provide more security as compared to other methods. Simulation results obtained from the experiments carried out using NS2 tool evident the performance of the proposed model over original AODV and other previous models.


Author(s):  
SUPREETHA PATEL T P ◽  
K.N. SHREENATH

In recent days, reactive jamming attack has emerged as a great security threat to wireless sensor network [WSN]. Several strategies are developed to identify the trigger nodes, whose legitimate transmission activates any reactive jammer. After identifying the trigger node, the node will be shut down to deactivate the jammer and its routing information is deleted from the routing table, then the node can’t be used again in the network. Since the node can’t be used again in the network it is one of the major drawbacks. Hence to overcome the problem, In this paper we propose a novel approach, where the identified trigger nodes are put in to the scanning mode, so that we can reuse the trigger nodes, after deactivating the jammer node in the network.


The inducing popularity of Wireless Sensor Network (WSN) is more concern with security factors. Secure communication is essential for demanding applications of WSN. Authentication being the crucial service due to deployment of nodes in unattended environment, this paper focus on analysis of popular trust authentication protocols such Trust Aware Routing Framework (TARF), Trust Aware Secure Routing Framework (TSRF), Trust Based Routing Scheme (TRS), Trust Guaranteed Routing (TGR) and Pair Key Based Trust Authentication Protocol (PTAP). Their performance is measured in sample simulation environment. To ensure perfect security in terms of authentication service, analysis of attack scenarios are performed. To implement this, fake attacks are created and the remaining number of legitimate nodes is measured in presence of attacks such as Sybil, black hole, replication and tampering. The analysis results in showing how each protocol withstand with different attack scenarios.


2012 ◽  
Vol E95.B (6) ◽  
pp. 2113-2116
Author(s):  
Yanqiang SUN ◽  
Xiaodong WANG ◽  
Xingming ZHOU

Sensors ◽  
2021 ◽  
Vol 21 (9) ◽  
pp. 3000
Author(s):  
Sadeeq Jan ◽  
Eiad Yafi ◽  
Abdul Hafeez ◽  
Hamza Waheed Khatana ◽  
Sajid Hussain ◽  
...  

A significant increase has been observed in the use of Underwater Wireless Sensor Networks (UWSNs) over the last few decades. However, there exist several associated challenges with UWSNs, mainly due to the nodes’ mobility, increased propagation delay, limited bandwidth, packet duplication, void holes, and Doppler/multi-path effects. To address these challenges, we propose a protocol named “An Efficient Routing Protocol based on Master–Slave Architecture for Underwater Wireless Sensor Network (ERPMSA-UWSN)” that significantly contributes to optimizing energy consumption and data packet’s long-term survival. We adopt an innovative approach based on the master–slave architecture, which results in limiting the forwarders of the data packet by restricting the transmission through master nodes only. In this protocol, we suppress nodes from data packet reception except the master nodes. We perform extensive simulation and demonstrate that our proposed protocol is delay-tolerant and energy-efficient. We achieve an improvement of 13% on energy tax and 4.8% on Packet Delivery Ratio (PDR), over the state-of-the-art protocol.


Sensors ◽  
2019 ◽  
Vol 19 (6) ◽  
pp. 1313 ◽  
Author(s):  
Muhammad Awais ◽  
Nadeem Javaid ◽  
Amjad Rehman ◽  
Umar Qasim ◽  
Musaed Alhussein ◽  
...  

Nowadays, the Internet of Things enabled Underwater Wireless Sensor Network (IoT-UWSN) is suffering from serious performance restrictions, i.e., high End to End (E2E) delay, low energy efficiency, low data reliability, etc. The necessity of efficient, reliable, collision and interference-free communication has become a challenging task for the researchers. However, the minimum Energy Consumption (EC) and low E2E delay increase the performance of the IoT-UWSN. Therefore, in the current work, two proactive routing protocols are presented, namely: Bellman–Ford Shortest Path-based Routing (BF-SPR-Three) and Energy-efficient Path-based Void hole and Interference-free Routing (EP-VIR-Three). Then we formalized the aforementioned problems to accomplish the reliable data transmission in Underwater Wireless Sensor Network (UWSN). The main objectives of this paper include minimum EC, interference-free transmission, void hole avoidance and high Packet Delivery Ratio (PDR). Furthermore, the algorithms for the proposed routing protocols are presented. Feasible regions using linear programming are also computed for optimal EC and to enhance the network lifespan. Comparative analysis is also performed with state-of-the-art proactive routing protocols. In the end, extensive simulations have been performed to authenticate the performance of the proposed routing protocols. Results and discussion disclose that the proposed routing protocols outperformed the counterparts significantly.


IJARCCE ◽  
2015 ◽  
pp. 143-145
Author(s):  
Megha Dubey ◽  
Prof Mayank Bhatt ◽  
Prof Rajat Bhandari

Sign in / Sign up

Export Citation Format

Share Document