misdirection attack
Recently Published Documents


TOTAL DOCUMENTS

7
(FIVE YEARS 3)

H-INDEX

2
(FIVE YEARS 0)

Author(s):  
Iqra Mustafa ◽  
Sheraz Aslam ◽  
Muhammad Bilal Qureshi ◽  
Nouman Ashraf ◽  
Shahzad Aslam ◽  
...  

2020 ◽  
Vol 8 (5) ◽  
pp. 1411-1414

Wireless Sensor Network (WSN) is susceptible to various kinds of security attacks such as the misdirection attack. Detection of misdirection attack in WSN is a difficult job. The malicious node misdirects the arriving packets to a node other than the purposive node in the path from the source to the destination. Consequently, it introduces high end- to- end delay in the network. A novel technique for detection of misdirection attack in WSN without using cluster heads is proposed in the paper. The proposed detection technique has been implemented using Omnetpp 5.4.1 on four different network scenarios (10, 20, 30, and 40 numbers of nodes) and varying number of malicious nodes. The results of simulation shows that the proposed technique delivers better detection rate with reduced end- to- end delay compared to the detection method which uses cluster heads.


A distributed sort of network in which sensor nodes can join or leave the network when they want is identified as wireless sensor network. Due to self-arranging of the network, attacker nodes make their entry inside networks and launch different types of active and passive intrusions. The active attacks can be divided into various sub categories and one of them is misdirection attack. This attack increases delay in the network. The available attacker hub will trigger attack. In order to recognize and disengage malicious nodes a novel strategy is proposed in this work. The malicious nodes are recognized from the networks which are in charge of triggering the node. The attacker or malevolent node launches sinkhole intrusion. This intrusion streams fake recognition information within the network. This study proposes a verification approach for detecting attacker nodes present in the network. The performance of introduced approach is tested in NS2. It is scrutinized that performance is improved as per various parameters.


Sign in / Sign up

Export Citation Format

Share Document