scholarly journals Node Validation Technique to Increase Security of Wireless Sensor Networks

A distributed sort of network in which sensor nodes can join or leave the network when they want is identified as wireless sensor network. Due to self-arranging of the network, attacker nodes make their entry inside networks and launch different types of active and passive intrusions. The active attacks can be divided into various sub categories and one of them is misdirection attack. This attack increases delay in the network. The available attacker hub will trigger attack. In order to recognize and disengage malicious nodes a novel strategy is proposed in this work. The malicious nodes are recognized from the networks which are in charge of triggering the node. The attacker or malevolent node launches sinkhole intrusion. This intrusion streams fake recognition information within the network. This study proposes a verification approach for detecting attacker nodes present in the network. The performance of introduced approach is tested in NS2. It is scrutinized that performance is improved as per various parameters.

2014 ◽  
Vol 622 ◽  
pp. 191-198
Author(s):  
Devasagayam Jayashree ◽  
V. Uma Rani ◽  
K. Soma Sundaram

Due to emerging technology Wireless Sensor Network (WSN), it is necessary to monitor the behavior of sensor nodes and establish the secure communication in network. Security is a challenging task in wireless environment. Several encryption mechanisms are available to prevent outsider attacks, but no mechanism available for insider attacks. A trust model is a collection of rules used to establish co-operation or collaboration among nodes as well as monitoring misbehavior of wireless sensor networks. Trust model is necessary to enhance secure localization, communication or routing, aggregation, collaboration among nodes. In this paper, proposed a behavior based distributed trust model for wireless sensor network to effectively deal with self-ish or malicious nodes. Here, take multidimensional trust attributes derived from communications and networks to evaluate the overall trust of sensor nodes. It monitors the behavior of nodes and establishes secure communication among networks.


Author(s):  
Mandeep Thakur ◽  
Amninder Kaur Gill

A wireless sensor network comprises of countless spread over a particular territory where we need to take care of at the progressions going ahead there. A sensor hub, for the most part, comprises of sensors, actuators, memory, a processor and they do have correspondence capacity. These sorts of networks are much powerless against security attacks. Many kinds of active and passive attacks are conceivable in the sensor network. Among all the conceivable active attacks, sinkhole attack is the most widely recognized and destructive attack. This attack debases network execution and prompts denial of service attack. The attack is triggered by the malicious hub which is available in the network. In this work, a novel strategy has been proposed to recognize and disengage malicious nodes from the network which are in charge of triggering the attack. The novel procedure is based on blacklist technique and clustering technique. The exploratory results will demonstrate that proposed strategy detects and separate the malicious nodes from the network proficiently. It will enhance network effectiveness as far as bundle misfortune, defer and expand throughput of the network. NS2 simulator instrument will be utilized as a part of it.


Author(s):  
Jyoti Rani ◽  
Vishal Anand

Aim: Wireless Sensor Networks is one of the hot research topic in previous years due to its wide contribution in emerging industry that is Internet of Things. A wireless sensor network is a network of tiny devices, which can gather the information from surrounding and then successfully communicate it via wireless link. WSNs are widely used for monitoring targets in given field of interest. Most popular area of research in Wireless Sensor Networks is coverage. This paper focus on coverage issues in Wireless Sensor Networks. Study Design: Various Issues in WSNs being studied and analyzed. Place and Duration of Study: Swami Parmanand College Lalru, between May 2019 to December 2019. Methodology: It included following steps:- Survey of the literature related to the proposed work. Comparison of different types of WSNs and challenges and issues related to them. Detailed study of coverage issue involved in implementation of WSN. Results: Coverage selection depends on the system requirement. Each coverage has its own advantages and disadvantages related to its implementation. “Table 2: Comparison between Various WSN and challenges related to them” it discusses about various types of WSNs and the challenges related to each one of them. Conclusion: Coverage in WSNs can be defined on how well the sensor nodes monitor the targets in given field of interest. Each application comes with different set of coverage requirements; hence, deployment strategies are chosen based on the requirements.


Sensors ◽  
2019 ◽  
Vol 19 (19) ◽  
pp. 4281
Author(s):  
Ngoc-Thanh Dinh ◽  
Younghan Kim

Wireless sensor network (WSN) studies have been carried out for multiple years. At this stage, many real WSNs have been deployed. Therefore, configuration and updating are critical issues. In this paper, we discuss the issues of configuring and updating a wireless sensor network (WSN). Due to a large number of sensor nodes, in addition to the limited resources of each node, manual configuring turns out to be impossible. Therefore, various auto-configuration approaches have been proposed to address the above challenges. In this survey, we present a comprehensive review of auto-configuration mechanisms with the taxonomy of classifications of the existing studies. For each category, we discuss and compare the advantages and disadvantages of related schemes. Lastly, future works are discussed for the remaining issues in this topic.


Author(s):  
Saloni Dhiman ◽  
Deepti Kakkar ◽  
Gurjot Kaur

Wireless sensor networks (WSNs) consist of several sensor nodes (SNs) that are powered by battery, so their lifetime is limited, which ultimately affects the lifespan and hence performance of the overall networks. Till now many techniques have been developed to solve this problem of WSN. Clustering is among the effective technique used for increasing the network lifespan. In this chapter, analysis of multi-hop routing protocol based on grid clustering with different selection criteria is presented. For analysis, the network is divided into equal-sized grids where each grid corresponds to a cluster and is assigned with a grid head (GH) responsible for collecting data from each SN belonging to respective grid and transferring it to the base station (BS) using multi-hop routing. The performance of the network has been analyzed for different position of BS, different number of grids, and different number of SNs.


2019 ◽  
Vol 29 (09) ◽  
pp. 2050141 ◽  
Author(s):  
Muhammed Enes Bayrakdar

In this paper, a monitoring technique based on the wireless sensor network is investigated. The sensor nodes used for monitoring are developed in a simulation environment. Accordingly, the structure and workflow of wireless sensor network nodes are designed. Time-division multiple access (TDMA) protocol has been chosen as the medium access technique to ensure that the designed technique operates in an energy-efficient manner and packet collisions are not experienced. Fading channels, i.e., no interference, Ricean and Rayleigh, are taken into consideration. Energy consumption is decreased with the help of ad-hoc communication of sensor nodes. Throughput performance for different wireless fading channels and energy consumption are evaluated. The simulation results show that the sensor network can quickly collect medium information and transmit data to the processing center in real time. Besides, the proposed technique suggests the usefulness of wireless sensor networks in the terrestrial areas.


Author(s):  
Turki Ali Alghamdi

Abstract Wireless sensor networks (WSNs) comprise tiny devices known as sensors. These devices are frequently employed in short-range communications and can perform various operations such as monitoring, collecting, analyzing, and processing data. WSNs do not require any infrastructure, are reliable, and can withstand adverse conditions. Sensor networks are autonomous structures in which the sensor nodes can enter or leave the network at any time instant. If the entering node is attacker node it will monitor the network operation and can cause security issues in the network that can affect communication. Existing literature presents security improvements in such networks in the form of cryptography, asymmetric techniques, key distribution, and various protocols. However, these techniques may not be effective in the case of autonomous structures and can increase computational complexity. In this paper, a convolutional technique (CT) is proposed that generates security bits using convolutional codes to prevent malicious node attacks on WSNs. Different security codes are generated at different hops and the simulation results demonstrate that the proposed technique enhances network security and reduces computational complexity compared to existing approaches.


2012 ◽  
Vol 04 (01) ◽  
pp. 1250010 ◽  
Author(s):  
DEYING LI ◽  
ZHENG LI ◽  
WENKAI MA ◽  
WENPING CHEN

An underwater acoustic wireless sensor network (UA-WSN) consists of many resource-constrained underwater sensor nodes (USNs), which are deployed to perform collaborative monitoring tasks over a given region. One way to preserve network connectivity while guaranteeing other network QoS is to deploy some relay nodes (RNs) in the networks. Although RNs' function is more powerful than USNs, but they can lead to more interference and their cost is more expensive. This paper addresses constrained low-interference relay node deployment problem for 3-D UA-WSNs in which the RNs are placed at a subset of candidate locations to ensure connectivity between the USNs such that the number of RNs deployed and the value of total incremental interference are minimized. We first prove that it is NP-hard, then propose a general approximation algorithm framework. Based on the framework, we get two polynomial time O(1)-approximation algorithms.


2014 ◽  
Vol 556-562 ◽  
pp. 6058-6062 ◽  
Author(s):  
Jin Wu Ju

Wireless sensor network (WSN) is the network which is composed of a large number of intelligent sensor nodes, it has the ability of self-organizing network routing, therefore, it has been widely used. Building wireless sensor networks is the key to WSN nodes. This paper introduces the basic structure of wireless sensor network node based on ARM, and it delivers a detailed analysis on the operating features and the CC2480 hardware interface of the ZigBee processor, what’s more, it specifically talks about the implementation of the Wince driver of WSN nodes.


2012 ◽  
Vol 263-266 ◽  
pp. 2972-2978
Author(s):  
Ju Long Pan ◽  
Ling Long Hu ◽  
Wen Jin Li ◽  
Hui Cui ◽  
Zi Yin Li

To identify the malicious nodes timely in wireless sensor networks(WSNs), a cooperation intrusion detection scheme based on weighted k Nearest Neighbour(kNN) is proposed. Given a few types of sensor nodes, the test model extracts the properties of sensor nodes related with the known types of malicious nodes, and establishes sample spaces of all sensor nodes which participate in network activities. According to the known node’s attributes sampled, the unknown type sensor nodes are classified based on weighted kNN. Considering of energy consumption, an intrusion detection system selection algorithm is joined in the sink node. Simulation results show that the scheme has a lower false detection rate and a higher detection rate at the same time, and it can preserve energy of detection nodes compared with an existing intrusion detection scheme.


Sign in / Sign up

Export Citation Format

Share Document