Signature Based Vulnerability Detection Over Wireless Sensor Network for Reliable Data Transmission

Due to the significant improvement in wireless communication technology, the need of Wireless Sensor Networks (WSN) have a vital role in the areas such as military applications, environmental monitoring, health care, home or industrial automation etc. However such type of network always been vulnerable to security threats, because the WSN has the resource constraints such as low battery life, low processing power, small memory, deployment in hostile environment and the radio links for communication are insecure. Thus, it is necessary to use effective detection mechanism to prevent WSN from routing attacks for reliable data transmission. In this paper, a signature based detection approach is proposed for detecting the routing attacks. For every known attack it has certain signature, based on this the rules are designed with the rule base which are applied for detecting various routing attacks such as wormhole, black hole and sybil attack. The simulated results show that the proposed signature based approach improves the reliability of data by measuring the parameters such as throughput and packet delivery ratio while detecting the routing attacks.

[1]  Antonio Alfredo Ferreira Loureiro,et al.  Decentralized intrusion detection in wireless sensor networks , 2005, Q2SWinet '05.

[2]  Raja Sharmi Raja Husin,et al.  Optimization of Circular Side Door Beam for Crashworthiness Analysis , 2012 .

[3]  Yih-Chun Hu,et al.  Packet leashes: a defense against wormhole attacks in wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[4]  A. Perrig,et al.  The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.

[5]  Ian F. Akyildiz,et al.  Wireless sensor networks: a survey , 2002, Comput. Networks.

[6]  Fuxiang Gao,et al.  Detecting Wormhole Attacks in Wireless Sensor Networks with Statistical Analysis , 2010, 2010 WASE International Conference on Information Engineering.

[7]  L. Tamilselvan,et al.  Prevention of Blackhole Attack in MANET , 2007, The 2nd International Conference on Wireless Broadband and Ultra Wideband Communications (AusWireless 2007).

[8]  Stamatis Voliotis,et al.  Efficient Detection of Routing Attacks in Wireless Sensor Networks , 2009, 2009 16th International Conference on Systems, Signals and Image Processing.

[9]  G. Padmavathi,et al.  A Survey of Attacks, Security Mechanisms and Challenges in Wireless Sensor Networks , 2009, ArXiv.

[10]  Radha Poovendran,et al.  Preventing wormhole attacks on wireless ad hoc networks: a graph theoretic approach , 2005, IEEE Wireless Communications and Networking Conference, 2005.

[11]  Gabriel Maciá-Fernández,et al.  Anomaly-based network intrusion detection: Techniques, systems and challenges , 2009, Comput. Secur..

[12]  Aung Htein Maw,et al.  Wormhole Attack Detection in Wireless Sensor Networks , 2008 .

[13]  Anazida Zainal,et al.  A Survey of Intrusion Detection Schemes in Wireless Sensor Networks , 2012 .

[14]  Shafiullah Khan,et al.  Intrusion Detection Systems in Wireless Sensor Networks: A Review , 2013, Int. J. Distributed Sens. Networks.

[15]  Yong Wang,et al.  A survey of security issues in wireless sensor networks , 2006, IEEE Communications Surveys & Tutorials.

[16]  Yunhao Liu,et al.  Topological detection on wormholes in wireless ad hoc and sensor networks , 2009, IEEE/ACM Transactions on Networking.