This document discusses detection of collision attacks in wireless sensor networks using rule-based packet flow rates. It proposes detection algorithms that monitor the packet flow rate to the base station node. The algorithms aim to have low false detection and tolerance rates and quickly detect attacks. Simulation results show the algorithms achieve these goals. The document also reviews related work on intrusion detection in wireless sensor networks.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
A NOVEL TWO-STAGE ALGORITHM PROTECTING INTERNAL ATTACK FROM WSNSIJCNC
Wireless sensor networks (WSNs) consists of small nodes with constrain capabilities. It enables numerous
applications with distributed network infrastructure. With its nature and application scenario, security of
WSN had drawn a great attention. In malicious environments for a functional WSN, security mechanisms
are essential. Malicious or internal attacker has gained attention as the most challenging attacks to
WSNs. Many works have been done to secure WSN from internal attacks but most of them relay on either
training data set or predefined thresholds. It is a great challenge to find or gain knowledge about the
Malicious. In this paper, we develop the algorithm in two stages. Initially, Abnormal Behaviour
Identification Mechanism (ABIM) which uses cosine similarity. Finally, Dempster-Shafer theory (DST)is
used. Which combine multiple evidences to identify the malicious or internal attacks in a WSN. In this
method we do not need any predefined threshold or tanning data set of the nodes.
A Review of Network Layer Attacks and Countermeasures in WSNiosrjce
IOSR Journal of Electronics and Communication Engineering(IOSR-JECE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of electronics and communication engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in electronics and communication engineering. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Securing WSN communication using Enhanced Adaptive Acknowledgement ProtocolIJMTST Journal
Wireless Sensor Networking is one of the most important technologies that have different applications. The
security of wireless sensor networks is a big concern. Hence for secure communication it is important to
detect and prevent the attacks in network. Major focus is given on security and on detection and prevention of
attacks. Adversary can create gray-hole attack and black-hole attack simultaneously. There are many
methods which do not provide proper method to defend against these kinds of attacks. The Ad-hoc On
Demand Distance Vector (AODV) scheme is used for detecting Gray-Hole attack and Enhanced Adaptive
Acknowledgment (EAACK) mechanism is used for detecting black-hole attack in network. But only by
detecting and preventing the attacks, it does not provide the better security to wireless network. Therefore, to
secure network a hybrid mechanism is deployed in wireless sensor network. Security algorithm for wireless
sensor networks such as CAWS and Modern Encryption Standard (MES-1) is used for secure communication.
The CAWS and Modern Encryption Standard (MES-1) is an advanced cryptography method which is used for
encryption and decryption process to provide special security.
HANDLING CROSS-LAYER ATTACKS USING NEIGHBORS MONITORING SCHEME AND SWARM INTE...Editor IJCATR
The standard MAC protocol widely used for Mobile Adhoc Networks (MANETs) is IEEE 802.11.
When attacks in MAC layer are left as such without paying attention, it could possibly disturb channel access and
consequently may cause wastage of resources in terms of bandwidth and power. In this paper, a swarm based detection
and defense technique is proposed for routing and MAC layer attacks in MANET. Using forward and backward ants,
the technique obtains mean value of nodes between the first received RREQ and RREP packets. Based on this
estimation, the source node decides the node as valid or malicious. Moreover the MAC layer parameters namely
number of neighbors identified by the MAC layer, number of neighbors identified by the routing layer, the number of
recent MAC receptions and the number of recent routing protocol receptions are used to determine the node state. The
source node uses these two node state estimation techniques to construct the reliable path to the destination. This
proposed technique improves the network performance and at the same time prevents attackers intelligently.
A survey on bio inspired security in wireless sensor networkseSAT Journals
Abstract Wireless sensor networks usually comprise of a large number of nodes which are geographically dis- tributed and are not physically connected. These nodes are frequently used to sense private data and can be necessary to transmit confidential and critical data. Hence it is important to provide security for wireless sensor networks. Research is still ongoing in this field and many models have been proposed for providing security. Looking into the symbiotic nature of biological systems can give us valuable in- sights for computer networks. Because of the analo- gies between network security and how the biotic components react to perceived threats in their sur- roundings, Bio-inspired approaches for providing se- curity in networks are interesting to evaluate . Many theories from nature such as swarm intelligence, ant colony optimisation (ACO), web spider defence, bird flocking, human immune system and so forth have been used to tackle various problems in the network- ing domain. In this paper, we intend to outline and categorize the various security attacks we encounter in a wireless sensor network and review the proposed conventional security mechanisms for them and also compare it with an alternative novel approach, i.e bio-inspired approach. Keywords— Wireless sensor network (WSN), Bio-inspired, security, attacks
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
A NOVEL TWO-STAGE ALGORITHM PROTECTING INTERNAL ATTACK FROM WSNSIJCNC
Wireless sensor networks (WSNs) consists of small nodes with constrain capabilities. It enables numerous
applications with distributed network infrastructure. With its nature and application scenario, security of
WSN had drawn a great attention. In malicious environments for a functional WSN, security mechanisms
are essential. Malicious or internal attacker has gained attention as the most challenging attacks to
WSNs. Many works have been done to secure WSN from internal attacks but most of them relay on either
training data set or predefined thresholds. It is a great challenge to find or gain knowledge about the
Malicious. In this paper, we develop the algorithm in two stages. Initially, Abnormal Behaviour
Identification Mechanism (ABIM) which uses cosine similarity. Finally, Dempster-Shafer theory (DST)is
used. Which combine multiple evidences to identify the malicious or internal attacks in a WSN. In this
method we do not need any predefined threshold or tanning data set of the nodes.
A Review of Network Layer Attacks and Countermeasures in WSNiosrjce
IOSR Journal of Electronics and Communication Engineering(IOSR-JECE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of electronics and communication engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in electronics and communication engineering. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Securing WSN communication using Enhanced Adaptive Acknowledgement ProtocolIJMTST Journal
Wireless Sensor Networking is one of the most important technologies that have different applications. The
security of wireless sensor networks is a big concern. Hence for secure communication it is important to
detect and prevent the attacks in network. Major focus is given on security and on detection and prevention of
attacks. Adversary can create gray-hole attack and black-hole attack simultaneously. There are many
methods which do not provide proper method to defend against these kinds of attacks. The Ad-hoc On
Demand Distance Vector (AODV) scheme is used for detecting Gray-Hole attack and Enhanced Adaptive
Acknowledgment (EAACK) mechanism is used for detecting black-hole attack in network. But only by
detecting and preventing the attacks, it does not provide the better security to wireless network. Therefore, to
secure network a hybrid mechanism is deployed in wireless sensor network. Security algorithm for wireless
sensor networks such as CAWS and Modern Encryption Standard (MES-1) is used for secure communication.
The CAWS and Modern Encryption Standard (MES-1) is an advanced cryptography method which is used for
encryption and decryption process to provide special security.
HANDLING CROSS-LAYER ATTACKS USING NEIGHBORS MONITORING SCHEME AND SWARM INTE...Editor IJCATR
The standard MAC protocol widely used for Mobile Adhoc Networks (MANETs) is IEEE 802.11.
When attacks in MAC layer are left as such without paying attention, it could possibly disturb channel access and
consequently may cause wastage of resources in terms of bandwidth and power. In this paper, a swarm based detection
and defense technique is proposed for routing and MAC layer attacks in MANET. Using forward and backward ants,
the technique obtains mean value of nodes between the first received RREQ and RREP packets. Based on this
estimation, the source node decides the node as valid or malicious. Moreover the MAC layer parameters namely
number of neighbors identified by the MAC layer, number of neighbors identified by the routing layer, the number of
recent MAC receptions and the number of recent routing protocol receptions are used to determine the node state. The
source node uses these two node state estimation techniques to construct the reliable path to the destination. This
proposed technique improves the network performance and at the same time prevents attackers intelligently.
A survey on bio inspired security in wireless sensor networkseSAT Journals
Abstract Wireless sensor networks usually comprise of a large number of nodes which are geographically dis- tributed and are not physically connected. These nodes are frequently used to sense private data and can be necessary to transmit confidential and critical data. Hence it is important to provide security for wireless sensor networks. Research is still ongoing in this field and many models have been proposed for providing security. Looking into the symbiotic nature of biological systems can give us valuable in- sights for computer networks. Because of the analo- gies between network security and how the biotic components react to perceived threats in their sur- roundings, Bio-inspired approaches for providing se- curity in networks are interesting to evaluate . Many theories from nature such as swarm intelligence, ant colony optimisation (ACO), web spider defence, bird flocking, human immune system and so forth have been used to tackle various problems in the network- ing domain. In this paper, we intend to outline and categorize the various security attacks we encounter in a wireless sensor network and review the proposed conventional security mechanisms for them and also compare it with an alternative novel approach, i.e bio-inspired approach. Keywords— Wireless sensor network (WSN), Bio-inspired, security, attacks
MANETs (Mobile Ad hoc Network) is a self-governing system in which different mobile nodes are connected by wireless links. MANETs comprise of mobile nodes that are independent for moving in and out over the network. Nodes are the devices or systems that is laptops, mobile phone etc. those are participating in the network. These nodes can operate as router/host or both simultaneously. These nodes can form uninformed topologies as per their connectivity among nodes over the network. Security in MANETs is the prime anxiety for the fundamental working of network. MANETs frequently will be ill with security threats because of it having features like altering its topology dynamically, open medium, lack of central management & monitoring, cooperative algorithms and no apparent security mechanism. These factors draw an attention for the MANETs against the security intimidation. In this paper we have studied about security attack in MANET and its consequences, proposed technique for black hole detection is hybrid in nature which combines the benefit of proactive and reactive protocol and proposed technique is compared with AODV.
An ids scheme against black hole attack to secure aomdv routing in manet pijans
In Mobile Ad hoc Network (MANET) all the nodes are freely moves in the absence of without ant
centralized coordination system. Due to that the attackers or malicious nodes are easily affected that kind
of network and responsible for the routing misbehavior. The routing is network is mandatory to deliver
data in between source and destination. In this research we work on security field in MANET and proposed
a novel security scheme against routing misbehavior through Black hole attack. The Ad hoc On demand
Multipath Routing (AOMDV) protocol is consider for routing and also to improves the routing quality as
compare to single path routing protocol. The attacker is affected all the possible paths that is selected by
sender for sending data in network. The malicious nodes are forward optimistic reply at the time of routing
by that their identification is also a complex procedure. The proposed Intrusion Detection System (IDS)
scheme is identified the attacker information through hop count mechanism. The routing information of
actual data is reached to which intermediate node and the next hop information is exist at that node is
confirm by IDS scheme. The black hole attacker node Identification (ID) is forward in network by that in
future attacker is not participating in routing procedure. The proposed security scheme detects and
provides the deterrence against routing misbehavior through malicious attack. Here we compare the
routing performance of AOMDV, Attack and IDS scheme. The performance of normal multipath routing
and proposed IDS scheme is almost equal. The attacker has degrades the whole routing performance but
observed that in presence of attacker, routing misbehavior is completely block by the proposed IDS scheme
and recovers 95 % of data as compare to normal routing.
An Optimal Risk- Aware Mechanism for Countering Routing Attacks in MANETsIJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
International Journal of Modern Engineering Research (IJMER) covers all the fields of engineering and science: Electrical Engineering, Mechanical Engineering, Civil Engineering, Chemical Engineering, Computer Engineering, Agricultural Engineering, Aerospace Engineering, Thermodynamics, Structural Engineering, Control Engineering, Robotics, Mechatronics, Fluid Mechanics, Nanotechnology, Simulators, Web-based Learning, Remote Laboratories, Engineering Design Methods, Education Research, Students' Satisfaction and Motivation, Global Projects, and Assessment…. And many more.
PREVENTION OF WORMHOLE ATTACK IN WIRELESS SENSOR NETWORKIJNSA Journal
Ubiquitous and pervasive applications, where the Wireless Sensor Networks are typically deployed, lead to the susceptibility to many kinds of security attacks. Sensors used for real time response capability also make it difficult to devise the resource intensive security protocols because of their limited battery, power, memory and processing capabilities. One of potent form of Denial of Service attacks is Wormhole attack that affects on the network layer. In this paper, the techniques dealing with wormhole attack are investigated and an approach for wormhole prevention is proposed. Our approach is based on the analysis of the two-hop neighbors forwarding Route Reply packet. To check the validity of the sender, a unique key between the individual sensor node and the base station is required to be generated by suitable scheme.
A SYMMETRIC TOKEN ROUTING FOR SECURED COMMUNICATION OF MANET cscpconf
The communication should be much secured in Mobile Adhoc Networks in the
protective environment such as Military atmosphere and in a disaster relief. Due to the attackers,
Mobile Adhoc Networks resulting in denial of Service attacks modify packets, Error packets,
Missing Packets, Theft of Nodes, etc. To overcome this problem, We propose a new Symmetric
Token Routing Protocol (STRP) for mobile ad hoc networks provides much security against
MANET. The proposed protocol distributed a secured shared symmetric token for each node to
provide security against hackers and attackers. Simulation results shows the better delivery against
the existing protocol in MANET.
An overview of contemporary security problems in wireless mesh networksiosrjce
Wireless mesh network (WMN) is a new wireless networking concept. Unlike traditional
wireless networks, Wireless Mesh Networks do not rely on any fixed communications. As an
alternative, hosts rely on each other to keep the network connected. Wireless Internet service
providers are choosing WMNs to offer Internet connectivity, as it allows a fast, simple and
inexpensive network use. One major challenge in design of these networks is their vulnerability to
security attacks. In this paper, principal contemporary security issues for wireless mesh networks
have been investigated. Identification of the threats a Wireless mesh network faces and the security
goals to be realized are described. The new challenges and opportunities posed by this new
networking environment are dealt with and explored approaches to secure its communication.
Data Transfer Security solution for Wireless Sensor NetworkEditor IJCATR
WSN is a wide growth area for specific resource limited application. Factor associated with technology like, the encryption
security, operating speed and power consumption for network. Here, we introduce a mechanism for secure transferring of data is WSN
and various security related issues. This energy-efficient encryption is a secure communication framework in which an algorithm is
used to encode the sensed data using like, RC5, AES and CAST Algorithm. The proposed scheme is most suitable for wireless sensor
networks that incorporate data centric routing protocols. An algorithm in sensor network is help to designers predict security
performance under a set of constraints for WSNs. This symmetric key function is used to guarantee secure communications between
in-network nodes and reliable operation cost. RC5 is good on the code point of view, but the key schedule consumes more resource
time for efficient security aspects.
A New Way of Identifying DOS Attack Using Multivariate Correlation Analysisijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
Analysis of security threats in wireless sensor networkijwmn
Wireless Sensor Network(WSN) is an emerging technology and explored field of researchers worldwide
in the past few years, so does the need for effective security mechanisms. The sensing technology
combined with processing power and wireless communication makes it lucrative for being exploited in
abundance in future. The inclusion of wireless communication technology also incurs various types of
security threats due to unattended installation of sensor nodes as sensor networks may interact with
sensitive data and /or operate in hostile unattended environments. These security concerns be addressed
from the beginning of the system design. The intent of this paper is to investigate the security related
issues in wireless sensor networks. In this paper we have explored general security threats in wireless
sensor network with extensive study.
SECURED AODV TO PROTECT WSN AGAINST MALICIOUS INTRUSIONIJNSA Journal
One of the security issues in Wireless Sensor Networks (WSN) is intrusion detection. In this paper, we propose a new defence mechanism based on the Ad hoc On-Demand Vector (AODV) routing protocol. AODV is a reactive protocol designed for ad hoc networks and has excellent flexibility to be adapted to a new secure version. The main objective of the proposed secured AODV routing protocol is to protect WSN against malicious intrusion and defend against adversary attacks. This secured AODV protocol works well with the WSN dynamics and topology changes due to limited available resources. It establishes secure multi-hop routing between sensor nodes with high confidence, integrity, and availability. The secured AODV utilizes an existing intrusion dataset that facilitates new collection from all the exchanged packets in the network. The protocol monitors end to end delay and avoid any additional overhead over message transfer between sensor nodes. The experimental results showed that this secured AODV could be used to fight against malicious attacks such as black hole attacks and avoid caused large transmission delays.
Survey of manet misbehaviour detection approachesIJNSA Journal
Distributed Denial of Service (DDoS) attacks today
have been amplified into gigabits volume with
broadband Internet access; at the same time, the us
e of more powerful botnets and common DDoS
mitigation and protection solutions implemented in
small and large organizations’ networks and servers
are no longer effective. Our survey provides an in-
depth study on the current largest DNS reflection a
ttack
with more than 300 Gbps on Spamhaus.org. We have re
viewed and analysed the current most popular
DDoS attack types that are launched by the hacktivi
sts. Lastly, effective cloud-based DDoS mitigation
and
protection techniques proposed by both academic res
earchers and large commercial cloud-based DDoS
service providers are discussed.
WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...ijsrd.com
The recent advancements in the wireless arena and their wide-spread utilization have introduced new security vulnerabilities. The wireless media being shared is exposed to outside world, so it is susceptible to various attacks at different layers of OSI network stack. For example, jamming and device tampering at the physical layer; disruption of the medium access control (MAC) layer; routing attacks like Blackhole, rushing, wormhole; targeted attacks on the transport protocol like session hijacking, SYN flooding or even attacks intended to disrupt specific applications through viruses, worms and Trojan Horses. Wormhole attack is one of the serious routing attacks amongst all the network layer attacks launched on MANET. Wormhole attack is launched by creation of tunnels and it leads to total disruption of the routing paths on MANET. In this paper, Wormhole detection algorithm (WDA) is proposed based on modifying the forwarding packet process that detects and isolates wormhole nodes in ad hoc on demand distance vector (AODV) routing protocol.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
MANETs (Mobile Ad hoc Network) is a self-governing system in which different mobile nodes are connected by wireless links. MANETs comprise of mobile nodes that are independent for moving in and out over the network. Nodes are the devices or systems that is laptops, mobile phone etc. those are participating in the network. These nodes can operate as router/host or both simultaneously. These nodes can form uninformed topologies as per their connectivity among nodes over the network. Security in MANETs is the prime anxiety for the fundamental working of network. MANETs frequently will be ill with security threats because of it having features like altering its topology dynamically, open medium, lack of central management & monitoring, cooperative algorithms and no apparent security mechanism. These factors draw an attention for the MANETs against the security intimidation. In this paper we have studied about security attack in MANET and its consequences, proposed technique for black hole detection is hybrid in nature which combines the benefit of proactive and reactive protocol and proposed technique is compared with AODV.
An ids scheme against black hole attack to secure aomdv routing in manet pijans
In Mobile Ad hoc Network (MANET) all the nodes are freely moves in the absence of without ant
centralized coordination system. Due to that the attackers or malicious nodes are easily affected that kind
of network and responsible for the routing misbehavior. The routing is network is mandatory to deliver
data in between source and destination. In this research we work on security field in MANET and proposed
a novel security scheme against routing misbehavior through Black hole attack. The Ad hoc On demand
Multipath Routing (AOMDV) protocol is consider for routing and also to improves the routing quality as
compare to single path routing protocol. The attacker is affected all the possible paths that is selected by
sender for sending data in network. The malicious nodes are forward optimistic reply at the time of routing
by that their identification is also a complex procedure. The proposed Intrusion Detection System (IDS)
scheme is identified the attacker information through hop count mechanism. The routing information of
actual data is reached to which intermediate node and the next hop information is exist at that node is
confirm by IDS scheme. The black hole attacker node Identification (ID) is forward in network by that in
future attacker is not participating in routing procedure. The proposed security scheme detects and
provides the deterrence against routing misbehavior through malicious attack. Here we compare the
routing performance of AOMDV, Attack and IDS scheme. The performance of normal multipath routing
and proposed IDS scheme is almost equal. The attacker has degrades the whole routing performance but
observed that in presence of attacker, routing misbehavior is completely block by the proposed IDS scheme
and recovers 95 % of data as compare to normal routing.
An Optimal Risk- Aware Mechanism for Countering Routing Attacks in MANETsIJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
International Journal of Modern Engineering Research (IJMER) covers all the fields of engineering and science: Electrical Engineering, Mechanical Engineering, Civil Engineering, Chemical Engineering, Computer Engineering, Agricultural Engineering, Aerospace Engineering, Thermodynamics, Structural Engineering, Control Engineering, Robotics, Mechatronics, Fluid Mechanics, Nanotechnology, Simulators, Web-based Learning, Remote Laboratories, Engineering Design Methods, Education Research, Students' Satisfaction and Motivation, Global Projects, and Assessment…. And many more.
PREVENTION OF WORMHOLE ATTACK IN WIRELESS SENSOR NETWORKIJNSA Journal
Ubiquitous and pervasive applications, where the Wireless Sensor Networks are typically deployed, lead to the susceptibility to many kinds of security attacks. Sensors used for real time response capability also make it difficult to devise the resource intensive security protocols because of their limited battery, power, memory and processing capabilities. One of potent form of Denial of Service attacks is Wormhole attack that affects on the network layer. In this paper, the techniques dealing with wormhole attack are investigated and an approach for wormhole prevention is proposed. Our approach is based on the analysis of the two-hop neighbors forwarding Route Reply packet. To check the validity of the sender, a unique key between the individual sensor node and the base station is required to be generated by suitable scheme.
A SYMMETRIC TOKEN ROUTING FOR SECURED COMMUNICATION OF MANET cscpconf
The communication should be much secured in Mobile Adhoc Networks in the
protective environment such as Military atmosphere and in a disaster relief. Due to the attackers,
Mobile Adhoc Networks resulting in denial of Service attacks modify packets, Error packets,
Missing Packets, Theft of Nodes, etc. To overcome this problem, We propose a new Symmetric
Token Routing Protocol (STRP) for mobile ad hoc networks provides much security against
MANET. The proposed protocol distributed a secured shared symmetric token for each node to
provide security against hackers and attackers. Simulation results shows the better delivery against
the existing protocol in MANET.
An overview of contemporary security problems in wireless mesh networksiosrjce
Wireless mesh network (WMN) is a new wireless networking concept. Unlike traditional
wireless networks, Wireless Mesh Networks do not rely on any fixed communications. As an
alternative, hosts rely on each other to keep the network connected. Wireless Internet service
providers are choosing WMNs to offer Internet connectivity, as it allows a fast, simple and
inexpensive network use. One major challenge in design of these networks is their vulnerability to
security attacks. In this paper, principal contemporary security issues for wireless mesh networks
have been investigated. Identification of the threats a Wireless mesh network faces and the security
goals to be realized are described. The new challenges and opportunities posed by this new
networking environment are dealt with and explored approaches to secure its communication.
Data Transfer Security solution for Wireless Sensor NetworkEditor IJCATR
WSN is a wide growth area for specific resource limited application. Factor associated with technology like, the encryption
security, operating speed and power consumption for network. Here, we introduce a mechanism for secure transferring of data is WSN
and various security related issues. This energy-efficient encryption is a secure communication framework in which an algorithm is
used to encode the sensed data using like, RC5, AES and CAST Algorithm. The proposed scheme is most suitable for wireless sensor
networks that incorporate data centric routing protocols. An algorithm in sensor network is help to designers predict security
performance under a set of constraints for WSNs. This symmetric key function is used to guarantee secure communications between
in-network nodes and reliable operation cost. RC5 is good on the code point of view, but the key schedule consumes more resource
time for efficient security aspects.
A New Way of Identifying DOS Attack Using Multivariate Correlation Analysisijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
Analysis of security threats in wireless sensor networkijwmn
Wireless Sensor Network(WSN) is an emerging technology and explored field of researchers worldwide
in the past few years, so does the need for effective security mechanisms. The sensing technology
combined with processing power and wireless communication makes it lucrative for being exploited in
abundance in future. The inclusion of wireless communication technology also incurs various types of
security threats due to unattended installation of sensor nodes as sensor networks may interact with
sensitive data and /or operate in hostile unattended environments. These security concerns be addressed
from the beginning of the system design. The intent of this paper is to investigate the security related
issues in wireless sensor networks. In this paper we have explored general security threats in wireless
sensor network with extensive study.
SECURED AODV TO PROTECT WSN AGAINST MALICIOUS INTRUSIONIJNSA Journal
One of the security issues in Wireless Sensor Networks (WSN) is intrusion detection. In this paper, we propose a new defence mechanism based on the Ad hoc On-Demand Vector (AODV) routing protocol. AODV is a reactive protocol designed for ad hoc networks and has excellent flexibility to be adapted to a new secure version. The main objective of the proposed secured AODV routing protocol is to protect WSN against malicious intrusion and defend against adversary attacks. This secured AODV protocol works well with the WSN dynamics and topology changes due to limited available resources. It establishes secure multi-hop routing between sensor nodes with high confidence, integrity, and availability. The secured AODV utilizes an existing intrusion dataset that facilitates new collection from all the exchanged packets in the network. The protocol monitors end to end delay and avoid any additional overhead over message transfer between sensor nodes. The experimental results showed that this secured AODV could be used to fight against malicious attacks such as black hole attacks and avoid caused large transmission delays.
Survey of manet misbehaviour detection approachesIJNSA Journal
Distributed Denial of Service (DDoS) attacks today
have been amplified into gigabits volume with
broadband Internet access; at the same time, the us
e of more powerful botnets and common DDoS
mitigation and protection solutions implemented in
small and large organizations’ networks and servers
are no longer effective. Our survey provides an in-
depth study on the current largest DNS reflection a
ttack
with more than 300 Gbps on Spamhaus.org. We have re
viewed and analysed the current most popular
DDoS attack types that are launched by the hacktivi
sts. Lastly, effective cloud-based DDoS mitigation
and
protection techniques proposed by both academic res
earchers and large commercial cloud-based DDoS
service providers are discussed.
WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...ijsrd.com
The recent advancements in the wireless arena and their wide-spread utilization have introduced new security vulnerabilities. The wireless media being shared is exposed to outside world, so it is susceptible to various attacks at different layers of OSI network stack. For example, jamming and device tampering at the physical layer; disruption of the medium access control (MAC) layer; routing attacks like Blackhole, rushing, wormhole; targeted attacks on the transport protocol like session hijacking, SYN flooding or even attacks intended to disrupt specific applications through viruses, worms and Trojan Horses. Wormhole attack is one of the serious routing attacks amongst all the network layer attacks launched on MANET. Wormhole attack is launched by creation of tunnels and it leads to total disruption of the routing paths on MANET. In this paper, Wormhole detection algorithm (WDA) is proposed based on modifying the forwarding packet process that detects and isolates wormhole nodes in ad hoc on demand distance vector (AODV) routing protocol.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Secure dynamic source routing protocol for defending black hole attacks in mo...nooriasukmaningtyas
Wireless Ad Hoc Network is a dynamically organized network on emergency
situations, in which a group of wireless devices send data among themselves
without requiring any base stations for forwarding data. Here the nodes itself
perform the functions of routing. This important characteristic of mobile ad
hoc networks allows the hassle free set up of the network for
communications in different crisis such as battlefield and natural disaster
zones. Multi hop communication in MANET is achieved by the cooperation
of nodes in forwarding data packets. This feature of MANET is largely
exploited to launch a security attack called black hole attack. A light weight
solution called SEC-DSR is proposed to defend the network from black hole
attack and enables communication among nodes even in the presence of
attackers. In this scheme, by analyzing only the control packets used for
routing in the network, the compromised nodes launching the attack are
identified. From the collective judgment by the participating nodes in the
routing path, a secure route free of black hole nodes is selected for
communication by the host. Simulation results validate and ensure the
effectiveness of the proposed solution tested on an ad hoc network with
compromised black hole nodes.
AN IMPROVED WATCHDOG TECHNIQUE BASED ON POWER-AWARE HIERARCHICAL DESIGN FOR I...IJNSA Journal
Preserving security and confidentiality in wireless sensor networks (WSN) are crucial. Wireless sensor networks in comparison with wired networks are more substantially vulnerable to attacks and intrusions. In WSN, a third person can eavesdrop to the information or link to the network. So, preventing these intrusions by detecting them has become one of the most demanding challenges. This paper, proposes an
improved watchdog technique as an effective technique for detecting malicious nodes based on a power aware hierarchical model. This technique overcomes the common problems in the original Watchdog mechanism. The main purpose to present this model is reducing the power consumption as a key factor
for increasing the network's lifetime. For this reason, we simulated our model with Tiny-OS simulator and then, compared our results with non hierarchical model to ensure the improvement. The results indicate that, our proposed model is better in performance than the original models and it has increased the lifetime of the wireless sensor nodes by around 2611.492 seconds for a network with 100 sensors.
Mitigation of Colluding Selective Forwarding Attack in WMNs using FADEIJTET Journal
ABSTRACT - Wireless Mesh Networks (WMNs) have emerged as a promising technology because of their wide range of
applications. Wireless mesh networks wireless mesh networks (WMNs) are dynamically self – organizing, self –
configuring, self – healing with nodes in the network automatically establishing an adHoc network and maintaining mesh
connectivity. Because of their fast connectivity wireless mesh networks (WMNs) is widely used in military applications.
Security is the major constrain in wireless mesh networks (WMNs). This paper considers a special type of DoS attack
called selective forwarding attack or greyhole attack. With such an attack, a misbehaving mesh router just forwards few
packets it receives but drops sensitive data packets. To mitigate the effect of such attack an approach called FADE :
Forward Assessment based Detection is adopted. FADE scheme detects the presence of attack inside the network by
means of two-hop acknowledgment based monitoring and forward assessment based detection. FADE operates in three
phases and analyzed by determining optimal threshold values. This approach is found to provide effective defense against
the collaborative internal attackers in WMNs.
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networksijsrd.com
A Mobile Ad-Hoc Network is a collection of mobile nodes or a temporary network set up by wireless mobile nodes moving arbitrary in the places that have no network infrastructure in such a manner that the interconnections between nodes are capable of changing on continual basis. Thus the nodes find a path to the destination node using routing protocols. However, due to security vulnerabilities of the routing protocols, wireless ad-hoc networks are unprotected to attacks of the malicious nodes. Various attacks and one of those attacks is the Black Hole Attack against network integrity absorbing all data packets in the network. Since the data packets do not reach the destination node on account of this attack, data loss will occur. Therefore, it is a severe attack that can be easily employed against routing in mobile ad hoc networks. There are lots of detection and defense mechanisms to eliminate the intruder that carry out the black hole attack. . Virtual Infrastructure achieves reliable transmission in Mobile Ad Hoc Network. Black Hole Attack is the major problem to affect the Virtual Infrastructure. In this paper, approach on analyzing and improving the security of AODV, which is one of the popular routing protocols for MANET. Our aim is to ensuring the avoidance against Black hole attack.
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
International Refereed Journal of Engineering and Science (IRJES)irjes
International Refereed Journal of Engineering and Science (IRJES) is a leading international journal for publication of new ideas, the state of the art research results and fundamental advances in all aspects of Engineering and Science. IRJES is a open access, peer reviewed international journal with a primary objective to provide the academic community and industry for the submission of half of original research and applications
PERFORMANCE EVALUATION OF WIRELESS SENSOR NETWORK UNDER HELLO FLOOD ATTACKIJCNCJournal
Wireless sensor network (WSN) is highly used in many fields. The network consists of tiny lightweight
sensor nodes and is largely used to scan or detect or monitor environments. Since these sensor nodes are
tiny and lightweight, they put some limitations on resources such as usage of power, processing given task,
radio frequency range. These limitations allow network vulnerable to many different types of attacks such
as hello flood attack, black hole, Sybil attack, sinkhole, and many more. Among these attacks, hello flood is
one of the most important attacks. In this paper,we have analyzed the performance of hello flood attack and
compared the network performance as number of attackers increases. Network performance is evaluated
by modifying the ad-hoc on demand distance vector (AODV) routing protocol by using NS2 simulator. It
has been tested under different scenarios like no attacker, single attacker, and multiple attackers to know
how the network performance changes. The simulation results show that as the number of attackers
increases the performance in terms of throughput and delay changes.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Requisite Trust Based Routing Protocol for WSNAM Publications
A mobile ad-hoc network (MANET) is an infrastructure less network of mobile devices connected by wireless
links. To secure a MANET in colluding nodes environment, the proposed work aims to detect and defend colluding nodes that
causes internal attacks. In order to achieve this, the work focuses on the novel algorithm of trust computation and route
detection that detects colluding nodes, without message and route redundancy during route discovery by using Requisite Trust
based Secure Routing Protocol (RTSR). The trust will be calculated in local forwarding nodes, which are used to discover the
route. The trust values from one hop neighbors are used to calculate the single trust value for each node using the constant
normalization concept. Route discovery and trust information will be stored in fixed cluster head (CH).
Analysis of wireless sensor networks security, attacks and challengeseSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Abstract Recent advancements in MEMS technologies and development in the area of low power microcontrollers have resulted as implementation of wireless sensor networks in real life problem solving in areas like traffic monitoring, patient monitoring , battlefield surveillance. These wireless sensors are very small in size and are operated at low power for low data rate applications. WSN nodes include features like scalability, self-organizing, self-healing. WSN nodes face many challenges starting from deployment till their life span which is dependent on very low battery strength. Since these nodes are operated in unattended environments, many security threats are for them to survive. These nodes face variety of attacks at different layers of their architecture, ranging from physical stealing, tempering to reprogramming. Applying any traditional security mechanism over wireless sensor nodes is also not possible as those traditional algorithms or protocols consume very much processing and power due to their complexity. In this paper, we have mentioned. This paper aims at reporting an initial introduction of WSN, WSN architecture, challenges and security threats subsequently. Keywords: Wireless, Sensor, Threat, Security, Power, Node
A Novel Approach to Detect & Prevent Wormhole Attack over MANET & Sensor n/w ...IOSR Journals
Abstract: In Mobile Ad hoc Network (MANET) mobile node is responsible for route establishment using
wireless link where each node may behave like both as a host and router. MANET encounters number of
security threats because of its open entrusted environment, with little security arrangement, security over
MANET can be enhance up to some satisfactory level because of its inherent characteristics. Among some of
the prominent security threats wormhole attack is considered to be a very serious security threat over MANET.
In wormhole two selfish node which is geographically very far away to each other makes tunnel between each
other to hide their actual location and give the illusion that they are true neighbours and attract other nodes to
make conversation through the wormhole tunnel. Many researchers focused on detecting wormhole attack and
its prevention mechanism. It seems that in the previous technique there is a need to improve their results in the
brink of false negative rate, routing overhead etc. The present paper has proposed the hybrid model in order to
detect and prevent the wormhole attack. This approach has been work with neighbour node and hop count
method.
Keywords: Mobile Ad hoc Network, Selfish node, Malicious node, AODV
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
"Impact of front-end architecture on development cost", Viktor TurskyiFwdays
I have heard many times that architecture is not important for the front-end. Also, many times I have seen how developers implement features on the front-end just following the standard rules for a framework and think that this is enough to successfully launch the project, and then the project fails. How to prevent this and what approach to choose? I have launched dozens of complex projects and during the talk we will analyze which approaches have worked for me and which have not.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Search and Society: Reimagining Information Access for Radical FuturesBhaskar Mitra
The field of Information retrieval (IR) is currently undergoing a transformative shift, at least partly due to the emerging applications of generative AI to information access. In this talk, we will deliberate on the sociotechnical implications of generative AI for information access. We will argue that there is both a critical necessity and an exciting opportunity for the IR community to re-center our research agendas on societal needs while dismantling the artificial separation between the work on fairness, accountability, transparency, and ethics in IR and the rest of IR research. Instead of adopting a reactionary strategy of trying to mitigate potential social harms from emerging technologies, the community should aim to proactively set the research agenda for the kinds of systems we should build inspired by diverse explicitly stated sociotechnical imaginaries. The sociotechnical imaginaries that underpin the design and development of information access technologies needs to be explicitly articulated, and we need to develop theories of change in context of these diverse perspectives. Our guiding future imaginaries must be informed by other academic fields, such as democratic theory and critical theory, and should be co-developed with social science scholars, legal scholars, civil rights and social justice activists, and artists, among others.
1. Hosamsoleman, Ali Payandeh, Nasser Mozayyani, SaeedSedighianKashi/ International Journal
of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 4, Jul-Aug 2013, pp.261-268
261 | P a g e
Detection Collision Attacks In Wireless Sensor Network
Usingrule-Based Packet Flow Rate
Hosamsoleman1
, Ali Payandeh2
, Nasser Mozayyani3
, SaeedSedighianKashi4
1,2
(Department of Computer Engineering Maleke-Ashtar University Islamic Republic of Iran)
3
(School of Electrical & Computer Engineering.Elm-o-SanatUniversity Islamic Republic of Iran)
4(School of Electrical & Computer Engineering.K.N toosi University of TechnologyIslamic Republic of Iran)
ABSTRACT
The increased deployment of ubiquitous
wireless sensor (WSN) networks has
exponentially increased the complexity to detect
wireless sensor network attacks and protect
against them. In this paper, we consider the
collision attack that can be easily launched by a
compromised (or hostile) node: a compromised
node does not follow the medium access control
protocol and cause collisions with neighbor
transmissions by sending a short noise packet.
This attack does not consume much energy of the
attacker but can cause a lot of disruptions to the
network operation. Due to the wireless broadcast
nature, it is not trivial to identify the attacker.
This paper describes detection algorithms for
wireless sensor networks, which detects collision
attack based on the packet flow rate to base
station node in the network. Simulation results
show that the algorithms have low false toleration
and false detection rates and small time to detect
attacks.
Keywords: wireless sensor network, packet flow,
cluster topology, collision attack.
I. INTRODUCTION
Wireless sensor networks are composed of
many lowcost micro sensor nodes which are
deployed in the monitoring area. Each sensor node
can form a multi-hop self-organizing network
through wireless communication, and each sensor
node is capable of sensing, data processing and
communication [1]. Generally speaking, wireless
sensor network is often deployed in an open
environment, even the enemy-occupied domain. As
sensor nodes transfer data through wireless
communication link, the network can be easily
captured and invaded. Due to the lack of foundation
infrastructure like wired network, what wireless
sensor networks face not only traditional security
threats but also some attacks which include the
exhaustion attack, selective forwarding-attack,
wormhole-attack, collision attack, sinkhole-attack,
Sybil attack, hello-flood-attack, etc… Besides, each
sensor node has limited energy and processing
capability, small storage capacity and low
bandwidth, this put forwards a larger challenge for
the security of wireless network.
The objectives of our algorithms are to
detect wireless sensor network attacks and generate
counter measures to protect the WSN and the
privacy of the users. The algorithms areusingpacket
flow rate that arriving to base station from cluster
headers of network. Wireless sensor network flows
(WSNetFlow) are learned and mined to select the
features that are most relevant to different types of
normal traffic and attack.
In this work, we focus on collision Attack
[2].
In the collision attack [2], the adversary sends his
own signal when he hears that a legitimate node will
transmit a message in order to make interferences. In
theory, causing collisions in only one byte is enough
to create a CRC error and to cripple the message.
The advantages of a collision attack are the short
power energy consumed and the difficulty to detect
it (the only evidence of collisions attacks is incorrect
message). In fact, such an attack can target specially
the ACK control message causing an exponential
back-off in some MAC protocol. According to
attack attributes, first the intention of the collision
attack is to exhaust the battery by using the channel
of communication indefinitely. Then in the
movement class, the attacker does not really need
particular technical capabilities and it can be
launched by anyone in the network, the vulnerability
is the data integrity requirement and the layer used is
the link layer. The target is general logical and can
be at the same time against internal service like
power management and against provided services,
for example the communication service. Finally the
result can be partial degradation if the attack is
launched in certain region in the network or total
degradation if the attack is applied in multiple
precise locations in the network.
II. RELEVANT KNOWLEDGE
Marti et al. [3] discussed two techniques
that detect compromised nodes that agree to forward
packets but fail to do so. The authors use watchdogs
that identify misbehaving nodes and a pathrater that
helps routing protocols avoid these nodes. When a
node forwards a packet, the nodes watchdog verifies
that the next node in the path also forwards the
2. Hosamsoleman, Ali Payandeh, Nasser Mozayyani, SaeedSedighianKashi/ International Journal
of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 4, Jul-Aug 2013, pp.261-268
262 | P a g e
packet. The watchdog does this by listening
promiscuously to the next nodes broadcast
transmissions. If the next node does not broadcast
the packet, it is misbehaving and the watchdog
detects it. Every time a node fails to forward a
packet, the watchdog increments the failure-tally. If
the tally exceeds a certain threshold, it is determined
that the node is misbehaving; this node is then
avoided with the help of the pathrater. The pathrater
combines knowledge of misbehaving nodes with
link reliability data to pick the route most likely to
be reliable. Each node maintains a rating for every
other node it knows about in the network. It
calculates a path metric by averaging the node
ratings in the path. The overhead of passive
continuous passive listening is formidable for
WSNs.
Buchegger et al. [4] proposed a mechanism
that detects misbehaving nodes by means of
observations or reports about several types of
attacks. This allows nodes to find routes around
misbehaving nodes and to isolate them from the
network. Nodes have a monitor for observations,
reputation records for first-hand observations and
trusted second-hand reports, trust records to control
trust given to received warnings, and a path manager
to adapt their behavior according to reputation of
other nodes. This approach involves continuous
monitoring similar to Marti.s approach and
collecting information about intrusion detections at
other places in the network. The overhead is
prohibitive for WSNs.
Michiardi et al. [5] proposed a collaborative
reputation mechanism that has a watchdog
component. However, it is complemented by a
reputation mechanism that differentiates between
subjective reputation (observations), indirect
reputation (positive reports by others), and
functional reputation (task specific behavior). They
are weighted for a combined reputation value used to
make decisions about cooperation with or gradual
isolation of a node. This approach involves
continuous monitoring and collecting information
about intrusion detections at other places in the
network for specific functions. The overhead is too
high for WSNs.
Huang et al. [6] proposed a mechanism that
needs separate monitoring nodes, specifically one
monitor per cluster (nodes that are in one-hop range
from a cluster). The approach requires monitors to
be active. If there is one monitor per cluster, the
monitor does most of the work. In WSNs, there is a
risk that monitor nodes run out of energy before the
network does or before the network gets partitioned.
This contradicts one of the main goals of prolonging
WSN lifetime and keeping WSN connected as much
as possible (since battery replacement is a very
costly or unavailable alternative).
All the above approaches monitor individual nodes
all the time. Continuous monitoring of each and
every node is not feasible for resource-constrained
WSNs especially when extending lifetime is the
main goal in the design of WSNs. Our proposed
solution, protect WSN from collision attacks.
2.1 Typical threats in WSNs
The threats and adequate defense techniques in
WSNs can be classified as in Table 1.
Table1. Typical threats in WSNs
Threat Layer Defense
techniques
Jamming
Physical
Spread-
spectrum,
lower duty
cycle
Tampering
Tamper-
proofing,
effective key
management
schemes
Exhausting
Link
Rate limitation
Collision Error
correcting code
Route
information.
manipulating
Network
Authentication,
encryption
Selective
forwarding
Redundancy,
probing
Sybil attack Authentication
Sinkhole Authentication,
monitoring,
redundancy
Wormhole Flexible
routing,
monitoring
Hello flood Two-way
authentication,
three-way
handshake
Flooding
Transport
Limiting
connection
numbers, client
puzzles
Clone attack
Application
Unique pair-
wise keys
III. PACKET TRAFFIC ARRIVAL
PROCESS
Because the data traffic dynamics in
different WSN scenarios are quite different, the data
traffic modeling and analysis in WSNs will be quite
application dependent. In [13] it is suggested that
WSN applications can be categorized as event-
driven or periodic data generation. For periodic data
generation scenarios, constant bit rate (CBR) can be
used to model the data traffic arrival process when
the bit rate is constant [14]. When the bit rate is
3. Hosamsoleman, Ali Payandeh, Nasser Mozayyani, SaeedSedighianKashi/ International Journal
of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 4, Jul-Aug 2013, pp.261-268
263 | P a g e
variable, a Poisson process can be used to model the
data traffic arrival process as long as the data traffic
is not bursty [15]. For event-driven scenarios such as
target detection and target tracking, bursty traffic can
arise from any corner of the sensing area if an event
is detected by the local sensors. A Poisson process
has also been used to model the traffic arrival
process in an event-driven WSN [16]. However,
there is no solid ground to support the use of a
Poisson process in this case. Actually, the widely
used Poisson processes are quite limited in their
burstiness [17]. Instead of using Poisson processes,
the author of this article proposes to use an ON/OFF
model (see Figure 1) to capture the burst
phenomenon in the source data traffic of an event-
driven WSN [18]. Further, the distributions of
ON/OFF periods are found to follow the generalized
Pareto distribution in his considered WSN scenario.
Ref. [19] studies a different WSN scenario - a
mobile sensor network (MSN). In an MSN, the node
mobility introduces new dynamics to network
traffic.
Fig. 1: ON/OFF state transition diagram
In this research have been used constant bit rate
(CBR) to modeling the data traffic arrival process
when the bit rate is constant (arriving packets to the
base station is constant).
IV. RULE-BASED INTRUSION
DETECTION SCHEMES IN WSN
Also called specification based intrusion
detection schemes. In these schemes, the detection
rules are first designed by domain expert before the
starting the detection process. Most of the techniques
in these schemes follow three main phases: data
acquisition phase, rule application phase and
intrusion detection phase (Silva et al., 2005). In the
following subsections, the key important schemes in
this category are explored.
4.1 Decentralized IDS in WSN
Silva et al. (2005) propose the first and the
most cited rule-based intrusion detection scheme for
WSN to detect many different kinds of attacks in
different layers. In this scheme, there are three main
phases involved: data acquisition phase in which the
monitor nodes are responsible of promiscuous
listening of the messages and filtering the important
information for the analysis; the rule application
phase, in which the pre-defined rules are applied to
the stored data from the previous phase, if the
message analysis failed any of the rules test, a failure
is raised and the counter increased by one; the
intrusion detection phase, a comparison is taken
place between the number of raised failures
produced from the rule application phase with a
predefined number of occasional failures that may
happen in the network. If the total number of the
raised failures is higher, intrusion alarm is produced.
According to Xieet al. (2011), this scheme brings a
good framework to the class of rule-based intrusion
detection. But, there is an important drawback of this
scheme, which is the ambiguity in determining the
number of monitoring nodes dedicated to the
detection process, the way of choosing them and
how to make sure that the way of selection will
cover the entire network. In addition, this scheme is
restricted to some types of attacks and the question
which may rise up is what if new types of attacks
emerge? All these drawbacks should be considered
when designing any kind of intrusion detection
scheme.
4.2 Malicious Node Detection in WSN
Pireset al. (2004) present a solution to
identify the possible malicious node based on the
received signal strength measured in each node.
They showed how to detect two kinds of attacks
called HELLO flood attack and the wormhole attack
in WSN by building a rule that compare the energy
of the received signal and the energy of the same
observed signal around the network. Although, this
solution was one of the first solutions in the domain,
it still restricted to those two types of attacks. In
addition, sometimes there are other reasons rather
than attacks that may cause a change in the signal
strength which make this solution impractical.
4.3 An intrusion Detection System For WSN
A novel intrusion detection scheme that
takes the benefits of neighboring node information
to detect the node impersonation and resource
depletion attacks has been proposed by Onat and
Miri (2005). In this scheme each node can make a
statistical profile of its neighbor’s behavior based on
two features which are the received power rate and
the arrival packet rate.
This scheme cannot to be generalized for a
typical wireless sensor network application in which
many types of attacks evolve continuously. In
4. Hosamsoleman, Ali Payandeh, Nasser Mozayyani, SaeedSedighianKashi/ International Journal
of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 4, Jul-Aug 2013, pp.261-268
264 | P a g e
addition and similar to the scheme proposed in
(Pireset al., 2004), the building of the rules based on
the received power rate is impractical since there are
other factors that may affect this feature.
4.4 Towards Intrusion Detection in WSN
Krontiriset al. (2007) introduce a
lightweight scheme for detecting selective
forwarding and blackhole attacks in WSN. The key
idea of their scheme is to make nodes monitor their
neighborhood and then communicate between each
other to decide if there is an intrusion taken place.
The scheme is further evaluated experimentally on a
real WSN deployment.
This scheme benefits from the neighbors
monitoring so that there is a kind of distribution that
will minimize the computation load on a detection
agent node. However, there will be an increase in the
communication messages between nodes during the
collaboration for voting that will increase the
communication overhead and as a result will deplete
the power of nodes quickly. It is clear that, this
scheme lacks the generality that other schemes in the
same category.
4.5 Intrusion Detection Scheme of Sinkhole
Attack in WSN
More specific intrusion detection scheme to
detect sinkhole attack was proposed by Krontiriset
al. (2008). This scheme is composed of four
modules: Local Packet Monitoring Module, Local
Detection Engine Module, Cooperative Detection
Engine and Local Response Model. The proposed
scheme has been implemented in the TinyOS
environment with MinRoute protocol. A suitable
detection rules have been prepared to suite with the
sinkhole attack.
Generally, this scheme satisfies the distribution
feature of IDS which is highly required on a large
scale and autonomous environment like WSN. The
problem here still with the communication overhead
between the nodes to exchange useful information
that helps in detecting the attack.
4.6 Neighbor-Based Intrusion Detection for WSN
Stetskoet al. (2010) present an intrusion
detection architecture based on collaboration
between neighbors. They evaluated their scheme for
detecting three types of attacks: Hello flood,
selective forwarding and jamming attacks. Their
scheme was implemented for Collaboration Tree
Protocol (CTP) on the TinyOS environment.
Although, the collaboration among nodes makes this
scheme strong, the communication overhead is a
problem. In addition, the extracted features that are
used to construct the rules like packet sending rate
and packet dropping rate caused a high false alarm
for detecting attacks. Another drawback of this study
is that it did not consider the power consumption
rate related to the performance which is a very
critical issue in WSNs.
4.7 Fuzzy Logic Intrusion Detection Scheme for
Directed Diffusion Based Sensor Networks
Chi and Cho (2006) propose an intrusion
detection scheme based on fuzzy logic. Some
features of the traffic were extracted to build the
fuzzy rules which are: node energy level, message
transmission rate, neighbor nodes list and error rate
in the transmission. The scheme was constructed to
prevent and detect from the denial of service (DoS)
attack which always drains the resources of the
system.
The base station or some monitoring nodes
will be responsible for collecting the information
messages from the neighborhood and the detection
value will be calculated by the fuzzy controller
based on the four features mentioned above It is not
clear how to choose the monitor nodes and how
many nodes will be enough to protect the network.
In addition, the need for an expert or sufficient
experience to prepare the rule causes inadaptability
of the scheme to detect new emerging attacks.
Another drawback is that the chosen monitor node
can be a point of failure if it is being compromised
itself.
4.8 Fuzzy Logic Intrusion Detection Scheme
against Sinkhole Attacks in Directed Diffusion
Based Sensor Networks
Another fuzzy logic based intrusion
detection approach has been proposed by Moon and
Cho (2009) to detect sinkhole attacks in directed
diffusion based sensor networks. Two features
related to the directed diffusion protocols are used
which are the reinforcement ratio and the radius. The
reinforcement ratio is the proportion of the
reinforcement messages transmitted in an area to the
number of sensing events from the nodes. The radius
is defined as the number of hop counts between any
two nodes in the area. In the case of the sinkhole
attack, there will be more reinforcement message
traffic in area than the normal number and the
number of hop count will be smaller. The fuzzy
logic controller will use these two features as an
input to generate its output which is the detection
value. If the result detection value is greater than a
predefined security threshold, the controller will
raise an alarm that a sinkhole attack has taken place
in the area. Prior to the calculation of the detection
value, the fuzzy rules should be set by an expert
according to the symptoms of the sinkhole attacks.
Using fuzzy logic gives the flexibility of detection
sinkhole attacks since the input values are not
always sharp values. However, the main problem of
any fuzzy based scheme is the need for manual
setting of rules.
5. Hosamsoleman, Ali Payandeh, Nasser Mozayyani, SaeedSedighianKashi/ International Journal
of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 4, Jul-Aug 2013, pp.261-268
265 | P a g e
4.9 Intrusion Detection Based on Traffic Analysis
and Fuzzy Inference System in WSN
Ponomarchuk and Seo (2010) introduced an
intrusion detection scheme for WSN by utilizing two
main traffic features: the packet reception rate and
the packet inter-arrival time in a time window and
then apply the fuzzy inference to decide whether an
attack has taken place or not. However, this scheme
is based on fuzzy logic, so it needs the rules to be
prepared prior the detection process. The
dependence on the prior knowledge which is the
rules makes such schemes impractical for a
continuous streaming environment like WSN. In
addition, the authors did not specify certain attacks
to be detected by this scheme.
Advantages of Rule-based intrusion
detection schemes for WSN:
Fast detection: because there is no training
involved in these schemes. This feature fulfills the
need for online detection when there is a continuous
streaming of data in some WSN applications
The computational complexity is not discussed
here: since the schemes use only simple rules for
detecting attacks
Higher detection accuracy: since it depends on
comparison with some predefined rules.
V. PROTECTION AlGORITHMS
The system is a cluster type of intrusion
detection for wireless sensor networks, its structure
after clustering is shown in Figure 2:
Fig 2. Clustering of wireless sensor networks
diagram
In this system, at first, we make the
following assumptions:
• In the detection area, each node has the same
resources and energy, between nodes is equivalent.
• The node is static in network, and the detection
area is divided into clusters by the clustering
algorithm, and clustering algorithm can
automatically run on the basis of the conditions set
by the algorithm.
• The common node of each cluster can directly
communicate with the cluster head node or
communicate through multi-hop.
• The base station is a safe and unlimited resources,
and can communicate with each elected cluster head
node, it can form a new cluster with all the cluster
head node based the base station on cluster head.
5.1Detection Wormhole attack:
When the network begins work in natural
state, number of arrived packets from cluster heads
to base station during interval of time is known. We
relied on that information to build algorithm to
detect wormhole attack.
Algorithm contains these steps:
1- Storing packet delivery waiting time (M) and
packet collision ratio (N) for period (PDR) of
time (ts) during the normal work of the
network without the presence of an attack for
each cluster head, and storing that information
in the table that shown in table
Cluster heads
IDs
Packets
delivery
waiting time
Packet
collision
ratio
ID1 M1 N1
ID2 M2 N2
ID3 M3 N3
. . .
. . .
IDr Mr Nr
2- For each period of time (t2) the autonomic
mechanism tests the packet delivery waiting
time and packet collision ratio for each cluster
head. For example, the value of packet delivery
waiting time and packet collision ratio of
cluster head x is M and N respectively in
normal work of network, and the value of
packet delivery waiting time and packet
collision ratio during testing the PDR from
autonomic mechanism is M1 and N2
respectively.
3- Comparing M1 and M.
4- Comparing N1 and N.
5- Depending on that comparing the autonomic
mechanism determines if there attack or no.
6- If there attack, the autonomic mechanism alerts
the cluster head and determines the location of
attack based on information in the packet
format (packet information).
VI. PACKE TRAFFIC IN WSN
SERVES AS THE DATA SOURCE
OF ANOMALY DETECTION
Packet traffic has been the most used data
source in the anomaly detection for WSNs. The
authors propose that an anomaly in WSNs could
violate one of the following rules applied to packet
traffic:
6. Hosamsoleman, Ali Payandeh, Nasser Mozayyani, SaeedSedighianKashi/ International Journal
of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 4, Jul-Aug 2013, pp.261-268
266 | P a g e
1) Interval rule: A failure is raised if the time which
passes between the reception of two consecutive
messages is larger or smaller than the allowed limits.
2) Retransmission rule: The monitor listens to a
message, pertaining to one of its neighbors as its
next hop, and expects that this node will forward the
received message, which does not happen.
3) Integrity rule: The message payload must be the
same along the path from its origin to a destination,
considering that in the retransmission process there
is no data aggregation by other sensor nodes.
4) Delay rule: The retransmission of a message by a
monitor's neighbor must occur before a defined
timeout.
5) Repetition rule: The same message can be
retransmitted by the same neighbor only a limited
number of times.
6) Radio transmission range: All messages listened
to by the monitor must have originated (previous
hop) from one of its neighbors.
7) Jamming rule: The number of collisions
associated with a message sent by the monitor must
be lower than the expected number in the network.
By regularly monitoring the violations of the listed
rules, network anomalies will be detected.
VII. EVALUATING AUTONOMC
SYSTEM (ANOMALY DETECTION
STRATIGY) FOR WSN
The two commonly used measurements for
evaluating the performance of an anomaly detection
strategy are the false positive rate (FP) and the false
negative rate (FN). FP is defined as the proportion of
normal events that are erroneously classified as
abnormal. FN is defined as the proportion of
abnormal events that are erroneously classified as
normal. Obviously, a good anomaly detection
strategy should have both a low FP and a low FN.
However, a tradeoff is usually to be made between
FP and FN, given that these two measurements are
usually influenced in opposing ways, by adjusting
the threshold parameters used in many anomaly
detection strategies. In addition to FP and FN, the
overhead introduced by an anomaly detection
strategy is also a concern. Considering the extreme
resource-constrained specialties of WSNs, a good
anomaly detection strategy should introduce as little
overhead as possible. Although WSNs are designed
for low rate communication, a broad range of real-
time applications, such as health care, highway
traffic coordination and even multimedia
transmission have also been proposed. When an
anomaly detection strategy is designed for real-time
applications, it should also fulfill the real-time
requirement such that it will not cause performance
degradation to the applications.
FP is measured as the number of normal records that
are classified anomalous. False positive rate (FPR) is
the percentage of normal records that are classified
anomalous to the total number of normal records as
shown in Equation 2 [20].
Equation 1
Equation 2
The number of normal records in the testing
dataset is 3267 and the number of false positive
detection is 73 leading to false positive rate of 2.234
%.
FP factor in equation 1 returns the sum of all false
alerts within a period of time T. FPR in equation 2
returns the number of false alerts by the total number
of collected frames during the same period of time
T. FPR measures the percentage of faulty alerts per
the total number of received frames. Systems that
generate high false positive rates are not practical
and less trusted by network administrators.
VIII. DETECTION RATE
Detection measures the ability of a certain
protection systems to detect wireless attacks. This
ability is the degree of confidence that an evaluated
protection system can indeed detect a certain type of
attack. It is quantified as the probability that a
certain protection system can detect a certain
wireless sensor attacks.
The detection rate (DR) is computed as the
percentage of times a certain attack type is detected
when attacks from the same type are launched n
times as given in Equation 3:
Equation
3
Where n is the total number of variations for attack
type j; N(i,j) is 1 if the attack is detected and 0 if the
attack is not detected. The total detection rate
measures the wideness of detection for a certain
protection system.
IX. RECEIVER OPERATION
CHARACTERISTIC
The ROC figure is used by different
protection system evaluation methodologies [21, 22,
and 23] to test and evaluate the accuracy of
protection systems. We extend this approach to
evaluate the protection system operation by
considering both false alarms and detection rates.
ROC shows the detection rate variations against
higher or lower false-positive rate. While detection
rate quantifies the ability of protection system to
detect certain attacks, a high false positive rate can
degrade the trust level because detection alerts might
not be taken seriously by system administrators.
7. Hosamsoleman, Ali Payandeh, Nasser Mozayyani, SaeedSedighianKashi/ International Journal
of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 4, Jul-Aug 2013, pp.261-268
267 | P a g e
Consequently, ROC represents the degree of
confidence in attack detection alerts produced by the
protection system. To experiment with different
variations of wireless attacks, the evaluated
protection systems are tested several times against
each type of attack. A direct comparison of the
accuracy between protection system and AirDefense
is shown in Figure 4, where protection system
provides a higher detection rate and a lower false
positive rate.
Fig 4.ROC Curve showing direct comparison
between WSPS and AirDefense for 4 different
types of attacks.
X. EXPERIME_TAL RESULTS
10.1 Simulation parameters:
Ns-2 simulator will be used to evaluation
our work. Ns-2 is an object-oriented (OO) simulator,
written in C++, with an OTcl interpreter as a front-
end [24]. Simulation kernel, models, protocols and
other components are implemented in C++, but are
also accessible from OTcl. OTcl scripts are used for
simulator configuration, setting up network
topology, specifying scenarios, recording simulation
results etc. Typical ns-2 OTcl script for wireless
simulation begins with configuration command,
which is used to specify PHY, MAC and routing
protocol, radio propagation and antenna model,
topology etc. The next step is creation of mobile
nodes. Node movement and network traffic patterns
are usually defined in separate files. Tools for
generating these files are provided. The table 2
shows the simulation parameters:
Table 2. Simulation parameters
channel type Wireless Channel
radio-propagation
model
Propagation/Two Ray Ground
network interface
type
Phy/Wireless Phy/802_15_4
MAC type Mac/802_15_4
interface queue
type
Queue/DropTail/PriQueue
link layer type LL
antenna model Antenna/Omni Antenna
max packet in ifq 100
number of sensor
nodes
80
protocol type AODV
X dimension of
topography
500 m
Y dimension of
topography
500 m
simulation period 500 second
Energy Model Energy Model
value Initial energy 100
number of CH
(cluster head)
nodes
8
number of base
station node
1
10.2 RESULTS
The detection rates of collision attacks are
shown in Table 3.
Table 3. Detection Rate (DR) for collision attacks
Type Size
Number of
Detection
DR
Collision
attack
350 320
96.60%
Fig5. Time token to detect collision attack
Figures 5 shows the time necessary to detect attacks
when using our algorithms.
XI. CONCLUSION
This paper analyzes the characteristics of
wireless sensors, and in order to detect the threat of
attack, for there are some external attack and internal
attack in wireless sensor networks, we proposed
algorithm for wireless sensor networks based on rule
learning and packet flow rat.
Our algorithms no needing additional
requirements, because they are built in base station.
Depending on the simulation results, our algorithms
are Very effective.
0
20
40
60
80
100
1 2 3 4 5
Timeinsecond
Number of collision attacks in networke
Time tocken to detect collision attack
8. Hosamsoleman, Ali Payandeh, Nasser Mozayyani, SaeedSedighianKashi/ International Journal
of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 4, Jul-Aug 2013, pp.261-268
268 | P a g e
The aim of our future research is to choose
appropriate characteristics to reduce false rate and
increase the accuracy when detecting attacks.
REFERENCES
[1] Zhenwei Yu, Jeffrey J.P. Tsai,A
Framework of Machine Learning Based
Intrusion Detection for Wireless Sensor
Networks, IEEE International Conference
on Sensor Networks, Ubiquitous, and
Trustworthy Computing,2008.
[2] W. Znaidi, M. Minier and J. P. Babau; An
Ontology for Attacks in Wireless Sensor
Networks; INSTITUT NATIONAL DE
RECHERCHE EN INFORMATIQUE ET
EN AUTOMATIQUE (INRIA); Oct 2008.
[3] Marti, S., Giuli, T. J., Lai, K., and Baker,
M., .Mitigating Routing Misbehavior in
Mobile Ad Hoc Networks,. Proc. 6th
Annual Intl. Conf. on Mobile Computing
and Networking (MobiCom.00), Boston,
Massachusetts, August 2000, pp. 255-265.
[4] Buchegger, S. and Le Boudec, J.,
.Performance Analysis of the
CONFIDANT Protocol: Cooperation of
Nodes -Fairness in Dynamic Ad-hoc
Networks., Proc. 13th IEEE/ACM Symp.
on Mobile Ad Hoc Networking and
Computing (MobiHoc), Lausanne,
Switzerland, June 2002.
[5] Michiardi, P. and Molva, R., .CORE: A
collaborative reputation mechanism to
enforce node cooperation in mobile ad hoc
networks., Proc. IFIP 6th Joint Working
Conference on Communications and
Multimedia Security (CMS.02), Portoro.,
Slovenia, September 2002, pp. 107-122.
[6] Chen, Z. and Khokhar, A., "Self
Organization and Energy Efficient TDMA
MAC Protocol by Wake Up For Wireless
Sensor Networks", Proc. First Annual IEEE
Intl Conf. on Sensor and Ad Hoc
Communications and Networks (SECON
2004), Santa Clara, CA, October 2004.
[7] Demirkol, I., Alagoz, F., Delic, H., and
Ersoy, C. (2006). Wireless sensor networks
for intrusion detection: Packet traffic
modeling. IEEE Communications Letters,
10(1):22--24.],
[8] Cui, S., Madan, R., Goldsmith, A. J., and
Lall, S. (2005). Joint routing, mac, and link
layer optimization in sensor networks with
energy constraints. In Proc. of IEEE
International Conference on
Communications (ICC'05), pages 725--729.
[9] Ma, Y. and Aylor, J. H. (2004). System
lifetime optimization for heterogeneous
sensor networks with a hub-spoke topology.
IEEE Transactions on Mobile Computing,
3(3):286--294.
[10] Tang, S. (2006). An analytical traffic flow
model for cluster-based wireless sensor
networks.In Proc. of 1st International
Symposium on Wireless Pervasive
Computing.
[11] Paxson, V. and Floyd, S. (1995). Wide-area
traffic: The failure of poisson modeling.
IEEE/ACM Transactions on Networking,
3:226--244.
[12] Wang, Q. and Zhang, T. (2008). Source
traffic modeling in wireless sensor
networks for target tracking. In Proc. of the
5th ACM International Symposium on
Performance Evaluation of Wireless Ad-
Hoc, Sensor, and Ubiquitous Networks
(PE-WASUN'08), pages 96--100.
[13] Wang, P. and Akyildiz, I. F. (2009). Spatial
correlation and mobility aware traffic
modeling for wireless sensor networks.In
Proc. of IEEE Global Communications
Conference (Globecom'09).
[14] W. Lee, S. J. Stolfo K. Mok, “A data
mining framework for building intrusion
detection models”, In Proc. IEEE
Symposium on Security and Privacy, 1999.
[15] SJ Stolfo, W Lee, PK Chan, W Fan, E
Eskin “Data mining-based intrusion
detectors: an overview of the columbia IDS
project” ACM SIGMOD Record, 2001 -
portal.acm.org.
[16] Lippmann et al. “Evaluating intrusion
detection systems: The 1998 DARPA
offline intrusion detection evaluation”, In
Proceedings of the on DARPA Information
Survivability Conference and Exposition
(DISCEX’00).
[17] J. McHugh. Testing intrusion detection
systems: A critique of the 1998 and 1999
DARPA intrusion detection system
evaluations as performed by Lincoln
Laboratory.
[18] K. Fall and K. Varadhan, “The ns manual”,
User’s manual, UC Berkeley, LBL,
USC/ISI, and Xerox PARC, January 2009.