• Title/Summary/Keyword: Selfish Node

Search Result 17, Processing Time 0.025 seconds

A Statistical Detection Method to Detect Abnormal Cluster Head Election Attacks in Clustered Wireless Sensor Networks (클러스터 기반 WSN에서 비정상적인 클러스터 헤드 선출 공격에 대한 통계적 탐지 기법)

  • Kim, Sumin;Cho, Youngho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.6
    • /
    • pp.1165-1170
    • /
    • 2022
  • In WSNs, a clustering algorithm groups sensor nodes on a unit called cluster and periodically selects a cluster head (CH) that acts as a communication relay on behalf of nodes in each cluster for the purpose of energy conservation and relay efficiency. Meanwhile, attack techniques also have emerged to intervene in the CH election process through compromised nodes (inside attackers) and have a fatal impact on network operation. However, existing countermeasures such as encryption key-based methods against outside attackers have a limitation to defend against such inside attackers. Therefore, we propose a statistical detection method that detects abnormal CH election behaviors occurs in a WSN cluster. We design two attack methods (Selfish and Greedy attacks) and our proposed defense method in WSNs with two clustering algorithms and conduct experiments to validate our proposed defense method works well against those attacks.

An Analysis on the Scheduling Algorithm of Job Allocation Based on the Trust Model in Wireless Distributed Network (분산 무선 네트워크 환경에서 트러스트 모델 기반의 작업 할당 스케줄링 알고리즘에 관한 연구)

  • Kim, Tae Kyung;Seo, Hee Seok
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.4 no.1
    • /
    • pp.33-40
    • /
    • 2008
  • This paper presents a new scheduling scheme in wireless distributed network. To overcome the limited information about unfamiliar mobile nodes and to reduce the required system performance, we propose a scheduling algorithm of job allocation based on the trust model. The suggested scheduler evaluate an unfamiliar mobile node's trust and make reference to the trust value of neighboring scheduler. This scheduling algorithm can avoid malicious or selfish mobile nodes by assigning low trust values. We also present a trust evaluation metric and show the efficiency of suggested scheduling algorithm by performance evaluation.

Replica Allocation with Selfish Node over Mobile Ad Hoc Networks (모바일 애드혹 네트워크 환경에서 이기적인 노드를 고려한 데이터 복제본 할당 기법)

  • Shim, Kyu-Sun;Jung, Daoun;Ryu, Byung-Gul;Lee, SangKeun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2010.11a
    • /
    • pp.69-71
    • /
    • 2010
  • 모바일 네트워크에서는 모바일 노드의 이동성으로 인하여 네트워크가 빈번하게 분리되며, 이로 인해 데이터 접근성이 낮아지는 문제가 발생한다. 기존 연구에서는 이러한 문제 해결하기 위해 다양한 복제 본 할당 기법이 연구되었다. 그러나 지금까지 연구된 복제본 할당기법들은 모바일 애드혹 네트워크 환경의 제한된 자원으로 인한 노드들의 이기적인 행동에 대해 고려하지 않았다. 본 논문은 모바일 애드혹 네트워크 상의 이기적인 노드들을 검출하기 위해 이진결정 기법과 레벨화 기법을 제안하고, 이를 통해, 이기적인 노드들의 영향을 최소화하는 기법을 제안하고자 한다. 실험 결과는 제안하는 기법이 기존 기법에 비해 모바일 애드혹 네트워크 내에 이기적인 노드들이 있는 환경에서 데이터 접근성이 향상됨을 보여준다.

Survivability Analysis of MANET Routing Protocols under DOS Attacks

  • Abbas, Sohail;Haqdad, Muhammad;Khan, Muhammad Zahid;Rehman, Haseeb Ur;Khan, Ajab;Khan, Atta ur Rehman
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.9
    • /
    • pp.3639-3662
    • /
    • 2020
  • The network capability to accomplish its functions in a timely fashion under failures and attacks is known as survivability. Ad hoc routing protocols have been studied and extended to various domains, such as Intelligent Transport Systems (ITSs), Unmanned Aerial Vehicles (UAVs), underwater acoustic networks, and Internet of Things (IoT) focusing on different aspects, such as security, QoS, energy. The existing solutions proposed in this domain incur substantial overhead and eventually become burden on the network, especially when there are fewer attacks or no attack at all. There is a need that the effectiveness of these routing protocols be analyzed in the presence of Denial of Service (DoS) attacks without any intrusion detection or prevention system. This will enable us to establish and identify the inherently stable routing protocols that are capable to survive longer in the presence of these attacks. This work presents a DoS attack case study to perform theoretical analysis of survivability on node and network level in the presence of DoS attacks. We evaluate the performance of reactive and proactive routing protocols and analyse their survivability. For experimentation, we use NS-2 simulator without detection or prevention capabilities. Results show that proactive protocols perform better in terms of throughput, overhead and packet drop.

Energy Harvesting Technique for Efficient Wireless Cognitive Sensor Networks Based on SWIPT Game Theory

  • Mukhlif, Fadhil;Noordin, Kamarul Ariffin Bin;Abdulghafoor, Omar B.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.6
    • /
    • pp.2709-2734
    • /
    • 2020
  • The growing demand to make wireless data services 5G compatible has necessitated the development of an energy-efficient approach for an effective new wireless environment. In this paper, we first propose a cognitive sensor node (CSN) based game theory for deriving energy via a primary user-transmitted radio frequency signal. Cognitive users' time was segmented into three phases based on a time switching protocol: energy harvest, spectrum sensing and data transmission. The proposed model chooses the optimal energy-harvesting phase as the effected factor. We further propose a distributed energy-harvesting model as a utility function via pricing techniques. The model is a non-cooperative game where players can increase their net benefit in a selfish manner. Here, the price is described as a function pertaining to transmit power, which proves that the proposed energy harvest game includes Nash Equilibrium and is also unique. The best response algorithm is used to achieve the green connection between players. As a result, the results obtained from the proposed model and algorithm show the advantages as well as the effectiveness of the proposed study. Moreover, energy consumption was reduced significantly (12%) compared to the benchmark algorithm because the proposed algorithm succeeded in delivering energy in micro which is much better compared to previous studies. Considering the reduction and improvement in power consumption, we could say the proposed model is suitable for the next wireless environment represented in 5G.

An Adaptive Incentive/Topology Control Scheme for Stimulating Real time Data Forwarding in VANET Environment (VANET 환경에서 실시간 데이터 포워딩 진작을 위한 적응형 인센티브/토폴로지 제어 기법)

  • Bae, Seo-Yun;Kim, Nak-Myeong
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.48 no.7
    • /
    • pp.1-8
    • /
    • 2011
  • Vehicular Ad-hoc Network (VANET) is a special form of Mobile Ad-hoc Network designed to provide communications among nearby vehicles without communications infrastructure. Some characteristics in VANET environment such as high mobility, dynamic topology and selfishness of nodes can cause degradation of network quality. In this paper, we propose an adaptive incentive/topology control scheme to improve network quality in VANET by stimulating real time data forwarding and reporting changes of network topology. In the proposed scheme, an incentive suggested by the source node is updated in real time simultaneously with data transmission to stimulate real time data forwarding. In addition, when the order of the nodes in the path is changed, nodes which report the changes of network topology will get an additional incentive. By computer simulation, it is shown that the proposed incentive/topology control scheme outperforms the conventional schemes with respect to data delivery time and data delivery ratio.

A New Incentive Based Bandwidth Allocation Scheme For Cooperative Non-Orthogonal Multiple Access (협력 비직교 다중 접속 네트워크에서 새로운 인센티브 기반 주파수 할당 기법)

  • Kim, Jong Won;Kim, Sung Wook
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.10 no.6
    • /
    • pp.173-180
    • /
    • 2021
  • Non Orthogonal Multiple Access (NOMA) is a technology to guarantee the explosively increased Quality of Service(QoS) of users in 5G networks. NOMA can remove the frequent orthogonality in Orthogonal Multiple Access (OMA) while allocating the power differentially to classify user signals. NOMA can guarantee higher communication speed than OMA. However, the NOMA has one disadvantage; it consumes a more energy power when the distance increases. To solve this problem, relay nodes are employed to implement the cooperative NOMA control idea. In a cooperative NOMA network, relay node participations for cooperative communications are essential. In this paper, a new bandwidth allocation scheme is proposed for cooperative NOMA platform. By employing the idea of Vickrey-Clarke-Groves (VCG) mechanism, the proposed scheme can effectively prevent selfishly actions of relay nodes in the cooperative NOMA network. Especially, base stations can pay incentives to relay nodes as much as the contributes of relay nodes. Therefore, the proposed scheme can control the selfish behavior of relay nodes to improve the overall system performance.