This document proposes a new secure routing scheme to simultaneously detect and defend against wormhole attacks and false report attacks in wireless sensor networks. Existing security schemes focus on defending against single attacks but their performance degrades when multiple attacks occur simultaneously. The proposed scheme uses a key partition-based routing protocol to mitigate the detection probability reduction caused by wormholes. It also defines a new event report format containing verification counts and wormhole detection mechanisms. The scheme aims to detect attacks with few hops and low overhead even if the sender or receiver is compromised.
NUMBER OF NEIGHBOUR NODES BASED NEXT FORWARDING NODES DETERMINATION SCHEME FO...ijcsity
Wireless Sensor Networks (Wsn) Are Used In Various Areas. These Networks Are Deployed In An Open Environment. So, They Are Very Weak Against An Attack, And Easily Damaged.The Wsn Has Limited Resources In Terms Of Battery Life, Computing Power, Communication Bandwidth And So On. Many Attacks Aim At That Point.The False Report Injection Attack Is One Of Them. Yu Et Al. Proposed A Dynamic En-Route Filtering Scheme (Def),To Prevent A False Report Injection Attack.In This Paper, We Propose An Energy Enhancement Scheme For Def Using A Fuzzy System. The Def Is Divided Into Three Phases (Key Pre-Distribution Phase, Key Dissemination Phase, Report Forwarding Phase). We Applied Our Scheme At The Next Forwarding Node Determination. So We Used Three Input Factors Of A Fuzzy System To Make A Determination. These Are The Availability Of Energy, Distance To The Base Station,
And Usage Count.Through The Experiments, Our Proposed Method Shows Up To 8.2% Energy Efficiency,Compared With The Def. If The Networks Consume More Energy, Our Proposed Method Shows More Efficiency For The Energy.
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
PERFORMANCE EVALUATION OF WIRELESS SENSOR NETWORK UNDER HELLO FLOOD ATTACKIJCNCJournal
Wireless sensor network (WSN) is highly used in many fields. The network consists of tiny lightweight
sensor nodes and is largely used to scan or detect or monitor environments. Since these sensor nodes are
tiny and lightweight, they put some limitations on resources such as usage of power, processing given task,
radio frequency range. These limitations allow network vulnerable to many different types of attacks such
as hello flood attack, black hole, Sybil attack, sinkhole, and many more. Among these attacks, hello flood is
one of the most important attacks. In this paper,we have analyzed the performance of hello flood attack and
compared the network performance as number of attackers increases. Network performance is evaluated
by modifying the ad-hoc on demand distance vector (AODV) routing protocol by using NS2 simulator. It
has been tested under different scenarios like no attacker, single attacker, and multiple attackers to know
how the network performance changes. The simulation results show that as the number of attackers
increases the performance in terms of throughput and delay changes.
IOSR Journal of Electronics and Communication Engineering(IOSR-JECE) is an open access international journal that provides rapid publication (within a month) of articles in all areas of electronics and communication engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in electronics and communication engineering. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
REPLICATION ATTACK MITIGATIONS FOR STATIC AND MOBILE WSNIJNSA Journal
Security is important for many sensor network applications. Wireless Sensor Networks (WSN) are often deployed in hostile environments as static or mobile, where an adversary can physically capture some of the nodes. once a node is captured, adversary collects all the credentials like keys and identity etc. the attacker can re-program it and replicate the node in order to eavesdrop the transmitted messages or compromise the functionality of the network. Identity theft leads to two types attack: clone and sybil. In particularly a harmful attack against sensor networks where one or more node(s) illegitimately claims an identity as replicas is known as the node replication attack. The replication attack can be exceedingly injurious to many important functions of the sensor network such as routing, resource llocation, misbehavior detection, etc. This paper analyzes the threat posed by the replication attack and several novel techniques to detect and defend against the replication attack, and analyzes their effectiveness in both static and mobile WSN.
Wireless sensor networks are nowadays widely popular and has become an integral part in the military
applications for human monitoring, thermal detection etc. Security of Wireless sensor network (WSN)
becomes a very important issue with the rapid development of WSN that is vulnerable to a wide range of
attacks such as sinkhole attacks due to deployment in the hostile environment and having limited resources.
Intrusion detection system is one of the major and efficient defensive methods against attacks in WSN. One
such detection technique is black listing technology. But using only Black listing technology is not suitable
for a mobile intruder since it was designed considering only a static intruding node in a WSN. So it is
necessary to build an energy efficient Intrusion detection system for sinkhole attack by a mobile intruder in
WSN. We are intended to design an energy efficient system for detection of sinkhole and elimination of a
mobile intruder from WSN nodes using a technology called greylisting. This technology uses pre alarm
packets to warn the neighboring nodes about the intruder and the energy consumed by the pre alarm
packets for making an alarm is much lesser than that of the packets used in black listing technology. Thus
this method will serve as the solution for the dilemma in providing the security for WSN in sinkhole attack.
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...ijasuc
This paper proposes a new top-down hierarchical, multi-hop, secure routing protocol for the wireless
sensor network, which is resilient to report fabrication attack. The report fabrication attack tries to
generate bogus reports by compromising the sensor nodes to mislead the environment monitoring
application executed by randomly deployed wireless sensor nodes. The proposed protocol relies on
symmetric key mechanism which is appropriate for random deployment of wireless sensor nodes. In the
proposed protocol, base station initiates the synthesis of secure hierarchical topology using top down
approach. The enquiry phase of the protocol provides assurance for the participation of all the cluster
heads in secure hierarchical topology formation. Further, this methodology takes care of failure of head
node or member node of a cluster. This protocol ensures confidentiality, integrity, and authenticity of the
final report of the monitoring application. The simulation results demonstrate the scalability of the
proposed protocol.
misrouting attack in wireless sensor networks under replication attack. agent based security schemes in Security schemes for wireless sensor networks. International journal paper on wireless sensor networks.
NUMBER OF NEIGHBOUR NODES BASED NEXT FORWARDING NODES DETERMINATION SCHEME FO...ijcsity
Wireless Sensor Networks (Wsn) Are Used In Various Areas. These Networks Are Deployed In An Open Environment. So, They Are Very Weak Against An Attack, And Easily Damaged.The Wsn Has Limited Resources In Terms Of Battery Life, Computing Power, Communication Bandwidth And So On. Many Attacks Aim At That Point.The False Report Injection Attack Is One Of Them. Yu Et Al. Proposed A Dynamic En-Route Filtering Scheme (Def),To Prevent A False Report Injection Attack.In This Paper, We Propose An Energy Enhancement Scheme For Def Using A Fuzzy System. The Def Is Divided Into Three Phases (Key Pre-Distribution Phase, Key Dissemination Phase, Report Forwarding Phase). We Applied Our Scheme At The Next Forwarding Node Determination. So We Used Three Input Factors Of A Fuzzy System To Make A Determination. These Are The Availability Of Energy, Distance To The Base Station,
And Usage Count.Through The Experiments, Our Proposed Method Shows Up To 8.2% Energy Efficiency,Compared With The Def. If The Networks Consume More Energy, Our Proposed Method Shows More Efficiency For The Energy.
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
PERFORMANCE EVALUATION OF WIRELESS SENSOR NETWORK UNDER HELLO FLOOD ATTACKIJCNCJournal
Wireless sensor network (WSN) is highly used in many fields. The network consists of tiny lightweight
sensor nodes and is largely used to scan or detect or monitor environments. Since these sensor nodes are
tiny and lightweight, they put some limitations on resources such as usage of power, processing given task,
radio frequency range. These limitations allow network vulnerable to many different types of attacks such
as hello flood attack, black hole, Sybil attack, sinkhole, and many more. Among these attacks, hello flood is
one of the most important attacks. In this paper,we have analyzed the performance of hello flood attack and
compared the network performance as number of attackers increases. Network performance is evaluated
by modifying the ad-hoc on demand distance vector (AODV) routing protocol by using NS2 simulator. It
has been tested under different scenarios like no attacker, single attacker, and multiple attackers to know
how the network performance changes. The simulation results show that as the number of attackers
increases the performance in terms of throughput and delay changes.
IOSR Journal of Electronics and Communication Engineering(IOSR-JECE) is an open access international journal that provides rapid publication (within a month) of articles in all areas of electronics and communication engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in electronics and communication engineering. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
REPLICATION ATTACK MITIGATIONS FOR STATIC AND MOBILE WSNIJNSA Journal
Security is important for many sensor network applications. Wireless Sensor Networks (WSN) are often deployed in hostile environments as static or mobile, where an adversary can physically capture some of the nodes. once a node is captured, adversary collects all the credentials like keys and identity etc. the attacker can re-program it and replicate the node in order to eavesdrop the transmitted messages or compromise the functionality of the network. Identity theft leads to two types attack: clone and sybil. In particularly a harmful attack against sensor networks where one or more node(s) illegitimately claims an identity as replicas is known as the node replication attack. The replication attack can be exceedingly injurious to many important functions of the sensor network such as routing, resource llocation, misbehavior detection, etc. This paper analyzes the threat posed by the replication attack and several novel techniques to detect and defend against the replication attack, and analyzes their effectiveness in both static and mobile WSN.
Wireless sensor networks are nowadays widely popular and has become an integral part in the military
applications for human monitoring, thermal detection etc. Security of Wireless sensor network (WSN)
becomes a very important issue with the rapid development of WSN that is vulnerable to a wide range of
attacks such as sinkhole attacks due to deployment in the hostile environment and having limited resources.
Intrusion detection system is one of the major and efficient defensive methods against attacks in WSN. One
such detection technique is black listing technology. But using only Black listing technology is not suitable
for a mobile intruder since it was designed considering only a static intruding node in a WSN. So it is
necessary to build an energy efficient Intrusion detection system for sinkhole attack by a mobile intruder in
WSN. We are intended to design an energy efficient system for detection of sinkhole and elimination of a
mobile intruder from WSN nodes using a technology called greylisting. This technology uses pre alarm
packets to warn the neighboring nodes about the intruder and the energy consumed by the pre alarm
packets for making an alarm is much lesser than that of the packets used in black listing technology. Thus
this method will serve as the solution for the dilemma in providing the security for WSN in sinkhole attack.
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...ijasuc
This paper proposes a new top-down hierarchical, multi-hop, secure routing protocol for the wireless
sensor network, which is resilient to report fabrication attack. The report fabrication attack tries to
generate bogus reports by compromising the sensor nodes to mislead the environment monitoring
application executed by randomly deployed wireless sensor nodes. The proposed protocol relies on
symmetric key mechanism which is appropriate for random deployment of wireless sensor nodes. In the
proposed protocol, base station initiates the synthesis of secure hierarchical topology using top down
approach. The enquiry phase of the protocol provides assurance for the participation of all the cluster
heads in secure hierarchical topology formation. Further, this methodology takes care of failure of head
node or member node of a cluster. This protocol ensures confidentiality, integrity, and authenticity of the
final report of the monitoring application. The simulation results demonstrate the scalability of the
proposed protocol.
misrouting attack in wireless sensor networks under replication attack. agent based security schemes in Security schemes for wireless sensor networks. International journal paper on wireless sensor networks.
Security Attacks and its Countermeasures in Wireless Sensor NetworksIJERA Editor
Wireless Sensor Networks have come to the forefront of the scientific community recently. Present WSNs typically communicate directly with a centralized controller or satellite. Going on the other hand, a smart WSN consists of a number of sensors spread across a geographical area; each sensor has wireless communication ability and sufficient intelligence for signal processing and networking of the data. This paper surveyed the different types of attacks, security related issues, and it’s Countermeasures with the complete comparison between Layer based Attacks in Wireless Sensor Networks
Techniques to Secure Wireless Sensor Networks in Terms of Delay, Process Time...AM Publications
The wireless sensor network system so created and the outcomes so ascertained depend on two standard encryption procedures. In another setting these systems are utilized for security however the exploration paper is assessed on the premise of three distinct parameters in particular delay energy and process time. The most basic piece of this paper is figuring of obligation cycle, which helps in presenting the energy and time delay in both encryption strategies. After broad research and study and computations so done, it has been found that if SAMA strategy is utilized then after effect of delay, energy, and process time all turns out to be better.
Limiting Self-Propagating Malware Based on Connection Failure Behavior csandit
Self-propagating malware (e.g., an Internet worm) exploits security loopholes in software to
infect servers and then use them to scan the Internet for more vulnerable servers. While the
mechanisms of worm infection and their propagation models are well understood, defense
against worms remains an open problem. One branch of defense research investigates the
behavioral difference between worm-infected hosts and normal hosts to set them apart. One
particular observation is that a worm-infected host, which scans the Internet with randomly
selected addresses, has a much higher connection-failure rate than a normal host. Rate-limit
algorithms have been proposed to control the spread of worms by traffic shaping based on
connection failure rate. However, these rate-limit algorithms can work properly only if it is
possible to measure failure rates of individual hosts efficiently and accurately. This paper points
out a serious problem in the prior method and proposes a new solution based on a highly
efficient double-bitmap data structure, which places only a small memory footprint on the
routers, while providing good measurement of connection failure rates whose accuracy can be
tuned by system parameters.
Secure Data Aggregation Technique for Wireless Sensor Networks in the Presenc...1crore projects
IEEE PROJECTS 2015
1 crore projects is a leading Guide for ieee Projects and real time projects Works Provider.
It has been provided Lot of Guidance for Thousands of Students & made them more beneficial in all Technology Training.
Dot Net
DOTNET Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
Java Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
ECE IEEE Projects 2015
1. Matlab project
2. Ns2 project
3. Embedded project
4. Robotics project
Eligibility
Final Year students of
1. BSc (C.S)
2. BCA/B.E(C.S)
3. B.Tech IT
4. BE (C.S)
5. MSc (C.S)
6. MSc (IT)
7. MCA
8. MS (IT)
9. ME(ALL)
10. BE(ECE)(EEE)(E&I)
TECHNOLOGY USED AND FOR TRAINING IN
1. DOT NET
2. C sharp
3. ASP
4. VB
5. SQL SERVER
6. JAVA
7. J2EE
8. STRINGS
9. ORACLE
10. VB dotNET
11. EMBEDDED
12. MAT LAB
13. LAB VIEW
14. Multi Sim
CONTACT US
1 CRORE PROJECTS
Door No: 214/215,2nd Floor,
No. 172, Raahat Plaza, (Shopping Mall) ,Arcot Road, Vadapalani, Chennai,
Tamin Nadu, INDIA - 600 026
Email id: 1croreprojects@gmail.com
website:1croreprojects.com
Phone : +91 97518 00789 / +91 72999 51536
Maximizing network interruption in wirelessIJCNCJournal
With the colossal growth of wireless sensor networks (WSNs) in different applications starting from home
automation to military affairs, the pressure on ensuring security in such a network is paramount.
Considering the security challenges, it is really a hard-hitting effort to develop a secured WSN system.
Moreover, as the information technology is getting popular, the intruders are also planning new ideas to
break the system security, to harm the network and to make the system quality down with the target of
taking the control of the network to corrupt it or to get benefits from it anyway. The intruders corrupt the
system only when the security breaking cost (SBC) is lower compared with the benefits they attained or the
harm it can make to others. In this paper, the authors define the term “maximizing network interruption
problem” and propose a technique, called the grid point approximation algorithm, to estimate the SBC of a
multi-hop WSN so that it can be made tougher for an intruder to break the system security. It is assumed
that the intruder has the complete picture of the entire network. The technique is designed from the
intruder’s point of view for completely jamming all the sensor nodes in the network through placing
jammers or malicious nodes strategically and at the same time keeping the number of jammer nodes to
minimum or near minimum. To the best of the authors’ knowledge, there is no work proposed so far of the
same kind. Experimental results with the changes of the different network parameters show that the
proposed algorithm is able to provide excellent performances to achieve the targets.
Enhancing the Security in WSN using Three Tier Security ArchitectureAM Publications,India
Security is the main issue while setting up the WSN network for node communication. This report describes the efficient mechanism for achieving the security between node communications by creating three tier security architecture. This system implements three tier architecture with the use of two polynomial pools having sensor nodes, mobile sinks and some access points that are also sensor nodes, to get better security. Two pools are common mobile polynomial pool and common static polynomial pool. Mobile sinks and access point carries keys from common mobile polynomial pool were as, access points and sensor nodes carries keys from common static polynomial pool. Communication gets established from mobile sink to access point then from access point to sensor node that shows three tier architecture Authentication is the main aspect of the system, that is achieved by pairwise key predistribution methods and authentication of the nodes with the use of polynomial keys. Here, Mobile sink replication attack is implemented against the network. The malicious node, it is blocked. If it wants to communicate within the network then it needs to capture large no of keys from both the pools for authentication. But as the sufficient keys are not available with it, it cannot communicate with the other nodes in the network
PDS- A Profile based Detection Scheme for flooding attack in AODV based MANETijsptm
One of the main challenges in MANET is to design the robust security solution that can protect MANET
from various routing attacks. Flooding attack launched at network layer is a serious routing attack which
can consume more resources like bandwidth, battery power, etc. It is more concealed form of Denial of
service attack and resource consumption attack. The route discovery scheme in reactive routing protocols
like Adhoc On Demand Distance Vector (AODV) and Dynamic Source Routing (DSR) used in MANET
makes it more easy for malicious nodes to launch connection request floods by flooding the route request
packets (RREQ) on the network. A novel detection technique based on dynamic profile with traffic pattern
analysis (PDS) is proposed. Its effectiveness in detecting and isolating the malicious node that floods the
route request packets is evaluated using java simulator jist/swans.
Securing WSN communication using Enhanced Adaptive Acknowledgement ProtocolIJMTST Journal
Wireless Sensor Networking is one of the most important technologies that have different applications. The
security of wireless sensor networks is a big concern. Hence for secure communication it is important to
detect and prevent the attacks in network. Major focus is given on security and on detection and prevention of
attacks. Adversary can create gray-hole attack and black-hole attack simultaneously. There are many
methods which do not provide proper method to defend against these kinds of attacks. The Ad-hoc On
Demand Distance Vector (AODV) scheme is used for detecting Gray-Hole attack and Enhanced Adaptive
Acknowledgment (EAACK) mechanism is used for detecting black-hole attack in network. But only by
detecting and preventing the attacks, it does not provide the better security to wireless network. Therefore, to
secure network a hybrid mechanism is deployed in wireless sensor network. Security algorithm for wireless
sensor networks such as CAWS and Modern Encryption Standard (MES-1) is used for secure communication.
The CAWS and Modern Encryption Standard (MES-1) is an advanced cryptography method which is used for
encryption and decryption process to provide special security.
Integrated Security and Attack Detection Scheme for Wireless Sensor NetworksEditor IJMTER
The wireless sensor node is a tiny device that is used to capture environment information.
Sensor devices are used to capture temperature and pressure details from the environment. The
sensor devices are used in hospitals, home and production plants. The main components of a sensor
node are microcontroller, transceiver, external memory and power source. A wireless sensor network
(WSN) is a wireless network consisting of spatially distributed autonomous devices. Sensors are
used to cooperatively monitor physical or environmental conditions. Sensor network is equipped
with a radio transceiver or other wireless communications device. The sensor networks are deployed
with consideration of sensing and transmission coverage factors.
Sensor network security protocols provide confidentiality for the messages. Object location and data
sink information are the sensitive elements in the sensor network. Two techniques are used to
provide location privacy to monitored objects. They are Source-location privacy and Sink-location
privacy. Periodic collection and Source simulation models are used in Source-location privacy
technique. Sink simulation and backbone flooding models are used in Sink-location privacy
technique. Communication cost and latency factors are consider in the privacy protection model.
Source and destination location details are protected in the privacy model.
The proposed system integrates the location privacy and data security process for the wireless sensor
network. Region based query model is used to improve location privacy. Confidentiality and
integrity techniques are used for the security process. Rivest Cipher (RC4) algorithm and Secure
Hashing Algorithms (SHA) are used for the data security.
AN ENERGY EFFICIENT COUNTERMEASURE AGAINST MULTIPLE ATTACKS OF THE FALSE DATA...ijcsity
Nodes are easily exposed from generated attacks on various layers because they compose simple functions in sensor networks. The false data injection attack drains finite energy resource in a compromised node,and the false HELLO flood attack threatens constructed routing paths in an adversary node. A localized encryption and authentication protocol (LEAP) was developed to prevent the aforementioned attacks through the use of four keys. However, when these attacks occur simultaneously, LEAP may not prevent damage from spreading rapidly throughout the network. In this paper, we propose a method that addresses these attacks through the use of four types of keys, including two new keys. We also improve energy consumption while maintaining a suitable security level. The effectiveness of the proposed method was evaluated relative to that of LEAP when multiple attacks occur. The experimental results reveal that the proposed method enhances energy saving by up to 12% while maintaining sufficient detection power
SIP Flooding Attack Detection Using Hybrid Detection AlgorithmEditor IJMTER
The session initiation protocol is the signalling protocol,for controlling voice and video
communication over the internet protocol.SIP is however designed with open structure vulnerable
to security attak.The SIP flooding attack is the most severe attack becouse it is easy to launch and
capable of quickly draining the resources of both network and node. The existing flooding
detection schemes are either anomaly based or misuse based.The anomaly based scheme can detect
unknown attack it does not need the proir knowledge of the attack,but it generates some false
alarm,suffers from accuracy problem and gives false positive.Similarly the misuse based schemes
have high detection accuracy,no false positive but it cannot detect unknown attack.To overcome
problems in both detection schemes a hybrid detection scheme is proposed.the proposed hybrid
scheme consist features of both anomaly based scheme and misuse based scheme,and it gives fast
response,increase accuracy of detection and no false alarm
A security method for multiple attacks in sensor networks against the false r...ijitjournal
In a large scale wireless sensor network, various attacks rapidly spread damages in the network from
inside and outside attacks such as the false report injection attack and the sinkhole attack, respectively.
These attacks drain finite energy resources and devastate constructed routing paths via compromised
nodes. The security methods like SEF (statistical en-route filtering scheme) and LEAP (localized encryption
and authentication protocol) try to cope with these attacks. When these attacks occur at the same time, SEF
and LEAP should be operated simultaneously in the sensor network thus, it introduces some inefficiency. In
this paper, we propose a security method which improves the energy efficiency while maintaining the
security level compared to the simultaneous application of SEF and LEAP. The proposed method is
designed by identifying and eliminating the redundancies within the simultaneous application of the two
methods and providing more efficient functionalities. In the proposed method, two types of new keys are
designed and provided for simultaneous detection of the attacks. Four types of keys are used in each sensor
node – a P1 for encrypting information, a PK (pairwise key) for keeping secure paths, a P2 for verifying a
specific cluster, and a GK (group key) for encrypting message. Among these keys, P1 and P2 are newly
provided keys. We have evaluated the effectiveness of the proposed method compared to the simultaneous
application of SEF and LEAP when the multiple attacks occur. The experiment results show that our
proposed method saves energy up to 10% while maintaining the detection power
A security method for multiple attacks in sensor networks against false repor...ieijjournal
In a large-scale wireless sensor network, damage spreads rapidly in the network when under false report injection, false votes injection, or wormhole attacks. These attacks cause finite energy resources to be drained, legitimate reports to be dropped, and data to be intercepted by adversary nodes. A probabilistic voting-based filtering scheme (PVFS) and localized encryption and authentication protocol (LEAP) can be used to cope with these attacks. When multiple attacks occur simultaneously, PVFS and LEAP should be operated together. But the concurrent application of PVFS and LEAP provides inefficient duplications of operations in the sensor network. In this paper, we propose a security method which improves the energy efficiency while maintaining the security level of applying PVFS and LEAP simultaneously. The proposed method was designed by identifying and eliminating the redundancies of employing both methods together and providing more efficient functionalities. Four types of new keys were also designed for simultaneous detection of multiple attacks. We evaluated the effectiveness of the proposed method compared to simply applying PVFS and LEAP simultaneously when under multiple attacks. The experimental results demonstrate that our proposed method saves energy by up to 11% while maintaining detection power.
Fuzzy-Based Multiple Path Selection Method for Improving Energy Efficiency in...aciijournal
In wireless sensor networks, adversaries can easily compromise sensors because the sensor resources are
limited. The compromised nodes can inject false data into the network injecting false data attacks. The
injecting false data attack has the goal of consuming unnecessary energy in en-route nodes and causing
false alarms in a sink. A bandwidth-efficient cooperative authentication scheme detects this attack based on
the random graph characteristics of sensor node deployment and a cooperative bit-compressed
authentication technique. Although this scheme maintains a high filtering probability and high reliability in
the sensor network, it wastes energy in en-route nodes due to a multireport solution. In this paper, our
proposed method effectively selects a number of multireports based on the fuzzy rule-based system. We
evaluated the performance in terms of the security level and energy savings in the presence of the injecting
false data attacks. The experimental results indicate that the proposed method improves the energy
efficiency up to 10% while maintaining the same security level as compared to the existing scheme.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
A New Way of Identifying DOS Attack Using Multivariate Correlation Analysisijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
Security Attacks and its Countermeasures in Wireless Sensor NetworksIJERA Editor
Wireless Sensor Networks have come to the forefront of the scientific community recently. Present WSNs typically communicate directly with a centralized controller or satellite. Going on the other hand, a smart WSN consists of a number of sensors spread across a geographical area; each sensor has wireless communication ability and sufficient intelligence for signal processing and networking of the data. This paper surveyed the different types of attacks, security related issues, and it’s Countermeasures with the complete comparison between Layer based Attacks in Wireless Sensor Networks
Techniques to Secure Wireless Sensor Networks in Terms of Delay, Process Time...AM Publications
The wireless sensor network system so created and the outcomes so ascertained depend on two standard encryption procedures. In another setting these systems are utilized for security however the exploration paper is assessed on the premise of three distinct parameters in particular delay energy and process time. The most basic piece of this paper is figuring of obligation cycle, which helps in presenting the energy and time delay in both encryption strategies. After broad research and study and computations so done, it has been found that if SAMA strategy is utilized then after effect of delay, energy, and process time all turns out to be better.
Limiting Self-Propagating Malware Based on Connection Failure Behavior csandit
Self-propagating malware (e.g., an Internet worm) exploits security loopholes in software to
infect servers and then use them to scan the Internet for more vulnerable servers. While the
mechanisms of worm infection and their propagation models are well understood, defense
against worms remains an open problem. One branch of defense research investigates the
behavioral difference between worm-infected hosts and normal hosts to set them apart. One
particular observation is that a worm-infected host, which scans the Internet with randomly
selected addresses, has a much higher connection-failure rate than a normal host. Rate-limit
algorithms have been proposed to control the spread of worms by traffic shaping based on
connection failure rate. However, these rate-limit algorithms can work properly only if it is
possible to measure failure rates of individual hosts efficiently and accurately. This paper points
out a serious problem in the prior method and proposes a new solution based on a highly
efficient double-bitmap data structure, which places only a small memory footprint on the
routers, while providing good measurement of connection failure rates whose accuracy can be
tuned by system parameters.
Secure Data Aggregation Technique for Wireless Sensor Networks in the Presenc...1crore projects
IEEE PROJECTS 2015
1 crore projects is a leading Guide for ieee Projects and real time projects Works Provider.
It has been provided Lot of Guidance for Thousands of Students & made them more beneficial in all Technology Training.
Dot Net
DOTNET Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
Java Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
ECE IEEE Projects 2015
1. Matlab project
2. Ns2 project
3. Embedded project
4. Robotics project
Eligibility
Final Year students of
1. BSc (C.S)
2. BCA/B.E(C.S)
3. B.Tech IT
4. BE (C.S)
5. MSc (C.S)
6. MSc (IT)
7. MCA
8. MS (IT)
9. ME(ALL)
10. BE(ECE)(EEE)(E&I)
TECHNOLOGY USED AND FOR TRAINING IN
1. DOT NET
2. C sharp
3. ASP
4. VB
5. SQL SERVER
6. JAVA
7. J2EE
8. STRINGS
9. ORACLE
10. VB dotNET
11. EMBEDDED
12. MAT LAB
13. LAB VIEW
14. Multi Sim
CONTACT US
1 CRORE PROJECTS
Door No: 214/215,2nd Floor,
No. 172, Raahat Plaza, (Shopping Mall) ,Arcot Road, Vadapalani, Chennai,
Tamin Nadu, INDIA - 600 026
Email id: 1croreprojects@gmail.com
website:1croreprojects.com
Phone : +91 97518 00789 / +91 72999 51536
Maximizing network interruption in wirelessIJCNCJournal
With the colossal growth of wireless sensor networks (WSNs) in different applications starting from home
automation to military affairs, the pressure on ensuring security in such a network is paramount.
Considering the security challenges, it is really a hard-hitting effort to develop a secured WSN system.
Moreover, as the information technology is getting popular, the intruders are also planning new ideas to
break the system security, to harm the network and to make the system quality down with the target of
taking the control of the network to corrupt it or to get benefits from it anyway. The intruders corrupt the
system only when the security breaking cost (SBC) is lower compared with the benefits they attained or the
harm it can make to others. In this paper, the authors define the term “maximizing network interruption
problem” and propose a technique, called the grid point approximation algorithm, to estimate the SBC of a
multi-hop WSN so that it can be made tougher for an intruder to break the system security. It is assumed
that the intruder has the complete picture of the entire network. The technique is designed from the
intruder’s point of view for completely jamming all the sensor nodes in the network through placing
jammers or malicious nodes strategically and at the same time keeping the number of jammer nodes to
minimum or near minimum. To the best of the authors’ knowledge, there is no work proposed so far of the
same kind. Experimental results with the changes of the different network parameters show that the
proposed algorithm is able to provide excellent performances to achieve the targets.
Enhancing the Security in WSN using Three Tier Security ArchitectureAM Publications,India
Security is the main issue while setting up the WSN network for node communication. This report describes the efficient mechanism for achieving the security between node communications by creating three tier security architecture. This system implements three tier architecture with the use of two polynomial pools having sensor nodes, mobile sinks and some access points that are also sensor nodes, to get better security. Two pools are common mobile polynomial pool and common static polynomial pool. Mobile sinks and access point carries keys from common mobile polynomial pool were as, access points and sensor nodes carries keys from common static polynomial pool. Communication gets established from mobile sink to access point then from access point to sensor node that shows three tier architecture Authentication is the main aspect of the system, that is achieved by pairwise key predistribution methods and authentication of the nodes with the use of polynomial keys. Here, Mobile sink replication attack is implemented against the network. The malicious node, it is blocked. If it wants to communicate within the network then it needs to capture large no of keys from both the pools for authentication. But as the sufficient keys are not available with it, it cannot communicate with the other nodes in the network
PDS- A Profile based Detection Scheme for flooding attack in AODV based MANETijsptm
One of the main challenges in MANET is to design the robust security solution that can protect MANET
from various routing attacks. Flooding attack launched at network layer is a serious routing attack which
can consume more resources like bandwidth, battery power, etc. It is more concealed form of Denial of
service attack and resource consumption attack. The route discovery scheme in reactive routing protocols
like Adhoc On Demand Distance Vector (AODV) and Dynamic Source Routing (DSR) used in MANET
makes it more easy for malicious nodes to launch connection request floods by flooding the route request
packets (RREQ) on the network. A novel detection technique based on dynamic profile with traffic pattern
analysis (PDS) is proposed. Its effectiveness in detecting and isolating the malicious node that floods the
route request packets is evaluated using java simulator jist/swans.
Securing WSN communication using Enhanced Adaptive Acknowledgement ProtocolIJMTST Journal
Wireless Sensor Networking is one of the most important technologies that have different applications. The
security of wireless sensor networks is a big concern. Hence for secure communication it is important to
detect and prevent the attacks in network. Major focus is given on security and on detection and prevention of
attacks. Adversary can create gray-hole attack and black-hole attack simultaneously. There are many
methods which do not provide proper method to defend against these kinds of attacks. The Ad-hoc On
Demand Distance Vector (AODV) scheme is used for detecting Gray-Hole attack and Enhanced Adaptive
Acknowledgment (EAACK) mechanism is used for detecting black-hole attack in network. But only by
detecting and preventing the attacks, it does not provide the better security to wireless network. Therefore, to
secure network a hybrid mechanism is deployed in wireless sensor network. Security algorithm for wireless
sensor networks such as CAWS and Modern Encryption Standard (MES-1) is used for secure communication.
The CAWS and Modern Encryption Standard (MES-1) is an advanced cryptography method which is used for
encryption and decryption process to provide special security.
Integrated Security and Attack Detection Scheme for Wireless Sensor NetworksEditor IJMTER
The wireless sensor node is a tiny device that is used to capture environment information.
Sensor devices are used to capture temperature and pressure details from the environment. The
sensor devices are used in hospitals, home and production plants. The main components of a sensor
node are microcontroller, transceiver, external memory and power source. A wireless sensor network
(WSN) is a wireless network consisting of spatially distributed autonomous devices. Sensors are
used to cooperatively monitor physical or environmental conditions. Sensor network is equipped
with a radio transceiver or other wireless communications device. The sensor networks are deployed
with consideration of sensing and transmission coverage factors.
Sensor network security protocols provide confidentiality for the messages. Object location and data
sink information are the sensitive elements in the sensor network. Two techniques are used to
provide location privacy to monitored objects. They are Source-location privacy and Sink-location
privacy. Periodic collection and Source simulation models are used in Source-location privacy
technique. Sink simulation and backbone flooding models are used in Sink-location privacy
technique. Communication cost and latency factors are consider in the privacy protection model.
Source and destination location details are protected in the privacy model.
The proposed system integrates the location privacy and data security process for the wireless sensor
network. Region based query model is used to improve location privacy. Confidentiality and
integrity techniques are used for the security process. Rivest Cipher (RC4) algorithm and Secure
Hashing Algorithms (SHA) are used for the data security.
AN ENERGY EFFICIENT COUNTERMEASURE AGAINST MULTIPLE ATTACKS OF THE FALSE DATA...ijcsity
Nodes are easily exposed from generated attacks on various layers because they compose simple functions in sensor networks. The false data injection attack drains finite energy resource in a compromised node,and the false HELLO flood attack threatens constructed routing paths in an adversary node. A localized encryption and authentication protocol (LEAP) was developed to prevent the aforementioned attacks through the use of four keys. However, when these attacks occur simultaneously, LEAP may not prevent damage from spreading rapidly throughout the network. In this paper, we propose a method that addresses these attacks through the use of four types of keys, including two new keys. We also improve energy consumption while maintaining a suitable security level. The effectiveness of the proposed method was evaluated relative to that of LEAP when multiple attacks occur. The experimental results reveal that the proposed method enhances energy saving by up to 12% while maintaining sufficient detection power
SIP Flooding Attack Detection Using Hybrid Detection AlgorithmEditor IJMTER
The session initiation protocol is the signalling protocol,for controlling voice and video
communication over the internet protocol.SIP is however designed with open structure vulnerable
to security attak.The SIP flooding attack is the most severe attack becouse it is easy to launch and
capable of quickly draining the resources of both network and node. The existing flooding
detection schemes are either anomaly based or misuse based.The anomaly based scheme can detect
unknown attack it does not need the proir knowledge of the attack,but it generates some false
alarm,suffers from accuracy problem and gives false positive.Similarly the misuse based schemes
have high detection accuracy,no false positive but it cannot detect unknown attack.To overcome
problems in both detection schemes a hybrid detection scheme is proposed.the proposed hybrid
scheme consist features of both anomaly based scheme and misuse based scheme,and it gives fast
response,increase accuracy of detection and no false alarm
A security method for multiple attacks in sensor networks against the false r...ijitjournal
In a large scale wireless sensor network, various attacks rapidly spread damages in the network from
inside and outside attacks such as the false report injection attack and the sinkhole attack, respectively.
These attacks drain finite energy resources and devastate constructed routing paths via compromised
nodes. The security methods like SEF (statistical en-route filtering scheme) and LEAP (localized encryption
and authentication protocol) try to cope with these attacks. When these attacks occur at the same time, SEF
and LEAP should be operated simultaneously in the sensor network thus, it introduces some inefficiency. In
this paper, we propose a security method which improves the energy efficiency while maintaining the
security level compared to the simultaneous application of SEF and LEAP. The proposed method is
designed by identifying and eliminating the redundancies within the simultaneous application of the two
methods and providing more efficient functionalities. In the proposed method, two types of new keys are
designed and provided for simultaneous detection of the attacks. Four types of keys are used in each sensor
node – a P1 for encrypting information, a PK (pairwise key) for keeping secure paths, a P2 for verifying a
specific cluster, and a GK (group key) for encrypting message. Among these keys, P1 and P2 are newly
provided keys. We have evaluated the effectiveness of the proposed method compared to the simultaneous
application of SEF and LEAP when the multiple attacks occur. The experiment results show that our
proposed method saves energy up to 10% while maintaining the detection power
A security method for multiple attacks in sensor networks against false repor...ieijjournal
In a large-scale wireless sensor network, damage spreads rapidly in the network when under false report injection, false votes injection, or wormhole attacks. These attacks cause finite energy resources to be drained, legitimate reports to be dropped, and data to be intercepted by adversary nodes. A probabilistic voting-based filtering scheme (PVFS) and localized encryption and authentication protocol (LEAP) can be used to cope with these attacks. When multiple attacks occur simultaneously, PVFS and LEAP should be operated together. But the concurrent application of PVFS and LEAP provides inefficient duplications of operations in the sensor network. In this paper, we propose a security method which improves the energy efficiency while maintaining the security level of applying PVFS and LEAP simultaneously. The proposed method was designed by identifying and eliminating the redundancies of employing both methods together and providing more efficient functionalities. Four types of new keys were also designed for simultaneous detection of multiple attacks. We evaluated the effectiveness of the proposed method compared to simply applying PVFS and LEAP simultaneously when under multiple attacks. The experimental results demonstrate that our proposed method saves energy by up to 11% while maintaining detection power.
Fuzzy-Based Multiple Path Selection Method for Improving Energy Efficiency in...aciijournal
In wireless sensor networks, adversaries can easily compromise sensors because the sensor resources are
limited. The compromised nodes can inject false data into the network injecting false data attacks. The
injecting false data attack has the goal of consuming unnecessary energy in en-route nodes and causing
false alarms in a sink. A bandwidth-efficient cooperative authentication scheme detects this attack based on
the random graph characteristics of sensor node deployment and a cooperative bit-compressed
authentication technique. Although this scheme maintains a high filtering probability and high reliability in
the sensor network, it wastes energy in en-route nodes due to a multireport solution. In this paper, our
proposed method effectively selects a number of multireports based on the fuzzy rule-based system. We
evaluated the performance in terms of the security level and energy savings in the presence of the injecting
false data attacks. The experimental results indicate that the proposed method improves the energy
efficiency up to 10% while maintaining the same security level as compared to the existing scheme.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
A New Way of Identifying DOS Attack Using Multivariate Correlation Analysisijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
AN IMPROVED WATCHDOG TECHNIQUE BASED ON POWER-AWARE HIERARCHICAL DESIGN FOR I...IJNSA Journal
Preserving security and confidentiality in wireless sensor networks (WSN) are crucial. Wireless sensor networks in comparison with wired networks are more substantially vulnerable to attacks and intrusions. In WSN, a third person can eavesdrop to the information or link to the network. So, preventing these intrusions by detecting them has become one of the most demanding challenges. This paper, proposes an
improved watchdog technique as an effective technique for detecting malicious nodes based on a power aware hierarchical model. This technique overcomes the common problems in the original Watchdog mechanism. The main purpose to present this model is reducing the power consumption as a key factor
for increasing the network's lifetime. For this reason, we simulated our model with Tiny-OS simulator and then, compared our results with non hierarchical model to ensure the improvement. The results indicate that, our proposed model is better in performance than the original models and it has increased the lifetime of the wireless sensor nodes by around 2611.492 seconds for a network with 100 sensors.
An Enhanced Detection and Energy-Efficient En-Route Filtering Scheme in Wirel...ieijjournal
Wireless sensor networks (WSNs), due to their small size, low cost, and untethered communication over a short-range, have great potential for applications and services. Due to hostile environments and an unattended nature, they are prone to many types of attacks by adversaries. False data injection attacks compromise data accuracy at the sink node and cause undesirable energy depletion at the sink and intermediate nodes. In order to detect and counter false data attacks, a number of en-route filtering schemes have been proposed. However, they lack a strong false report detection capacity or cannot support network dynamics well. Commutative cipher-based en-route filtering (CCEF) is based on fixed paths, and a fixed detection probability, and does not consider the residual energy of a node. In an enhanced detectioncapacity and energy-efficient en-route filtering (EDEF) scheme, we use a fuzzy logic system which considers the residual energy, false traffic ratio (FTR), and number of message authentication codes (MACs) in a report to evaluate the fitness of a node to be a verification node. This helps to balance network energy usage and reduce the number of hops a false report may travel. The simulation results demonstrate the validity of our scheme with increased energy-efficiency (4.55 to 13.92%) and detection power (99.95%)
AN ENHANCED DETECTION AND ENERGYEFFICIENT EN-ROUTE FILTERING SCHEME IN WIRELE...ieijjournal
Wireless sensor networks (WSNs), due to their small size, low cost, and untethered communication over a short-range, have great potential for applications and services. Due to hostile environments and an unattended nature, they are prone to many types of attacks by adversaries. False data injection attacks compromise data accuracy at the sink node and cause undesirable energy depletion at the sink and intermediate nodes. In order to detect and counter false data attacks, a number of en-route filtering schemes have been proposed. However, they lack a strong false report detection capacity or cannot support network dynamics well. Commutative cipher-based en-route filtering (CCEF) is based on fixed paths, and a
fixed detection probability, and does not consider the residual energy of a node. In an enhanced detectioncapacity and energy-efficient en-route filtering (EDEF) scheme, we use a fuzzy logic system which considers the residual energy, false traffic ratio (FTR), and number of message authentication codes
(MACs) in a report to evaluate the fitness of a node to be a verification node. This helps to balance network
energy usage and reduce the number of hops a false report may travel. The simulation results demonstrate the validity of our scheme with increased energy-efficiency (4.55 to 13.92%) and detection power (99.95%) against false report attacks in WSNs.
PREVENTION OF WORMHOLE ATTACK IN WIRELESS SENSOR NETWORKIJNSA Journal
Ubiquitous and pervasive applications, where the Wireless Sensor Networks are typically deployed, lead to the susceptibility to many kinds of security attacks. Sensors used for real time response capability also make it difficult to devise the resource intensive security protocols because of their limited battery, power, memory and processing capabilities. One of potent form of Denial of Service attacks is Wormhole attack that affects on the network layer. In this paper, the techniques dealing with wormhole attack are investigated and an approach for wormhole prevention is proposed. Our approach is based on the analysis of the two-hop neighbors forwarding Route Reply packet. To check the validity of the sender, a unique key between the individual sensor node and the base station is required to be generated by suitable scheme.
AN APPROACH TO PROVIDE SECURITY IN MOBILE AD-HOC NETWORKS USING COUNTER MODE ...IJNSA Journal
Security in any of the networks became an important issue in this paper we have implemented a security mechanism on Medium Access Control layer by Assured Neighbor based Security Protocol to provide authentication and confidentiality of packets along with High speed transmission for Ad hoc networks. Here we have divided the protocol into two different parts. The first part deals with Routing layer information; in this part we have tried to implement a possible strategy for detecting and isolating the malicious nodes. A trust counter for each node is determined which can be actively increased and decreased depending upon the trust value for the purpose of forwarding the packets from source node to destination node with the help of intermediate nodes. A threshold level is also predetermined to detect the malicious nodes. If the value of the node in trust counter is less than the threshold value then the node is denoted ‘malicious’. The second part of our protocol deals with the security in the link layer. For this security reason we have used CTR (Counter) approach for authentication and encryption. We have simulated all our strategies and schemes in NS-2, the result of which gives a conclusion that our proposed protocol i.e. Assured Neighbor based Security Protocol can perform high packet delivery against various intruders and also packet delivery ratio against mobility with low delays and low overheads.
DDoS Attack and Defense Scheme in Wireless Ad hoc NetworksIJNSA Journal
The wireless ad hoc networks are highly vulnerable to distributed denial of service(DDoS) attacks because of its unique characteristics such as open network architecture, shared wireless medium and stringent resource constraints. These attacks throttle the tcp throughput heavily and reduce the quality of service(QoS) to end systems gradually rather than refusing the clients from the services completely. In this paper, we discussed the DDoS attacks and proposed a defense scheme to improve the performance of the ad hoc networks. Our proposed defense mechanism uses the medium access control (MAC) layer information to detect the attackers. The status values from MAC layer that can be used for detection are Frequency of receiving RTS/CTS packets, Frequency of sensing a busy channel and the number of RTS/DATA retransmissions. Once the attackers are identified, all the packets from those nodes will be blocked. The network resources are made available to the legitimate users. We perform the simulation with Network Simulator NS2 and we proved that our proposed system improves the network performance.
ENHANCED THREE TIER SECURITY ARCHITECTURE FOR WSN AGAINST MOBILE SINK REPLI...ijwmn
Recent developments on Wireless Sensor Networks have made their application in a wide range
such as military sensing and tracking, health monitoring, traffic monitoring, video surveillance and so on.
Wireless sensor nodes are restricted to computational resources, and are always deployed in a harsh,
unattended or unfriendly environment. Therefore, network security becomes a tough task and it involves
the authorization of admittance to data in a network. The problem of authentication and pair wise key
establishment in sensor networks with mobile sink is still not solved in the mobile sink replication attacks.
In q-composite key pre distribution scheme, a large number of keys are compromised by capturing a
small fraction of sensor nodes by the attacker. The attacker can easily take a control of the entire network
by deploying a replicated mobile sinks. Those mobile sinks which are preloaded with compromised keys
are used authenticate and initiate data communication with sensor node. To determine the above problem
the system adduces the three-tier security framework for authentication and pair wise key establishment
between mobile sinks and sensor nodes. The previous system used the polynomial key pre distribution
scheme for the sensor networks which handles sink mobility and continuous data delivery to the
neighbouring nodes and sinks, but this scheme makes high computational cost and reduces the life time of
sensors. In order to overcome this problem a random pair wise key pre distribution scheme is suggested
and further it helps to improve the network resilience. In addition to this an Identity Based Encryption is
used to encrypt the data and Mutual authentication scheme is proposed for the identification and
isolation of replicated mobile sink from the network.
NOVEL HYBRID INTRUSION DETECTION SYSTEM FOR CLUSTERED WIRELESS SENSOR NETWORKIJNSA Journal
Wireless sensor network (WSN) is regularly deployed in unattended and hostile environments. The WSN is vulnerable to security threats and susceptible to physical capture. Thus, it is necessary to use effective mechanisms to protect the network. It is widely known, that the intrusion detection is one of the most efficient security mechanisms to protect the network against malicious attacks or unauthorized access. In this paper, we propose a hybrid intrusion detection system for clustered WSN. Our intrusion framework uses a combination between the Anomaly Detection based on support vector machine (SVM) and the Misuse Detection. Experiments results show that most of routing attacks can be detected with low false alarm.
A Novel Approach to Detect & Prevent Wormhole Attack over MANET & Sensor n/w ...IOSR Journals
Abstract: In Mobile Ad hoc Network (MANET) mobile node is responsible for route establishment using
wireless link where each node may behave like both as a host and router. MANET encounters number of
security threats because of its open entrusted environment, with little security arrangement, security over
MANET can be enhance up to some satisfactory level because of its inherent characteristics. Among some of
the prominent security threats wormhole attack is considered to be a very serious security threat over MANET.
In wormhole two selfish node which is geographically very far away to each other makes tunnel between each
other to hide their actual location and give the illusion that they are true neighbours and attract other nodes to
make conversation through the wormhole tunnel. Many researchers focused on detecting wormhole attack and
its prevention mechanism. It seems that in the previous technique there is a need to improve their results in the
brink of false negative rate, routing overhead etc. The present paper has proposed the hybrid model in order to
detect and prevent the wormhole attack. This approach has been work with neighbour node and hop count
method.
Keywords: Mobile Ad hoc Network, Selfish node, Malicious node, AODV
A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...IJCNCJournal
With the growing usage of wireless sensors in a variety of applications including Internet of Things, the security aspects of wireless sensor networks have been on priority for the researchers. Due to the constraints of resources in wireless sensor networks, it has been always a challenge to design efficient security protocols for wireless sensor networks. An novel elliptic curve signcryption based security protocol for wireless sensor networks has been presented in this paper, which provides anonymity, confidentiality, mutual authentication, forward security, secure key establishment, and key privacy at the same time providing resistance from replay attack, impersonation attack, insider attack, offline dictionary attack, and stolen-verifier attack. Results have revealed that the proposed elliptic curve signcryption based protocol consumes the least time in comparison to other protocols while providing the highest level of security.
Robust encryption algorithm based sht in wireless sensor networksijdpsjournal
In bound applications, the locations
of events reportable by a device network have to be compelled to stay
anonymous. That is, unauthorized observers should be unable to notice the origin of such events by
analyzing the network traffic. I analyze 2 forms of downsides: Communication overhead a
nd machine load
problem. During this paper, I gift a brand new framework for modeling, analyzing, and evaluating
obscurity in device networks. The novelty of the proposed framework is twofold: initial, it introduc
es the
notion of “interval indistinguishabi
lity” and provides a quantitative live to model obscurity in wireless
device networks; second, it maps supply obscurity to the applied mathematics downside I showed that
the
present approaches for coming up with statistically anonymous systems introduce co
rrelation in real
intervals whereas faux area unit unrelated. I show however mapping supply obscurity to consecutive
hypothesis testing with nuisance Parameters ends up in changing the matter of exposing non
-
public supply
data into checking out associate d
egree applicable knowledge transformation that removes or minimize the
impact of the nuisance data victimization sturdy cryptography algorithmic rule. By doing therefore,
I
remodel the matter of analyzing real valued sample points to binary codes, that ope
ns the door for
committal to writing theory to be incorporated into the study of anonymous networks. In existing wor
k,
unable to notice unauthorized observer in network traffic. However our work in the main supported
enhances their supply obscurity against
correlation check. the most goal of supply location privacy is to
cover the existence of real events.
Similar to A secure routing process to simultaneously defend against false report and wormhole attacks in sensor networks (20)
THE PRESSURE SIGNAL CALIBRATION TECHNOLOGY OF THE COMPREHENSIVE TEST SYSTEMieijjournal
The pressure signal calibration technology of the comprehensive test system which involved pressure
sensors was studied in this paper. The melioration of pressure signal calibration methods was elaborated.
Compared with the calibration methods in the lab and after analyzing the relevant problems,the
calibration technology online was achieved. The test datum and reasons of measuring error analyzed,the
uncertainty evaluation was given and then this calibration method was proved to be feasible and accurate.
8 th International Conference on Education (EDU 2023)ieijjournal
8th International Conference on Education (EDU 2023) will provide an excellent
international forum for sharing knowledge and results in theory, methodology and
applications impacts and challenges of education. The conference documents practical and
theoretical results which make a fundamental contribution for the development of
Educational research. The goal of this conference is to bring together researchers and
practitioners from academia and industry to focus on Educational advancements and
establishing new collaborations in these areas. Original research papers, state-of-the-art
reviews are invited for publication in all areas of Education
Informatics Engineering, an International Journal (IEIJ)ieijjournal
Informatics is a rapidly developing the field. The study of informatics involves human-computer
interaction and how an interface can be built to maximize user efficiency. Due to the growth in IT,
individuals and organizations increasingly process information digitally. This has led to the study of
informatics to solve privacy, security, healthcare, education, poverty, and challenges in our environment.
The Informatics Engineering, an International Journal (IEIJ) is an open access peer-reviewed journal that
publishes articles which contribute new results in all areas of Informatics. The goal of this journal is to
bring together researchers and practitioners from academia and industry to focus on the human use of
computing fields such as communication, mathematics, multimedia, and human-computer interaction
design and establishing new collaborations in these areas.
Big data is a prominent term which characterizes the improvement and availability of data in all three
formats like structure, unstructured and semi formats. Structure data is located in a fixed field of a record
or file and it is present in the relational data bases and spreadsheets whereas an unstructured data file
includes text and multimedia contents. The primary objective of this big data concept is to describe the
extreme volume of data sets i.e. both structured and unstructured. It is further defined with three “V”
dimensions namely Volume, Velocity and Variety, and two more “V” also added i.e. Value and Veracity.
Volume denotes the size of data, Velocity depends upon the speed of the data processing, Variety is
described with the types of the data, Value which derives the business value and Veracity describes about
the quality of the data and data understandability. Nowadays, big data has become unique and preferred
research areas in the field of computer science. Many open research problems are available in big data
and good solutions also been proposed by the researchers even though there is a need for development of
many new techniques and algorithms for big data analysis in order to get optimal solutions. In this paper,
a detailed study about big data, its basic concepts, history, applications, technique, research issues and
tools are discussed.
LOW POWER SI CLASS E POWER AMPLIFIER AND RF SWITCH FOR HEALTH CAREieijjournal
This research was to design a 2.4 GHz class E Power Amplifier (PA) for health care, with 0.18um
Semiconductor Manufacturing International Corporation CMOS technology by using Cadence software.
And also RF switch was designed at cadence software with power Jazz 180nm SOI process. The ultimate
goal for such application is to reach high performance and low cost, and between high performance and
low power consumption design. This paper introduces the design of a 2.4GHz class E power amplifier and
RF switch design. PA consists of cascade stage with negative capacitance. This power amplifier can
transmit 16dBm output power to a 50Ω load. The performance of the power amplifier and switch meet the
specification requirements of the desired
PRACTICE OF CALIBRATION TECHNOLOGY FOR THE SPECIAL TEST EQUIPMENT ieijjournal
For the issues encountered in the special test equipment calibration work, based on the characteristics of
special test equipment, the calibration point selection,classification of calibration parameters and
calibration method of special test equipment are briefly introduced in this paper, at the same time, the
preparation and management requirements of calibration specification are described.
8th International Conference on Signal, Image Processing and Embedded Systems...ieijjournal
8th International Conference on Signal, Image Processing and Embedded Systems (SIGEM 2022) is a forum for presenting new advances and research results in the fields of Digital Image Processing and Embedded Systems.
Informatics Engineering, an International Journal (IEIJ)ieijjournal
Informatics is rapidly developing field. The study of informatics involves human-computer interaction and how an interface can be built to maximize user-efficiency. Due to the growth in IT, individuals and organizations increasingly process information digitally. This has led to the study of informatics to solve privacy, security, healthcare, education, poverty, and challenges in our environment.
International Conference on Artificial Intelligence Advances (AIAD 2022) ieijjournal
International Conference on Artificial Intelligence Advances (AIAD 2022) will act as a major forum for the presentation of innovative ideas, approaches, developments, and research projects in the area advanced Artificial Intelligence. It will also serve to facilitate the exchange of information between researchers and industry professionals to discuss the latest issues and advancement in the research area. Core areas of AI and advanced multi-disciplinary and its applications will be covered during the conferences.
Informatics Engineering, an International Journal (IEIJ)ieijjournal
Call for papers...!!!
Informatics Engineering, an International Journal (IEIJ)
https://airccse.org/journal/ieij/index.html
Submission Deadline: July 02, 2022
Here's where you can reach us : ieijjournal@yahoo.com or ieij@aircconline.com
http://coneco2009.com/submissions/imagination/home.html
8th International Conference on Artificial Intelligence and Soft Computing (A...ieijjournal
Call for papers...!!!
8th International Conference on Artificial Intelligence and Soft Computing (AIS 2022)
August 20 ~ 21, 2022, Chennai, India
https://csit2022.org/ais/index
Submission Deadline: July 02, 2022
Here's where you can reach us : ais@csit2022.org or aisconf@yahoo.com
https://csit2022.org/submission/index.php
Informatics Engineering, an International Journal (IEIJ) ieijjournal
Informatics Engineering, an International Journal (IEIJ)
Submission Deadline : June 18, 2022
submission link
http://coneco2009.com/submissions/imagination/home.html
website link
https://airccse.org/journal/ieij/index.html
contact us
ieijjournal@yahoo.com or ieij@aircconline.com
International Conference on Artificial Intelligence Advances (AIAD 2022)ieijjournal
International Conference on Artificial Intelligence Advances (AIAD 2022)
August 27 ~ 28, 2022, Virtual Conference
Webpage URL:
https://www.aiad2022.org/
Submission Deadline: June 04, 2022
Contact us:
Here's where you can reach us: aiad@aiad2022.org (or) aiadconf@yahoo.com
Informatics Engineering, an International Journal (IEIJ)ieijjournal
call for paper
Informatics Engineering, an International Journal (IEIJ)
Submission Deadline : May 28, 2022
Submit your paper through online :
http://coneco2009.com/submissions/imagination/home.html
Submit your paper through mail:
ieijjournal@yahoo.com or ieij@aircconline.com
for more details:
https://airccse.org/journal/ieij/index.html
Informatics Engineering, an International Journal (IEIJ) ieijjournal
Call for paper
Informatics Engineering, an International Journal (IEIJ)
https://airccse.org/journal/ieij/index.html
Submission Deadline : May 14, 2022
Contact Us
Here's where you can reach us : ieijjournal@yahoo.com or ieij@aircconline.com
Paper Submission Link: http://coneco2009.com/submissions/imagination/home.html
LOW POWER SI CLASS E POWER AMPLIFIER AND RF SWITCH FOR HEALTH CAREieijjournal
This research was to design a 2.4 GHz class E Power Amplifier (PA) for health care, with 0.18um
Semiconductor Manufacturing International Corporation CMOS technology by using Cadence software.
And also RF switch was designed at cadence software with power Jazz 180nm SOI process. The ultimate goal for such application is to reach high performance and low cost, and between high performance and low power consumption design. This paper introduces the design of a 2.4GHz class E power amplifier and
RF switch design. PA consists of cascade stage with negative capacitance. This power amplifier can
transmit 16dBm output power to a 50Ω load. The performance of the power amplifier and switch meet the specification requirements of the desired.
FROM FPGA TO ASIC IMPLEMENTATION OF AN OPENRISC BASED SOC FOR VOIP APPLICATIONieijjournal
ASIC (Application Specific Integrated Circuit) design verification takes as long as the designers take to describe, synthesis and implement the design. The hybrid approach, where the design is first prototyped on an FPGA (Field-Programmable Gate Array) platform for functional validation and then implemented as
an ASIC allows earlier defect detection in the design process and thus allows a significant time saving.
This paper deals with a CMOS standard-cell ASIC implementation of a SoC (System on Chip) based on the
OpenRISC processor for Voice over IP (VoIP) application; where a hybrid approach is adopted. The
architecture of the design is mainly based on the reuse of IPs cores described at the RTL level. This RTL code is technology-independent; hence the design can be ported easily from FPGA to ASIC.
Informatics Engineering, an International Journal (IEIJ)ieijjournal
Informatics is a rapidly developing the field. The study of informatics involves human-computer interaction and how an interface can be built to maximize user efficiency. Due to the growth in IT, individuals and organizations increasingly process information digitally. This has led to the study of informatics to solve privacy, security, healthcare, education, poverty, and challenges in our environment.
Water scarcity is the lack of fresh water resources to meet the standard water demand. There are two type of water scarcity. One is physical. The other is economic water scarcity.
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxR&R Consult
CFD analysis is incredibly effective at solving mysteries and improving the performance of complex systems!
Here's a great example: At a large natural gas-fired power plant, where they use waste heat to generate steam and energy, they were puzzled that their boiler wasn't producing as much steam as expected.
R&R and Tetra Engineering Group Inc. were asked to solve the issue with reduced steam production.
An inspection had shown that a significant amount of hot flue gas was bypassing the boiler tubes, where the heat was supposed to be transferred.
R&R Consult conducted a CFD analysis, which revealed that 6.3% of the flue gas was bypassing the boiler tubes without transferring heat. The analysis also showed that the flue gas was instead being directed along the sides of the boiler and between the modules that were supposed to capture the heat. This was the cause of the reduced performance.
Based on our results, Tetra Engineering installed covering plates to reduce the bypass flow. This improved the boiler's performance and increased electricity production.
It is always satisfying when we can help solve complex challenges like this. Do your systems also need a check-up or optimization? Give us a call!
Work done in cooperation with James Malloy and David Moelling from Tetra Engineering.
More examples of our work https://www.r-r-consult.dk/en/cases-en/
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
A secure routing process to simultaneously defend against false report and wormhole attacks in sensor networks
1. Informatics Engineering, an International Journal (IEIJ), Vol.2, No.4, December 2014
31
A SECURE ROUTING PROCESS TO
SIMULTANEOUSLY DEFEND AGAINST FALSE
REPORT AND WORMHOLE ATTACKS IN SENSOR
NETWORKS
SOO YOUNG MOON, TAE HO CHO
*
College of Information and Communication Engineering, Sungkyunkwan University,
Suwon 440-746, Republic of Korea
ABSTRACT
Most research related to secure routing in sensor networks has focused on how to detect and defend
against a single attack. However, it is not feasible to predict which attack will occur in sensor networks.
It is possible for multiple attacks to occur simultaneously, degrading the performance of the existing
security schemes. For example, an attacker may try simultaneous false report and wormhole attacks to
effectively damage a sensor network. Hence, a multiple simultaneous attack environment is much more
complex than a single attack environment. Thus, a new security scheme that can detect multiple
simultaneous attacks with a high probability and low energy consumption is needed. In this paper, we
propose a secure routing scheme to defend against wormhole and false report attacks in sensor networks.
The proposed method achieves a higher attack detection ratio and consumes less energy in a multi-attack
scenario compared to existing schemes. It can also be extended to other types of attacks and security
schemes to detect and defend against possible combinations of multiple attacks.
KEYWORDS
Wireless Sensor Networks, wormhole attacks, false report attacks
1. INTRODUCTION
Sensor networks are systems that collect environmental information from sensors that are
attached to objects, provide that information to a user, and react to certain events on demand [1-
5]. A sensor network is composed of a large number of tiny sensor nodes that monitor the
surrounding environment and one or more sink node(s) that collect information from the sensor
nodes. There are very limited available resources such as the energy, bandwidth, and
computation capability in a sensor network. Applications of sensor networks vary to include
disaster prevention, battlefield monitoring, and U-health [1, 2].
Many security attacks can occur to violate the security objectives, such as the data integrity,
confidentiality, and authentication of a sensor network [6, 7]. In false report attacks, an attacker
injects forged event information into the network for the purpose of depleting the energy
resources of sensor nodes and causing unnecessary user responses. False reports are injected via
compromised nodes whose keys are used to generate the false reports. Figure 1 shows an
illustration of false report attacks.
2. Informatics Engineering, an International Journal (IEIJ), Vol.2, No.4, December 2014
32
Figure 1 False report attacks
The black nodes within Fig. 1 represent compromised nodes that generate false event reports
and inject them into the network. The false reports cause unnecessary energy consumption of
intermediate nodes as they are forwarded to the sink node. In addition, a compromised node
does not comply with any security protocol; instead, it just forwards a false event report without
verifying it.
A wormhole is a physical or virtual link that connects two points in the network and enables two
remote nodes to communicate with each other as if they are neighbors. The goal of an attacker
in wormhole attacks is to disrupt the communication between the source nodes and the sink
node. The attacker may try a message drop, fabrication or modification of messages, or selective
forwarding attacks via a wormhole included in the routing paths in the network.
Figure 2 Wormhole attacks
The dotted circle represents the transmission range of the sensor nodes. We assume that the
wormhole nodes are powerful devices such as laptops. A wormhole node eavesdrops on
messages sent by the nodes within the transmission range and forwards them to the other
wormhole node through the wormhole. One of three actions may be taken in a wormhole: 1)
message modification, 2) message drop, and 3) message forwarding (no attack).
Security attacks in a sensor network system do not always occur one by one. For example, the
above false report attacks and wormhole attacks are two representative attacks in the application
layer and network layer, respectively. Attackers may combine the two attacks to damage the
network.
In false report filtering schemes, each node detects a false report with a certain probability. As a
false report performs more hops, there is a higher probability that the false report will be
detected and removed en-route. A wormhole in routing paths decreases the number of hops
performed by a false report and hence degrades the en-route detection capability of a filtering
scheme.
The sender and receiver nodes of an event report in wormhole countermeasures detect a
wormhole between them based on mechanisms such as the message authentication code (MAC)
and acknowledgement (ACK) messages. False report attacks involve a node compromise attack,
and compromised nodes do not participate in wormhole detection mechanisms. If either a
sender or a receiver is a compromised node, it degrades the wormhole detection ratio. Figure 3
illustrates the multi-attack scenario.
3. Informatics Engineering, an International Journal (IEIJ), Vol.2, No.4, December 2014
33
Sink node
Energy depletion
WormholeAttack
False Report Attack
Event Report
False Alarm
Compromised
node
Event Report drop,
modification or
forwarding
Figure 3 Multi-attack scenario
In Fig. 3, a compromised node generates and injects false reports into the network, and the
injected false reports deplete the energy of the nodes on the forwarding path. Wormhole nodes
are powerful devices such as laptops, and they forward normal event reports or false reports
through the wormhole.
Hence, we need a new security protocol to solve the performance degradation problems that
may occur in existing security schemes [8-21] in the multi-attack scenario. We propose a
security scheme to effectively detect the false report and wormhole attacks when the two attacks
occur simultaneously. The proposed scheme makes use of a key partition-based routing protocol
to mitigate the detection probability degradation problem caused by a wormhole. In addition, we
define a new format for event report messages that contain the number of verifications by the
forwarding nodes and the corresponding wormhole detection mechanisms.
The proposed method is able to detect and remove false event reports within a few hops and can
detect a wormhole even when a sender or receiver node that is connected through the wormhole
is compromised. Also, the proposed method detects the two attacks with low computation
overhead.
The remaining sections of the paper are as follows. In Section 2, we review the false report and
wormhole attacks and their countermeasure schemes and confirm the complexity of the
multiple-attack environment. In Section 3, we describe the motivation and explain the
assumptions and operational phases of the proposed scheme. We show the experimental results
about the detection ratio and the energy consumption in Section 4. We conclude the paper and
speculate about future work in Section 5
2. BACKGROUND
False report attacks and wormhole attacks are representative attacks at the application and the
network layer, respectively. In this section, we describe the characteristics of the two attacks
and existing countermeasures to be used against them. In addition, we explain the problem of
the performance degradation of existing schemes under a multi-attack scenario.
2.1. False report attacks & countermeasures
The objective of false report attacks is to deplete the energy resources of nodes that forward the
false event reports, leading to unnecessary responses on the part of the user. In false report
attacks, an attacker gains control of compromised nodes. Hence, false report attacks are insider
attacks in which the attacker makes use of information and the resources of authorized sensor
nodes. The attacker injects false reports about non-existent events via the compromised nodes
into the network. The injected false reports are forwarded to the sink node via intermediate
4. Informatics Engineering, an International Journal (IEIJ), Vol.2, No.4, December 2014
34
nodes. Thus, they deplete the energy of the forwarding nodes and waste the user‟s time in
useless responses [8].
Many security schemes have been proposed [8, 10-14, 20, 21] to defend against false report
attacks. The Statistical En-route Filtering (SEF) scheme [8] proposed by Ye et al. aims to detect
and remove false reports early in their phases. The sink node in SEF manages a set of
authentication keys in a global key pool. The global key pool is divided into several key
partitions, and each sensor node is assigned a portion of a key partition before deployment.
Sensor nodes collaboratively authenticate event information using their keys. When an
interesting event occurs, the sensing nodes elect a center of stimulus (CoS) node. The CoS
broadcasts an initial report and collects message authentication codes (MACs) from the other
sensing nodes. Then, it generates the final event report that contains the event information, the
MACs, and the corresponding key indices. Next, the CoS sends the event report to its parent
node. When a sensor node receives an event report, it checks to see if it has the same key as one
of the keys that were used to generate the MACs in the report. If so, it verifies the
corresponding MAC and determines whether or not to forward it based on the verification result.
When the sink node receives the event report, it verifies all of the MACs in the report, since it
knows all of the keys in the global key pool. If any of the verification results is false, it detects a
false report and drops it. Figure 4 shows the filtering operation in SEF.
Figure 4. SEF filtering operation
In Fig. 4, each circle represents a sensor node that is assigned an authentication key (the number
below each circle) from a key partition (the number in each circle). The event report contains
three MACs and the corresponding key indices in addition to the event information. A key
index represents both the key partition and the order of the key in the partition. For example, K24
in the figure denotes the fourth key in the second key partition. MACK24 denotes the MAC
generated using K24 from the event information. MACK31 is the incorrect one among the three
MACs, since K31 was not disclosed to the attacker. When the second node on the path receives
the event report, it verifies MACK24. It forwards the event report to the next node, since the
MAC is correct. When the fourth node on the path receives the event report, the node attempts
to verify MACK31. The verification fails at the node, since the MAC is an incorrect MAC. Thus,
the node drops the event report.
2.2. Wormhole attacks & countermeasures
The objective of an attacker in wormhole attacks [9] is to disconnect a network and to interrupt
the communication between the source nodes and the sink node. For this, the attacker tries to
include a wormhole, which is a physical or logical link, in the routing paths in the network. We
assume that, in the proposed method, the wormhole nodes are powerful devices such as laptops.
Hence, wormhole attacks are outsider attacks in which the attacker has no access to the network
resources and a laptop-class attack in which a long transmission range and sufficient energy
resources are available [7]. Wormhole attacks may occur in a neighbor discovery phase or a data
dissemination phase. A wormhole node eavesdrops control or data messages and then forwards
them to the other wormhole node through the wormhole. In a wormhole, one of three actions
may occur: 1) message drop, 2) message modification, and 3) message forwarding. Wormhole
attacks disrupt reliable communication between the source nodes and the sink node and hence
degrade the availability of the network.
5. Informatics Engineering, an International Journal (IEIJ), Vol.2, No.4, December 2014
35
Many security schemes have been proposed [9, 15-19] to defend against wormhole attacks, and
among them, we explain two security schemes: 1) the secure routing protocol against wormhole
attacks (SeRWA) [17] and 2) the localized encryption and lightweight protocol (LEAP) [18].
A secure routing protocol against wormhole attacks (SeRWA) [17] was proposed by Madria and
Yin. SeRWA is able to detect a wormhole and update routing paths without requiring special
hardware.
There are four phases in SeRWA: 1) one-hop neighbor discovery, 2) initial route discovery, 3)
data dissemination and wormhole detection, and 4) secure route discovery against a wormhole
attack. In the one-hop neighbor discovery phase, sensor nodes that are within radio range
discover and add each other to their neighbor node lists by exchanging hello and reply messages.
Each node also exchanges its neighbor node list with its neighbor nodes. Then, the initial
wormhole detection is performed based on the neighbors‟ neighbor node lists. If a wormhole is
detected, the neighbor list is reconstructed. At the end of the phase, the neighbor nodes share the
message authentication keys.
In the initial route discovery phase, the sink node broadcasts a route request message. Each node
sets the first node from which it receives a route request message as its parent node and then re-
broadcasts the message. At the end of the phase, a routing tree is constructed.
In the data dissemination and wormhole detection phase, the source nodes forward event reports
to the sink node through the routing paths. The integrity of the event reports is verified in a hop-
by-hop manner by using the shared key between the immediate sender and immediate receiver.
If a message drop or message modification is detected, a wormhole is detected. Figure 5
represents the wormhole detection in SeRWA at the one-hop neighbor discovery phase and the
data dissemination phase.
Figure 5. Wormhole detection in SeRWA
Figure 5(a) illustrates wormhole detection in the one-hop neighbor discovery phase in SeRWA.
Nodes A and B are neighbor nodes, and the two circles represent their transmission ranges. SA is
the set of node A and its neighbor list, while SB is the set of node B and its neighbor list.
)|S(S)S|(S ABBA is the number of nodes within either SA or SB but not both. If the
value is less than a threshold value Th, a wormhole is detected. The threshold value Th is
determined by the maximum distance between two „close nodes,‟ the transmission range of the
sensor nodes, and the node density in the network.
Figure 5(b) shows the wormhole detection in the data dissemination phase. We assume that
nodes A and B are neighbor nodes of each other, and that node A is the parent node of node B.
Each data message transmitted from node B to node A includes a MAC that is generated using a
pairwise key that is shared between the two nodes. Node A verifies the MAC and notifies node
B of the verification result by replying back with an ACK message. The ACK message also
includes a MAC generated using the pairwise key, and hence, node B is able to verify the ACK
message. If a data message is illegally modified, a wormhole is detected at node A and node B.
6. Informatics Engineering, an International Journal (IEIJ), Vol.2, No.4, December 2014
36
Otherwise, if a data message is dropped, a wormhole is detected at node B, which is the sending
node. If a wormhole is detected, the neighbor list reconstruction is performed.
LEAP [18] is a key management scheme that defines the establishment, deployment, and update
of keys. It also provides an inter-node authentication mechanism. Each node in the scheme
organizes its own One-way Hash Chain (OHC), the elements of which are authentication keys.
When a node sends a packet to its neighbor node, it selects the next authentication key in its
own OHC and attaches the key to the packet. The receiving node is able to verify the
authentication key in the packet based on the last authentication key received from the sending
node. In this way, LEAP can detect wormhole or sinkhole attacks.
2.3. Environment of multiple simultaneous attacks
As we mentioned in the previous section, the existing countermeasures for false report and
wormhole attacks suffer from performance degradation if the two attacks occur simultaneously.
Figure 6 shows the performance degradation of SEF in a multiple attack environment.
Figure 6. Performance degradation of SEF under a multiple attack environment
(false report attack perspective)
In the figure, the false report detection ratios decrease as the fraction of compromised nodes
increases, under both the single-attack and multi-attack scenarios. In addition, the false report
detection ratio of SEF in the multi-attack scenario is lower than that in the single-attack scenario.
The reason is that a wormhole reduces the number of hops through which the false reports pass.
Figure 7 shows the performance degradation of SeRWA in the multiple attack scenario.
Figure 7. Performance degradation of SeRWA under a multiple attack environment
(wormhole attack perspective)
7. Informatics Engineering, an International Journal (IEIJ), Vol.2, No.4, December 2014
37
Figure 7 compares the wormhole detection ratios of SeRWA under single-attack and multi-
attack scenarios. As shown in the figure, the wormhole detection ratio of SeRWA in the multi-
attack scenario is lower than that in the single-attack scenario. That is because the compromised
nodes in the multi-attack scenario do not comply with the wormhole detection processes such as
MAC verification or the generation and exchange of ACK messages.
As shown in the above results, the performance of the existing security schemes decreases when
there are multiple attacks. Thus, a new security protocol that can handle a combination of
multiple attacks is needed.
3. PROPOSED SCHEME
The proposed scheme aims to detect false report and wormhole attacks under a multi-attack
scenario. The two main goals are 1) to detect false reports early even when there is a wormhole
in the network and 2) to detect a wormhole even when one of the two nodes connected via the
wormhole is compromised. We explain the advantages of the proposed scheme compared to
existing schemes in this section.
3.1 MOTIVATION
As mentioned in Section 2, the existing security schemes suffer performance degradation in a
multi-attack scenario. We can improve the detection ratio of false event reports by exploiting a
key partition-based routing and can mitigate the performance degradation of the existing
filtering schemes due to a wormhole. In addition, we can enhance the detection ratio of a
wormhole based on the number of verifications for an event report by the forwarding nodes,
even when one of the two nodes that are connected through a wormhole is compromised.
3.2 ASSUMPTIONS
We assume a static sensor network in which the sensor nodes do not change their locations.
Each node can obtain its location information. The sensor nodes have the same fixed
transmission range.
We assume that there is no attack until the data dissemination phase, and we focus on false
report injection and wormhole attacks in the data dissemination phase. There are two types of
attack nodes in the network: 1) compromised nodes and 2) wormhole nodes. Compromised
nodes are authorized nodes that are controlled by an attacker to perform false report injection
attacks. 2) Wormhole nodes are laptop-level devices that are owned by the attacker and are
equipped with a long transmission range and sufficient energy resources.
False reports are injected through compromised nodes to the sink node along the intermediate
nodes. A wormhole node eavesdrops on neighbor nodes and forwards event reports to the other
wormhole node through the wormhole. In a wormhole, one of three actions may occur: 1)
message drop, 2) message modification, and 3) message forwarding.
We assume that the compromised nodes do not comply with security protocols and hence, do
not detect false reports or a wormhole. However, we assume that there is no additional
cooperation between the compromised nodes and the wormhole nodes.
3.2 OPERATION
The specific description of the operation of the proposed scheme is as follows. In the pre-
deployment phase, the assignment of unique IDs and authentication keys is performed, as in
8. Informatics Engineering, an International Journal (IEIJ), Vol.2, No.4, December 2014
38
SEF. Additionally, two empty lists are created and initialized at each node. One is a neighbor
list, which will contain a list of the other nodes within its transmission range, and the other is a
candidate parent list, which will contain a list of the neighbor nodes that are closer to the sink
node than the current node.
In the neighbor discovery phase, every sensor node broadcasts a hello message to the nodes
within its transmission range and waits to receive reply messages from them. Each hello
message contains the sender‟s ID, whereas each response message includes the sender‟s and the
receiver‟s IDs. When a sensor node receives a hello message, it creates and sends back a
response message to the sender of the hello message. When the sender receives the response
message, it adds the receiver‟s ID to its neighbor list if the sender‟s ID is the same as that in the
response message. Figure 8 shows the neighbor discovery process.
Figure 8. Neighbor discovery of sensor nodes
In the route setup phase, each node organizes its own candidate parent list, which contains the
information of its neighbor nodes that are closer to the sink node. That is, a node can choose one
of the nodes in its candidate parent list as the next forwarding node on the routing paths for
event reports. The sink node initializes the route setup phase by broadcasting a control message.
A control message contains 1) the ID of the sender, 2) the distance of the sender to the sink
node, and 3) the key partition associated with the sender. A receiving node of the control
message inserts the record (sender‟s ID, distance to the sink, key partition) to its candidate
parent list if the sender is closer to the sink node than itself. Every pair of neighbor nodes
establishes a pairwise key at the end of the phase [18]. Figure 9 shows the route setup process.
Figure 9 Flooding of control messages in the route setup phase
In the figure, node D receives a control message from nodes A and B, respectively. Node A is
8m from the sink node and is associated with the first key partition, whereas node B is 10m
from the sink node and is associated with the third key partition. Both of the two nodes are
closer to the sink node than node D, so node D organizes its candidate parent list as {(A, 8, 1),
(B, 10, 3)}.
In the data dissemination phase, the sensor nodes detect events and report them to the sink node.
In addition, they detect false reports and (or) a wormhole based on the content of the event
reports and the ACK messages that have been forwarded. Figure 10 shows the format of an
event report and an ACK message in the proposed scheme.
9. Informatics Engineering, an International Journal (IEIJ), Vol.2, No.4, December 2014
39
Figure 10 Event report and ACK msg. format
In Figure 10, nodes A and B are neighbors of each other, and node A is the next node after node
B on the routing path. An event report contains the sender‟s ID (i.e., B), the receiver‟s ID (i.e.,
A), the event information, a list of (key index, MAC) pairs that have been generated by using
the global authentication keys, and the number of verification operations performed by the
forwarding nodes, which includes node B.
Node A receives the event report r and replies with an ACK message if no wormhole is detected.
An ACK message includes the receiver‟s ID, the sender‟s ID, event information, and a MAC
that is generated by using the pairwise key shared between nodes A and B. Figure 11 shows the
operation of a receiving node and the detection process of the two attacks.
Figure 11. Wormhole and false report detection at the receiving node A
10. Informatics Engineering, an International Journal (IEIJ), Vol.2, No.4, December 2014
40
The process of attack detection at a forwarding node is as follows:
1) The receiving node A checks to see if the ID of the sending node B is in its neighbor
list, and if not, it drops the report.
2) Node A computes the distance d(CoS, A) between the CoS and itself. The computation
is based on node A‟s location information and the event information in the report.
3) Node A estimates the hop counts from the CoS to itself by dividing the distance by the
transmission range of the nodes. The estimated hop count is:
h*(CoS, A) = d(CoS, A) / TRANS_RANGE
where TRANS_RANGE is the transmission range of the sensor nodes.
4) The receiving node A estimates the number of verification operations for the received
event report performed by the former nodes of the current node on the forwarding path.
The estimated number of verifications is computed as follows:
numVer* = h*(CoS, A) * OVP
where OVP is the probability of being able to verify a MAC in the event report at a
randomly selected node.
5) If the actual number of verifications (numVer) for the received event report is less than
numVer*, the malicious count of node B (malC(B)) is increased by one.
6) If malC(B) becomes greater than or equal to a threshold value th, a wormhole is
detected.
7) If a wormhole is not detected, node B replies to node A with an ACK message.
8) If node A has one of the MAC-generating keys for the received report, it verifies the
corresponding MAC using its own authentication key. It forwards the report to the next
node only when the verification succeeds.
After that attack detection, the current node selects one of its candidate parent nodes as the next
node to forward the event report.
It chooses one of the candidate parent nodes based on an evaluation function f(n) as follows:
)(
)(
1
)( nv
nrank
nf (1)
)1,1,0(
In equation (1), n is a candidate parent node, and rank(n) is the order of n when we sort the
candidate parent nodes by the distance to the sink in increasing order. The rank(n) has a positive
integer value (1, 2, 3, …), and v(n) is the probability of verifying a MAC in the forwarded
report at node n when it is selected as the next node.
The current node can compute the v(n) of each candidate parent node based on the candidate
parent list stored in its memory.
11. Informatics Engineering, an International Journal (IEIJ), Vol.2, No.4, December 2014
41
First, it computes the key partitions of MAC-generating keys from their indexes in the event
report. Then, it compares each of them with the key partition of node n. If the key partition of
node n is the same as one of the key partitions of the MAC-generating keys, v(n) can be
computed as the number of keys stored at node n divided by the total number of keys in the key
partition. Otherwise, if the key partition of node n does not match any of the key partitions of
the MAC-generating keys, v(n) becomes 0. Equation (2) shows the values of v(n) for the two
cases.
else
keysgeneratingMACofonewithmatchesnofpartitionkey
m
k
nv
:0
:
)( (2)
In the above equation, k is the number of keys in the key partition stored at node n, and m is the
total number of keys in the matching key partition. The parameters α and β are weights for the
two factors. As α increases, the priority of the nodes close to the sink node increases. On the
other hand, if β increases, the priority of nodes with a high probability of verifying a MAC
increases. Figure 12 illustrates the selection of the next node under different values of α and β.
Figure 12. Selection of a parent node at a forwarding node
The two nodes N1 and N2 are candidate parent nodes of the sending node (on the left in the
figure). If we sort the candidate parent list of the sending node based on the distances to the sink
node in increasing order, the orders of N1 and N2 are 1 and 2, respectively. Hence, rank(N1) =
1 and rank(N2)=2. The key partition associated with N1 is not the same as any of the key
partitions of the MAC-generating keys for the report, so v(N1) = 0. On the other hand, the key
partition associated with N2 is the same as one of the MAC-generating keys for the report, so, if
we assume that k=5 and m=10, v(N2)=0.5.
If we use 0.8 for α and 0.2 for β, f(N1) = 0.8*1 + 0.2*0 = 0.8, and f(N2) = 0.8*1/2+0.2*0.5=0.5.
Hence, f(N1) > f(N2), and N1 is selected by the current node as the next forwarding node. In
another case, if we use 0.2 for α and 0.8 for β, f(N1) = 0.2*1 + 0.8*0 = 0.2 and f(N2) =
0.2*(1/2) + 0.8*0.5=0.5. Hence, f(N1) < f(N2), and N2 is selected by the current node as the
next forwarding node.
4. PERFORMANCE EVALUATION
4.1 SECURITY ANALYSIS
False report injection attacks involve a node compromise attack. The attackers can take
information from and control of the compromised nodes. The assumptions about
compromised nodes are as follows. A compromised node performs no activities related
to the attack detection; instead, it just performs essential operations such as message
transmission and reception. On the other hand, we assume no cooperation between the
compromised nodes and the wormhole attack nodes.
12. Informatics Engineering, an International Journal (IEIJ), Vol.2, No.4, December 2014
42
The following figure shows the process of message forwarding through a routing path
that contains a wormhole.
Figure 13. A routing path that contains a wormhole
In the figure, nodes A and B are two nodes that are connected by a wormhole. Node A
sends a message to node B, and the message is forwarded to a wormhole, node B, and
node C in that order. In this scenario, four cases may exist: 1) neither node A nor node
B is compromised, 2) node A is compromised, 3) node B is compromised, and 4) both
nodes A and B are compromised. For each of the four cases, three sub-cases exist: A) a
message modification occurs in a wormhole, B) a message drop occurs in a wormhole,
and C) message forwarding occurs in a wormhole.
Case 1: Neither A nor B is compromised
In this case, neither node A nor node B is compromised by an attacker. In sub-cases A)
and C), node B computes the distance between the CoS and itself. It then estimates the
number of hop counts traveled and the number of verifications of the received event
report. Since the actual number of verifications in the report is less than the estimated
value, node B increases the malicious count of node A by one. If the malicious count of
node A reaches a threshold value, node B detects a wormhole, removes node A from its
neighbor list, and does not send an ACK message to node A. Then, node A does not
receive a corresponding ACK message within a timeout period, so it also detects a
wormhole and removes node B from its neighbor list. Note that the proposed method
can detect a wormhole even when an event report is forwarded without modification
through the wormhole, because each node detects a wormhole by checking the number
of verifications of the received event report, not the MACs in the report.
If a message drop occurs in the wormhole, node B cannot receive the event report. In
this case, only node A can detect a wormhole because it does not receive a
corresponding ACK message within a timeout period.
Case 2: Node A is compromised
If node A is compromised, it does not comply with the proposed method. Similar to
case 1), if message modification or message forwarding occurs in a wormhole, node B
compares the number of verifications in the event report and the estimated value and
increases the malicious count of node A. If the malicious count of node A reaches a
threshold value, node B detects a wormhole and removes node A from its neighbor list.
However, node A does not detect the wormhole since it is compromised. The proposed
method does not include compromised node detection and eviction mechanisms. If a
message drop occurs in a wormhole, the wormhole is not detected in this case.
Case 3: Node B is compromised
13. Informatics Engineering, an International Journal (IEIJ), Vol.2, No.4, December 2014
43
Node B is compromised and does not follow the proposed method. If message
modification or message forwarding occurs in a wormhole, node B does not detect a
wormhole and forwards an event report to node C. Node C computes the distance
between itself and the CoS and estimates the number of hop counts and the number of
verifications of the event report. Since the actual number of verifications in the report is
less than the estimated number, node C increases the malicious count of node B. If the
malicious count of node B reaches a threshold value, node C detects a wormhole and
removes node B from its neighbor list. If a message drop occurs in a wormhole, node A
does not receive an ACK message within the timeout period, detects a wormhole and
removes node B from its neighbor list.
Case 4: Both A and B are compromised
In the case, both nodes A and B are compromised nodes. If message modification or
message forwarding occurs in a wormhole, an event message is forwarded to node C.
Node C compares the actual number of verifications of the received report and the
estimated number and increases the malicious count of node B by one. If the malicious
count of node B reaches a threshold value, node C detects a wormhole and removes
node B from its neighbor list. If a message drop occurs in a wormhole, the wormhole is
not detected. The following table compares the wormhole detection capabilities of
SeRWA, LEAP, and the proposed method.
Table 1 Wormhole detection capabilities of the existing schemes and the proposed method
Case SeRWA LEAP P.M
Case 1:
No compromise 1) Message modification
Node A and B detec
t a wormhole
2) Message drop
Node A detects a w
ormhole
3) Message forwarding (no
attack)
no detection
1) Message modification
Node B detects a w
ormhole
2) Message drop
no detection
3) Message forwarding (no
attack)
no detection
1) Message modification
Node A and B detec
t a wormhole
2) Message drop
Node A detects a w
ormhole
3) Message forwarding (
no attack)
Node A and B detec
ts a wormhole
Case 2:
Node A is comp
romised
1) Message modification
Node B detects a w
ormhole
2) Message drop
No detection
3) Message forwarding (no
attack)
No detection
1) Message modification
Node B detects a w
ormhole
2) Message drop
No detection
3) Message forwarding (no
attack)
No detection
1) Message modification
Node B detects a w
ormhole
2) Message drop
No detection
3) Message forwarding (
no attack)
Node B detects a w
ormhole
Case 3:
Node B is comp
romised
1) Message modification
No detection
2) Message drop
1) Message modification
No detection
2) Message drop
1) Message modification
Node C detects a w
ormhole
14. Informatics Engineering, an International Journal (IEIJ), Vol.2, No.4, December 2014
44
Node A detects a w
ormhole
3) Message forwarding (no
attack)
No detection
No detection
3) Message forwarding (no
attack)
No detection
2) Message drop
Node A detects a w
ormhole
3) Message forwarding (n
o attack)
Node C detects a w
ormhole
Case 4:
Nodes A and B
are compromise
d
1) Message modification
No detection
2) Message drop
No detection
3) Message forwarding (no
attack)
No detection
1) Message modification
No detection
2) Message drop
No detection
3) Message forwarding (no
attack)
No detection
1) Message modification
Node C detects a w
ormhole
2) Message drop
No detection
3) Message forwarding (
no attack)
Node C detects a w
ormhole
There are 12 total situations, considering the four cases with three sub-cases each. SeRWA and
LEAP can detect a wormhole in four and two of those situations, respectively, and the proposed
method can detect a wormhole in ten situations. If we assume that the threshold value is one and
that all of the situations occur with the same probability, the probability that the proposed
method will detect a wormhole attack is 10/12, whereas the probabilities that SeRWA and
LEAP would detect a wormhole attack are 4/12 and 2/12, respectively.
In en-route filtering schemes, the routing paths strongly affect the detection probability of false
event reports, since each node has only a small portion of the global key pool, and its detecting
capability is limited.
In the proposed method, every node chooses the next node to forward an event report based on
the key partitions of its candidate parent nodes. Hence, the filtering probability is higher than
that of existing schemes such as SEF.
The following equation represents the filtering probability of false event reports at each node in
the proposed method.
(3)
In the above equation, n is the number of key partitions in a global key pool, T is the number of
MACs in each event report, m is the number of keys in each key partition, k is the number of
keys loaded into each node, and NC is the number of compromised partitions with disclosed
keys. nc is the average number of candidate parent nodes for each node (i.e., the neighbor nodes
that are closer to the sink node than the current node).
Table 2 shows that the probability that a receiving node in the proposed method detects a false
report increases as nc increases.
15. Informatics Engineering, an International Journal (IEIJ), Vol.2, No.4, December 2014
45
Table 2 filtering probabilities of SEF and the proposed method
nc n m k T NC P1 P1'
1 10 10 4 5 1 0.16 0.16
2 10 10 4 5 1 0.16 0.24
3 10 10 4 5 1 0.16 0.28
4 10 10 4 5 1 0.16 0.30
5 10 10 4 5 1 0.16 0.31
For example, if nc = 5, n = 10, m = 10, k = 4, T = 5, and NC = 1, then the filtering
probability of the proposed method is 0.31, whereas the filtering probability of SEF is
0.16.
4.2 EXPERIMENTS
We obtained experimental results for the existing schemes and for the proposed method under
single attack and multi-attack scenarios. The main performance measures are the attack
detection ratios and energy consumption. The parameter values used in our experiments are as
follows.
The total number of sensor nodes is 1000, and the sensor nodes are randomly deployed in a 500
× 500 m2
field based on uniform distribution. The transmission range of the nodes is 50m and is
the same for each node. The energy consumption for transmission / reception of a single byte is
16.25/12.5 μJ, and we assume that the length of each event message is 36 bytes [22-24]. The
energy consumption for one verification operation of a MAC is 75 μJ. There are also parameters
that are related to false report or wormhole attacks. The percentage of compromised nodes is
within the range of 0 ~ 50%. Each false report contains four valid MACs and one incorrect
MAC. The length of a wormhole is between 50m and 150m.
Figure 13 shows the false report detection ratios of SEF and the proposed method as the fraction
of compromised nodes increases under a false report attack. Figure 13 and all of the following
figures represent the sample means and the 95% confidence interval of the y-axis values.
Figure 13 Attack detection ratio under false report attack (single attack)
We can see that the proposed method achieves a much higher false report detection ratio than
SEF. The proposed method detects 58% of the false reports when the fraction of compromised
16. Informatics Engineering, an International Journal (IEIJ), Vol.2, No.4, December 2014
46
nodes is zero, while SEF detects 34% of the false reports. The reason is that each node chooses
the next forwarding nodes based on the key partition information and the distance to the sink of
its neighbor nodes.
The detection ratios for the two schemes decrease as the fraction of compromised nodes
increases. However, the proposed method still shows a higher detection ratio (35%) than SEF
(18%), even when the fraction of compromised nodes is 50%. Figure 14 compares the energy
consumption of SEF and the proposed method under a false report attack.
Figure 14 Energy consumption under false report attack (single attack)
The energy consumption of the proposed method is higher than that of SEF under a false report
attack because the nodes in the proposed method exchange ACK messages with each other. The
energy consumption for ACK messages decreases as the fraction of compromised nodes
increases, since compromised nodes do not generate and send ACK messages. If no ACK
message is used in the proposed method („P.M. (without ACK)‟ in the figure), the proposed
method consumes less energy than SEF. For example, the proposed method without ACK
consumes 89% as much energy as SEF when the fraction of compromised nodes is 50%. We
can selectively turn off the functions related to the ACK messages to save energy in the
proposed method if the false report attack is the only attack in the field.
Figure 15 shows the wormhole detection ratios of SeRWA, LEAP, and the proposed method
under a wormhole attack.
Figure 15 Attack detection ratio under wormhole attack (single attack)
The wormhole detection ratio of the proposed method increases as the length of the wormhole
increases, since the proposed method detects a wormhole based on the number of MAC
verifications performed by the forwarding nodes of the event messages. The proposed method
achieves detection ratios of 61%, 68%, and 75% when the wormhole lengths are 50, 100, and
17. Informatics Engineering, an International Journal (IEIJ), Vol.2, No.4, December 2014
47
150m, respectively. On the other hand, SeRWA and LEAP show relatively constant detection
ratios (59% and 31%, respectively) for increasing values of wormhole length. Figure 16
illustrates the energy consumptions of SeRWA, LEAP, and the proposed method under a
wormhole attack.
Figure 16 Energy consumption under wormhole attack (single attack)
The energy consumption of all three of the schemes tends to decrease as the wormhole length
increases. This is because the forwarding paths for the event messages are shortened due to the
wormhole, so the event messages travel fewer hops. In addition to that, the proposed method
saves energy since it detects more wormholes and drops the corresponding event messages
earlier than the existing schemes. Figure 17 represents the false report detection ratios of the
combined scheme of the two existing schemes (SEF+SeRWA) and the proposed method under a
multi-attack (false report and wormhole attacks) scenario.
Figure 17 False report detection ratio under multi-attack (false report and wormhole attack)
The false report detection ratios of the combined scheme and the proposed method under multi-
attack are less than those for a single attack (i.e., a false report attack), since the number of hops
that the event messages are forwarded decreases due to the wormhole. They also decrease as the
fraction of compromised nodes increases. Still, the proposed method shows a higher false report
detection ratio than the combined scheme since it chooses the forwarding paths of the event
messages based on the key partitions of the nodes. For example, the proposed method detects
22% false reports, while the combined scheme detects 13% false reports.
18. Informatics Engineering, an International Journal (IEIJ), Vol.2, No.4, December 2014
48
Figure 18 compares the wormhole detection ratios of the combined scheme and the proposed
method under the multi-attack scenario.
Figure 18 Wormhole detection ratio under multi-attack (false report and wormhole attack)
When there is no compromised node, the combined scheme shows a comparable wormhole
detection ratio compared to the proposed method. The wormhole detection ratios of the two
schemes degrade as the fraction of compromised nodes increases. However, the detection ratio
of the combined scheme is far lower than the proposed method, whereas the proposed method
shows graceful degradation. Note that when the fraction of compromised nodes is 30%, the
proposed method detects 57% of the wormholes, which is higher than the 39% detected by SEF.
Figure 19 compares the energy consumption of the proposed method and the combined scheme
under the multi-attack scenario.
Figure 19 Energy consumption under multi-attack (false report and wormhole attack)
The result shows that the energy consumption (without ACK) of the combined scheme and the
proposed method increases as the fraction of compromised nodes increases. In addition, the
curve of the combined scheme is higher than that of the proposed method. When the fraction of
compromised nodes is 50%, the energy consumption of the proposed method is 75% of that of
the combined scheme.
19. Informatics Engineering, an International Journal (IEIJ), Vol.2, No.4, December 2014
49
The energy consumption of the combined scheme (with ACK) increases as the fraction of
compromised nodes increases. On the other hand, the energy consumption of the proposed
method shows relatively constant energy consumption. The reason is that the energy
consumption for the ACK messages decreases for both of the two schemes as the fraction of the
compromised nodes increases.
In summary, the proposed method achieves a higher attack detection ratio and less energy
consumption compared to the combined scheme in a multi-attack (false report + wormhole)
scenario.
4.3 DEFENDING AGAINST OTHER ATTACKS
There are many attacks other than the false report and wormhole attacks, and we can use the
proposed method to defend against some of them.
The hello flood attack is one in which an attacker broadcasts a Hello message with high
transmission power to advertise the attack node to most of the nodes in the network. The nodes
that receive the Hello message assume that the attack node is one of their neighbors. However,
most of them are too far from the attack node, and the messages sent by the nodes to the attack
node are lost due to signal attenuation, and the energy used for transmitting the messages is
wasted. The goal of the attacker in a Hello flood attack is to cause message loss due to signal
attenuation, thereby wasting energy. In ACK spoofing attacks, an attack node eavesdrops
messages and transmits forged ACK messages to cause other nodes to keep using a weak or
dead link. The attack disrupts the exchange of messages among the nodes and harms the
availability of the network.
The proposed method is able to defend against the above two attacks. In the proposed method,
each node sends a hello message and receives the corresponding response messages from its
neighbor nodes. Each node adds to its neighbor list only the nodes from which it receives
response messages. This guarantees that the two links of the opposite directions between any
two neighbor nodes are available (i.e., they are able to share a message). Even if an attack node
transmits a hello message with high transmission power, the receiving nodes do not add the
attack node to their neighbor lists. Hence, the proposed method can prevent hello flood attacks.
In addition, the proposed method authenticates messages that are transmitted between two
neighbor nodes based on the pairwise key. An attacker can forge only the ACK messages from
the compromised nodes but not the ACK messages from the other nodes. Hence, the proposed
method mitigates the damage because of the ACK spoofing attack.
5. CONCLUSIONS
Most research related to secure routing in sensor networks has focused on how to detect and
defend against a single attack. However, if multiple attacks occur simultaneously, the existing
security schemes suffer performance degradation. For example, false report and wormhole
attacks can both be applied to effectively damage a sensor network. In this paper, we proposed a
secure routing scheme to defend against wormhole and false report attacks in sensor networks.
The proposed scheme achieves a higher attack detection ratio than the existing schemes and
their combined scheme, which is executed by modifying the two security schemes SEF and
SeRWA so that they share data. The proposed scheme can be extended to defend against other
combinations of multiple attacks.
20. Informatics Engineering, an International Journal (IEIJ), Vol.2, No.4, December 2014
50
ACKNOWLEDGEMENTS
This research was supported by Basic Science Research Program through the National Research
Foundation of Korea (NRF) funded by the Ministry of Education, Science and Technology (No.
NRF-2013R1A2A2A01013971)
REFERENCES
[1] Xu, N. (2002). A Survey of Sensor Network Applications. Tech. Rep., University of Southern
California.
[2] J. A. Stankovic, "When Sensor and Actuator Networks Cover the World," ETRI Journal, vol.
30, no. 5, 2008.
[3] Akyildiz, I. F., and Su, W., Sankarasubramaniam, Y., and Cayirci, E. (2002). A Survey on
Sensor Networks. IEEE Communications Magazine, 40(8), 102-116.
[4] Al-Karaki , J.N. , Kamal , A. E. (2004). Routing techniques in wireless sensor networks: a
survey. IEEE Wireless Communication Magazine, 11(6), 6-28.
[5] Baronti, P., Pillai, P., Chook, V. W. C., Chessa, S., Gotta, A., Hu, Y. F., “Wireless sensor
networks: A survey on the state of the art and the 802.15.4 and ZigBee standards,” Computer
Communications, Vol. 30, No. 7, pp. 1655-1695.
[6] Djenouri, D., Khelladi, L., Badache, N. (2005). A Survey of Security Issues in Mobile Ad-Hoc
and Sensor Networks. IEEE Communications Surveys & Tutorials, 7(4), 2-28.
[7] Karlof, C., Wagner, D. (2003). Secure Routing in Wireless Sensor Networks: Attacks and
Countermeasures. Elsevier's Ad Hoc Networks Journal, Special Issue on Sensor Network
Protocols and Applications, 1( 2-3), 293-315.
[8] Ye, F., Luo, H., Lu, S., Zhang, L. (2005). Statistical En-route Filtering of Injected False Data in
Sensor Networks. IEEE Journals on Selected Areas in Communications, 23(4), 839-850.
[9] Hu, Y. C., Perrig, A. and Johnson, D. B. (2006). “Wormhole Attacks in Wireless Networks”,
IEEE Journal on Selected Areas in Communications, Vol. 24, No. 2, 370-380.
[10] Zhu, S., Setia, S., Jajodia, S., Ning, P. (2004). An Interleaved Hop-by-Hop Authentication
Scheme for Filtering of Injected False Data in Sensor Networks. Proc. S&P, 259-271.
[11] Yu, Z., Guan, Y. (2005). A Dynamic En-route Scheme for Filtering False Data Injection in
Wireless Sensor Networks. Proc. of SenSys, 294-295, ACM.
[12] Lee, H. Y., Cho, T. H. (2006). Key Inheritance-Based False Data Filtering Scheme in Wireless
Sensor Networks. Lecture Notes in Computer Science, LNCS 4317, 116-127, Springer Verlag.
[13] Nghiem, P. T. and Cho, T. H. (2009). “A fuzzy-based interleaved multi-hop authentication
scheme in wireless sensor networks”, Journal of Parallel and Distributed Computing, Vol. 69,
No. 5, 441-450.
[14] Lee, H. Y. and Cho, T. H. (2007). “Fuzzy Adaptive Selection of Filtering Schemes for Energy
Saving in Sensor Networks”, IEICE Trans. Comm., Vol. E90-B, No. 12, 3346-3353.
21. Informatics Engineering, an International Journal (IEIJ), Vol.2, No.4, December 2014
51
[15] Khalil, I., Bagchi, S., and Shroff, N. B. (2007). “LiteWorp: Detection and isolation of the
wormhole attack in static multihop wireless networks,” Computer Networks, Vol. 51, No. 13,
3750-3772.
[16] Khalil, I., Bagchi, S., and Shroff, N. B. (2008). “MOBIWORP: Mitigation of the wormhole
attack in mobile multihop wireless networks,” Ad Hoc Networks, Vol. 6, No. 3, 344-362.
[17] Madria, S. and Yin, J. (2009). “SeRWA: A secure routing protocol against wormhole attacks in
sensor networks”, Ad Hoc Networks, Vol. 7, No. 6, 1051-1063.
[18] Zhu, S., Setia, S., Jajodia, S. (2003), “LEAP: Efficient Mechanisms for Large-Scale Distributed
Sensor Networks,” ACM Conference of Computer and Communications Security, pp. 62-72.
[19] Yun, J-H., I-H. Kim, J-H. Lim and S-W. Seo, “WODEM: Wormhole Attack Defense
Mechanism in Wireless Sensor Networks”, Lecture Notes in Computer Science (LNCS), Vol.
4412(2007), 200-209.
[20] Lee, H. Y. and T. H. Cho (2009), “Fuzzy-Based Path Selection Method for Improving the
Detection of False Reports in Sensor Networks”, IEICE Trans. Inf. & Syst., Vol. E92-D, No. 8,
1574-1416.
[21] Sun, C. I., Lee, H. Y., and Cho, T. H. (2009). “A Path Selection Method for Improving the
Detection Power of the Statistical Filtering in Sensor Networks”, Journal of Information Science
and Engineering, Vol. 25, No. 4, 1163-1175.
[22] Hill, J., Szewczyk, R., Woo, A., Hollar, S., Culler, D., and Pister, K. (2000). System
Architecture Directions for Networked Sensors. Proc. of ACM ASPLOS IX, 93-104.
[23] Xbow sensor networks, http://www.xbow.com
[24] Btnodes, http://www.btnode.ethz.ch/
[25] Roy, S. D., Singh, A., Choudhury, S., and Debnath, N. C.(2008), “Countering Sinkhole and
Black hole Attacks on Sensor Networks using Dynamic Trust Management,” IEEE Symposium
on Computers and Communications, pp. 537-542.
[26] da Silva, A. P. R., Matins, M. H. T., and Rocha, B. P. S.,(2005), “Decentralized Intrusion
Detection in Wireless Sensor Networks,” Q2SWinet '05, pp. 16-23.
Authors
Soo Young Moon received his B.S. and M.S. degrees in Electrical and Computer
Engineering from Sungkyunkwan University in 2007 and 2009, respectively. He is now
a doctoral student in the College of Information and Communication Engineering at
Sungkyunkwan University. His research interests include modeling and simulation,
wireless sensor networks, network security, and artificial intelligence.
Tae Ho Cho received his Ph.D. in Electrical and Computer Engineering from the
University of Arizona, USA, in 1993 and his B.S. and M.S. degrees in Electrical
Engineering from Sungkyunkwan University, Korea, and the University of Alabama,
USA, respectively. He is currently a Professor in the College of Information and
Communication Engineering at Sungkyunkwan University, Korea. His research
interests include wireless sensor networks, intelligent systems, modeling and
simulation, and enterprise resource planning.