Fair Election of Monitoring Nodes in WSNs

In this era of big data, of quantified self and of smart cities, wireless sensor networks are meant to be used every day, for all sort of applications. Made of tiny sensors, they collect data and communicate through wireless technologies. Because they may take part in sensitive or military applications, security is an essential matter in such networks. Confidentiality and authenticity can be ensured by the use of dedicated mechanisms. Focusing on availability, we propose here a new practical approach to protect the network against denial of service attacks thanks to the use of traffic monitoring agents called cNodes. The approach uses a fair election process of cNodes in accordance with classical criteria related to residual energies and the presence of compromised nodes which may have greedy or jamming behaviors. Results obtained from simulations show that this method is effective both in terms of detection and of energy conservation.

[1]  Dirk Timmermann,et al.  Low energy adaptive clustering hierarchy with deterministic cluster-head selection , 2002, 4th International Workshop on Mobile and Wireless Communications Network.

[2]  Alireza Keshavarz-Haddad,et al.  Watchdog-LEACH: A new method based on LEACH protocol to Secure Clustered Wireless Sensor Networks , 2013, ArXiv.

[3]  K. Kishan Rao,et al.  A Modified clustering for LEACH algorithm in WSN , 2013 .

[4]  Yang Xiao,et al.  Secure data aggregation in wireless sensor networks: A comprehensive overview , 2009, Comput. Networks.

[5]  Shengyong Chen,et al.  Game Theory for Wireless Sensor Networks: A Survey , 2012, Sensors.

[6]  Jeong-Uk Kim,et al.  Construction of Trusted Wireless Sensor Networks with Lightweight Bilateral Authentication , 2013 .

[7]  Jalel Ben-Othman,et al.  Timed automata based modeling and veri?cation of denial of service attacks in wireless sensor networks , 2014, Stud. Inform. Univ..

[8]  Subhash Challa,et al.  Survey of trust models in different network domains , 2010, ArXiv.

[9]  Ashish Jasuja,et al.  Algorithm for Optimizing First Node Die (FND) Time in LEACH Protocol , 2014 .

[10]  Sarma B. K. Vrudhula,et al.  An Analytical High-Level Battery Model for Use in Energy Management of Portable Electronic Systems , 2001, ICCAD.

[11]  Ricardo Dahab,et al.  SecLEACH - On the security of clustered sensor networks , 2007, Signal Process..

[12]  ALI JORIO,et al.  A NEW CLUSTERING ALGORITHM FOR WIRELESS SENSOR NETWORKS , 2013 .

[13]  M. Kumar,et al.  Cluster based Location privacy in Wireless Sensor Networks against a universal adversary , 2013, 2013 International Conference on Information Communication and Embedded Systems (ICICES).

[14]  Debashis De,et al.  Analysis of Security Threats in Wireless Sensor Network , 2014, ArXiv.

[15]  P. Sivakumar,et al.  Power Conservation and Security Enhancement in Wireless Sensor Networks: A Priority Based Approach , 2014, Int. J. Distributed Sens. Networks.

[16]  Murizah Kassim,et al.  A Literature Survey on Security Challenges in VANETs , 2012 .

[17]  Leonidas Kazatzopoulos,et al.  WSN Location Privacy Scheme Enhancement through Epidemical Information Dissemination , 2014, Int. J. Commun. Networks Inf. Secur..

[18]  Parminder Singh,et al.  An Efficient Novel Key Management Scheme for Enhancing User Authentication in A WSN , 2013 .

[19]  Shio Kumar Singh,et al.  A Survey on Network Security and Attack Defense Mechanism For Wireless Sensor Networks , 2011 .

[20]  Habib Youssef,et al.  Confidentiality and Integrity for Data Aggregation in WSN Using Homomorphic Encryption , 2014, Wireless Personal Communications.

[21]  Jalel Ben-Othman,et al.  Energy-balancing method to detect denial of service attacks in wireless sensor networks , 2014, 2014 IEEE International Conference on Communications (ICC).

[22]  Mario Di Francesco,et al.  Energy conservation in wireless sensor networks: A survey , 2009, Ad Hoc Networks.

[23]  Makoto Takizawa,et al.  A Survey on Clustering Algorithms for Wireless Sensor Networks , 2010, 2010 13th International Conference on Network-Based Information Systems.

[24]  Paolo Ballarini,et al.  Modeling tools for detecting DoS attacks in WSNs , 2013, Secur. Commun. Networks.

[25]  Sipra Das Bit,et al.  A lightweight security scheme for query processing in clustered wireless sensor networks , 2015, Comput. Electr. Eng..

[26]  Ossama Younis,et al.  HEED: a hybrid, energy-efficient, distributed clustering approach for ad hoc sensor networks , 2004, IEEE Transactions on Mobile Computing.