scholarly journals Modeling and Simulation of Replay Attack Detection using V2X Message in Autonomous Vehicles in WSN based IoT Environment

An autonomous vehicle is a car that drives itself to its destination without driver intervention. Autonomous driving provides driver convenience and prevents accidents caused by driver carelessness. Autonomous vehicles recognize external environments using sensors such as cameras and riders. In addition, autonomous vehicles collect information by using vehicle-to-everything communication in places they do not recognize. During vehicle-to-everything communication, vehicle-to-infrastructure communication communicates with the infrastructure installed on the road and receives information. In other words, the autonomous vehicle receives information from the infrastructure located in an unrecognized place and grasps the road conditions. However, because infrastructure is expensive to install and maintain, technology that uses wireless sensor networks instead of infrastructure has been proposed. Since the sensor node used in the wireless sensor network is placed outside and communicates wirelessly, it is easily compromised from an attacker. Attackers can use a compromised node to attempt various attacks that affect the system, such as replay attacks. These attacks can also have a fatal effect on autonomous vehicles that use information from sensor nodes. The attacker constantly transmits false information to autonomous vehicles, causing a disruption in the driver's schedule. In addition, autonomous vehicles may cause traffic accidents due to path planning using incorrect information. The proposed scheme in this paper uses an autonomous vehicle to defend against replay attacks and detects compromised nodes. The sensor node sends a message to the base station and the autonomous vehicle to notify them when an event occurs. Thereafter, the message is transmitted to the traffic management center and the base station to be mutually verified. This paper shows that by modeling and simulating EF-ITS, it is possible to defend against replay attacks with a probability of 90% and detect compromised nodes.

Wireless sensor networks can be used to deliver status information to users in real time. The sensor nodes used in wireless sensor networks are arranged by attaching sensors to acquire necessary information, such as vibration, sound, light, and temperature. Since a sensor node is small in size and inexpensive, it is advantageous for monitoring large areas. When a sensor node senses a change in a situation, this event information is wirelessly communicated with other sensor nodes and transmitted to a base station. However, since the sensor nodes used in wireless sensor networks are small and inexpensive, there are restrictions in terms of their battery life, memory, and computing power. An attacker can easily compromise a sensor node and use a compromised node to attempt message tampering and energy consumption attacks. EDDK is a scheme that detects attacks from compromised nodes through key management. EDDK uses a pairwise key and a local cluster key to defend against various attacks in the network. In addition, EDDK protects against replay attacks by using sequence numbers and guarantees message integrity. However, since the sequence number and sensor node ID are not encrypted, they can be used as an attack element. An attacker can attempt a replay attack by manipulating the sequence number through sniffing. A replay attack that occurs in a wireless sensor network consumes sensor node energy and confuses the user. In order to defend against such an attack, we propose a sequence number encryption scheme. The proposed scheme detects new types of replay attacks and shows about 7% energy improvement.


Author(s):  
C. R. Bharathi ◽  
Alapati Naresh ◽  
Arepalli Peda Gopi ◽  
Lakshman Narayana Vejendla

In wireless sensor networks (WSN), the majority of the inquiries are issued at the base station. WSN applications frequently require collaboration among countless sensor nodes in a network. One precedent is to persistently screen a region and report occasions. A sensor node in a WSN is initially allocated with an energy level, and based on the tasks of that sensor node, energy will be reduced. In this chapter, two proposed methods for secure network cluster formation and authentication are discussed. When a network is established then all the nodes in it must register with cluster head and then authentication is performed. The selection of cluster head is done using a novel selection algorithm and for authenticating the nodes. Also, a novel algorithm for authentication is used in this chapter. The validation and authorization of nodes are carried over by managing the keys in WSN. The results have been analyzed using NS2 simulator with an aid of list of relevant parameters.


2014 ◽  
Vol 2014 ◽  
pp. 1-8 ◽  
Author(s):  
Mohammadjavad Abbasi ◽  
Muhammad Shafie Bin Abd Latiff ◽  
Hassan Chizari

Wireless sensor networks (WSNs) include sensor nodes in which each node is able to monitor the physical area and send collected information to the base station for further analysis. The important key of WSNs is detection and coverage of target area which is provided by random deployment. This paper reviews and addresses various area detection and coverage problems in sensor network. This paper organizes many scenarios for applying sensor node movement for improving network coverage based on bioinspired evolutionary algorithm and explains the concern and objective of controlling sensor node coverage. We discuss area coverage and target detection model by evolutionary algorithm.


Author(s):  
Monjul Saikia

The wireless sensor network is a collection of sensor nodes that operate collectively to gather sensitive data from a target area. In the process of data collection the location of sensor nodes from where data is originated matters for taking any decision at the base station. Location i.e. the coordinates of a sensor node need to be shared among other nodes in many circumstances such as in key distribution phase, during routing of packets and many more. Secrecy of the location of every sensor node is important in any such cases. Therefore, there must be a location sharing scheme that facilitates the sharing of location among sensor nodes securely. In this paper, we have proposed a novel secure and robust mechanism for location sharing scheme using 2-threshold secret sharing scheme. The implementation process of the proposed model is shown here along with results and analysis.


Author(s):  
Sonam ◽  
Manju Khari

This chapter describes how as world is switching from wired communication to wireless communication, the need of a wireless sensor network (WSN) is increasing. WSNs became very popular due to its wide applications. A WSN is a network of small-in-size sensor nodes which are densely deployed for monitoring a chosen environment. In WSNs, each sensor node detects data and sends it to the base station. These sensor nodes have four basic duties, consisting of sensing, computation, transmission and power. Due to the small size, these sensor nodes are more constrained in terms of computational energy and storage resources. Energy awareness is also an essential design issue for routing protocols in WSNs. The focus of this chapter is to provide an overview of WSNs. In addition, this chapter describes the components of WSNs, its challenges and the classifications of WSNs. This chapter compares the results of LEACH, SEP and TEEN protocols.


2021 ◽  
Vol 13 (03) ◽  
pp. 97-107
Author(s):  
Su Man Nam ◽  
Youn Kyoung Seo

In wireless sensor networks, sensor nodes have the disadvantage of being vulnerable to several attacks due to the use of wireless communication and constrained energy. Adversaries exploit vulnerable characteristics of these nodes to capture them and generate false positive and false negative attacks. These attacks result in false alarms in a base station and information loss in intermediate nodes. A context-aware architecture for a probabilistic voting-based filtering scheme (CAA-PVFS) identifies compromised nodes that cause the damage. Although this method immediately detects the compromised nodes using its CAA, its additional network use consumes unnecessary energy. In this paper, our proposed method configures geofencing for the compromised nodes and blocks the nodes using false data injection. The proposed method reduces the unnecessary energy of the additional network while maintaining security strength. Experimental results indicate that the proposed method offers energy savings of up to 17% while maintaining the security strength against the two attacks as compared to the existing method.


Author(s):  
S. JERUSHA ◽  
K. KULOTHUNGAN ◽  
A Kannan

Wireless sensor nodes are usually embedded in the physical environment and report sensed data to a central base station. Clustering is one of the most challenging issues in wireless sensor networks. This paper proposes a new cluster scheme for wireless sensor network by modified the K means clustering algorithm. Sensor nodes are deployed in a harsh environment and randomly scattered in the region of interest and are deployed in a flat architecture. The transmission of packet will reduce the network lifetime. Thus, clustering scheme is required to avoid network traffic and increase overall network lifetime. In order to cluster the sensor nodes that are deployed in the sensor network, the location information of each sensor node should be known. By knowing the location of the each sensor node in the wireless sensor network, clustering is formed based on the highest residual energy and minimum distance from the base station. Among the group of nodes, one node is elected as a cluster head using centroid method. The minimum distance between the cluster node’s and the centroid point is elected as a cluster head. Clustering of nodes can minimize the residual energy and maximize the network performance. This improves the overall network lifetime and reduces network traffic.


2014 ◽  
Vol 556-562 ◽  
pp. 6311-6315
Author(s):  
Yong Qing Wang ◽  
Jing Tian Tang ◽  
Xing Po Ma

We study data aggregation for region-based top-k queries in wireless sensor networks, which is one kind of internet of things. Because the energy of sensor nodes is limited and a sensor node will die if it has no energy left, one of the important targets for all protocols in wireless sensor networks is to decrease the energy consumption of the sensor nodes. For a sensor node, communication cost is much more than other kinds of energy cost such as energy cost on computation and data storage. Thus, a very efficient way to decrease the energy cost of the sensor nodes is to decrease the quality of the sensing data that will be transmitted to the base station. In this paper, we use the technique of data aggregation to achieve this goal, and propose an algorithm to construct a novel Data Aggregation Tree (DAT) in the query region. To check the efficiency of DAT, we have made a simulation on OMNET, and the results show that DAT can shrink large quality of data when they are transmitted to the base station, and the life time of the sensor networks can thus be prolonged..


Electrician ◽  
2019 ◽  
Vol 13 (3) ◽  
pp. 70-75
Author(s):  
Denny Nugroho ◽  
Rudi Uswarman

Intisari — Bencana alam seperti gerakan tanah atau longsor dapat terjadi pada berbagai skala dan kecepatan. Untuk meminimalkan kerugian akibat bencana tersebut maka dilakukan usaha mengenal tanda-tanda yang mengawali gerakan tanah, atau disebut sebagai mitigasi. Penelitian ini dilakukan untuk merancang wireless sensor network yang mampu mengidentifikasi bencana longsor. Node sensor terdiri dari: sensor getaran, sensor kemiringan lahan, sensor pergeseran lahan, kontroler, dan modul transmisi data. Node-node sensor ini ditanam pada daerah yang rawan longsor dan saling berkomunikasi antara node satu dengan lainnya. Data-data berupa getaran, kemiringan lahan, dan status selalu ditransmisikan ke base station sistem peringatan dini longsor secara realtime. Ketika bencana longsor akan segera terjadi node sensor diharapkan mampu mendeteksi dan mengaktifkan alarm yang ada pada node sensor serta mengirimkan tanda bahaya ke base station. Kata Kunci — longsor, wireless sensor network, node sensor, mikrokontroler   Abstrak — Natural disasters such as land movements or landslides can occur at various scales and speeds. To minimize damages due to the disaster, an effort is made to recognize the signs that initiate soil movements or referred to as mitigation. This research was conducted to design a wireless sensor network that can identify landslides. Sensor nodes consist of vibration sensor, slope sensor, land shift sensor, controller, and data transmission module. These sensor nodes are planted in areas inclined to landslides and communicate with each other between nodes. The data vibration, the slope of the land, and status are always transmitted to the base station of the landslide early warning system in real time. When an landslide will occur soon the sensor node is expected to be able to detect and activate the alarm on the sensor node and send an signal to the base station. Keyword — landslides, wireless sensor networks, sensor nodes, microcontrollers


Author(s):  
Dr. Akhilesh A. Waoo ◽  
◽  
Mr. Virendra Tiwari ◽  

Wireless sensor networks (WSN’s) comprise limited energy small sensor nodes having the ability to monitor the physical conditions and communicate information among the various nodes without requiring any physical medium. Over the last few years, with the rapid advancements in information technology, there has been an increasing interest of various organizations in making the use of wireless sensor networks (WSN’s). The sensor nodes in WSN having limited energy detects an event, collect data and forward this collected data to the base node, called sink node, for further processing and assessment. Few attributes of WSN’s like the energy consumption and lifetime can be impacted by the design and placement of the Sink node. Despite various useful characteristics WSN’s is being considered vulnerable and unprotected. There is a large class of various security attacks that may affect the performance of the system among which sinkhole an adversary attack puts dreadful threats to the security of such networks. Out of various attacks, a sinkhole attack is one of the detrimental types of attacks that brings a compromised node or fabricated node in the network which keeps trying to lures network traffic by advertising its wrong and fake routing update. Sinkhole attacks may have some other serious harmful impacts to exploit the network by launching few other attacks. Some of these attacks are forwarding attacks, selective acknowledge spoofing attacks, and they may drop or modify routing information too. It can also be used to send fake or false information to the base station. This study is analyzing the challenges with sinkhole attacks and exploring the existing available solutions by surveying comparatively which used to detect and mitigate sinkhole attacks in the wireless sensor network.


Sign in / Sign up

Export Citation Format

Share Document