With the colossal growth of wireless sensor networks (WSNs) in different applications starting from home
automation to military affairs, the pressure on ensuring security in such a network is paramount.
Considering the security challenges, it is really a hard-hitting effort to develop a secured WSN system.
Moreover, as the information technology is getting popular, the intruders are also planning new ideas to
break the system security, to harm the network and to make the system quality down with the target of
taking the control of the network to corrupt it or to get benefits from it anyway. The intruders corrupt the
system only when the security breaking cost (SBC) is lower compared with the benefits they attained or the
harm it can make to others. In this paper, the authors define the term “maximizing network interruption
problem” and propose a technique, called the grid point approximation algorithm, to estimate the SBC of a
multi-hop WSN so that it can be made tougher for an intruder to break the system security. It is assumed
that the intruder has the complete picture of the entire network. The technique is designed from the
intruder’s point of view for completely jamming all the sensor nodes in the network through placing
jammers or malicious nodes strategically and at the same time keeping the number of jammer nodes to
minimum or near minimum. To the best of the authors’ knowledge, there is no work proposed so far of the
same kind. Experimental results with the changes of the different network parameters show that the
proposed algorithm is able to provide excellent performances to achieve the targets.
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...ijasuc
This paper proposes a new top-down hierarchical, multi-hop, secure routing protocol for the wireless
sensor network, which is resilient to report fabrication attack. The report fabrication attack tries to
generate bogus reports by compromising the sensor nodes to mislead the environment monitoring
application executed by randomly deployed wireless sensor nodes. The proposed protocol relies on
symmetric key mechanism which is appropriate for random deployment of wireless sensor nodes. In the
proposed protocol, base station initiates the synthesis of secure hierarchical topology using top down
approach. The enquiry phase of the protocol provides assurance for the participation of all the cluster
heads in secure hierarchical topology formation. Further, this methodology takes care of failure of head
node or member node of a cluster. This protocol ensures confidentiality, integrity, and authenticity of the
final report of the monitoring application. The simulation results demonstrate the scalability of the
proposed protocol.
Securing WSN communication using Enhanced Adaptive Acknowledgement ProtocolIJMTST Journal
Wireless Sensor Networking is one of the most important technologies that have different applications. The
security of wireless sensor networks is a big concern. Hence for secure communication it is important to
detect and prevent the attacks in network. Major focus is given on security and on detection and prevention of
attacks. Adversary can create gray-hole attack and black-hole attack simultaneously. There are many
methods which do not provide proper method to defend against these kinds of attacks. The Ad-hoc On
Demand Distance Vector (AODV) scheme is used for detecting Gray-Hole attack and Enhanced Adaptive
Acknowledgment (EAACK) mechanism is used for detecting black-hole attack in network. But only by
detecting and preventing the attacks, it does not provide the better security to wireless network. Therefore, to
secure network a hybrid mechanism is deployed in wireless sensor network. Security algorithm for wireless
sensor networks such as CAWS and Modern Encryption Standard (MES-1) is used for secure communication.
The CAWS and Modern Encryption Standard (MES-1) is an advanced cryptography method which is used for
encryption and decryption process to provide special security.
Improvement of quality of service parameters using reinvented fsmac protocol ...eSAT Journals
Abstract Now-a-days Wireless Sensor Networks (WSNs) have been used in a various applications including military and security monitoring, industrial control, health monitoring, home automation, intelligent agriculture and environmental sensing. The shared and easy to access medium is undoubtedly the biggest advantage of wireless networks. The shared nature of the medium in wireless Sensor Networks makes it easy for an attacker to launch a Denial of Service (DoS) attack. These attacks are happening to stop the legitimate node from accessing resources. There are many occasions where the attack can be much easier for an attacker. For example, in carrier sensing based networks (a) the transmissions at the sender are deferred because the medium is sensed to be busy, and/or (b) the reception at the receiver is interfered with due to the jamming signals. Both these effects degrade the wireless network performance significantly. As a result causes degradation in Quality-of-Service (QoS) of a sensor network. In proposed paper, Fuzzy Logic Secure Media Access Control (FSMAC) Protocol is reinvented using new intrusion detection parameter. These two parameters are Number of time channel sensed free and variation in Channel sensed period. Performance characteristics are measured in terms of successful data transmission rate and throughput of the network. Keywords: Wireless Sensor Networks, Denial-of-Service Attack, Quality of Service, Reinvented FSMAC Protocol.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
A Security Mechanism Against Reactive Jammer Attack In Wireless Sensor Netwo...ijsptm
Providing an efficient security for wireless sensor network is a crucial challenge which is made more
difficult due to its broadcast nature and restrictions on resources such as energy, power memory usage,
computation and communication capabilities. The Reactive Jammer Attack is a major security threat to
wireless sensor networks because reactive jammer attack is a light weight attack which is easy to launch
but difficult to detect .This work suggest a new scheme to neutralize malicious reactive jammer nodes by
changing the characteristic of trigger nodes to act as only receiver. Here the current approach attempts to
identify the trigger nodes using the group testing technique, which enhances the identification speed and
reduces the message complexity of the status report sent periodically between the sensor nodes and the
base station.
Analysis of security threats in wireless sensor networkijwmn
Wireless Sensor Network(WSN) is an emerging technology and explored field of researchers worldwide
in the past few years, so does the need for effective security mechanisms. The sensing technology
combined with processing power and wireless communication makes it lucrative for being exploited in
abundance in future. The inclusion of wireless communication technology also incurs various types of
security threats due to unattended installation of sensor nodes as sensor networks may interact with
sensitive data and /or operate in hostile unattended environments. These security concerns be addressed
from the beginning of the system design. The intent of this paper is to investigate the security related
issues in wireless sensor networks. In this paper we have explored general security threats in wireless
sensor network with extensive study.
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGESEditor IJCTER
A Wireless Sensor Network (WSN) is an evolving technology and getting significant attention due to its unlimited potential starts from domestic application to battlefield. Wireless
Sensor Networks(WSN) are a most challenging and emerging technology for the research due to
their vital scope in the field coupled with their low processing power and associated low energy.
Today wireless sensor networks are broadly used in environmental control, surveillance tasks,
monitoring, tracking and controlling etc. Sensor nodes are tiny, cheap, disposable and self-contained
battery powered computers, known as "motes”, which can accept input from an attached sensor,
process this input data and transmit the results wirelessly to the transit network. Due to the various
applications of WSN in homeland security and military, security is the major issue to be taken care
of. In this paper we discuss about The combination of these factors demands security for sensor
networks at design time to ensure operation safety, secrecy of sensitive data, and privacy for people
in sensor environments. Broadcast authentication is a critical security service in sensor networks; it
allows a sender to broadcast messages to multiple nodes in an authenticated way. µ TESLA and multi-level µTESLA have been proposed to provide such service for sensor networks.
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...ijasuc
This paper proposes a new top-down hierarchical, multi-hop, secure routing protocol for the wireless
sensor network, which is resilient to report fabrication attack. The report fabrication attack tries to
generate bogus reports by compromising the sensor nodes to mislead the environment monitoring
application executed by randomly deployed wireless sensor nodes. The proposed protocol relies on
symmetric key mechanism which is appropriate for random deployment of wireless sensor nodes. In the
proposed protocol, base station initiates the synthesis of secure hierarchical topology using top down
approach. The enquiry phase of the protocol provides assurance for the participation of all the cluster
heads in secure hierarchical topology formation. Further, this methodology takes care of failure of head
node or member node of a cluster. This protocol ensures confidentiality, integrity, and authenticity of the
final report of the monitoring application. The simulation results demonstrate the scalability of the
proposed protocol.
Securing WSN communication using Enhanced Adaptive Acknowledgement ProtocolIJMTST Journal
Wireless Sensor Networking is one of the most important technologies that have different applications. The
security of wireless sensor networks is a big concern. Hence for secure communication it is important to
detect and prevent the attacks in network. Major focus is given on security and on detection and prevention of
attacks. Adversary can create gray-hole attack and black-hole attack simultaneously. There are many
methods which do not provide proper method to defend against these kinds of attacks. The Ad-hoc On
Demand Distance Vector (AODV) scheme is used for detecting Gray-Hole attack and Enhanced Adaptive
Acknowledgment (EAACK) mechanism is used for detecting black-hole attack in network. But only by
detecting and preventing the attacks, it does not provide the better security to wireless network. Therefore, to
secure network a hybrid mechanism is deployed in wireless sensor network. Security algorithm for wireless
sensor networks such as CAWS and Modern Encryption Standard (MES-1) is used for secure communication.
The CAWS and Modern Encryption Standard (MES-1) is an advanced cryptography method which is used for
encryption and decryption process to provide special security.
Improvement of quality of service parameters using reinvented fsmac protocol ...eSAT Journals
Abstract Now-a-days Wireless Sensor Networks (WSNs) have been used in a various applications including military and security monitoring, industrial control, health monitoring, home automation, intelligent agriculture and environmental sensing. The shared and easy to access medium is undoubtedly the biggest advantage of wireless networks. The shared nature of the medium in wireless Sensor Networks makes it easy for an attacker to launch a Denial of Service (DoS) attack. These attacks are happening to stop the legitimate node from accessing resources. There are many occasions where the attack can be much easier for an attacker. For example, in carrier sensing based networks (a) the transmissions at the sender are deferred because the medium is sensed to be busy, and/or (b) the reception at the receiver is interfered with due to the jamming signals. Both these effects degrade the wireless network performance significantly. As a result causes degradation in Quality-of-Service (QoS) of a sensor network. In proposed paper, Fuzzy Logic Secure Media Access Control (FSMAC) Protocol is reinvented using new intrusion detection parameter. These two parameters are Number of time channel sensed free and variation in Channel sensed period. Performance characteristics are measured in terms of successful data transmission rate and throughput of the network. Keywords: Wireless Sensor Networks, Denial-of-Service Attack, Quality of Service, Reinvented FSMAC Protocol.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
A Security Mechanism Against Reactive Jammer Attack In Wireless Sensor Netwo...ijsptm
Providing an efficient security for wireless sensor network is a crucial challenge which is made more
difficult due to its broadcast nature and restrictions on resources such as energy, power memory usage,
computation and communication capabilities. The Reactive Jammer Attack is a major security threat to
wireless sensor networks because reactive jammer attack is a light weight attack which is easy to launch
but difficult to detect .This work suggest a new scheme to neutralize malicious reactive jammer nodes by
changing the characteristic of trigger nodes to act as only receiver. Here the current approach attempts to
identify the trigger nodes using the group testing technique, which enhances the identification speed and
reduces the message complexity of the status report sent periodically between the sensor nodes and the
base station.
Analysis of security threats in wireless sensor networkijwmn
Wireless Sensor Network(WSN) is an emerging technology and explored field of researchers worldwide
in the past few years, so does the need for effective security mechanisms. The sensing technology
combined with processing power and wireless communication makes it lucrative for being exploited in
abundance in future. The inclusion of wireless communication technology also incurs various types of
security threats due to unattended installation of sensor nodes as sensor networks may interact with
sensitive data and /or operate in hostile unattended environments. These security concerns be addressed
from the beginning of the system design. The intent of this paper is to investigate the security related
issues in wireless sensor networks. In this paper we have explored general security threats in wireless
sensor network with extensive study.
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGESEditor IJCTER
A Wireless Sensor Network (WSN) is an evolving technology and getting significant attention due to its unlimited potential starts from domestic application to battlefield. Wireless
Sensor Networks(WSN) are a most challenging and emerging technology for the research due to
their vital scope in the field coupled with their low processing power and associated low energy.
Today wireless sensor networks are broadly used in environmental control, surveillance tasks,
monitoring, tracking and controlling etc. Sensor nodes are tiny, cheap, disposable and self-contained
battery powered computers, known as "motes”, which can accept input from an attached sensor,
process this input data and transmit the results wirelessly to the transit network. Due to the various
applications of WSN in homeland security and military, security is the major issue to be taken care
of. In this paper we discuss about The combination of these factors demands security for sensor
networks at design time to ensure operation safety, secrecy of sensitive data, and privacy for people
in sensor environments. Broadcast authentication is a critical security service in sensor networks; it
allows a sender to broadcast messages to multiple nodes in an authenticated way. µ TESLA and multi-level µTESLA have been proposed to provide such service for sensor networks.
IOSR Journal of Electronics and Communication Engineering(IOSR-JECE) is an open access international journal that provides rapid publication (within a month) of articles in all areas of electronics and communication engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in electronics and communication engineering. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Secure and Efficient DiDrip Protocol for Improving Performance of WSNsINFOGAIN PUBLICATION
Wireless Sensor Networks consists of a set of resource constrained devices called nodes that communicate wirelessly with each other. Wireless Sensor Networks have become a key application in number of technologies. It also measures the unit of vulnerability to security threats. Several Protocols are projected to make them secure. Some of the protocols within the sensor network specialize in securing data. These protocols are named as data discovery and dissemination protocols. The data discovery and dissemination protocol for wireless sensor networks are utilized for distributing management commands and altering configuration parameters to the sensor nodes. All existing data discovery and dissemination protocols primarily suffer from two drawbacks. Basically, they are support centralized approach (only single station can distribute data item).This approach is not suitable for multiple owner-multiple users. Second, the protocols are not designed with security in mind. This Paper proposes the first distributed knowledge discovery and dissemination protocol called DiDrip which is safer than the existing one. The protocol permits multiple owners to authorize many network users with altogether totally different priorities to at an equivalent time and directly flow into data items to sensor nodes.
ENHANCED THREE TIER SECURITY ARCHITECTURE FOR WSN AGAINST MOBILE SINK REPLI...ijwmn
Recent developments on Wireless Sensor Networks have made their application in a wide range
such as military sensing and tracking, health monitoring, traffic monitoring, video surveillance and so on.
Wireless sensor nodes are restricted to computational resources, and are always deployed in a harsh,
unattended or unfriendly environment. Therefore, network security becomes a tough task and it involves
the authorization of admittance to data in a network. The problem of authentication and pair wise key
establishment in sensor networks with mobile sink is still not solved in the mobile sink replication attacks.
In q-composite key pre distribution scheme, a large number of keys are compromised by capturing a
small fraction of sensor nodes by the attacker. The attacker can easily take a control of the entire network
by deploying a replicated mobile sinks. Those mobile sinks which are preloaded with compromised keys
are used authenticate and initiate data communication with sensor node. To determine the above problem
the system adduces the three-tier security framework for authentication and pair wise key establishment
between mobile sinks and sensor nodes. The previous system used the polynomial key pre distribution
scheme for the sensor networks which handles sink mobility and continuous data delivery to the
neighbouring nodes and sinks, but this scheme makes high computational cost and reduces the life time of
sensors. In order to overcome this problem a random pair wise key pre distribution scheme is suggested
and further it helps to improve the network resilience. In addition to this an Identity Based Encryption is
used to encrypt the data and Mutual authentication scheme is proposed for the identification and
isolation of replicated mobile sink from the network.
Overview on security and privacy issues in wireless sensor networks-2014Tarek Gaber
Lecture Outlines
Why Security is Important for WSN
WSNs have many applications e.g.:
military, homeland security
assessing disaster zones
Others.
This means that such sensor networks have mission-critical tasks.
Security is crucial for such WSNs deployed in these hostile environments.
Why Security is Important for WSN
Moreover, wireless communication employed by WSN facilitates
eavesdropping and
packet injection by an adversary.
These mentioned factors require security for WSN during the design stage to ensure operation safety, secrecy of sensitive data, and privacy for people in sensor environments.
Algorithms to achieve security services
Symmetric Encryption
Asymmetric Encryption
Hash Function/Algorithm
Digital Signature
Why Security is Complex in WSN
Because of WSNs Characteristics:
Anti-jamming and physical temper proofing are impossible
greater design complexity and energy consumption
Denial-of-service (DoS) attack is difficult
Sensor node constraints
Sensor nodes are susceptible to physical capture
Deploying in hostile environment.
eavesdropping and injecting malicious message are easy
Using wireless communication
Why Security is Complex in WSN
Because of WSNs Characteristics:
maximization of security level is challenging
Resource consumption
asymmetric cryptography is often too expensive
Node constraints
centralized security solutions are big issue
no central control and constraints, e.g. small memory capacity.
Cost Issues
Overall cost of WSN should be as low as possible.
Typical Attacks to WSN
Physical Attacks
Environmental
Permanently destroy the node, e.g., crashing or stealing a node.
Attacks at the Physical Layer
Jamming: transmission of a radio signal to interfere with WSN radio frequencies.
Constant jamming: No message are able to be sent or received.
Intermittent jamming: Nodes are able to exchange messages periodically
Jamming Attack Countermeasure
Physical Attacks
Node Capture Attacks
routing functionalities
Countermeasure
tamper-proof features
Expensive solution
Self-Protection
disable device when attack detected
Attacks on Routing
Sinkhole attack
attacker tries to attract the traffic from a particular region through it
Solution:
Watchdog Nodes can start to trace the source of false routing information
Attacks on Routing
Sybil attack (Identity Spoofing)
attacker claims to have multiple identities or locations
provide wrong information for routing to launch false routing attacks
Solutions:
Misbehavior Detection.
Identity Protection
Privacy Attacks
Attempts to obtain sensitive information collected and communicated in WSNs
Eavesdropping
made easy by broadcast nature of wireless networks
Traffic analysis
used to identify sensor nodes of interest (data of interest),
WSN Privacy Issues Cont.
WSN Privacy Issues Attack
Trust and reputation in WSN
WSN Traditional Security Techniques
Cryptographic primitive
Review of Security Issues in Mobile Wireless Sensor NetworksEswar Publications
MWSNs are finding applicability in wide range of applications. Applications spread from day to day utilities to military and surveillance, where they may sense information about vehicular movements around border. Considering the importance of data being sent by these nodes, threat of compromising them has also increased. This paper aims to explore various types of attacks and tries to classify them based on some common parameter. Better understanding of various attacks, their style of functioning and point of penetration can help researchers devise better preventive measures.
Hybrid Technique for Detection of Denial of Service (DOS) Attack in Wireless ...Eswar Publications
Wireless Sensor Network (WSNs) are deployed at aggressive environments which are vulnerable to various security attacks such as Wormholes, Denial of Attacks and Sybil Attacks. There are various intrusion detection techniques that are used to identify attacks in a network with high accuracy level. This paper has focused on Denial of Service attack, since it is the most common attack that affects the environment severely. Therefore a new hybrid technique combining Hidden Markov Model with Ant Colony Optimization (HMM+ACO) has been
proposed that gives improved performance than the other techniques.
A survey on bio inspired security in wireless sensor networkseSAT Journals
Abstract Wireless sensor networks usually comprise of a large number of nodes which are geographically dis- tributed and are not physically connected. These nodes are frequently used to sense private data and can be necessary to transmit confidential and critical data. Hence it is important to provide security for wireless sensor networks. Research is still ongoing in this field and many models have been proposed for providing security. Looking into the symbiotic nature of biological systems can give us valuable in- sights for computer networks. Because of the analo- gies between network security and how the biotic components react to perceived threats in their sur- roundings, Bio-inspired approaches for providing se- curity in networks are interesting to evaluate . Many theories from nature such as swarm intelligence, ant colony optimisation (ACO), web spider defence, bird flocking, human immune system and so forth have been used to tackle various problems in the network- ing domain. In this paper, we intend to outline and categorize the various security attacks we encounter in a wireless sensor network and review the proposed conventional security mechanisms for them and also compare it with an alternative novel approach, i.e bio-inspired approach. Keywords— Wireless sensor network (WSN), Bio-inspired, security, attacks
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
PERFORMANCE ANALYSIS OF THE LINK-ADAPTIVE COOPERATIVE AMPLIFY-AND-FORWARD REL...IJCNCJournal
This paper analyzes the performance of cooperative amplify-and-forward (CAF) relay networks that
employ adaptive M-ary quadrature amplitude modulation (M-QAM)/M-ary phase shift keying (M-PSK)
digital modulation techniques in Nakagami-m fading channel. In particular, we present and compared the
analysis of CAF relay networks with different cooperative diversity and opportunistic routing strategies
such as regular Maximal Ratio Combining (MRC), Selection Diversity Combining (SDC), Opportunistic
Relay Selection with Maximal Ratio Combining (ORS-MRC) and Opportunistic Relay Selection with
Selection Diversity Combining (ORS-SDC). We advocate a simple yet unified numerical approach based on
the marginal moment generating function (MGF) of the total received SNR to compute the average symbol
error rate (ASER), mean achievable spectral efficiency, and outage probability performance metrics.
Peer-to-Peer streaming technology has become one of the major Internet applications as it offers the opportunity of broadcasting high quality video content to a large number of peers with low costs. It is widely accepted that with the efficient utilization of peers and server's upload capacities, peers can enjoy watching a high bit rate video with minimal end-to-end delay. In this paper, we present a practical scheduling algorithm that works in the challenging condition where no spare capacity is available, i.e., it maximally utilizes the resources and broadcasts the maximum streaming rate. Each peer contacts with only a small number of neighbours in the overlay network and autonomously subscribes to sub-streams according to a budget-model in such a way that the number of peers forwarding exactly one sub-stream will be maximized. The hop-count delay is also taken into account to construct a short depth trees. Finally, we show through simulation that peers dynamically converge to an efficient overlay structure with a short hop-count delay. Moreover, the proposed scheme gives nice features in the homogeneous case and overcomes SplitStream in all simulated scenarios.
IOSR Journal of Electronics and Communication Engineering(IOSR-JECE) is an open access international journal that provides rapid publication (within a month) of articles in all areas of electronics and communication engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in electronics and communication engineering. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Secure and Efficient DiDrip Protocol for Improving Performance of WSNsINFOGAIN PUBLICATION
Wireless Sensor Networks consists of a set of resource constrained devices called nodes that communicate wirelessly with each other. Wireless Sensor Networks have become a key application in number of technologies. It also measures the unit of vulnerability to security threats. Several Protocols are projected to make them secure. Some of the protocols within the sensor network specialize in securing data. These protocols are named as data discovery and dissemination protocols. The data discovery and dissemination protocol for wireless sensor networks are utilized for distributing management commands and altering configuration parameters to the sensor nodes. All existing data discovery and dissemination protocols primarily suffer from two drawbacks. Basically, they are support centralized approach (only single station can distribute data item).This approach is not suitable for multiple owner-multiple users. Second, the protocols are not designed with security in mind. This Paper proposes the first distributed knowledge discovery and dissemination protocol called DiDrip which is safer than the existing one. The protocol permits multiple owners to authorize many network users with altogether totally different priorities to at an equivalent time and directly flow into data items to sensor nodes.
ENHANCED THREE TIER SECURITY ARCHITECTURE FOR WSN AGAINST MOBILE SINK REPLI...ijwmn
Recent developments on Wireless Sensor Networks have made their application in a wide range
such as military sensing and tracking, health monitoring, traffic monitoring, video surveillance and so on.
Wireless sensor nodes are restricted to computational resources, and are always deployed in a harsh,
unattended or unfriendly environment. Therefore, network security becomes a tough task and it involves
the authorization of admittance to data in a network. The problem of authentication and pair wise key
establishment in sensor networks with mobile sink is still not solved in the mobile sink replication attacks.
In q-composite key pre distribution scheme, a large number of keys are compromised by capturing a
small fraction of sensor nodes by the attacker. The attacker can easily take a control of the entire network
by deploying a replicated mobile sinks. Those mobile sinks which are preloaded with compromised keys
are used authenticate and initiate data communication with sensor node. To determine the above problem
the system adduces the three-tier security framework for authentication and pair wise key establishment
between mobile sinks and sensor nodes. The previous system used the polynomial key pre distribution
scheme for the sensor networks which handles sink mobility and continuous data delivery to the
neighbouring nodes and sinks, but this scheme makes high computational cost and reduces the life time of
sensors. In order to overcome this problem a random pair wise key pre distribution scheme is suggested
and further it helps to improve the network resilience. In addition to this an Identity Based Encryption is
used to encrypt the data and Mutual authentication scheme is proposed for the identification and
isolation of replicated mobile sink from the network.
Overview on security and privacy issues in wireless sensor networks-2014Tarek Gaber
Lecture Outlines
Why Security is Important for WSN
WSNs have many applications e.g.:
military, homeland security
assessing disaster zones
Others.
This means that such sensor networks have mission-critical tasks.
Security is crucial for such WSNs deployed in these hostile environments.
Why Security is Important for WSN
Moreover, wireless communication employed by WSN facilitates
eavesdropping and
packet injection by an adversary.
These mentioned factors require security for WSN during the design stage to ensure operation safety, secrecy of sensitive data, and privacy for people in sensor environments.
Algorithms to achieve security services
Symmetric Encryption
Asymmetric Encryption
Hash Function/Algorithm
Digital Signature
Why Security is Complex in WSN
Because of WSNs Characteristics:
Anti-jamming and physical temper proofing are impossible
greater design complexity and energy consumption
Denial-of-service (DoS) attack is difficult
Sensor node constraints
Sensor nodes are susceptible to physical capture
Deploying in hostile environment.
eavesdropping and injecting malicious message are easy
Using wireless communication
Why Security is Complex in WSN
Because of WSNs Characteristics:
maximization of security level is challenging
Resource consumption
asymmetric cryptography is often too expensive
Node constraints
centralized security solutions are big issue
no central control and constraints, e.g. small memory capacity.
Cost Issues
Overall cost of WSN should be as low as possible.
Typical Attacks to WSN
Physical Attacks
Environmental
Permanently destroy the node, e.g., crashing or stealing a node.
Attacks at the Physical Layer
Jamming: transmission of a radio signal to interfere with WSN radio frequencies.
Constant jamming: No message are able to be sent or received.
Intermittent jamming: Nodes are able to exchange messages periodically
Jamming Attack Countermeasure
Physical Attacks
Node Capture Attacks
routing functionalities
Countermeasure
tamper-proof features
Expensive solution
Self-Protection
disable device when attack detected
Attacks on Routing
Sinkhole attack
attacker tries to attract the traffic from a particular region through it
Solution:
Watchdog Nodes can start to trace the source of false routing information
Attacks on Routing
Sybil attack (Identity Spoofing)
attacker claims to have multiple identities or locations
provide wrong information for routing to launch false routing attacks
Solutions:
Misbehavior Detection.
Identity Protection
Privacy Attacks
Attempts to obtain sensitive information collected and communicated in WSNs
Eavesdropping
made easy by broadcast nature of wireless networks
Traffic analysis
used to identify sensor nodes of interest (data of interest),
WSN Privacy Issues Cont.
WSN Privacy Issues Attack
Trust and reputation in WSN
WSN Traditional Security Techniques
Cryptographic primitive
Review of Security Issues in Mobile Wireless Sensor NetworksEswar Publications
MWSNs are finding applicability in wide range of applications. Applications spread from day to day utilities to military and surveillance, where they may sense information about vehicular movements around border. Considering the importance of data being sent by these nodes, threat of compromising them has also increased. This paper aims to explore various types of attacks and tries to classify them based on some common parameter. Better understanding of various attacks, their style of functioning and point of penetration can help researchers devise better preventive measures.
Hybrid Technique for Detection of Denial of Service (DOS) Attack in Wireless ...Eswar Publications
Wireless Sensor Network (WSNs) are deployed at aggressive environments which are vulnerable to various security attacks such as Wormholes, Denial of Attacks and Sybil Attacks. There are various intrusion detection techniques that are used to identify attacks in a network with high accuracy level. This paper has focused on Denial of Service attack, since it is the most common attack that affects the environment severely. Therefore a new hybrid technique combining Hidden Markov Model with Ant Colony Optimization (HMM+ACO) has been
proposed that gives improved performance than the other techniques.
A survey on bio inspired security in wireless sensor networkseSAT Journals
Abstract Wireless sensor networks usually comprise of a large number of nodes which are geographically dis- tributed and are not physically connected. These nodes are frequently used to sense private data and can be necessary to transmit confidential and critical data. Hence it is important to provide security for wireless sensor networks. Research is still ongoing in this field and many models have been proposed for providing security. Looking into the symbiotic nature of biological systems can give us valuable in- sights for computer networks. Because of the analo- gies between network security and how the biotic components react to perceived threats in their sur- roundings, Bio-inspired approaches for providing se- curity in networks are interesting to evaluate . Many theories from nature such as swarm intelligence, ant colony optimisation (ACO), web spider defence, bird flocking, human immune system and so forth have been used to tackle various problems in the network- ing domain. In this paper, we intend to outline and categorize the various security attacks we encounter in a wireless sensor network and review the proposed conventional security mechanisms for them and also compare it with an alternative novel approach, i.e bio-inspired approach. Keywords— Wireless sensor network (WSN), Bio-inspired, security, attacks
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
PERFORMANCE ANALYSIS OF THE LINK-ADAPTIVE COOPERATIVE AMPLIFY-AND-FORWARD REL...IJCNCJournal
This paper analyzes the performance of cooperative amplify-and-forward (CAF) relay networks that
employ adaptive M-ary quadrature amplitude modulation (M-QAM)/M-ary phase shift keying (M-PSK)
digital modulation techniques in Nakagami-m fading channel. In particular, we present and compared the
analysis of CAF relay networks with different cooperative diversity and opportunistic routing strategies
such as regular Maximal Ratio Combining (MRC), Selection Diversity Combining (SDC), Opportunistic
Relay Selection with Maximal Ratio Combining (ORS-MRC) and Opportunistic Relay Selection with
Selection Diversity Combining (ORS-SDC). We advocate a simple yet unified numerical approach based on
the marginal moment generating function (MGF) of the total received SNR to compute the average symbol
error rate (ASER), mean achievable spectral efficiency, and outage probability performance metrics.
Peer-to-Peer streaming technology has become one of the major Internet applications as it offers the opportunity of broadcasting high quality video content to a large number of peers with low costs. It is widely accepted that with the efficient utilization of peers and server's upload capacities, peers can enjoy watching a high bit rate video with minimal end-to-end delay. In this paper, we present a practical scheduling algorithm that works in the challenging condition where no spare capacity is available, i.e., it maximally utilizes the resources and broadcasts the maximum streaming rate. Each peer contacts with only a small number of neighbours in the overlay network and autonomously subscribes to sub-streams according to a budget-model in such a way that the number of peers forwarding exactly one sub-stream will be maximized. The hop-count delay is also taken into account to construct a short depth trees. Finally, we show through simulation that peers dynamically converge to an efficient overlay structure with a short hop-count delay. Moreover, the proposed scheme gives nice features in the homogeneous case and overcomes SplitStream in all simulated scenarios.
A NOVEL METHOD TO TEST DEPENDABLE COMPOSED SERVICE COMPONENTSIJCNCJournal
Assessing Web service systems performance and their dependability are crucial for the development of
today’s applications. Testing the performance and Fault Tolerance Mechanisms (FTMs) of composed
service components is hard to be measured at design time due to service instability is often caused by the
nature of the network conditions. Using a real internet environment for testing systems is difficult to set up
and control. We have introduced a fault injection toolkit that emulates a WAN within a LAN environment
between composed service components and offers full control over the emulated environment in addition to
the capability to inject network-related faults and application specific faults. The toolkit also generates
background workloads on the system under test so as to produce more realistic results. We describe an
experiment that has been performed to examine the impact of fault tolerance protocols deployed at a
service client by using our toolkit system.
Sensor nodes are highly mobile, which makes the application running on them face network related problems like node failure, link failure, network level disconnection, scarcity of resources etc. Node failure and Network fault are need to be monitored continuously by supervising the network status especially for critical applications like Health Monitoring System. We propose Node Monitoring protocol (NMP) to monitor the node good conditions using agents and ensure that node gets promised quality of service. These Nodes senses environment and communicates important data to the sink or base station. To establish the correct event time, these nodes need to be synchronized with global clock. Therefore, time synchronization is very important parameter. We have built a simulating environment for Validating Node Monitoring Protocol (NMP) to assess the reliability of Health Monitoring systems. Formal Specification and Description Language tool (SDL) has been used to validate the NMP at design time in order to increase the confidence and efficiency of the system.
Advancements in Complementary Metal Oxide Semiconductor (CMOS) technology have enabled Wireless Sensor Networks (WSN) to gather, process and transport multimedia (MM) data as well and not just limited to handling ordinary scalar data anymore. This new generation of WSN type is called Wireless Multimedia Sensor Networks (WMSNs). Better and yet relatively cheaper sensors – sensors that are able to sense both scalar data and multimedia data with more advanced functionalities such as being able to handle rather intense computations easily - have sprung up. In this paper, the applications, architectures, challenges and issues faced in the design of WMSNs are explored. Security and privacy issues, over all requirements, proposed and implemented solutions so far, some of the successful achievements and other related works in the field are also highlighted. Open research areas are pointed out and a few solution suggestions to the still persistent problems are made, which, to the best of my knowledge, so far haven’t been explored yet.
In this paper, an application-based QoS evaluation approach for heterogeneous networks is proposed.It is possible to expand the network capacity and coverage in a dynamic fashion by applying heterogeneous wireless network architecture. However, the Quality of Service (QoS) evaluation of this type of network architecture is very challenging due to the presence of different communication technologies. Different communication technologies have different characteristics and the applications that utilize them have unique QoS requirements. Although, the communication technologies have different performance measurement parameters, the applications using these radio access networks have the same QoS requirements. As a result, it would be easier to evaluate the QoS of the access networks and the overall network configuration based on the performance of applications running on them. Using such applicationbased QoS evaluation approach, the heterogeneous nature of the underlying networks and the diversity of their traffic can be adequately taken into account. Through simulation studies, we show that the application performance based assessment approach facilitates better QoS management and monitoring of heterogeneous network configurations.
A predictive framework for cyber security analytics using attack graphsIJCNCJournal
Security metrics serve as a powerful tool for organizations to understand the effectiveness of protecting computer networks. However majority of these measurement techniques don’t adequately help corporations to make informed risk management decisions. In this paper we present a stochastic security framework for obtaining quantitative measures of security by taking into account the dynamic attributes associated with vulnerabilities that can change over time. Our model is novel as existing research in attack graph analysis do not consider the temporal aspects associated with the vulnerabilities, such as the availability of exploits and patches which can affect the overall network security based on how the vulnerabilities are interconnected and leveraged to compromise the system. In order to have a more realistic representation of how the security state of the network would vary over time, a nonhomogeneous model is developed which incorporates a time dependent covariate, namely the vulnerability age. The daily transition-probability matrices are estimated using Frei's Vulnerability Lifecycle model. We also leverage the trusted CVSS metric domain to analyze how the total exploitability and impact measures evolve over a time period for a given network.
PERFORMANCE ASSESSMENT OF CHAOTIC SEQUENCE DERIVED FROM BIFURCATION DEPENDENT...IJCNCJournal
In CDMA system, m-sequence and Gold codes are often utilized for spreading-despreading and
scrambling-descrambling operations. In a previous work, a design framework was created for generating
large family of codes from logistic map, which have comparable autocorrelation and cross correlation to
m-sequence and Gold codes. The purpose of this work is to evaluate the performance of these chaotic
codes in a CDMA environment. In the bit error rate (BER) simulation, matched filter, decorrelator and
MMSE receiver have been utilized. The received signal was modelled for synchronous CDMA uplink for
simulation simplicity purpose. Additive White Gaussian Noise channel model was assumed for the
simulation.
ENERGY SAVINGS IN APPLICATIONS FOR WIRELESS SENSOR NETWORKS TIME CRITICAL REQ...IJCNCJournal
Along with handling and poor storage capacity, each sensor in wireless sensor network (WSN) is equipped
with a limited power source and very difficult to be replaced in most application environments. Improving
the energy savings in applications for wireless sensor networks is necessary. In this paper, we mainly focus
on energy consumption savings in applications for wireless sensor networks time critical requirements. Our
Paper accompanying analysis of advanced technologies for energy saving techniques for the optimization
of energy efficiency together with the data transmission is optimal. Moreover, we propose improvements to
increase energy savings in applications for wireless sensor networks require time critical (LEACH
improvements). Simulation results show that our proposed protocol significantly better than LEACH about
the formation of clusters in each round, the average power, the number of nodes alive and average total
received data in base stations.
As Wireless Sensor Networks are penetrating into the industrial domain, many research opportunities are emerging. One such essential and challenging application is that of node localization. A feed-forward neural network based methodology is adopted in this paper. The Received Signal Strength Indicator (RSSI) values of the anchor node beacons are used. The number of anchor nodes and their configurations has an impact on the accuracy of the localization system, which is also addressed in this paper. Five different training algorithms are evaluated to find the training algorithm that gives the best result. The multi-layer Perceptron (MLP) neural network model was trained using Matlab. In order to evaluate the performance of the proposed method in real time, the model obtained was then implemented on the Arduino microcontroller. With four anchor nodes, an average 2D localization error of 0.2953 m has been achieved with a 12-12-2 neural network structure. The proposed method can also be implemented on any other embedded microcontroller system.
These days considering expansion of networks, dissemination of information has become one of significant cases for researchers. In social networks in addition to social structures and people effectiveness on each other, Profit increase of sales, publishing a news or rumor, spread or diffusion of an idea can be mentioned. In social societies, people affect each other and with an individual’s membership, his friends
may join that group as well. In publishing a piece of news, independent of its nature there are different ways to expand it. Since information isn’t always suitable and positive, this article is trying to introduce the immunization mechanism against this information. The meaning of immunization is a kind of Slow Publishing of such information in network. Therefor it has been tried in this article to slow down the
publishing of information or even stop them. With comparison of presented methods for immunization and also presenting rate delay parameter, the immunization of methods were evaluated and we identified the most effective immunization method. Among existing methods for immunization and recommended methods, recommended methods also have an effective role in preventing spread of malicious rumor.
HIDING A MESSAGE IN MP3 USING LSB WITH 1, 2, 3 AND 4 BITSIJCNCJournal
Steganography is the art of hiding information in ways that prevent the detection of hidden messages. This
paper presentsa new method which randomly selects position in MP3 file to hide a text secret messageby
using Least Significant Bit (LSB) technique. The text secret message isused in start and ends locations a
unique signature or key.The methodology focuses to embed one bit, two bits, three bitsor four bits from
secret message into MP3 file by using LSB techniques. The evaluation and performancemethods are based
on robustness (BER and correlation), Imperceptibility (PSNR) and hiding capacity (Ratio between Sizes of
text message and MP3 Cover) indicators.The experimental results show the new method is more security.
Moreover the contribution of this paper is the provision of a robustness-based classification of LSB
steganography models depending on their occurrence in the embedding position.
On the approximation of the sum of lognormals by a log skew normal distributionIJCNCJournal
Several methods have been proposed to approximate the sum of lognormal RVs. However the accuracy of each method relies highly on the region of the resulting distribution being examined, and the individual lognormal parameters, i.e., mean and variance. There is no such method which can provide the needed accuracy for all cases. This paper propose a universal yet very simple approximation method for the sum of Lognormals based on log skew normal approximation. The main contribution on this work is to propose an analytical method for log skew normal parameters estimation. The proposed method provides highly accurate approximation to the sum of lognormal distributions over the whole range of dB spreads for any correlation coefficient. Simulation results show that our method outperforms all previously proposed methods and provides an accuracy within 0.01 dB for all cases.
PERFORMANCE ANALYSIS OF MULTI-PATH TCP NETWORKIJCNCJournal
MPTCP is proposed by IETF working group, it allows a single TCP stream to be split across multiple
paths. It has obvious benefits in performance and reliability. MPTCP has implemented in Linux-based
distributions that can be compiled and installed to be used for both real and experimental scenarios. In this
article, we provide performance analyses for MPTCP with a laptop connected to WiFi access point and 3G
cellular network at the same time. We prove experimentally that MPTCP outperforms regular TCP for
WiFi or 3G interfaces. We also compare four types of congestion control algorithms for MPTCP that are
also implemented in the Linux Kernel. Results show that Alias Linked Increase Congestion Control
algorithm outperforms the others in the normal traffic load while Balanced Linked Adaptation algorithm
outperforms the rest when the paths are shared with heavy traffic, which is not supported by MPTCP.
ENHANCEMENT OF TRANSMISSION RANGE ASSIGNMENT FOR CLUSTERED WIRELESS SENSOR NE...IJCNCJournal
Transmitter range assignment in clustered wireless networks is the bottleneck of the balance between
energy conservation and the connectivity to deliver data to the sink or gateway node. The aim of this
research is to optimize the energy consumption through reducing the transmission ranges of the nodes,
while maintaining high probability to have end-to-end connectivity to the network’s data sink. We modified
the approach given in [1] to achieve more than 25% power saving through reducing cluster head (CH)
transmission range of the backbone nodes in a multihop wireless sensor network with ensuring at least
95% end-to-end connectivity probability.
PERFORMANCE EVALUATION OF WIRELESS SENSOR NETWORK UNDER HELLO FLOOD ATTACKIJCNCJournal
Wireless sensor network (WSN) is highly used in many fields. The network consists of tiny lightweight
sensor nodes and is largely used to scan or detect or monitor environments. Since these sensor nodes are
tiny and lightweight, they put some limitations on resources such as usage of power, processing given task,
radio frequency range. These limitations allow network vulnerable to many different types of attacks such
as hello flood attack, black hole, Sybil attack, sinkhole, and many more. Among these attacks, hello flood is
one of the most important attacks. In this paper,we have analyzed the performance of hello flood attack and
compared the network performance as number of attackers increases. Network performance is evaluated
by modifying the ad-hoc on demand distance vector (AODV) routing protocol by using NS2 simulator. It
has been tested under different scenarios like no attacker, single attacker, and multiple attackers to know
how the network performance changes. The simulation results show that as the number of attackers
increases the performance in terms of throughput and delay changes.
ADAPTIVE HANDOVER HYSTERESIS AND CALL ADMISSION CONTROL FOR MOBILE RELAY NODESIJCNCJournal
The aim of equipping a wireless network with a mobile relay node is to support broadband wireless communications for vehicular users and their devices. The high mobility of vehicular users, possibly at a very high velocity in the area in which two cells overlap, could cause the network to suffer from a reduced handover success rate and, hence, increased radio link failure. The combined impact of these problems is service interruptions to vehicular users. Thus, the handover schemes are crucial in solving these problems. In this work, we first present the adaptive handover hysteresis scheme for the wireless network with mobile relay nodes in the high-speed train scenario. Specifically, our proposed adaptive hysteresis scheme is based on the velocity of the train. Second, the handover call dropping probability is reduced by introducing a modified call admission control scheme to support radio resource reservation for handover calls that prioritizes handover calls of mobile relay over the other calls. The proposed solution in which adaptive parameter is combined with call admission control is evaluated by system level simulation. Our simulation results illustrate an increased handover success rate and reduced radio link failures.
Using spectral radius ratio for node degreeIJCNCJournal
In this paper, we show that the spectral radius ratio for node degree could be used to analyze the variation of node degree during the evolution of complex networks. We focus on three commonly studied models of complex networks: random networks, scale-free networks and small-world networks. The spectral radius ratio for node degree is defined as the ratio of the principal (largest) eigenvalue of the adjacency matrix of a network graph to that of the average node degree. During the evolution of each of the above three categories of networks (using the appropriate evolution model for each category), we observe the spectral radius ratio for node degree to exhibit high-very high positive correlation (0.75 or above) to that of the
coefficient of variation of node degree (ratio of the standard deviation of node degree and average node degree). We show that the spectral radius ratio for node degree could be used as the basis to tune the operating parameters of the evolution models for each of the three categories of complex networks as well as analyze the impact of specific operating parameters for each model.
APPROXIMATING NASH EQUILIBRIUM UNIQUENESS OF POWER CONTROL IN PRACTICAL WSNSIJCNCJournal
Transmission power has a major impact on link and communication reliability and network lifetime in Wireless Sensor Networks. We study power control in a multi-hop Wireless Sensor Network where nodes' communication interfere with each other. Our objective is to determine each node's transmission power level that will reduce the communication interference and keep energy consumption to a minimum. We propose a potential game approach to obtain the unique equilibrium of the network transmission power allocation. The unique equilibrium is located in a continuous domain. However, radio transceivers accept only discrete values for transmission power level setting. We study the viability and performance of mapping the continuous solution from the potential game to the discrete domain required by the radio. We demonstrate the success of our approach through TOSSIM simulation when nodes use the Collection Tree Protocol for routing the data. Also, we show results of our method from the Indriya testbed. We compare it with the case where the motes use Collection Tree Protocol with the maximum transmission power.
Secure and Efficient Hierarchical Data Aggregation in Wireless Sensor NetworksIJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
International Journal of Modern Engineering Research (IJMER) covers all the fields of engineering and science: Electrical Engineering, Mechanical Engineering, Civil Engineering, Chemical Engineering, Computer Engineering, Agricultural Engineering, Aerospace Engineering, Thermodynamics, Structural Engineering, Control Engineering, Robotics, Mechatronics, Fluid Mechanics, Nanotechnology, Simulators, Web-based Learning, Remote Laboratories, Engineering Design Methods, Education Research, Students' Satisfaction and Motivation, Global Projects, and Assessment…. And many more.
Wireless Sensor Network (WSN) is a promising field for research. As the use of this field increases, it is
required to give proper security to this field. So to ensure the security of communication of data or messages and to
control the use of data in WSN is of great importance. As sensor networks interact with responsive data and operate
in unfriendly unattended area, from the time of system design these security concerns should be addressed. The paper,
presents a modified Motesec security protocol which is a security mechanism for Wireless sensor network. In this
protocol a hash function based approach is used to detect replay attacks. For data access control key lock matching
method i.e. memory data access control policy is used to prevent unauthorized data access. Encoding and
reconstruction scheme is used to find out attacker. Flooding attack detection by comparing data rate. There is currently
massive research is present in the area of wireless sensor network security..Keywords: GPS,GCM,LBS Android.
Keywords: secure communication architecture, wireless Sensor network security.
A SURVEY ON WIRELESS SENSOR NETWORKS SECURITY WITH THE INTEGRATION OF CLUSTER...cscpconf
Keying technique in Wireless Sensor Networks(WSNs) is one of the most emerging fields ofWSN security. In order to provide security on WSN, the role of Key distribution technique is
considered to be very significant and thus the key management plays a crucial and fundamentalroles in the security service of WSNs. This paper reviews pairwise key establishment techniquealong with the architecture and the environment of WSN. The cluster based group key
agreement protocols for infrastructure base WSN are discussed in this paper. This paper also
reviews how the security can be provided to WSNs with the integration of clustering and keying
techniques. The survey also provides a more detailed discussion on the comparison between different cluster based group key agreement protocols.
A survey on wireless sensor networks security with the integration of cluster...csandit
Keying technique in Wireless Sensor Networks(WSNs) is one of the most emerging fields of
WSN security. In order to provide security on WSN, the role of Key distribution technique is
considered to be very significant and thus the key management plays a crucial and fundamental
roles in the security service of WSNs. This paper reviews pairwise key establishment technique
along with the architecture and the environment of WSN. The cluster based group key
agreement protocols for infrastructure base WSN are discussed in this paper. This paper also
reviews how the security can be provided to WSNs with the integration of clustering and keying
techniques. The survey also provides a more detailed discussion on the comparison between
different cluster based group key agreement protocols.
A NOVEL TWO-STAGE ALGORITHM PROTECTING INTERNAL ATTACK FROM WSNSIJCNC
Wireless sensor networks (WSNs) consists of small nodes with constrain capabilities. It enables numerous
applications with distributed network infrastructure. With its nature and application scenario, security of
WSN had drawn a great attention. In malicious environments for a functional WSN, security mechanisms
are essential. Malicious or internal attacker has gained attention as the most challenging attacks to
WSNs. Many works have been done to secure WSN from internal attacks but most of them relay on either
training data set or predefined thresholds. It is a great challenge to find or gain knowledge about the
Malicious. In this paper, we develop the algorithm in two stages. Initially, Abnormal Behaviour
Identification Mechanism (ABIM) which uses cosine similarity. Finally, Dempster-Shafer theory (DST)is
used. Which combine multiple evidences to identify the malicious or internal attacks in a WSN. In this
method we do not need any predefined threshold or tanning data set of the nodes.
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Networkpijans
Sensor nodes, when deployed to form Wireless sensor network operating under control of central authority
i.e. Base station are capable of exhibiting interesting applications due to their ability to be deployed
ubiquitously in hostile & pervasive environments. But due to same reason security is becoming a major
concern for these networks. Wireless sensor networks are vulnerable against various types of external and
internal attacks being limited by computation resources, smaller memory capacity, limited battery life,
processing power & lack of tamper resistant packaging. This survey paper is an attempt to analyze threats
to Wireless sensor networks and to report various research efforts in studying variety of routing attacks
which target the network layer. Particularly devastating attack is Wormhole attack- a Denial of Service
attack, where attackers create a low-latency link between two points in the network. With focus on survey of
existing methods of detecting Wormhole attacks, researchers are in process to identify and demarcate the
key research challenges for detection of Wormhole attacks in network layer.
Wireless Sensor Networks: An Overview on Security Issues and ChallengesIJAEMSJORNAL
Wireless Sensor Networks (WSNs) are formed by deploying as large number of sensor nodes in an area for the surveillance of generally remote locations. A typical sensor node is made up of different components to perform the task of sensing, processing and transmitting data. WSNs are used for many applications in diverse forms from indoor deployment to outdoor deployment. The basic requirement of every application is to use the secured network. Providing security to the sensor network is a very challenging issue along with saving its energy. Many security threats may affect the functioning of these networks. WSNs must be secured to keep an attacker from hindering the delivery of sensor information and from forging sensor information as these networks are build for remote surveillance and unauthorized changes in the sensed data may lead to wrong information to the decision makers. This paper gives brief description about various security issues and security threats in WSNs.
A key management approach for wireless sensor networksZac Darcy
In this paper we presenta key management approach for wireless sensor networks. This approach
facilitating an efficient scalable post-distribution key establishment that provides different security services.
We have developed and tested this approach under TinyOs. Result shows that this approach provides
acceptable resistance against node capture attacks and replay attacks. The provision of security services is
completely transparent to the user of the WSNs. Furthermore, being highly scalable and lightweight, this
approach is appropriate to be used in a wireless sensor network of hundreds of nodes.
Integrated Security and Attack Detection Scheme for Wireless Sensor NetworksEditor IJMTER
The wireless sensor node is a tiny device that is used to capture environment information.
Sensor devices are used to capture temperature and pressure details from the environment. The
sensor devices are used in hospitals, home and production plants. The main components of a sensor
node are microcontroller, transceiver, external memory and power source. A wireless sensor network
(WSN) is a wireless network consisting of spatially distributed autonomous devices. Sensors are
used to cooperatively monitor physical or environmental conditions. Sensor network is equipped
with a radio transceiver or other wireless communications device. The sensor networks are deployed
with consideration of sensing and transmission coverage factors.
Sensor network security protocols provide confidentiality for the messages. Object location and data
sink information are the sensitive elements in the sensor network. Two techniques are used to
provide location privacy to monitored objects. They are Source-location privacy and Sink-location
privacy. Periodic collection and Source simulation models are used in Source-location privacy
technique. Sink simulation and backbone flooding models are used in Sink-location privacy
technique. Communication cost and latency factors are consider in the privacy protection model.
Source and destination location details are protected in the privacy model.
The proposed system integrates the location privacy and data security process for the wireless sensor
network. Region based query model is used to improve location privacy. Confidentiality and
integrity techniques are used for the security process. Rivest Cipher (RC4) algorithm and Secure
Hashing Algorithms (SHA) are used for the data security.
Protocols for Wireless Sensor Networks and Its SecurityIJERA Editor
This paper proposes a protocol for Wireless Sensor Networks and its security which are characterized by severely constrained computational and energy resources, and an ad hoc operational environment. The paper first introduces sensor networks, and discusses security issues and goals along with security problems, threats, and risks in sensor networks. It describes crippling attacks against all of them and suggests countermeasures and design considerations. It gives a brief introduction of proposed security protocol SPINS whose building blocks are SNEP and μTESLA which overcome all the important security threats and problems and achieves security goals like data confidentiality, freshness, authentication in order to provide a secure Wireless Sensor Network
Even in difficult places to reach, the new networking technique allows the easy deployment of sensor networks although these wireless sensor networks confront a lot of constraints. The major constraint is related to the quality of information sent by the network. The wireless sensor networks use different methods to achieve data to the base station. Data aggregation is an important one, used by these wireless sensor networks. But this aggregated data can be subject to several types of attacks and provides security is necessary to resist against malicious attacks, secure communication between severely resource constrained sensor nodes while maintaining the flexibility of the topology changes. Recently, several secure data aggregation schemes have been proposed for wireless sensor networks, it provides better security compared with traditional aggregation. In this paper, we try to focus on giving a brief statement of the various approaches used for the purpose of secure data aggregation in wireless sensor networks.
NOVEL HYBRID INTRUSION DETECTION SYSTEM FOR CLUSTERED WIRELESS SENSOR NETWORKIJNSA Journal
Wireless sensor network (WSN) is regularly deployed in unattended and hostile environments. The WSN is vulnerable to security threats and susceptible to physical capture. Thus, it is necessary to use effective mechanisms to protect the network. It is widely known, that the intrusion detection is one of the most efficient security mechanisms to protect the network against malicious attacks or unauthorized access. In this paper, we propose a hybrid intrusion detection system for clustered WSN. Our intrusion framework uses a combination between the Anomaly Detection based on support vector machine (SVM) and the Misuse Detection. Experiments results show that most of routing attacks can be detected with low false alarm.
Analyze and Detect Packet Loss for Data Transmission in WSNIJERA Editor
An emerging technology is Wireless Sensor Network where sensors are deployed at extreme geographical
locations where human intervention is not possible. The data transferred through the sensor nodes are majorly
used in crucial decision making process. Since WSN is a wireless infrastructure it tempts the attackers to
tamper/misuse the data. Privacy-preserving routing is important for some ad hoc networks that require stronger
privacy protection. Hence a routing protocol to achieve total unobservability by anonymous key establishment
using secret session keys and group signature is used. The unobservable routing protocol is divided into two
main phases. First phases define an anonymous key establishment process to construct secret session keys.
Second phase consist of unobservable route discovery process to find appropriate as well as secure route to the
destination. A node establishes a key with its direct neighbour and uses the same key to encrypt the packet
before transferring.
AN IMPROVED WATCHDOG TECHNIQUE BASED ON POWER-AWARE HIERARCHICAL DESIGN FOR I...IJNSA Journal
Preserving security and confidentiality in wireless sensor networks (WSN) are crucial. Wireless sensor networks in comparison with wired networks are more substantially vulnerable to attacks and intrusions. In WSN, a third person can eavesdrop to the information or link to the network. So, preventing these intrusions by detecting them has become one of the most demanding challenges. This paper, proposes an
improved watchdog technique as an effective technique for detecting malicious nodes based on a power aware hierarchical model. This technique overcomes the common problems in the original Watchdog mechanism. The main purpose to present this model is reducing the power consumption as a key factor
for increasing the network's lifetime. For this reason, we simulated our model with Tiny-OS simulator and then, compared our results with non hierarchical model to ensure the improvement. The results indicate that, our proposed model is better in performance than the original models and it has increased the lifetime of the wireless sensor nodes by around 2611.492 seconds for a network with 100 sensors.
International Journal of Computational Engineering Research(IJCER) ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
Vehicle Ad Hoc Networks (VANETs) have become a viable technology to improve traffic flow and safety on the roads. Due to its effectiveness and scalability, the Wingsuit Search-based Optimised Link State Routing Protocol (WS-OLSR) is frequently used for data distribution in VANETs. However, the selection of MultiPoint Relays (MPRs) plays a pivotal role in WS-OLSR's performance. This paper presents an improved MPR selection algorithm tailored to WS-OLSR, designed to enhance the overall routing efficiency and reduce overhead. The analysis found that the current OLSR protocol has problems such as redundancy of HELLO and TC message packets or failure to update routing information in time, so a WS-OLSR routing protocol based on improved-MPR selection algorithm was proposed. Firstly, factors such as node mobility and link changes are comprehensively considered to reflect network topology changes, and the broadcast cycle of node HELLO messages is controlled through topology changes. Secondly, a new MPR selection algorithm is proposed, considering link stability issues and nodes. Finally, evaluate its effectiveness in terms of packet delivery ratio, end-to-end delay, and control message overhead. Simulation results demonstrate the superior performance of our improved MR selection algorithm when compared to traditional approaches.
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...IJCNCJournal
So far, Wireless Body Area Networks (WBANs) have played a pivotal role in driving the development of intelligent healthcare systems with broad applicability across various domains. Each WBAN consists of one or more types of sensors that can be embedded in clothing, attached directly to the body, or even implanted beneath an individual's skin. These sensors typically serve asingle application. However, the traffic generated by each sensor may have distinct requirements. This diversity necessitates a dual approach: tailored treatment based on the specific needs of each traffic typeand the fulfillment of application requirements, such asreliability and timeliness. Never the less, the presence of energy constraints and the unreliable nature of wireless communications make QoS provisioning under such networks a non-trivial task. In this context, the current paper introduces a novel Medium AccessControl (MAC) strategy for the regular traffic applications of WBANs, designed to significantly enhance efficiency when compared to the established MAC protocols IEEE 802.15.4 and IEEE 802.15.6, with a particular focus on improving reliability, timeliness, and energy efficiency.
May_2024 Top 10 Read Articles in Computer Networks & Communications.pdfIJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...IJCNCJournal
The efficient use of energy in wireless sensor networks is critical for extending node lifetime. The network topology is one of the factors that have a significant impact on the energy usage at the nodes and the quality of transmission (QoT) in the network. We propose a topology control algorithm for software-defined wireless sensor networks (SDWSNs) in this paper. Our method is to formulate topology control algorithm as a nonlinear programming (NP) problem with the objective to optimizing two metrics, maximum communication range, and desired degree. This NP problem is solved at the SDWSN controller by employing the genetic algorithm (GA) to determine the best topology. The simulation results show that the proposed algorithm outperforms the MaxPower algorithm in terms of average node degree and energy expansion ratio.
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...IJCNCJournal
The integration of artificial intelligence technology with a scalable Internet of Things (IoT) platform facilitates diverse smart communication services, allowing remote users to access services from anywhere at any time. The multi-server environment within IoT introduces a flexible security service model, enabling users to interact with any server through a single registration. To ensure secure and privacy preservation services for resources, an authentication scheme is essential. Zhao et al. recently introduced a user authentication scheme for the multi-server environment, utilizing passwords and smart cards, claiming resilience against well-known attacks. This paper conducts cryptanalysis on Zhao et al.'s scheme, focusing on denial of service and privacy attacks, revealing a lack of user-friendliness. Subsequently, we propose a new multi-server user authentication scheme for privacy preservation with fuzzy commitment over the IoT environment, addressing the shortcomings of Zhao et al.'s scheme. Formal security verification of the proposed scheme is conducted using the ProVerif simulation tool. Through both formal and informal security analyses, we demonstrate that the proposed scheme is resilient against various known attacks and those identified in Zhao et al.'s scheme.
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsIJCNCJournal
In -Vehicle Ad-Hoc Network (VANET), vehicles continuously transmit and receive spatiotemporal data with neighboring vehicles, thereby establishing a comprehensive 360-degree traffic awareness system. Vehicular Network safety applications facilitate the transmission of messages between vehicles that are near each other, at regular intervals, enhancing drivers' contextual understanding of the driving environment and significantly improving traffic safety. Privacy schemes in VANETs are vital to safeguard vehicles’ identities and their associated owners or drivers. Privacy schemes prevent unauthorized parties from linking the vehicle's communications to a specific real-world identity by employing techniques such as pseudonyms, randomization, or cryptographic protocols. Nevertheless, these communications frequently contain important vehicle information that malevolent groups could use to Monitor the vehicle over a long period. The acquisition of this shared data has the potential to facilitate the reconstruction of vehicle trajectories, thereby posing a potential risk to the privacy of the driver. Addressing the critical challenge of developing effective and scalable privacy-preserving protocols for communication in vehicle networks is of the highest priority. These protocols aim to reduce the transmission of confidential data while ensuring the required level of communication. This paper aims to propose an Advanced Privacy Vehicle Scheme (APV) that periodically changes pseudonyms to protect vehicle identities and improve privacy. The APV scheme utilizes a concept called the silent period, which involves changing the pseudonym of a vehicle periodically based on the tracking of neighboring vehicles. The pseudonym is a temporary identifier that vehicles use to communicate with each other in a VANET. By changing the pseudonym regularly, the APV scheme makes it difficult for unauthorized entities to link a vehicle's communications to its real-world identity. The proposed APV is compared to the SLOW, RSP, CAPS, and CPN techniques. The data indicates that the efficiency of APV is a better improvement in privacy metrics. It is evident that the AVP offers enhanced safety for vehicles during transportation in the smart city.
April 2024 - Top 10 Read Articles in Computer Networks & CommunicationsIJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionIJCNCJournal
Malware is one of the threats to security of computer networks and information systems. Since malware instances are available sufficiently, there is increased interest among researchers on usage of Artificial Intelligence (AI). Of late AI-enabled methods such as machine learning (ML) and deep learning paved way for solving many real-world problems. As it is a learning-based approach, accumulated training samples help in improving thequality of training and thus leveraging malware detection accuracy. Existing deep learning methods are focusing on learning-based malware detection systems. However, there is need for improving the state of the art through ensemble approach. Towards this end, in this paper we proposed a framework known as Deep Ensemble Framework (DEF) for automatic malware detection. The framework obtains features from training samples. From given malware instance a grayscale image is generated. There is another process to extract the opcode sequences. Convolutional Neural Network (CNN) and Long Short Term Memory (LSTM) techniques are used to obtain grayscale image and opcode sequence respectively. Afterwards, a stacking ensemble is employed in order to achieve efficient malware detection and classification. Malware samples collected fromthe Internet sources and Microsoft are used for theempirical study. An algorithm known as Ensemble Learning for Automatic Malware Detection (EL-AML) is proposed to realize our framework. Another algorithm named Pre-Process is proposed to assist the EL-AML algorithm for obtaining intermediate features required by CNN and LSTM.Empirical study reveals that our framework outperforms many existing methods in terms of speed-up and accuracy.
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficIJCNCJournal
With the emergence of smart devices and the Internet of Things (IoT), millions of users connected to the network produce massive network traffic datasets. These vast datasets of network traffic, Big Data are challenging to store, deal with and analyse using a single computer. In this paper we developed parallel implementation using a High Performance Computer (HPC) for the Non-Negative Matrix Factorization technique as an engine for an Intrusion Detection System (HPC-NMF-IDS). The large IoT traffic datasets of order of millions samples are distributed evenly on all the computing cores for both storage and speedup purpose. The distribution of computing tasks involved in the Matrix Factorization takes into account the reduction of the communication cost between the computing cores. The experiments we conducted on the proposed HPC-IDS-NMF give better results than the traditional ML-based intrusion detection systems. We could train the HPC model with datasets of one million samples in only 31 seconds instead of the 40 minutes using one processor), that is a speed up of 87 times. Moreover, we have got an excellent detection accuracy rate of 98% for KDD dataset.
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...IJCNCJournal
So far, Wireless Body Area Networks (WBANs) have played a pivotal role in driving the development of intelligent healthcare systems with broad applicability across various domains. Each WBAN consists of one or more types of sensors that can be embedded in clothing, attached directly to the body, or even implanted beneath an individual's skin. These sensors typically serve asingle application. However, the traffic generated by each sensor may have distinct requirements. This diversity necessitates a dual approach: tailored treatment based on the specific needs of each traffic typeand the fulfillment of application requirements, such asreliability and timeliness. Never the less, the presence of energy constraints and the unreliable nature of wireless communications make QoS provisioning under such networks a non-trivial task. In this context, the current paper introduces a novel Medium AccessControl (MAC) strategy for the regular traffic applications of WBANs, designed to significantly enhance efficiency when compared to the established MAC protocols IEEE 802.15.4 and IEEE 802.15.6, with a particular focus on improving reliability, timeliness, and energy efficiency.
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...IJCNCJournal
The efficient use of energy in wireless sensor networks is critical for extending node lifetime. The network topology is one of the factors that have a significant impact on the energy usage at the nodes and the quality of transmission (QoT) in the network. We propose a topology control algorithm for software-defined wireless sensor networks (SDWSNs) in this paper. Our method is to formulate topology control algorithm as a nonlinear programming (NP) problem with the objective to optimizing two metrics, maximum communication range, and desired degree. This NP problem is solved at the SDWSN controller by employing the genetic algorithm (GA) to determine the best topology. The simulation results show that the proposed algorithm outperforms the MaxPower algorithm in terms of average node degree and energy expansion ratio.
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...IJCNCJournal
The integration of artificial intelligence technology with a scalable Internet of Things (IoT) platform facilitates diverse smart communication services, allowing remote users to access services from anywhere at any time. The multi-server environment within IoT introduces a flexible security service model, enabling users to interact with any server through a single registration. To ensure secure and privacy preservation services for resources, an authentication scheme is essential. Zhao et al. recently introduced a user authentication scheme for the multi-server environment, utilizing passwords and smart cards, claiming resilience against well-known attacks. This paper conducts cryptanalysis on Zhao et al.'s scheme, focusing on denial of service and privacy attacks, revealing a lack of user-friendliness. Subsequently, we propose a new multi-server user authentication scheme for privacy preservation with fuzzy commitment over the IoT environment, addressing the shortcomings of Zhao et al.'s scheme. Formal security verification of the proposed scheme is conducted using the ProVerif simulation tool. Through both formal and informal security analyses, we demonstrate that the proposed scheme is resilient against various known attacks and those identified in Zhao et al.'s scheme.
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsIJCNCJournal
In -Vehicle Ad-Hoc Network (VANET), vehicles continuously transmit and receive spatiotemporal data with neighboring vehicles, thereby establishing a comprehensive 360-degree traffic awareness system. Vehicular Network safety applications facilitate the transmission of messages between vehicles that are near each other, at regular intervals, enhancing drivers' contextual understanding of the driving environment and significantly improving traffic safety. Privacy schemes in VANETs are vital to safeguard vehicles’ identities and their associated owners or drivers. Privacy schemes prevent unauthorized parties from linking the vehicle's communications to a specific real-world identity by employing techniques such as pseudonyms, randomization, or cryptographic protocols. Nevertheless, these communications frequently contain important vehicle information that malevolent groups could use to Monitor the vehicle over a long period. The acquisition of this shared data has the potential to facilitate the reconstruction of vehicle trajectories, thereby posing a potential risk to the privacy of the driver. Addressing the critical challenge of developing effective and scalable privacy-preserving protocols for communication in vehicle networks is of the highest priority. These protocols aim to reduce the transmission of confidential data while ensuring the required level of communication. This paper aims to propose an Advanced Privacy Vehicle Scheme (APV) that periodically changes pseudonyms to protect vehicle identities and improve privacy. The APV scheme utilizes a concept called the silent period, which involves changing the pseudonym of a vehicle periodically based on the tracking of neighboring vehicles. The pseudonym is a temporary identifier that vehicles use to communicate with each other in a VANET. By changing the pseudonym regularly, the APV scheme makes it difficult for unauthorized entities to link a vehicle's communications to its real-world identity. The proposed APV is compared to the SLOW, RSP, CAPS, and CPN techniques. The data indicates that the efficiency of APV is a better improvement in privacy metrics. It is evident that the AVP offers enhanced safety for vehicles during transportation in the smart city.
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionIJCNCJournal
Malware is one of the threats to security of computer networks and information systems. Since malware instances are available sufficiently, there is increased interest among researchers on usage of Artificial Intelligence (AI). Of late AI-enabled methods such as machine learning (ML) and deep learning paved way for solving many real-world problems. As it is a learning-based approach, accumulated training samples help in improving thequality of training and thus leveraging malware detection accuracy. Existing deep learning methods are focusing on learning-based malware detection systems. However, there is need for improving the state of the art through ensemble approach. Towards this end, in this paper we proposed a framework known as Deep Ensemble Framework (DEF) for automatic malware detection. The framework obtains features from training samples. From given malware instance a grayscale image is generated. There is another process to extract the opcode sequences. Convolutional Neural Network (CNN) and Long Short Term Memory (LSTM) techniques are used to obtain grayscale image and opcode sequence respectively. Afterwards, a stacking ensemble is employed in order to achieve efficient malware detection and classification. Malware samples collected fromthe Internet sources and Microsoft are used for theempirical study. An algorithm known as Ensemble Learning for Automatic Malware Detection (EL-AML) is proposed to realize our framework. Another algorithm named Pre-Process is proposed to assist the EL-AML algorithm for obtaining intermediate features required by CNN and LSTM.Empirical study reveals that our framework outperforms many existing methods in terms of speed-up and accuracy.
High Performance NMF based Intrusion Detection System for Big Data IoT TrafficIJCNCJournal
With the emergence of smart devices and the Internet of Things (IoT), millions of users connected to the network produce massive network traffic datasets. These vast datasets of network traffic, Big Data are challenging to store, deal with and analyse using a single computer. In this paper we developed parallel implementation using a High Performance Computer (HPC) for the Non-Negative Matrix Factorization technique as an engine for an Intrusion Detection System (HPC-NMF-IDS). The large IoT traffic datasets of order of millions samples are distributed evenly on all the computing cores for both storage and speedup purpose. The distribution of computing tasks involved in the Matrix Factorization takes into account the reduction of the communication cost between the computing cores. The experiments we conducted on the proposed HPC-IDS-NMF give better results than the traditional ML-based intrusion detection systems. We could train the HPC model with datasets of one million samples in only 31 seconds instead of the 40 minutes using one processor), that is a speed up of 87 times. Moreover, we have got an excellent detection accuracy rate of 98% for KDD dataset.
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IJCNCJournal
Cyber intrusion attacks increasingly target the Internet of Things (IoT) ecosystem, exploiting vulnerable devices and networks. Malicious activities must be identified early to minimize damage and mitigate threats. Using actual benign and attack traffic from the CICIoT2023 dataset, this WORK aims to evaluate and benchmark machine-learning techniques for IoT intrusion detection. There are four main phases to the system. First, the CICIoT2023 dataset is refined to remove irrelevant features and clean up missing and duplicate data. The second phase employs statistical models and artificial intelligence to discover novel features. The most significant features are then selected in the third phase based on cooperative game theory. Using the original CICIoT2023 dataset and a dataset containing only novel features, we train and evaluate a variety of machine learning classifiers. On the original dataset, Random Forest achieved the highest accuracy of 99%. Still, with novel features, Random Forest's performance dropped only slightly (96%) while other models achieved significantly lower accuracy. As a whole, the work contributes substantial contributions to tailored feature engineering, feature selection, and rigorous benchmarking of IoT intrusion detection techniques. IoT networks and devices face continuously evolving threats, making it necessary to develop robust intrusion detection systems.
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...IJCNCJournal
IoT networking uses real items as stationary or mobile nodes. Mobile nodes complicate networking. Internet of Things (IoT) networks have a lot of control overhead messages because devices are mobile. These signals are generated by the constant flow of control data as such device identity, geographical positioning, node mobility, device configuration, and others. Network clustering is a popular overhead communication management method. Many cluster-based routing methods have been developed to address system restrictions. Node clustering based on the Internet of Things (IoT) protocol, may be used to cluster all network nodes according to predefined criteria. Each cluster will have a Smart Designated Node. SDN cluster management is efficient. Many intelligent nodes remain in the network. The network design spreads these signals. This paper presents an intelligent and responsive routing approach for clustered nodes in IoT networks. An existing method builds a new sub-area clustered topology. The Nodes Clustering Based on the Internet of Things (NCIoT) method improves message transmission between any two nodes. This will facilitate the secure and reliable interchange of healthcare data between professionals and patients. NCIoT is a system that organizes nodes in the Internet of Things (IoT) by grouping them together based on their proximity. It also picks SDN routes for these nodes. This approach involves selecting one option from a range of choices and preparing for likely outcomes problem addressing limitations on activities is a primary focus during the review process. Predictive inquiry employs the process of analyzing data to forecast and anticipate future events. This document provides an explanation of compact units. The Predictive Inquiry Small Packets (PISP) improved its backup system and partnered with SDN to establish a routing information table for each intelligent node, resulting in higher routing performance. Both principal and secondary roads are available for use. The simulation findings indicate that NCIoT algorithms outperform CBR protocols. Enhancements lead to a substantial 78% boost in network performance. In addition, the end-to-end latency dropped by 12.5%. The PISP methodology produces 5.9% more inquiry packets compared to alternative approaches. The algorithms are constructed and evaluated against academic ones.
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IJCNCJournal
Cyber intrusion attacks increasingly target the Internet of Things (IoT) ecosystem, exploiting vulnerable devices and networks. Malicious activities must be identified early to minimize damage and mitigate threats. Using actual benign and attack traffic from the CICIoT2023 dataset, this WORK aims to evaluate and benchmark machine-learning techniques for IoT intrusion detection. There are four main phases to the system. First, the CICIoT2023 dataset is refined to remove irrelevant features and clean up missing and duplicate data. The second phase employs statistical models and artificial intelligence to discover novel features. The most significant features are then selected in the third phase based on cooperative game theory. Using the original CICIoT2023 dataset and a dataset containing only novel features, we train and evaluate a variety of machine learning classifiers. On the original dataset, Random Forest achieved the highest accuracy of 99%. Still, with novel features, Random Forest's performance dropped only slightly (96%) while other models achieved significantly lower accuracy. As a whole, the work contributes substantial contributions to tailored feature engineering, feature selection, and rigorous benchmarking of IoT intrusion detection techniques. IoT networks and devices face continuously evolving threats, making it necessary to develop robust intrusion detection systems.
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...IJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...IJCNCJournal
IoT networking uses real items as stationary or mobile nodes. Mobile nodes complicate networking. Internet of Things (IoT) networks have a lot of control overhead messages because devices are mobile. These signals are generated by the constant flow of control data as such device identity, geographical positioning, node mobility, device configuration, and others. Network clustering is a popular overhead communication management method. Many cluster-based routing methods have been developed to address system restrictions. Node clustering based on the Internet of Things (IoT) protocol, may be used to cluster all network nodes according to predefined criteria. Each cluster will have a Smart Designated Node. SDN cluster management is efficient. Many intelligent nodes remain in the network. The network design spreads these signals. This paper presents an intelligent and responsive routing approach for clustered nodes in IoT networks. An existing method builds a new sub-area clustered topology. The Nodes Clustering Based on the Internet of Things (NCIoT) method improves message transmission between any two nodes. This will facilitate the secure and reliable interchange of healthcare data between professionals and patients. NCIoT is a system that organizes nodes in the Internet of Things (IoT) by grouping them together based on their proximity. It also picks SDN routes for these nodes. This approach involves selecting one option from a range of choices and preparing for likely outcomes problem addressing limitations on activities is a primary focus during the review process. Predictive inquiry employs the process of analyzing data to forecast and anticipate future events. This document provides an explanation of compact units. The Predictive Inquiry Small Packets (PISP) improved its backup system and partnered with SDN to establish a routing information table for each intelligent node, resulting in higher routing performance. Both principal and secondary roads are available for use. The simulation findings indicate that NCIoT algorithms outperform CBR protocols. Enhancements lead to a substantial 78% boost in network performance. In addition, the end-to-end latency dropped by 12.5%. The PISP methodology produces 5.9% more inquiry packets compared to alternative approaches. The algorithms are constructed and evaluated against academic ones.
Automobile Management System Project Report.pdfKamal Acharya
The proposed project is developed to manage the automobile in the automobile dealer company. The main module in this project is login, automobile management, customer management, sales, complaints and reports. The first module is the login. The automobile showroom owner should login to the project for usage. The username and password are verified and if it is correct, next form opens. If the username and password are not correct, it shows the error message.
When a customer search for a automobile, if the automobile is available, they will be taken to a page that shows the details of the automobile including automobile name, automobile ID, quantity, price etc. “Automobile Management System” is useful for maintaining automobiles, customers effectively and hence helps for establishing good relation between customer and automobile organization. It contains various customized modules for effectively maintaining automobiles and stock information accurately and safely.
When the automobile is sold to the customer, stock will be reduced automatically. When a new purchase is made, stock will be increased automatically. While selecting automobiles for sale, the proposed software will automatically check for total number of available stock of that particular item, if the total stock of that particular item is less than 5, software will notify the user to purchase the particular item.
Also when the user tries to sale items which are not in stock, the system will prompt the user that the stock is not enough. Customers of this system can search for a automobile; can purchase a automobile easily by selecting fast. On the other hand the stock of automobiles can be maintained perfectly by the automobile shop manager overcoming the drawbacks of existing system.
Event Management System Vb Net Project Report.pdfKamal Acharya
In present era, the scopes of information technology growing with a very fast .We do not see any are untouched from this industry. The scope of information technology has become wider includes: Business and industry. Household Business, Communication, Education, Entertainment, Science, Medicine, Engineering, Distance Learning, Weather Forecasting. Carrier Searching and so on.
My project named “Event Management System” is software that store and maintained all events coordinated in college. It also helpful to print related reports. My project will help to record the events coordinated by faculties with their Name, Event subject, date & details in an efficient & effective ways.
In my system we have to make a system by which a user can record all events coordinated by a particular faculty. In our proposed system some more featured are added which differs it from the existing system such as security.
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
Forklift Classes Overview by Intella PartsIntella Parts
Discover the different forklift classes and their specific applications. Learn how to choose the right forklift for your needs to ensure safety, efficiency, and compliance in your operations.
For more technical information, visit our website https://intellaparts.com
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxR&R Consult
CFD analysis is incredibly effective at solving mysteries and improving the performance of complex systems!
Here's a great example: At a large natural gas-fired power plant, where they use waste heat to generate steam and energy, they were puzzled that their boiler wasn't producing as much steam as expected.
R&R and Tetra Engineering Group Inc. were asked to solve the issue with reduced steam production.
An inspection had shown that a significant amount of hot flue gas was bypassing the boiler tubes, where the heat was supposed to be transferred.
R&R Consult conducted a CFD analysis, which revealed that 6.3% of the flue gas was bypassing the boiler tubes without transferring heat. The analysis also showed that the flue gas was instead being directed along the sides of the boiler and between the modules that were supposed to capture the heat. This was the cause of the reduced performance.
Based on our results, Tetra Engineering installed covering plates to reduce the bypass flow. This improved the boiler's performance and increased electricity production.
It is always satisfying when we can help solve complex challenges like this. Do your systems also need a check-up or optimization? Give us a call!
Work done in cooperation with James Malloy and David Moelling from Tetra Engineering.
More examples of our work https://www.r-r-consult.dk/en/cases-en/
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdfKamal Acharya
The College Bus Management system is completely developed by Visual Basic .NET Version. The application is connect with most secured database language MS SQL Server. The application is develop by using best combination of front-end and back-end languages. The application is totally design like flat user interface. This flat user interface is more attractive user interface in 2017. The application is gives more important to the system functionality. The application is to manage the student’s details, driver’s details, bus details, bus route details, bus fees details and more. The application has only one unit for admin. The admin can manage the entire application. The admin can login into the application by using username and password of the admin. The application is develop for big and small colleges. It is more user friendly for non-computer person. Even they can easily learn how to manage the application within hours. The application is more secure by the admin. The system will give an effective output for the VB.Net and SQL Server given as input to the system. The compiled java program given as input to the system, after scanning the program will generate different reports. The application generates the report for users. The admin can view and download the report of the data. The application deliver the excel format reports. Because, excel formatted reports is very easy to understand the income and expense of the college bus. This application is mainly develop for windows operating system users. In 2017, 73% of people enterprises are using windows operating system. So the application will easily install for all the windows operating system users. The application-developed size is very low. The application consumes very low space in disk. Therefore, the user can allocate very minimum local disk space for this application.
Vaccine management system project report documentation..pdfKamal Acharya
The Division of Vaccine and Immunization is facing increasing difficulty monitoring vaccines and other commodities distribution once they have been distributed from the national stores. With the introduction of new vaccines, more challenges have been anticipated with this additions posing serious threat to the already over strained vaccine supply chain system in Kenya.
Quality defects in TMT Bars, Possible causes and Potential Solutions.PrashantGoswami42
Maintaining high-quality standards in the production of TMT bars is crucial for ensuring structural integrity in construction. Addressing common defects through careful monitoring, standardized processes, and advanced technology can significantly improve the quality of TMT bars. Continuous training and adherence to quality control measures will also play a pivotal role in minimizing these defects.
Quality defects in TMT Bars, Possible causes and Potential Solutions.
Maximizing network interruption in wireless
1. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.2, March 2015
DOI : 10.5121/ijcnc.2015.7209 103
MAXIMIZING NETWORK INTERRUPTION IN WIRELESS
SENSOR NETWORK: AN INTRUDER’S PERSPECTIVE
Mohammad Mahfuzul Islam1
, Fariha Tasmin Jaigirdar2
and Mohammad Manzurul
Islam3
1
Department of Computer Science and Engineering, Bangladesh University of
Engineering and Technology (BUET), Dhaka, Bangladesh
2
Department of Computer Science and Engineering, Bangladesh University of
Engineering and Technology (BUET), Dhaka, Bangladesh
3
Faculty of Engineering and IT, University of Technology (UTS), Sydney, Australia
ABSTRACT
With the colossal growth of wireless sensor networks (WSNs) in different applications starting from home
automation to military affairs, the pressure on ensuring security in such a network is paramount.
Considering the security challenges, it is really a hard-hitting effort to develop a secured WSN system.
Moreover, as the information technology is getting popular, the intruders are also planning new ideas to
break the system security, to harm the network and to make the system quality down with the target of
taking the control of the network to corrupt it or to get benefits from it anyway. The intruders corrupt the
system only when the security breaking cost (SBC) is lower compared with the benefits they attained or the
harm it can make to others. In this paper, the authors define the term “maximizing network interruption
problem” and propose a technique, called the grid point approximation algorithm, to estimate the SBC of a
multi-hop WSN so that it can be made tougher for an intruder to break the system security. It is assumed
that the intruder has the complete picture of the entire network. The technique is designed from the
intruder’s point of view for completely jamming all the sensor nodes in the network through placing
jammers or malicious nodes strategically and at the same time keeping the number of jammer nodes to
minimum or near minimum. To the best of the authors’ knowledge, there is no work proposed so far of the
same kind. Experimental results with the changes of the different network parameters show that the
proposed algorithm is able to provide excellent performances to achieve the targets.
KEYWORDS
Wireless sensor network, Maximizing network interruption problem, Grid point approximation algorithm,
Security breaking cost, Step-size.
1.INTRODUCTION
A wireless sensor network (WSN) is a wireless network consisting of distributed autonomous
devices, called sensors, to cooperatively monitor physical or environmental conditions, such as
temperature, vibration, pressure, motion or pollutants at different locations [1]. With the
tremendous growing trend of computing and communication technologies, nowadays, WSNs are
contentedly used in different applications ranging from home monitoring and automation to ocean
and wildlife monitoring, industrial process monitoring, traffic control, healthcare applications,
building safety and earthquake monitoring to many military applications [1]. The network can
work both in a friendly environment as well as in an unfriendly or hostile environment to collect
and to operate with sensitive data [2]. However, the wireless media are susceptible to easy access
2. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.2, March 2015
104
by the intruders especially when data is transmitted through it from sensor devices having very
poor computing facilities for protection. The signals in these media can also be interrupted easily
through jamming or creating obstacles for the sensors to operate in a regular manner. By
obliterating the regular operational activities of the network or by stealing sensitive data an
intruder can readily get benefits or may cause harm to the targets. Therefore, ensuring the security
during data gathering and transmission in WSN is highly imperative besides keeping up the
smooth operation of the network.
Ensuring proper security in a WSN is very difficult, if not impossible, because it is hard to
implement sophisticated security algorithms within the tiny sensors. Moreover, the batteries
stored inside the sensors supply very limited power and are died out quickly. Nevertheless,
charging the battery in a sensor under deployment is intricate, if not impossible in many cases.
The processing speed of a sensor device is also very limited to run complex methodologies.
Therefore, implementing any effective security algorithms inside a sensor to protect its signals
from the intruders is difficult and an intruder can easily attack a sensor node or damage its signals
whenever it can arrive in a location where the sensors are within its transmission boundary. If the
sensors in a WSN are deployed in close proximity, then a few numbers of intruders can spoil the
network operation. Hence, deployment strategies used for WSN plays a vital role in ensuring both
the operational and the data security of the network.
No system in this universe is fully secured. As broadcasting is an inherent phenomenon in WSNs,
wireless networks are vulnerable to maintain its security and unable to tackle most of the attacks
like overhearing [3], jamming [4], malicious association and denial of service (DoS) [5].
Overhearing allows intruders to capture the target messages without changing the original
transmitted from the sender when the signal is within the communication range of the intruders,
i.e., the intruders are placed within the communication range of the sender. Nevertheless,
Jamming deliberately uses its own radio noise or signals to disrupt the communication of signals
from other targeted devices. The attack having the highest impact is called DoS, in which a
malicious node disrupts the communication of signals among other nodes using various means
and making the destination unreachable. In all of the above cases, the intruders target to make
more harms to the system or to gain more profits from it utilizing its minimum possible budget. If
a vicious activity made by an intruder costs more than the profit gained or the cost of harms
enforced to others, then attacker must not choose such an activity for its misdeed. The attackers
always explore the way to break the security of the system spending minimum amount of efforts
or cost, which is termed as the security breaking cost (SBC) in this paper. A high-quality security
ensuring algorithm, therefore, shall need to estimate the minimum SBC required for the intruders
to make the algorithm robust.
Maximizing network interruption problem (MIP) is the strategy to explore how maximum harms
can be made to opponents or how maximum profits can be gained by an intruder through utilizing
minimum resources, i.e., minimum SBC. MIP is an NP-hard problem [6] as the solution is a
decision problem where optimal utilization of resources is to be made for ensuring the maximum
harms or profits gained. This paper, for the first time to the best knowledge of the authors,
proposes a low SBC based greedy solution to the MIP by using the grid approximation technique.
The scheme is designed from the intruder’s perspective and assumed that the intruder has the
complete picture of the entire network. The network deployment area is divided into smaller units
through placing gridlines horizontally and vertically and then deployment of the malicious nodes
are carried out strategically at the grid intersection points which best suits for making more harms
to the networks or gaining more benefits from it at the lower cost. The scheme either corrupts the
operation of entire WSN or overhears signals communicated within the region while keeping the
number of malicious nodes to a minimum or near minimum.
3. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.2, March 2015
105
Though the grid approximation technique is designed from the trespassers' perspective to make
more harm in network operation or to get more benefits by analyzing the signals transmitted
within the network, the concept it bears is very suitable for ensuring high level securities for the
systems. Some of the practical target-oriented applications of the proposed scheme are as follows:
(1) to measure the network security immunity power through simulating the proposed scheme on
it; (2) to jog the memory of the proposed scheme while designing a new secured deployment
strategy for WSN so that the SBC of the proposed network to be set up become higher; (3) to
make the communication topology more complicated for the sniffers to overhear packets in view
of the thoughts presented in the proposed scheme. The proposed grid approximation scheme can
also be applied for quick data gathering inside the WSN coverage area, cost effective deployment
of chargers for connectionless inductive remote charging, maximizing destruction to the
opponents in the battlefield with minimum resources, earthquake monitoring with message
passing and saving of scarce battery powers available in tiny sensors by keeping more nodes in
sleeping mode.
The rest of the paper is organized as follows. Section 2 describes the state-of-arts relating to the
coverage problems which are not the same but constitutes related literatures required for
presenting the novelty of the MIP and the proposed solution. The details of the strategies used in
the proposed grid approximation technique and related algorithms are presented in Section 3.
Section 4 presents experimental setups, simulation results and its comparative analysis under the
variations of tuning parameters for proper investigations. Finally, some concluding remarks and
future research directions are presented in Section 5.
2. LITERATURE REVIEW
Monitoring is one of the key applications for WSN through which a target space or some objects
are kept in close observation to ensure the proper protection of them from misdeeds or
malfunctioning. In most applications, a number of sensors are deployed densely in an enclosed or
a limited area to inspect whether some events take place in that specific zone or not. The coverage
problem [7] is used to represent the processes where a specific area, or points or a boundary is
monitored by deploying a number of sensors at multiple points. Nevertheless, a single monitoring
device is deployed in the schemes commonly named as the minimum enclosing circle (MEC) [12]
where the processes find the minimum coverage distance required for the device for monitoring
all objects in a cram place. All of above mentioned techniques, having objectives, missions and
methodologies different from the grid approximation technique; hold on important principles that
are detailed below for defining the novelty and concepts of the proposed scheme.
2.1. The Coverage Problem
The coverage problem [7] defines the problem of finding suitable techniques for
monitoring/tracking a given place or its border lines or the objects lies inside the place using the
possible minimum resources. The main goal of the coverage problem is to monitor each target in
the physical space of interest within the sensing range by at least one sensor. Depending on the
type of the targets, the coverage problem is divided into three classes—the area coverage, the
point or target coverage and the barrier or path coverage [10]. Many works [7][9][10][11] have
been proposed to explore the appropriate solutions for the different types of coverage problems.
The basic principle of each type of the coverage problems is detailed below.
4. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.2, March 2015
106
2.1.1. The Area Coverage Problem
The area coverage problem monitors or covers the entire area of a given network with the goal of
leaving no point in the target area unattained by the observer [7]. Figure 1 shows the scenario of
an area coverage problem where each points within the square-shaped area ABCD is monitored
or tracked by deploying a number of sensor nodes at different location inside the area.
Figure 1. Example of the area coverage problem
Most of the schemes solving the area coverage problem deploy sensors or monitoring devices
randomly and use different techniques [7][8][9][13] to select some of them (as indicated by filled
circles in Figure 1) for monitoring the location while keeping the rest in inactive, i.e., in sleeping
mode (as indicated by unfilled circle) to reduce the wastage of scarce energy. In the coverage
configuration protocol (CCP) [8], one of the prominent area coverage methods, the authors
propose the k-coverage algorithm where each location within the particular area is covered by at
least k sensors while keeping the maximum number of sensor nodes deployed in sleeping mode.
If any case an active node goes out of energy, i.e., die out, a sleeping node becomes active to
cover the uncovered zone and some mutations are performed between the active and the sleeping
nodes to ensure the coverage of the entire area. The main problem of the CCP scheme is its time
and space complexity as it has to solve NP-hard problem to select the required nodes that can
guarantee the coverage of entire monitoring area under observation while keeping the number of
active sensors to the minimum. The well-known optimal geographical density control (OGDC)
scheme proposed by H. Zhang et. al. [9] addresses the problem using the greedy approach [14].
The first node, in the OGDC scheme, is selected randomly and the next one is selected which is
the closest to the point located at the distance from the first one. The remaining nodes are
selected repeating the process of taking the closest one to the point which is on the line
perpendicular to the line connecting the positions of two previously selected sensors and situated
at the distance of from the intersection point of two circles representing coverage. Selecting the
node in such a directional way still has higher computational and time complexities. Nevertheless,
the algorithm requiring the knowledge of the sensors' locations or directional information is
difficult to implement. A solution to this problem is proposed in [17], where each sensor needs
only to know the distances between adjacent nodes within its transmission range and their sensing
radii. The authors in the paper design a polynomial-time distributed algorithm which mutates the
activeness of sensors, maintaining a sequence on remaining energy, in every time slot in order to
maximize the network lifetime. The upper bound of the network life-time and deviation in this
algorithm from the upper bound has also been studied in this research paper.
All of the schemes representing the solutions to the area coverage problem are designed to
monitor a specific area under the observation by activating the sensors that are deployed
5. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.2, March 2015
107
randomly in past. No such mechanism deploys nodes/sensors in real time using explorative way
to corrupt or monitor devices located at some predefined points (rather than monitoring the entire
area) besides maintaining the number of deployments to the minimum.
2.1.2. The Point or Target Coverage Problem
The point or target coverage problem is a special case of area coverage problem in which, instead
of inspecting all points in a specific area, a limited number of immobile devices or points of
interest are monitored or tracked by activating required sensor devices from those deployed
previous in a random manner [7][10]. Figure 2 represents the problem where the six targets are
monitored by the three sensor nodes selected from the previous random deployments.
Figure 2. Example of the point coverage problem
The maximum set cover approximation scheme [11] explores for all the minimum sets of sensors,
selected from the previous random deployments and each of the sets is able to uniquely monitor
or track all the targets. The NP-hard problem for selecting the minimum number of sensors
covering all targets is solved by the greedy approach where the sensor covering the maximum
number of targets within its transmission range is selected first. The scheme then selects one set
of sensors containing the minimum number of elements for monitoring/tracking the targets so that
the energy efficiency is prevailed. If any member of the selected set is died out, then set becomes
unable to keep an eye on all the targets and, hence, the scheme chooses next set for monitoring.
Moreover, common sensors are not always able to connect directly with the central node due to
their limited ranges in asymmetrical wireless networks. Therefore, in [15] A. Rostami et al.
utilize super nodes that have more energy, processing power and a wider range of
communication. It does connectivity and transmits data to the base station, nevertheless, it is not
possible for all simple nodes to connect to the super nodes directly and they transmit data through
other nodes. The authors present an energy aware routing algorithm considering the energy of
relay nodes to choose and transmit data and increase the lifetime of the network. Although this is
a better solution for increasing network lifetime, but is dependent on those particular super nodes.
So a round basis algorithm proves to be efficient in this manner. In [16] the authors propose a
gravitational emulation local search algorithm (GELS) as a strategy to select optimal sensors. The
goal of this algorithm is to increase network lifetime by optimization and reducing power
consumption and increasing monitoring network efficiency. At first for each executive round in
network, a number of sensors are activated to monitor all the targets. To solve the problem of
optimal sensor the authors consider three matrixes, distance matrix, initial velocity matrix and
time matrix. In this paper the energy and distances of a sensor node is calculated with different
factors for gaining the mass and using the law of gravity different solutions are examined and
finally from the solutions the optimal one is considered.
6. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.2, March 2015
108
All the point or target coverage schemes select monitoring devices from those sensors pre-
deployed randomly to inspect a limited number of points or targets and none of them are designed
for explorative deployments of observers to corrupt or making harms to all the nodes in an
existing network. The monitoring network is therefore based on the selection of nodes pre-
existed, not superimposing another network with the vision of making harm to all nodes of the
network already installed.
2.2. Minimum Enclosing Circle (MEC)
The minimum enclosing circle (MEC) [12] is a mathematical problem for determining a circle
having the smallest radius but containing all target points from a given set in the Euclidean plane
[19]. The method is used to find out the location for placing a monitoring device and its required
coverage distance to keep an eye on targeted region/objects or to find out a location for placing a
shared facility. MEC can also be used to solve the "bomb problem" where the circle radius is used
for determining the minimum explorative capacity of the bomb and the center of the circle is the
best place to drop the bomb for maximizing the level of destructions to the enemies. The
algorithm proposed in [12] constructs a number of possible circles and select the one with the
smallest radius that encompasses all the target points. Y. Lin et.al. [18] present another MEC
implementation technique where deployment is performed by placing the multiple base stations
or sinks each at the geometric center of a cluster in a WSN to maximize network lifetime in case
of both the one-hop and the multi-hop communication.
MIP differs from the MEC such that there is only one observant or malicious node in the later
whose coverage radius varies arbitrarily depending on the transmission power level and the
deployment environment. Nevertheless, MIP uses multiple vigilant or malicious nodes with the
same or different coverage distance and deployment is performed by selecting the best location
for them.
3. PROPOSED NETWORK INTERRUPTION MAXIMIZATION SCHEME
MIP explores for a cost-effective and efficient strategy to deploy malicious nodes in a coverage
zone such that all the active participants working in that zone become corrupted or failed to
perform its activities. Figure 3 illustrates that at least three malicious nodes (represented by red
circles) are necessary to corrupt the transmission of 13 (thirteen) sensors nodes (A to M),
represented by blue circles. A blind deployment strategy, however, performs random deployment
within the target zone to corrupt the sensor devices and requires 13 malicious nodes in worse-case
to corrupt the entire network.
Figure 3. Jamming a sensor network
7. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.2, March 2015
109
The malicious nodes are usually more powerful than the sensor nodes deployed because complex
speed and memory intensive applications are required to be executed inside such devices. From
an intruders perspective, it is not realistic to spend equal or more resources to make harm to
others by making the entire network inactive. The main objective of this paper is to explore the
best locations for deployment of malicious nodes while making the entire target zone tarnished by
the minimum number. The optimum solution to this problem is an NP-hard [6] problem. The
authors of this paper propose a heuristic solution named "the grid approximation scheme" to solve
the proposed MIP problem. The scheme divides the entire deployment location into small squares
through placing imaginary gridlines to explore points for malevolent node deployments at the
locations nearest to the optimal. The scheme is detailed below.
3.1. The Grid Approximation Scheme
The grid approximation scheme at first defines a square space that encompasses the entire WSN
and places a number of horizontal and vertical gridlines on it to divide the space into small square
precincts. Let a two-dimensional field of size D×D square precincts includes a WSN consisting of
N sensor nodes deployed as shown in Figure 4. It is assumed that all the malicious nodes
deployed are homogeneous and have the same transmission distance, denoted by R. Therefore, to
jam a wireless sensor node v, a jamming node j must be placed so that ||v, j|| <= R, i.e., the
distance between v and j is required to be less than or equal to R. The authors in this paper assume
that the intruder has the full knowledge about the network topology as each sensor has a low-
power Global Positioning System (GPS) [20]. If GPS is not available, the distance between
neighbouring nodes can be estimated on the basis of incoming signal strengths.
Figure 4. Network architecture
The proposed grid approximation scheme places the malicious nodes at the grid points only. For
ensuring maximum destruction, the scheme uses the greedy approach to find out the mostly dense
region centred at a grid point in order to place the first malicious node. Stepping ahead, the
strategy removes those sensor nodes that are already jammed by the malicious node placed at the
selected junction. The process repeats recursively to add more malicious nodes at the appropriate
grid points until all the sensors nodes are removed or covered being within the transmission
ranges of them. The strategy stops on finding out the minimum or near minimum number of
malicious or jamming nodes required to corrupt all the sensor nodes in the network.
(1,1)
(D,0)
----------
(0,0)
(2,1) (3,1)
(1,0) (2,0) (3,0)
(0,1) (D,1)
(1,2) (2,2) (3,2)
(0,2)
(1,3) (2,3) (3,3)
----------
(D,2)
(D,3)
(0,3)
(1,4) (2,4) (3,4) (D,4)
(D,D)
----------
----------
----------
(0,4)
(1,D) (2,D) (3,D)
8. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.2, March 2015
110
Let Si(xi,yi), 1 ≤ i ≤ N be a sensor node in the WSN deployed randomly at the location (xi, yi),
where 0 ≤ xi, yi ≤ D and G(m, n) be the grid points produced by the scheme within the target
region such that m, n {0, 1, 2, 3, 4, ....., D}. Therefore, the distance between a sensor node
Si(xi,yi) and a grid point G(m, n) is calculated using the Euclidian distance as follows,
22
)()(,,, nymxnmGyxSdis iiiii (1)
Eq. (1) is the generalized distance calculating equation which is used for finding out the
prospective member nodes of each grid points. Thus the malicious node placed at a grid point
disrupts the communications of all sensor member nodes of that grid point. Throughout the
procedure, the strategy maintains a table with only those grid points having at least one member
node, i.e., sensor node within the R distance. The densest area in the grid structure is determined
by the reference of the grid point having the highest number of member nodes. If is the
distance of the sensor Si(xi,yi) from the point G(m, n), then
nmGyxSdisk iii
mn
i ,,, (2)
The number of member nodes in a grid point G(m, n) is the count of distances having value
less than R.
(3)
A table is generated for all the grid points G(m, n) such . The first candidate
grid point for placing the malicious node is chosen as the one containing the maximum
number of member nodes K.
)max( mnKK (4)
After getting the first malicious node position, , the strategy deletes all the member nodes of
the grid point , i.e., all the sensor nodes covered by the malicious node placed at the grid point
from the table. The table is then revised by deleting the row of the table for the grid point
and reducing the number of member nodes for the grid points G(p, q) by deleting
the sensor nodes that are also members of where,
and (5)
The grid approximation technique reapplies the same greedy method to the revised table to find
out the next near optimum position for placing the next malicious node until the table becomes
empty.
9. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.2, March 2015
111
3.2. An Example
To clearly portray the operation procedure of grid approximation technique, the authors of this
paper use a 6×6 sized grid structure as an example, indicating in Figure 5. Each grid point is
marked by G (m, n), where (m, n), 0 ≤ m, n ≤ 5 represents the point in the grid. The grid
approximation scheme investigates for the sensor nodes deployed within the grid region to be
interrupted by the malicious node with coverage distance R placed in each grid point.
Figure 5. A 6×6 sized grid structure
The WSN attempt to be interrupted as shown in this example contains 11 sensor nodes deployed
in scattered manner within the region as depicted in Figure 6. Each blue circle has the radius R as
shown in the figure and represents the region that can be covered by individual malicious node
placed at the grid point, i.e., the centre of the circle. Table 1 shows the implementation/simulation
scenario where each grid point that is able to cover at least one sensor is listed in along with the
identity number of the sensors, such as only sensor node n1 is within the communication range
from grid point G (1, 1), sensor nodes n1, n2 and n3 are within the communication range from the
grid point G (1, 2). The third column represents the number of nodes that can be covered by the
corresponding grid point. It is observed from the table that a specific sensor node may be covered
from more than one malicious node, i.e., grid points. The scheme then explores for the minimum
number of locations for placing malicious node using the concept of the minimum set cover
problem [22]. The greedy approach first looks for the grid point such that placing a malicious
node in that point covers the maximum number of sensors. In Table 1, placing a malicious node at
grid point G (3, 3) will covered maximum number of six sensors represented by n*, where * = {6,
7, 8, 9, 10, 11}. So, this is the position for the first malicious node deployment guaranteeing the
maximum number of transmission blockade in the network.
Figure 6. Deploying the sensor nodes over the network
(0,1) (1,1) (2,1
)
(3,1) (4,1) (5,1)
(0,2) (1,2) (2,2) (3,2) (4,2) (5,2)
(0,3) (1,3) (2,3) (3,3) (4,3) (5,3)
(0,4) (1,4) (2,4) (3,4) (4,4) (5,4)
(0,5) (1,5) (2,5) (3,5) (4,5) (5,5)
10. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.2, March 2015
112
After exploring the location for the first malevolent node, the table is reduced through applying
the Pruning Strategy and location for the next malevolent node is identified. The process repeated
until all the sensor nodes are interrupted by at least one of the malicious agents.
Table 1. Grid point’s member nodes and total node count.
Grid points Covered nodes Total
G(1,1) n1 1
G(1,2) n1, n2, n3 3
G(2,2) n1, n3 2
G(2,3) n6, n7,n8 3
G(2,4) n8, n9 2
G(3,1) n4, n5 2
G(3,2) n4, n5 2
G(3,3) n6, n7, n8, n9, n10, n11 6
G(3,4) n8, n9, n10, n11, 4
G(4,2) n5 1
G(4,3) n10, n11 2
.
3.2.1. Pruning Strategy
The pruning strategy of grid approximation technique each time when applied removes all entries
in the row containing the grid point, say G(m, n), identified for placing the next malicious nodes.
The strategy then accounts the sensor nodes listed against G (m, n) in the deleted row of the table
that are the candidates to be covered by the malevolent node placed at the said grid point. The
accounted sensors nodes are then deleted from each row of the table represented by the grid
points G (m±R, n±R) where appears and the total count for the corresponding row is recalculated.
In example, the first identified grid point is G (3, 3). So, the row containing G (3, 3) is deleted and
sensor nodes n* in the row are accounted. In the second step, the accounted sensor nodes are
deleted from the rows represented by G (3±1, 3±1), i.e., G (2, 2), G (2, 3), G (2, 4), G (3, 2), G (4,
2), G (4, 3), and G (3, 4) and the total count for these rows {2, 3, 2, 2, 1, 2, 4} is changed to {2, 0,
0, 2, 1, 0, 0}.
After the modification, the new table is ready to be used for finding out the next location for the
malicious nodes and the pruning strategy to be reapplied again. Both the strategies are repeated
until the table becomes empty, i.e., all the sensor nodes are covered by the malicious agents
deployed. Finally, the strategy terminates by finding a list of three grid points represented by G
(3, 3), G (1, 2) and G (3, 1).
3.3. Malicious Node Placement Algorithm
This section demonstrates the proposed grid approximation algorithm and describes its different
steps to clearly depict all iterations. The different parameters used in the algorithm are the number
of sensor nodes (NN), the transmission range (R), the maximum dimension limit of the grid
structure (XMAX, YMAX) and the step-size of the grid (∆).
The algorithm assumes that the sensor nodes are already deployed randomly in a two dimensional
grid structure. Step 1 of the algorithm represents the random placement of the sensor nodes. Upon
placing all the sensor nodes, distances are calculated from each sensor node to each grid point for
11. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.2, March 2015
113
finding out every grid point’s member set, as indicated in step 5. Step 1 to step 10 formulate the
table containing the grid points that have sensor nodes within the transmission zone. At the
beginning of the algorithm, all the sensor nodes are considered as unaffected nodes, representing
in step 11. Step 12 starts with a while loop that continues till all the sensor nodes are jammed by
the intruders assuring the condition num_unaffected to be greater than 0. Step 14 to step 19
searches for all the grid point entries in the table in order to find out the highest sensor node
covering the grid-point, where to place the intruder. Step 20 updates the num_unaffected array by
deleting the already jammed sensor nodes. Step 21 to step 30 calculate the grid points that have
already covered sensor nodes within their transmission range for deleting already covered entries
of sensor nodes from the table. Step 31 to step 33 determine the number of intruders (along with
their positions) needed for jamming all the sensor nodes by guaranteeing the num_unaffected
value to be zero.
Algorithm Grid (NN, R, XMAX,YMAX, ∆)
Input: Transmission range, R, Number of sensor nodes, NN, Maximum dimension in x-axes,
XMAX, Maximum dimension in y-axes, YMAX, Step-size, ∆.
Output: Deployment position of the intruders and the number of intruders.
/*num_unaffected=number of unaffected nodes, pCount= number of grid point entries in the
table, hNPcount= the value of highest number of sensor node covered by a grid point, nCount=
sensor node count in the table, HighestPointNode= the point that has the maximum number of
sensor nodes in its transmission range.*/
1. Sensor nodes are deployed randomly over the deployment area, i.e.; XMAX×YMAX
2. for i := 0 to YMAX step ∆
3. for j := 0 to XMAX step ∆
4. for k := 0 to NN
5. if distance from all the grid points to all the sensor nodes ≤ R
6. those grid points are inserted in the table
/*Here only those grid points are inserted in the table who have sensor nodes in their
transmission range, i.e., the grid points that does not has any neighbour, not need to include in
the table.*/
7. endif
8. endfor
9. endfor
10. endfor
11. num_unaffected := NN
12. while(num_unaffected > 0)
13. hNPcount := 0
14. for i := 0 to pCount
/*Checking for all the grid point entries in the table to find out the point that has
maximum number of sensor nodes in its transmission range*/
15. if nCount[i] > hNPcount
16. hNPcount := nCount [i]
17. HighestPointNode := i
18. endif
19. endfor
/*Here the position of first malicious node is found and also the number of sensor
nodes it covers.*/
20. num_unaffected := num_unaffected-hNPcount
/*Now the algorithm checks for other grid point entries within the upper and
12. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.2, March 2015
114
lower bound of the transmission range of the HighestPointNode to determine whether they
have those sensor nodes within their transmission range, R, as they have already been covered
and that is why, need to be deleted.*/
21. for j :=0 to pCount
22. if j :≠ HighestPointNode
23. Check for those grid points that resides between the transmission range of
24. HighestPoint Node, i.e., within ±R of HighestPointNode
25. for k := 0 to nCount [j]
26. if redundant node exist, delete all of them from the entries and update the table
27. endif
28. endfor
29. endif
30. endfor
31. nCount [HighestPointNode] := 1
32. Show all the malicious node position
33. Endwhile
3.4. Complexity Analysis
The efficiency of the algorithm is to be analysed by calculating the time and space complexity.
The space complexity of the proposed algorithm is proportionate to the number of grid points. For
estimating the time complexity, the authors assume the grid size G = D×D, number of grid points
NG = number of sensors = NS, cost for calculating distance = CD, cost of each
comparison = CG and transmission range of the malicious nodes = R, ∆ is the step size.
In the first iteration, distances of all sensor nodes from each grid point are calculated and then
find the point that covers the maximum number of nodes within its transmission range. Thus the
first iteration has two steps. In step 1.1, the time complexity of finding the distances of all sensor
nodes from a given grid point is NSCD and hence for all grid point it becomes NGNSCD. In step
1.2, number of comparison for finding the point that cover the maximum number of nodes is
NGNS and total comparison cost is NGNSCG. So, the total time-complexity for finding the grid
point covering the maximum sensor nodes is NGNSCD + NGNSCG, i.e., NGNS (CD+CG).
The second and consecutive iteration ensures that all the sensor nodes are jammed. The
computational complexity at this stage is calculated by dividing the algorithm in different steps as
shown below:
Step 2.1: Upon finding the point (p, q) that holds the maximum number of nodes in its
transmission range, the algorithm has to adjust which points need to be searched next. The
adjustment points are (p ± r, q ± r). So, the total points to be searched are (2r×2r-1) = (4r2
-1),
where, r = ceiling (R/∆).
Step 2.2: Then the sensor nodes that have already been covered by the chosen grid point are
deleted from the list and require NDNS comparisons, where ND is the number of sensor nodes
covered by the grid point and deleted from the list. So, the time complexity for the iteration is
(4r2
-1) NDNSCG.
13. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.2, March 2015
115
Step 2.3: For finding rest of the grid points, the algorithm repeats the process for NS-ND sensor
nodes and (NG-1) grid points.
If the sensor nodes are distributed randomly and equally spaced within the region, then the
number of grid points, p, chosen for intruders can be estimated as . So the time
complexity is estimated as,
Solving the equation, the complexity of the algorithm is found as,
Therefore, the total time complexity found for the algorithm is,
.
4. EXPERIMENTAL SETUP
This section illustrates the experimental arrangement to evaluate the performance of the grid
approximation technique. Different considering factors are added here for clear understanding the
network scenario as well as the different network parameters ranges.
4.1. Simulation Setup
The authors have developed a simulation software in Java environment using the discrete event
simulation toolkit, SimJava [23]. The simulations were carried out in an Intel Xeon processor
with 2GB RAM. The environment, number of sensors, step size for placing grids and other
simulation parameters were chosen carefully to ensure that the real environment is to be reflected
through simulation.
4.1.1. Environmental Setting
To set up the simulation environment, a 2D space having size of D×D is used and N sensor nodes
deployed in that space. The number of nodes, N is changed to several values for examining the
effects of the algorithm. The dimensional length, D also varied into different ranges for analyzing
the effects of the algorithm on different space size, i.e., from small to large network.
4.1.2. Changing Step-size
While considering the grid structure for any simulation, a major concern is to decide the distance
or the step size used for the gridlines. As the proposed grid approximation technique deploys the
malicious nodes in the grid points only, measuring step size, i.e., the distance between two nearest
grid points is a major feature for designing the algorithm. The goal of the scheme is not only
finding the better locations for placing the malicious nodes and ensuring the number to the
14. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.2, March 2015
116
minimum or the nearer, but also emphasizing on the processing steps and time complexity, which
is by any case not desirable to be amplified.
Figure 7. Maximum distance between two grid points
Let AB = BC = CD= AD = X be the step size used for a particular empirical analysis for placing
malicious nodes as shown in Figure 7. As the covering distance of a malicious node is R, the
distance between two nearest malicious nodes must be at most 2R to ensure the sensor nodes in
any location within the region will be under the coverage of the malicious node. So, for the
maximum step size, the diagonal distance between two consecutive grid points is BD = 2R. From
Pythagoras theorem [21], the relationship can be written as, , i.e.,
. The maximum step size, X, therefore can be obtain as R. The minimum
distance of the step-size can be any distance greater than or equal to zero and hence, 0 < X ≤ R.
At step-size X, there will be NG = grid points within the region .
.
4.1.3. Simulation Parameters
The different parameters used for simulation environment are the transmission range R, i.e., a
malicious node’s covering range of receiving and transmitting signals, number of sensor nodes N,
total networking area or dimension, D and step-size, Δ. To increase the accuracy of simulation
results, the outcome of the simulation has been obtained at least five times for the same snapshots
of the experimental environments and parameters and then the average is taken. Different values
of the changing parameters used in simulation are listed in Table 2.
Table 2. Different values of network parameters.
Parameters Values
Transmission
Range, R
5, 8, 10, 20, 40
Number of Nodes,
N
70,100,150,200,300,500
Dimension, D 100, 150, 200, 300
Step-size, Δ 1 to R
15. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.2, March 2015
117
4.2. Simulation Result and Comparative Analysis
Different simulation results and their comparative analysis are added in this section for
determining the proposed algorithm’s efficiency. By varying the network parameters, Figure 8, 9
and 10 show three line charts that estimate the number of intruders needed to destroy all the
deployed sensor nodes in the network.
Figure 8. Results by changing transmission range and dimension
Transmission range, R is the most important one among the three network parameters, when
sensor node covering is the prime issue. Figure 8 shows the arrangement of the first scenario by
keeping the number of nodes value fixed 200 and changes the value of transmission range, R (5, 8
and 10) and network topology, D(100×100, 200×200 and 300×300).
It can be observed from Figure 8 that as the transmission range increases, the number of intruders
needed to jam the network decreases accordingly. The reason is, with the increasing value of
transmission range, more nodes can be within the range of the grid points (i.e., by placing a
malicious at that point all the sensors that are within the transmission range of that point can be
jammed easily) and number of intruders is lessening accordingly. Here, the intruder required is
minimum for the highest valued transmission range, i.e., 10 in every charts and lowest for the low
valued transmission range, 5.
The second scenario adjusts the value of dimension and number of nodes, while transmission
range remains fixed, 40. For establishing sophisticated applications of wireless sensor networks,
another important parameter of a network is number of nodes, N. Figure 9 and 10 shows that, in
most of the cases, as number of nodes increase the number of intruders require increase
accordingly. This is because, with higher number of nodes, more malicious nodes are necessary to
embrace them meeting the corresponding criteria. On a contrary, an exception is marked in Figure
9. That is, while the algorithm moves from number of nodes 100 to 150, the number of intruders
needed is decreased. The reason is very obvious. The sensor nodes are deployed randomly over
the networking region. As a result, if the nodes are placed in close proximity to all other nodes, it
is possible to find out the most dense region of the sensors in a scenario that occurs in Figure 9.
Thus, this region can be covered by minimum number of nodes easily rather than sparsely
deployed sensors. In spite of such exceptional scenario, in most of the cases, as the number of
nodes increases, the number of intruders required also increases accordingly which easily can be
seen from Figure 9 and 10. By fixing the dimension or network topology, D, 300×300 the last
scenario of experimental analysis deals with changing the other two parameters. In a large area,
16. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.2, March 2015
118
where nodes are placed randomly it is normally happens that they are placed in a scattered
manner and that is why more intruders are required to cover all the nodes in the network. Figure 8
and 9 shows that in most of the cases, as the dimension increase the number of intruders needed
increase accordingly.
Figure 9. Results by changing dimension and number of nodes
The authors in this paper empirically determine the distance between the grid points, called step-
size to find out the minimum number of malicious nodes that can cover the entire space under the
acceptable time and space complexity. Decreasing the step-size gives better location for the
placement of malicious nodes but increases the complexity and hence a trade-off is required to be
minimized.
Figure 10. Results by changing number of nodes and transmission range
This paper heading towards this goal finds the largest distance between the grid points, √2R.
Figure 11 changes the value of number of nodes (100, 200 and 500) and fix the value of
transmission range, 20 and network topology, 200×200. Maximum distance between the grid
points in this case is √2×20, i.e., 28. Number of intruders needed for different step size value is
recorded and it can be observed from the figure that for different step sized values, whenever the
distance between the grid-points increase, the amount of intruders needed also increase. Actually
in case of lower step sized grid, the more grid points are placed in close proximity and checked
accordingly. As a result, the probability of the number of intruders required to be near minimum
for such a scenario increases. But, as the distance between the grid points increase, they reside in
17. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.2, March 2015
119
far space than previous placement. Therefore, the number of intruders required to embrace them
increase accordingly.
Figure 11. : Results for different step size value by changing number of nodes
while keeping dimension and transmission range fixed
Though escalating step size of the grid structure increases the desired number of intruders, the
authors in this paper analysis the processing steps of the proposed architecture here that would be
helpful for taking decisions on choosing the correct value of the step size. Figure 12 shows the
processing step values for different step size and also indicate how processing step values change
with the changing values of the step size. Considering a two-dimensional network structure of
100×100 and the transmission range, 20, for unit distanced step size, the processing step is 10000,
where as for the maximum distanced step size, 28, the processing step value drop off to13, which
is too minor in comparison to the previous value.
Figure 12. : Processing steps required for different step sized value
5. CONCLUSIONS AND FUTURE WORKS
Designing a secured network or making the network durable against its security breakdown is a
burning issue in developing an appropriate structure of a wireless network. This paper deals with
the security issue from an intruder’s point of view with the goal of finding those regions where by
placing malicious nodes maximum interruption is possible and finally searches for the minimum
or near minimum number of intruders or malicious nodes needed to completely jam or destroy all
the sensor nodes in the network. The authors in this paper describe these as a problem called “the
maximizing network interruption problem” and find the solution of it by deriving an efficient and
18. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.2, March 2015
120
cost-effective grid approximation algorithm. The proposed algorithm implies some bounds on
how difficult it is for an intruder to launch an operational attack on the communication or signal
passing of the network with a minimum power budget. Thus the security strength of a network is
head to head comparable with the proposed strategy. By developing an algorithm from the
intruders' perspective, the authors proposes an excellent means for security engineers to make
their network robust by making the security breaking cost higher so that the intruders do not get
any benefits through breaking the system security. The algorithm can further be enhanced by
redesigning it for distributed environment and for mobile sensor devices under the reduced
complexity and the reduced power consumption.
REFERENCES
[1] J Yick, B Mukherjee and D Ghosal, Wireless Sensor Network Survey, Computer Networks, 52, 2292-
2330 (2008).
[2] C –Y Chong and S P Kumar, Sensor Networks: Evolution, Opportunities and Challenges,
Proceedings of IEEE, 1247-1256 (2003).
[3] P Basu and J Redi, Effect of Overhearing Transmissions on Energy Efficiency in Dense Sensor
Networks, Proceedings of third International Symposium on Information Processing in Sensor
Networks, 196-204(2004).
[4] W Xu, K Ma, W Trappe and Y Zhang, Jamming Sensor Networks: Attack and Defense Strategies,
Network, IEEE, 20( 3), 41-47, May-June (2006).
[5] Z Cao, X Zhou, M Xu, Z Chen, J Hu and L Tang, Enhancing Base Station Security against DoS
Attacks in Wireless Sensor Networks, IEEE International Conference on Wireless communications,
networking and Mobile Computing (WiCOM), 22-24 Sept 2006.
[6] NP-Hard Problem, http://www.princeton.edu/~achaney/tmve/wiki100k/docs/NP-hard.html, Accessed
30 Mar 2014.
[7] M Cardei and J Wu, Coverage in Wireless Sensor Networks, Handbook of Sensor Networks, CRC
Press(2004).
[8] X Wang, G Xing,Y Zhang,C Lu,R Pless and C Gill, Integrated Coverage and Connectivity
Configuration in Wireless Sensor Networks,ACM Transactions on Sensor Networks, 36-72(2005).
[9] H Zhang, and J C Hou, Maintaining Sensing Coverage and Connectivity in Large Sensor
Networks,International Journal of Ad Hoc & Sensor Wireless Networks, 89-124(2005).
[10] G J Fan and S Jin, Coverage Problem in Wireless Sensor Network: A Survey, Journal of Networks,
319-329(2010).
[11] M Cardei, M Thai, Y Li and W Wu, Energy-efficient target coverage in wireless sensor networks,
24th Annual Joint Conference of the IEEE Computer and Communications Societies, 1976-1984, 13-
17 Mar 2005.
[12] Minimum Enclosing Circle Problem,
http://www.cs.mcgill.ca/~cs507/projects/1998/jacob/problem.htnl, Accessed 27 Jun 2011.
[13] M. Marengoni, A. B. Draper, A. Hanson, and R. Sitaraman, A System to Place Observers on
Polyhedral Terrain in Polynomial Time, Image and Vision Computing, 18, 773-780 (2000).
[14] K Jain, M Mahdian & A Saberi, A New Greedy Approach for Facility Location Problems,
Proceedings of the 34th annual ACM symposium on theory of computing, 731-740 (2002).
[15] A S Rostami, M R Tanhatalab, H M Berneti, Novel Algorithm of Energy-Aware in Asymmetric
Wireless Sensor Networks Routing for In-point Coverage, International Conference on Computational
Intelligence and Communication Networks(CICN), 308-313, 27-28 Nov 2010.
[16] A Bagrezai, S V A -D Makki and A S Rostami, A New Energy Consumption Algorithm with Active
Sensor Selection using GELS in Target Coverage WSN, International Journal of Computer Science
Issues (IJCSI), 10(1) (2013).
[17] G S Kasbekar, Y Bejerano and S Sarkar,Lifetime and Coverage Guarantees through Distributed
Coordinate-free Sensor Activation, IEEE/ACM transaction in Networking, 19(2), 470-483 (2011).
[18] Y Lin, Q Wu, X Cai, X Du and K Kwon, On Deployment of Multiple Base Stations for Energy-
Efficient Communication in Wireless Sensor Networks, International journal of distributed sensor
networks, 2010, (2010).
19. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.2, March 2015
121
[19] P Winter, An Algorithm for the Steiner Problem in the Euclidian Plane, Networks an International
Journal, 15 (3), 323-345 (1985).
[20] A E Rabbany, Introduction to GPS: The Global Positioning System, Library of Congress Cataloguing
in Publication Data (2002).
[21] Pythagoras Theorem, http://www.mathsisfun.com/pythagoras.html, 5 Jan 2011.
[22] P Zhang, R-L Wang, C-G Wu and K Okazaki, An Effective Algorithm for the Minimum Set Cover
Problem, International Conference on Machine learning and Cybernetics, 3032-3035, 13-16 Aug
2006.
[23] A Sobeih, W –P Chen, J C Hou, L –C Kung, N Li, H Lim, H –Y Tyan and H Zhang, J-Sim: A
Simulation Environment for Wireless Sensor Networks, Proceedings of the 38th annual simulation
symposium (ANSS’05), IEEE, 175-187, 4-6 Apr 2005.
Authors
Dr. Mohammad Mahfuzul Islam has completed his Bsc. and Msc. Engineering in
Computer Science and Engineering from Bangladesh University of Engineering and
Technology (BUET). Mahfuz has achieved his Phd degree from Monash University,
Australia. He is working in Buet in the Dept. of Computer Science and Engineering as a
Professor and Head of the department. His research area is wireless cellular network. He
has a number of conferences and journal in this field. Dr. Islam is the President of Bangladesh Computer
Society (BCS). He is also member of IEEE.
Fariha Tasmin Jaigirdar was born in Chittagong, Bangladesh at 9th May, 1983. Fariha
has completed Bsc. Engineering in Computer Science and Engineering from Chittagong
University of Engineering and Technology (CUET) in. Her Msc. Engineering in
Computer Science and Engineering has been completed from Bangladesh University of
Engineering and Technology (BUET) in 2011 with the submission of thesis entitled
“Maximizing Network Interruption: An Intruder’s Perspective”.At present she is working in Daffodil
International University as an Assistant Professor in the dept. of Computer Science and Engineering. Her
research interest includes wireless network and digital signal processing. She has attended three
conferences of ICCIT, Bangladesh, 2009 to 2011. She has more than five publications in different journals
also. She has two poster papers. Recently she is working on different applications of Wireless Sensor
Network.
Mohammad Manzurul Islam received his M.Sc. degree in Information Technology with
major in Internetworking from University of Technology Sydney (UTS) in 2013. He
obtained his B.Sc. degree in Computer Science and Information Technology from Islamic
University of Technology (IUT) in 2005. He started his career as a Lecturer of Computer
Science and Engineering department in Stamford University Bangladesh. At the same time, he was the
Legal Main Contact, Curriculum Lead and Instructor of Cisco Local Academy. Currently he is working as
an Assistant Professor of Computer Science and Engineering department in Stamford University
Bangladesh. His research interests include networking, network security and wireless sensor network.