Loading [MathJax]/extensions/MathMenu.js
CPMTS: Catching packet modifiers with trust support in wireless sensor networks | IEEE Conference Publication | IEEE Xplore

CPMTS: Catching packet modifiers with trust support in wireless sensor networks


Abstract:

Security in wireless sensor networks is critical due to its way of open communication. Packet modification is a common attack in wireless sensor networks. In literature, ...Show More

Abstract:

Security in wireless sensor networks is critical due to its way of open communication. Packet modification is a common attack in wireless sensor networks. In literature, many schemes have been proposed to mitigate such an attack but very few detect the malicious nodes effectively. In the proposed approach, each node chooses the parent node for forwarding the packet towards sink. Each node adds its identity and trust on parent as a routing path marker and encrypts only the bytes added by node in packet before forwarding to parent. Sink can determine the modifiers based on trust value and node identities marked in packet. Child node observes the parent and decides the trust on parent based on successful and unsuccessful transactions. Data transmission is divided into multiple rounds of equal time duration. Each node chooses the parent node at the beginning of a round based on its own observation on parent. Simulated the algorithm in NS-3 and performance analysis is discussed. With the combination of trust factor and fixed path routing to detect malicious activity, analytical results show that proposed method detect modifiers efficiently and early, and also with low percentage of false detection.
Date of Conference: 19-20 December 2015
Date Added to IEEE Xplore: 31 March 2016
ISBN Information:
Conference Location: Dhaka, Bangladesh
References is not available for this document.

I. Introduction

A wireless sensor network (WSN) consists of spatially distributed autonomous devices having sensing, computing and communication capabilities. Sensor nodes cooperatively monitor physical or environmental conditions, such as temperature, pressure, sound, vibration, motion or pollutants. Wireless sensor networks are used in environmental conditions where information is difficult to access. Sensor node, also known as a ’mote’, is a node in a wireless sensor network that is capable of performing some processing, gathering sensory information and communicating with other connected nodes in the network. Sensor network transmits the data from one node to another node in an adhoc way and finally to a base station where the data is stored, processed and displayed.

Select All
1.
H. Chan and A. Perrig, "Security and Privacy in Sensor Networks", Computer, vol. 36, pp. 103-105, Oct 2003.
2.
Issa M. Khalil, "ELMO: Energy Aware Local Monitoring in Sensor Networks", IEEE Transactions on dependable and secure computing, vol. 8, pp. 523-536, August 2011.
3.
W Chuang, F Taiming, K Jinsook, W Guiling and Z Wensheng, "Catching Packet Droppers and Modifiers in Wireless Sensor Networks", IEEE Transactions on Parallel and Distributed Systems, vol. 23, pp. 835-843, May 2012.
4.
C. Karlof and D. Wagner, "Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures", Proc. IEEE First Intl Workshop Sensor Network Protocols and Applications, 2003.
5.
V. Bhuse, A. Gupta and L. Lilien, "DPDSN: Detection of Packet - Dropping Attacks for Wireless Sensor Networks", Proc. Fourth Trusted Internet Workshop, 2005.
6.
M. Kefayati, H.R. Rabiee, S.G. Miremadi and A. Khonsari, "Misbehavior Resilient Multi-Path Data Transmission in Mobile Ad-Hoc Networks", Proc. Fourth ACM Workshop Security of Ad Hoc and Sensor Networks (SASN 06), 2006.
7.
R. Mavropodi, P. Kotzanikolaou and C. Douligeris, "SECMRa Secure Multipath Routing Protocol for Ad Hoc Networks", Ad Hoc Networks, vol. 5, pp. 87-99, 2007.
8.
F. Ye, H. Luo, S. Lu and L. Zhang, "Statistical En-Route Filtering of Injected False Data in Sensor Networks", Proc. IEEE INFOCOM, 2004.
9.
S. Zhu, S. Setia, S. Jajodia and P. Ning, "An Interleaved Hop-by-Hop Authentication Scheme for Filtering False Data in Sensor Networks", Proc. IEEE Svmp. Securitv and Privacv, 2004.
10.
H. Yang, F. Ye, Y. Yuan, S. Lu and W. Arbaugh, "Toward Resilient Security in Wireless Sensor Networks", Proc. Sixth ACM IntI Symp. Mobile Ad Hoc Networking and Computing (MobiHoc 05), 2005.
Contact IEEE to Subscribe

References

References is not available for this document.