Swarm-based defense technique for tampering and cheating attack in WSN using CPHS

Nowadays, Wireless Sensor Networks (WSN) have been seen as one of the most essential technologies which play a vital role in several important areas, such as healthcare, military, critical infrastructure monitoring, environment monitoring, and manufacturing. The desirable nature of WSN introduces many security challenges which have necessitated the introduction of several classical security methodologies over the last few years for various security attacks. A defense technique using Swarm Based Trusted Node for Tampering and Cheating Attack (SBTN-TC) model has been proposed to identify the physical layer attacks in a WSN. This model, first selects a trusted node (TN) within the network for identifying the tampered or cheating nodes using swarm intelligence. The trusted node monitors and processes the nodes session receipts involved in the transmission session to extract the contextual information such as broken links, frequent packet droppers, and fair and cheating sessions. Based on the session receipts, the trusted node renews the nodes certificate and ignores the tampered node or cheating node. In order to maintain a secure communication of contextual information between node and trusted node, a Cryptographic Puzzle Hiding Scheme (CPHS) is used for submitting the session receipts to trusted node. The effectiveness of the proposed method has been proved from the simulation results based on packet delivery ratio, packet drop, residual energy, and overhead.

[1]  Tang Ming . Wei Lian. Si Tuo Lin Si,et al.  Cryptography and Network Security - Principles and Practice , 2015 .

[2]  Choong Seon Hong,et al.  Security in wireless sensor networks: issues and challenges , 2006, 2006 8th International Conference Advanced Communication Technology.

[3]  Issa M. Khalil,et al.  MOBIWORP: Mitigation of the Wormhole Attack in Mobile Multihop Wireless Networks , 2006, 2006 Securecomm and Workshops.

[4]  V. R. Sarma Dhulipala,et al.  Comparative Analysis on Fault Tolerant Techniques for Memory Cells in Wireless Sensor Devices , 2016 .

[5]  Sayyed Aziz,et al.  PACKET-HIDING METHODS FOR PREVENTING SELECTIVE JAMMING ATTACKS , 2014 .

[6]  Xuemin Shen,et al.  An Integrated Stimulation and Punishment Mechanism for Thwarting Packet Dropping Attack in Multihop Wireless Networks , 2011, IEEE Transactions on Vehicular Technology.

[7]  Rina Bhattacharya A COMPARATIVE STUDY OF PHYSICAL ATTACKS ON WIRELESS SENSOR NETWORKS , 2013 .

[8]  Hongmei Deng,et al.  Trust-Aware In-Network Aggregation for Wireless Sensor Networks , 2009, GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference.

[9]  Mohamed-Lamine Messai Classification of Attacks in Wireless Sensor Networks , 2014, ArXiv.

[10]  Félix Gómez Mármol,et al.  Towards pre-standardization of trust and reputation models for distributed and heterogeneous systems , 2010, Comput. Stand. Interfaces.

[11]  Yifeng Zhu,et al.  Effective Stochastic Modeling of Energy-Constrained Wireless Sensor Networks , 2012, J. Comput. Networks Commun..

[12]  Mrityunjaya V. Latte,et al.  Optimized mathematical model for cell receivers running in spatially problematic multi path channels for wireless systems in smart antennas , 2016, 2016 International Conference on Emerging Trends in Engineering, Technology and Science (ICETETS).

[13]  Loukas Lazos,et al.  Packet-Hiding Methods for Preventing Selective Jamming Attacks , 2012, IEEE Transactions on Dependable and Secure Computing.

[14]  V. Sumathy,et al.  A Swarm Based Defense Technique for Jamming Attacks in Wireless Sensor Networks , 2011 .

[15]  P. H. Bhathawala,et al.  Wireless Sensor Networks: Security Attacks and Challenges , 2017 .

[16]  S. Baskar Error recognition and correction enhanced decoding of hybrid codes for memory application , 2014, 2014 2nd International Conference on Devices, Circuits and Systems (ICDCS).

[17]  Roberto Di Pietro,et al.  A randomized, efficient, and distributed protocol for the detection of node replication attacks in wireless sensor networks , 2007, MobiHoc '07.

[18]  Lingxi Li,et al.  Bounded Length Least-Cost Path Estimation in Wireless Sensor Networks Using Petri Nets , 2012, J. Networks.

[19]  Miloslav Hub,et al.  Basic authentication procedure modelled by Petri nets , 2010 .

[20]  John S. Baras,et al.  An Analytic Framework for Modeling and Detecting Access Layer Misbehavior in Wireless Networks , 2008, TSEC.

[21]  S. Baskar,et al.  ERROR DETECTION AND CORRECTION ENHANCED DECODING OF DIFFERENCE SET CODES FOR MEMORY APPLICATION , 2012 .

[22]  Wuu Yang,et al.  A robust user authentication scheme with self-certificates for wireless sensor networks , 2011, Secur. Commun. Networks.

[23]  Raja Datta,et al.  Light-weight trust-based routing protocol for mobile ad hoc networks , 2012, IET Inf. Secur..