Reactive security scheme using behavioral aspects of attacks for Wireless Sensor Networks

Wireless Sensor Networks(WSN) are vulnerable to many types of hackers who might get into the network with the intent of fetching its significant data and destroying the network. The sink node in WSN that maintains the database of entire network is also prone to security violations and there is no such security mechanism devised for communicating the data to other nodes. Hence, there is a need to design security scheme with the capabilities to protect the network and the sink node on the occurrence of attack. In this paper, we aim to provide security with a reactive security scheme that includes studying the behavioral aspect of attacks and congregating the security demands. This scheme successively conglomerates the security and the network rescue mechanism free from attacks and their impacts on the network. The simulation results such as Packet Delivery Ratio(PDR), Malicious node activity, Delay, Transmission power depict various attack behaviours in WSN along with the Reception power rate observed by the sink node and the Packet loss.

[1]  Kang Yen,et al.  Sensor network security: a survey , 2009, IEEE Communications Surveys & Tutorials.

[2]  Cristina Alcaraz,et al.  Analysis of Security Threats, Requirements, Technologies and Standards in Wireless Sensor Networks , 2009, FOSAD.

[3]  Christian Callegari,et al.  Advances in Computing, Communications and Informatics (ICACCI) , 2015 .

[4]  Murali S. Kodialam,et al.  Detecting network intrusions via sampling: a game theoretic approach , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[5]  Rajashekhar C. Biradar,et al.  A survey on routing protocols in Wireless Sensor Networks , 2012, 2012 18th IEEE International Conference on Networks (ICON).

[6]  N.R. Prasad,et al.  A Security, Privacy and trust architecture for Wireless Sensor Networks , 2008, 2008 50th International Symposium ELMAR.

[7]  Ian F. Akyildiz,et al.  Sensor Networks , 2002, Encyclopedia of GIS.

[8]  Yusnani Mohd Yussoff,et al.  A Review of Physical Attacks and Trusted Platforms in Wireless Sensor Networks , 2012 .

[9]  Sajal K. Das,et al.  Intrusion detection in sensor networks: a non-cooperative game approach , 2004, Third IEEE International Symposium on Network Computing and Applications, 2004. (NCA 2004). Proceedings..

[10]  Mohamed F. Younis,et al.  A survey on routing protocols for wireless sensor networks , 2005, Ad Hoc Networks.

[11]  Yee Wei Law,et al.  How to Secure a Wireless Sensor Network , 2005, 2005 International Conference on Intelligent Sensors, Sensor Networks and Information Processing.

[12]  Lalan Kumar,et al.  A review on security issues in wireless sensor network , 2010 .

[13]  Han Zhijie,et al.  Intrusion Detection for Wireless Sensor Network Based on Traffic Prediction Model , 2012 .

[14]  Shu-Chin Wang,et al.  An Integrated Intrusion Detection System for Cluster-based Wireless Sensor Networks , 2011, Expert Syst. Appl..

[15]  Ann Nowé,et al.  Decentralized Learning in Wireless Sensor Networks , 2009, ALA.