Improving Adhoc wireless sensor networks security using distributed automaton

Wireless Sensor Network due to their Adhoc nature have emerged as a popular technology driving the growth of Internet of Things and Cyber Physical Systems. Wireless Sensor Networks due to their self-configuring nature are more vulnerable to attacks at all layers of the OSI model. Malicious attacks include packet drops, change in the data structure and mimicking other devices to destabilize the network. This work proposed an Intelligent Control Mechanism to secure WSN based on the principles of Distributed Automaton. Simulations carried out show the effectiveness of the proposed technique in not only improving the network performance but also reduction in time space complexities. The proposed techniques performs well even in heterogenous network by using the clustered behavior.

[1]  Yan Zhang,et al.  The Research of Coverage Problems in Wireless Sensor Network , 2009, 2009 International Conference on Wireless Networks and Information Systems.

[2]  Annu Joshi Denial of service in wireless sensor network attacks and defenses , 2018 .

[3]  Jianying Zhou,et al.  Applying intrusion detection systems to wireless sensor networks , 2006, CCNC 2006. 2006 3rd IEEE Consumer Communications and Networking Conference, 2006..

[4]  A. Perrig,et al.  The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.

[5]  Marco Conti,et al.  Mobile ad hoc networking: milestones, challenges, and new research directions , 2014, IEEE Communications Magazine.

[6]  Jean-Marie Bonnin,et al.  Wireless sensor networks: a survey on recent developments and potential synergies , 2013, The Journal of Supercomputing.

[7]  Noman Islam,et al.  A review of wireless sensors and networks' applications in agriculture , 2014, Comput. Stand. Interfaces.

[8]  Shiyong Zhang,et al.  Resisting flooding attacks in ad hoc networks , 2005, International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II.

[9]  Adrian Perrig,et al.  Distributed detection of node replication attacks in sensor networks , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).

[10]  Scott F. Midkiff,et al.  Denial-of-Service in Wireless Sensor Networks: Attacks and Defenses , 2008, IEEE Pervasive Computing.

[11]  Philip S. Yu,et al.  Cross-feature analysis for detecting ad-hoc routing anomalies , 2003, 23rd International Conference on Distributed Computing Systems, 2003. Proceedings..

[12]  C. Karlof,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[13]  Yih-Chun Hu Packet Leashes : A Defense against Wormhole Attacks in Wireless Ad Hoc Networks , 2001 .

[14]  José A. Gutiérrez,et al.  On the Use of IEEE Std. 802.15.4 to Enable Wireless Sensor Networks in Building Automation , 2004, Int. J. Wirel. Inf. Networks.

[15]  Xinrong Li,et al.  Wireless Sensor Network System Design Using Raspberry Pi and Arduino for Environmental Monitoring Applications , 2014, FNC/MobiSPC.

[16]  Shafiullah Khan,et al.  Intrusion Detection Systems in Wireless Sensor Networks: A Review , 2013, Int. J. Distributed Sens. Networks.

[17]  Winston Khoon Guan Seah,et al.  Reliability in wireless sensor networks: A survey and challenges ahead , 2015, Comput. Networks.

[18]  Max Mühlhäuser,et al.  Collaborative Intrusion Detection in Smart Energy Grids , 2013 .

[19]  Gerhard P. Hancke,et al.  Opportunities and Challenges of Wireless Sensor Networks in Smart Grid , 2010, IEEE Transactions on Industrial Electronics.

[20]  Refik Molva,et al.  Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks , 2002, Communications and Multimedia Security.

[21]  Biming Tian,et al.  Anomaly detection in wireless sensor networks: A survey , 2011, J. Netw. Comput. Appl..

[22]  Yih-Chun Hu,et al.  Packet leashes: a defense against wormhole attacks in wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[23]  Lin Wu,et al.  A PEFKS- and CP-ABE-Based Distributed Security Scheme in Interest-Centric Opportunistic Networks , 2013, Int. J. Distributed Sens. Networks.

[24]  Virgil D. Gligor,et al.  On secure and reliable communications in wireless sensor networks: Towards k-connectivity under a random pairwise key predistribution scheme , 2014, 2014 IEEE International Symposium on Information Theory.

[25]  Y.A. Sekercioglu,et al.  Detecting Selective Forwarding Attacks in Wireless Sensor Networks using Support Vector Machines , 2007, 2007 3rd International Conference on Intelligent Sensors, Sensor Networks and Information.