Browse > Article
http://dx.doi.org/10.3837/tiis.2019.11.005

Behavior based Routing Misbehavior Detection in Wireless Sensor Networks  

Terence, Sebastian (Department of Computer Science and Engineering, Karunya Institute of Technology and Sciences)
Purushothaman, Geethanjali (School of Electrical Engineering, VIT)
Publication Information
KSII Transactions on Internet and Information Systems (TIIS) / v.13, no.11, 2019 , pp. 5354-5369 More about this Journal
Abstract
Sensor networks are deployed in unheeded environment to monitor the situation. In view of the unheeded environment and by the nature of their communication channel sensor nodes are vulnerable to various attacks most commonly malicious packet dropping attacks namely blackhole, grayhole attack and sinkhole attack. In each of these attacks, the attackers capture the sensor nodes to inject fake details, to deceive other sensor nodes and to interrupt the network traffic by packet dropping. In all such attacks, the compromised node advertises itself with fake routing facts to draw its neighbor traffic and to plunge the data packets. False routing advertisement play vital role in deceiving genuine node in network. In this paper, behavior based routing misbehavior detection (BRMD) is designed in wireless sensor networks to detect false advertiser node in the network. Herein the sensor nodes are monitored by its neighbor. The node which attracts more neighbor traffic by fake routing advertisement and involves the malicious activities such as packet dropping, selective packet dropping and tampering data are detected by its various behaviors and isolated from the network. To estimate the effectiveness of the proposed technique, Network Simulator 2.34 is used. In addition packet delivery ratio, throughput and end-to-end delay of BRMD are compared with other existing routing protocols and as a consequence it is shown that BRMD performs better. The outcome also demonstrates that BRMD yields lesser false positive (less than 6%) and false negative (less than 4%) encountered in various attack detection.
Keywords
False route advertisement; Wireless Sensor Network; Blackhole attack; Grayhole attack; Sinkhole attack;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 Minho Jo, Longzhe Han, Dohoon Kim, and Hoh Peter In, "Selfish attacks and detection in cognitive radio ad-hoc networks," IEEE network, vol. 27, no. 3, pp. 46-50, May/June 2013.   DOI
2 Krontiris, Ioannis, Tassos Dimitriou, Thanassis Giannetsos, and Marios Mpasoukos, "Intrusion detection of sinkhole attacks in wireless sensor networks," in Proc. of the 3rd International Workshop on Algorithmic Aspects of Wireless Sensor Networks (AlgoSensors 2007), pp. 150-161, July 2007.
3 Sundararajan, Ranjeeth Kumar, and Umamakeswari Arumugam, "Intrusion detection algorithm for mitigating sinkhole attack on LEACH protocol in wireless sensor network," Journal of Sensors, vol. 2015, pp. 1-12, Feb.2015.
4 Wazid, Mohammad, and Ashok Kumar Das, "A Secure Group-Based Blackhole Node Detection Scheme for Hierarchical Wireless Sensor Network," Wireless Personal Communications, vol. 94, issue 3, pp. 1165-1191, Sep. 2017.   DOI
5 Dong Xie, HaiPeng Peng, Lixiang Li, and Yixian Yang, "Efficient post-quantum secure network coding signatures in the standard model," KSII Transactions on Internet and Information Systems (TIIS) vol. 10, no. 5, pp. 2427-2445, May 2016.   DOI
6 Dong Xie, Haipeng Peng, Lixiang Li, and Yixian Yang, "An efficient privacy-preserving scheme for secure network coding based on compressed sensing," AEU-International Journal of Electronics and Communications, vol. 79, pp. 33-42, Sep. 2017.   DOI
7 Anwar, Raja Waseem, Majid Bakhtiari, Anazida Zainal, and Kashif Naseer Qureshi, "Wireless sensor network performance analysis and effect of blackhole and sinkhole attacks," Jurnal Teknologi (Science & Engineering), vol. 78, no., 4-3, pp. 75-81, 2016.
8 Dhaka, Arvind, Amita Nandal, and Raghuveer S. Dhaka, "Gray and Blackhole Attack Identification using Control Packets in MANETs," Procedia Computer Science 54 pp. 83-91, August, 2015.   DOI
9 Perkins, Charles, Elizabeth Belding-Royer, and Samir Das, "Ad hoc on-demand distance vector (AODV) routing," No.RFC 3561, 2003.
10 Shafiei, Hosein, Ahmad Khonsari, H. Derakhshi, and P. Mousavi, "Detection and mitigation of sinkhole attacks in wireless sensor networks" Journal of Computer and System Sciences, vol. 80, no. 3, pp. 644-653, 2014.   DOI
11 Ju Ren, Yaoxue Zhang, Kuan Zhang, Xuemin Shen., "Adaptive and Channel-Aware Detection of Selective Forwarding Attacks in Wireless Sensor networks," IEEE Transactions on Wireless Communications, vol. 15, no. 5, pp. 3718-3731, May 2016.   DOI
12 Umar, Idris Abubakar, Zurina Mohd Hanapi, Aduwati Sali, and Zuriati A. Zulkarnain, "FuGeF: a resource bound secure forwarding protocol for wireless sensor networks," Sensors, no. 16(6), pp. 943, 2016.   DOI
13 Umar, Idris Abubakar, Zurina Mohd Hanapi, Aduwati Sali, and Zuriati A. Zulkarnain, "Trufix: A configurable trust-based cross-layer protocol for wireless sensor networks," IEEE Access, vol. 5, pp. 2550-2562, 2017.   DOI
14 Marti, Sergio, Thomas J. Giuli, Kevin Lai, and Mary Baker, "Mitigating routing misbehavior in mobile ad hoc networks" in Proc. of the 6th annual international conference on Mobile computing and networking, pp. 255-265. ACM, 2000.
15 Balakrishnan, Kashyap, Jing Deng, and V. K. Varshne., "TWOACK: Preventing Selfishness in Mobile Ad Hoc Networks," in Proc. of Wireless communications and networking conference, pp. 2137-2142, April, 2005.
16 Karuppiah, A. Babu, and S. Rajaram, "False Misbehavior Elimination of Packet Dropping Attackers during Military Surveillance using WSN," Advances in Military Technology, vol. 9, no.1, pp. 19-30 June 2014.
17 Kumar, Vimal, and Rakesh Kumar, "An Adaptive Approach for Detection of Blackhole Attack in Mobile Ad hoc Network" Procedia Computer Science, vol. 48, pp.472-479, 2015.   DOI
18 Altisen, Karine, Stephane Devismes, Raphael Jamet, and Pascal Lafourcade, "SR3: secure resilient reputation-based routing," Wireless Networks, vol. 23, no. 7, pp. 2111-2133, 2017.   DOI
19 Liu, Kejun, Jing Deng, Pramod K. Varshney, and Kashyap Balakrishnan, "An acknowledgment-based approach for the detection of routing misbehaviour in MANETs," IEEE transactions on mobile computing, vol. 6, no. 5, pp. 536-550, May, 2007.   DOI
20 Shakshuki, Elhadi M., Nan Kang, and Tarek R. Sheltami, "EAACK - A secure Intrusion Detection System for MANETs," IEEE Transactions on Industrial Electronics, Vol. 60, Issue 3, pp. 1089-1098 March 2013.   DOI
21 Madria, Sanjay, and Jian Yin, "SeRWA: A secure routing protocol against wormhole attacks in sensor networks," Ad Hoc Networks, vol. 7, no. 6, pp. 1051-1063, 2009.   DOI
22 Bankovic, Z., Juan Carlos Vallejo, David Fraga, and Jose Manuel Moya, "Detecting bad-mouthing attacks on reputation systems using self-organizing maps," Computational Intelligence in Security for Information Systems, pp. 9-16. Springer, Berlin, Heidelberg, 2011.
23 http://www.mannasim.dcc.ufmg.br/index.htm
24 Chang, Jian-Ming, Po-Chun Tsou, Isaac Woungang, Han-Chieh Chao, and Chin-Feng Lai, "Defending Against Collaborative Attacks by Malicious Nodes in MANETs: A Cooperative Bait Detection Approach" IEEE Systems Journal, vol. 9, no. 1, pp. 65-75, 2015.   DOI
25 NS2 web site, http://www.isi.edu/nsnam/ns/