Enhanced TESRP Protocol for Isolation of Selective Forwarding Attack in WSN

A wireless sensor network is the combination of large numbers of nodes connected to each other in order to communicate with other networks over a particular territory. Within the sensor networks there are two types of attacks which are active and passive attacks. The selective forwarding is the active type of attack in which malicious nodes drop some packets in the network which affect network performance which is considered in this paper. In this research work, technique of threshold is designed which detect and isolate malicious nodes from the network. The simulation results shows improvement in terms of dead nodes, throughput and packet loss.

[1]  Anitha S Sastry,et al.  Security Threats in Wireless Sensor Networks in Each Layer , 2013 .

[2]  Elisa Bertino,et al.  Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks , 2015, IEEE Transactions on Dependable and Secure Computing.

[3]  N. Alsharabi,et al.  Wireless sensor networks misdirection attacker challenges and solutions , 2008, 2008 International Conference on Information and Automation.

[4]  Sneha Kamble,et al.  Reliable routing data aggregation using efficient clustering in WSN , 2016, 2016 International Conference on Advanced Communication Control and Computing Technologies (ICACCCT).

[5]  Omar Said,et al.  Scaling of wireless sensor network intrusion detection probability: 3D sensors, 3D intruders, and 3D environments , 2015, EURASIP J. Wirel. Commun. Netw..

[6]  Hyeong Seon Yoo,et al.  On the Security Issues in Wireless Body Area Networks , 2009, J. Digit. Content Technol. its Appl..

[7]  Kamalrulnizam Abu Bakar,et al.  A Secure Routing Protocol with Trust and Energy Awareness for Wireless Sensor Network , 2016, Mob. Networks Appl..

[8]  G. Padmavathi,et al.  A Survey of Attacks, Security Mechanisms and Challenges in Wireless Sensor Networks , 2009, ArXiv.

[9]  David A. Wagner,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Ad Hoc Networks.

[10]  R. K. Gnanamurthy,et al.  Localized DoS Attack Detection Architecture for Reliable Data Transmission Over Wireless Sensor Network , 2016, Wirel. Pers. Commun..

[11]  Jing Lei,et al.  Full-duplex relay for enhancing physical layer security in Wireless Sensor Networks: Optimal power allocation for minimizing secrecy outage probability , 2017, 2017 IEEE 17th International Conference on Communication Technology (ICCT).

[12]  Hervé Guyennet,et al.  Wireless Sensor Network Attacks and Security Mechanisms: A Short Survey , 2010, 2010 13th International Conference on Network-Based Information Systems.

[13]  D. P. Singh,et al.  Misdirection attack in WSN: Topological analysis and an algorithm for delay and throughput prediction , 2013, 2013 7th International Conference on Intelligent Systems and Control (ISCO).

[14]  Kalpana Sharma,et al.  Wireless Sensor Networks: An Overview on its Security Threats , 2010 .

[15]  Vinodh P. Vijayan,et al.  Misdirection Attack in WSN Due to Selfish Nodes; Detection and Suppression using Longer Path Protocol , 2014 .

[16]  Suparna Biswas,et al.  A Survey of Security Attacks, Defenses and Security Mechanisms in Wireless Sensor Network , 2015 .

[17]  David A. Wagner,et al.  Security in wireless sensor networks , 2004, SASN '04.