Enhanced Detection of Packet Droppers AndModifiers In Wireless Sensor Networks

There are several emerging trends in the field of networks, out of which Wireless Sensor Networks(WSN) are gaining importance recent years due to its impact on Cost, ability to cope up with node and communication failures, Mobility, Capability to withstand harsh environmental condition, monitoring purpose and Ease of use. Despite Sensor nodes large collection of benefits there are few constrains such as Security, Quality of Service and Resource constrains which act as hurdle in implementing sensor network application in real world environment. Security is considered to be a critical parameter in Sensor network due to the fact that they are mostly deployed in an environment where human interaction is less. An opponent or intruder is one who may perform various attacks on packets in order to make a node compromise and cut short the communication to take place. Attacks that have been concentrated here are packet dropping and modification. Sensor applications are time critical and if compromised nodes are not detected, large quantities of irrelevant data can be injected into the network which in turn will have a greater impact on computational cost and storage overhead. In this paper Node Categorization and Heuristic Ranking (NCHR) is used along with our proposed scheme of energy consumption and delay aspects to identify compromised nodes and further a Secure Routing and Encryption techniques are provided to ensure reliable communication.

[1]  C. Karlof,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[2]  Pramod K. Varshney,et al.  An Acknowledgment-Based Approach for the Detection of Routing Misbehavior in MANETs , 2007, IEEE Transactions on Mobile Computing.

[3]  Tassos Dimitriou,et al.  LIDeA: a distributed lightweight intrusion detection architecture for sensor networks , 2008, SecureComm.

[4]  F. Freiling,et al.  Towards Intrusion Detection in Wireless Sensor Networks , 2007 .

[5]  Sharon Goldberg,et al.  Protocols and Lower Bounds for Failure Localization in the Internet , 2008, EUROCRYPT.

[6]  Guiling Wang,et al.  Catching Packet Droppers and Modifiers in Wireless Sensor Networks , 2009, 2009 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.

[7]  Fan Ye,et al.  Catching "Moles" in Sensor Networks , 2007, 27th International Conference on Distributed Computing Systems (ICDCS '07).

[8]  Yoon-Hwa Choi,et al.  A resilient packet-forwarding scheme against maliciously packet-dropping nodes in sensor networks , 2006, SASN '06.

[9]  Xin Zhang,et al.  Packet-dropping adversary identification for data plane security , 2008, CoNEXT '08.

[10]  Ajay K. Gupta,et al.  DPDSN : Detection of packet-dropping attacks for wireless sensor networks , 2005 .

[11]  Mary Baker,et al.  Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.

[12]  Elaine Shi,et al.  Detection of denial-of-message attacks on sensor network broadcasts , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).

[13]  Adrian Perrig,et al.  Security and Privacy in Sensor Networks , 2003, Computer.

[14]  Felix C. Freiling,et al.  Towards an Intrusion Detection System in Wireless Sensor Networks , 2007 .

[15]  Jie Wu,et al.  Reputation and Trust-based Systems for Ad Hoc and Sensor Networks , 2006 .

[16]  Panayiotis Kotzanikolaou,et al.  SecMR - a secure multipath routing protocol for ad hoc networks , 2007, Ad Hoc Networks.

[17]  Haiyun Luo,et al.  Statistical en-route filtering of injected false data in sensor networks , 2004, IEEE INFOCOM 2004.

[18]  Bo Yu,et al.  Detecting selective forwarding attacks in wireless sensor networks , 2006, Proceedings 20th IEEE International Parallel & Distributed Processing Symposium.

[19]  G. Padmavathi,et al.  A Survey of Attacks, Security Mechanisms and Challenges in Wireless Sensor Networks , 2009, ArXiv.

[20]  Vidya Kadam,et al.  An Acknowledgement-Based Approach for the Detection of Routing Misbehaviour in MANETS , 2011 .

[21]  Bo Yu,et al.  CHEMAS: Identify suspect nodes in selective forwarding attacks , 2007, J. Parallel Distributed Comput..

[22]  William A. Arbaugh,et al.  Toward resilient security in wireless sensor networks , 2005, MobiHoc '05.