Analysis and detection of Byzantine attack in wireless sensor network

This paper outlines the Byzantine attack and comparative analysis with different attacks; among these attacks. The paper also presented the solution to the problem of Byzantine attack that arises in most of network scenarios. The problem of Byzantine attack is causing timeouts, unexpected transmission or packet losses. The proposed Solution modifies the existing techniques and provides some alternative solution, that is, (i) Set Network Node Controller that provides the authentication mechanism and control existing nodes in the network scenario, (ii) read MAC addresses of every node existing in the network, and (iii) adopt modify route selection mechanism to maintain the route table information. Results of simulation have been calculated from the NS2 Simulator and compare the results of proposed method with Byzantine attack.

[1]  Christoforos Panayiotou,et al.  A Survey on Routing Techniques Supporting Mobility in Sensor Networks , 2009, 2009 Fifth International Conference on Mobile Ad-hoc and Sensor Networks.

[2]  N. Marriwala,et al.  An approach to increase the wireless sensor network lifetime , 2012, 2012 World Congress on Information and Communication Technologies.

[3]  Parminder Singh,et al.  An Approach to Improve the Performance of WSN during Wormhole Attack using Promiscuous Mode , 2013 .

[4]  Xiaohui Liang,et al.  Sybil Attacks and Their Defenses in the Internet of Things , 2014, IEEE Internet of Things Journal.

[5]  Roopali Garg,et al.  Enhanced lightweight sybil attack detection technique , 2014, 2014 5th International Conference - Confluence The Next Generation Information Technology Summit (Confluence).

[6]  Zhiyun Lin,et al.  A geographically opportunistic routing protocol used in mobile wireless sensor networks , 2012, Proceedings of 2012 9th IEEE International Conference on Networking, Sensing and Control.

[7]  John Lane,et al.  Prime: Byzantine Replication under Attack , 2011, IEEE Transactions on Dependable and Secure Computing.

[8]  G. S. Mamatha,et al.  Network Layer Attacks and Defense Mechanisms in MANETS- A Survey , 2010 .

[9]  Ben Y. Zhao,et al.  QUORUM—Quality of Service in Wireless Mesh Networks , 2007, Mob. Networks Appl..

[10]  Somanath Tripathy,et al.  WRSR: wormhole-resistant secure routing for wireless mesh networks , 2013, EURASIP J. Wirel. Commun. Netw..

[11]  Devesh C. Jinwala,et al.  MOSAODV: Solution to Secure AODV against Blackhole Attack , 2009 .

[12]  Fei-Yue Wang,et al.  Key Technologies of Passive Wireless Sensor Networks Based on Surface Acoustic Wave Resonators , 2008, 2008 IEEE International Conference on Networking, Sensing and Control.

[13]  Parminder Singh Comparative study between unicast and Multicast Routing Protocols in different data rates using vanet , 2014, 2014 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT).

[14]  Luiz A. DaSilva,et al.  A reputation-based mechanism for isolating selfish nodes in ad hoc networks , 2005, The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services.

[15]  Yan Zhang,et al.  The Research of Coverage Problems in Wireless Sensor Network , 2009, 2009 International Conference on Wireless Networks and Information Systems.

[16]  Xuhui Chen,et al.  Research on hierarchical mobile wireless sensor network architecture with mobile sensor nodes , 2010, 2010 3rd International Conference on Biomedical Engineering and Informatics.

[17]  Ossama Younis,et al.  HEED: a hybrid, energy-efficient, distributed clustering approach for ad hoc sensor networks , 2004, IEEE Transactions on Mobile Computing.

[18]  Eryk Dutkiewicz,et al.  A review of routing protocols for mobile ad hoc networks , 2004, Ad Hoc Networks.

[19]  Ratan K. Guha,et al.  Effective intrusion detection using multiple sensors in wireless ad hoc networks , 2003, 36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the.