FBMT: fuzzy based merkle technique for detecting and mitigating malicious nodes in sensor networks

Wireless sensor networks are prone to many vulnerabilities because of its unattended environment policy. Intrusion is one of the serious issue in wireless networks, since wireless networks are resource constrained and devising a security mechanism to counter intrusion is a challenging task. This paper focuses on building light-weight Intrusion Detection System to counter the routing attack, by identifying the malicious nodes at the earliest point. The proposed scheme namely Fuzzy Based Merkle Technique applies fuzzy logic to identify the malicious nodes and builds a light-weight Intrusion detection system and adapts Merkle tree approach for building the network. The proposed scheme is efficient in identifying the malicious nodes with minimum energy consumption and less communication overhead than the existing Merkle technique. Network Simulator 2 is used to simulate the Intrusion Detection System (IDS) and the results are verified.

[1]  Robert LIN,et al.  NOTE ON FUZZY SETS , 2014 .

[2]  Kerim Goztepe,et al.  Designing Fuzzy Rule Based Expert System for Cyber Security , 2012 .

[3]  Chun-Hung Richard Lin,et al.  Intrusion detection system: A comprehensive review , 2013, J. Netw. Comput. Appl..

[4]  Dorothy E. Denning,et al.  An Intrusion-Detection Model , 1987, IEEE Transactions on Software Engineering.

[5]  Ralph C. Merkle,et al.  A Digital Signature Based on a Conventional Encryption Function , 1987, CRYPTO.

[6]  Umamakeswari Arumugam,et al.  Intrusion Detection Algorithm for Mitigating Sinkhole Attack on LEACH Protocol in Wireless Sensor Networks , 2015, J. Sensors.

[7]  Iman Attarzadeh,et al.  A NOVEL APPROACH FOR FAULTY NODE DETECTION W ITH THE AID OFFUZZY THEORY AND M AJORITY VOTING IN W IRELESS SENSOR NETWORKS , 2012 .

[8]  Annie Mathew,et al.  A survey on various detection techniques of sinkhole attacks in WSN , 2017, 2017 International Conference on Communication and Signal Processing (ICCSP).

[9]  Sivakami Raja,et al.  Performance comparison of neuro-fuzzy cloud intrusion detection systems , 2016, Int. Arab J. Inf. Technol..

[10]  Jimmi Grönkvist,et al.  Evaluation of a Specification-Based Intrusion Detection System for AODV , 2007 .

[11]  Abderrahmane Baadache,et al.  Fighting against packet dropping misbehavior in multi-hop wireless ad hoc networks , 2012, J. Netw. Comput. Appl..

[12]  Ping Li,et al.  Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures , 2012, J. Netw. Comput. Appl..

[13]  Jatinder Singh,et al.  A cross-layer based intrusion detection technique for wireless networks , 2012, Int. Arab J. Inf. Technol..

[14]  Karl N. Levitt,et al.  Execution monitoring of security-critical programs in distributed systems: a specification-based approach , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).

[15]  Karl N. Levitt,et al.  A specification-based intrusion detection system for AODV , 2003, SASN '03.

[17]  Kamalanathan Chandran,et al.  Designing a fuzzy-logic based trust and reputation model for secure resource allocation in cloud computing , 2016, Int. Arab J. Inf. Technol..

[18]  G. Santhi,et al.  A Survey on Various Attacks and Countermeasures in Wireless Sensor Networks , 2017 .