A Node Confident based IDS to Avoid Packet Drop Attacks for Wireless Sensor Network

Full Text (PDF, 532KB), PP.41-56

Views: 0 Downloads: 0

Author(s)

Kareti Madhava Rao 1,* S Ramakrishna 2

1. Department of Computer Science, Sri Venkateswara University, Tirupati-517501, Andhra Pradesh, India

2. Department of Computer Science, Sri Venkateswara University, Tirupati-57501, Andhra Pradesh, India

* Corresponding author.

DOI: https://doi.org/10.5815/ijcnis.2021.06.04

Received: 2 Nov. 2020 / Revised: 17 Jan. 2021 / Accepted: 25 Feb. 2021 / Published: 8 Dec. 2021

Index Terms

Energy Efficient, Wireless Sensor Networks, Packet Drop Nodes, Bayesian Filter, Malicious, Shortest Path, Confident Score, CFS-BFNMA

Abstract

Because of the great characteristics of Wireless Sensor Networks like easier to use and less cost of deployment, they have attracted the researchers to conduct the investigations and received the importance in various civilian and military applications. A number of security attacks have been involved due to the lack of centralized management in these networks. The packet drop attack is one of the attacks and it has a compromised node which drops the malicious packets. In WSNs, different techniques have been implemented to identify the packet drop attack but none of them provides the feasibility to stop or isolate their occurrence in the future. In recent times, the reputation systems provide the way to identify the trustworthy nodes for data forwarding. But the lack of data classification in the reputation systems affects the false positive rate. In this paper, a novel CONFIDENT SCORE based BAYESIAN FILTER NODE MONITORING AGENT (CFS-BFNMA) mechanism is introduced to identify & avoid the packet drop nodes and also to monitor the node behaviours to improve the false positive rate. The final CFS of a node is estimated based on the node past and threshold CFS values. The node monitoring agents (BFNMA) constantly monitors the forwarding behaviour of the nodes and assigns CFS based on the successful forwards. The NMA saves the copy of the data packets in their buffers before forwarding to the neighbour nodes to compare them. Also, this BFNMA analyses the traffic pattern of every round of transmission to improve the false positive rate. By comparing with other conventional security algorithms, the proposed mechanism has been improved the network security & false positive rate drastically based on the simulation results.

Cite This Paper

Kareti Madhava Rao, S Ramakrishna, "A Node Confident based IDS to Avoid Packet Drop Attacks for Wireless Sensor Network", International Journal of Computer Network and Information Security(IJCNIS), Vol.13, No.6, pp.41-56, 2021. DOI: 10.5815/ijcnis.2021.06.04

Reference

[1] Rajeswari, Kasilingam, and Subbu Neduncheliyan. "Genetic algorithm-based fault tolerant clustering in wireless sensor network." Iet Communications 11, no. 12 (2017): 1927-1932.

[2] Jasvir Kaur, Sukhchandan Randhawa, Sushma Jain," A novel Energy Efficient Cluster Head Selection Method for Wireless Sensor Networks", International Journal of Wireless and Microwave Technologies, Vol.8, No.2, pp. 37-51, 2018.

[3] Tomić, Ivana, and Julie A. McCann. "A survey of potential security issues in existing wireless sensor network protocols." IEEE Internet of Things Journal 4, no. 6 (2017): 1910-1923.

[4] Zhao, Nan, F. Richard Yu, Ming Li, Qiao Yan, and Victor CM Leung. "Physical layer security issues in interference-alignment-based wireless networks." IEEE Communications Magazine 54, no. 8 (2016): 162-168.

[5] Ding, X., Sun, X. J., Huang, C., & Wu, X. B. (2016). Cluster-level based link redundancy with network coding in duty cycled relay wireless sensor networks. Computer Networks, 99(C), 15–36.

[6] Akram, Vahid Khalilpour, and Orhan Dagdeviren. "Deck: A distributed, asynchronous and exact k-connectivity detection algorithm for wireless sensor networks." Computer Communications 116 (2018): 9-20.

[7] Mahaboob Sharief Shaik, Fahad Mira, " A Comprehensive Mechanism of MANET Network Layer Based Security Attack Prevention ", International Journal of Wireless and Microwave Technologies, Vol.10, No.1, pp. 38-47, 2020.

[8] Ch Rambabu, V.V.K.D.V.Prasad, K.Satya Prasad, " Multipath Cluster-based Hybrid MAC Protocol for Wireless Sensor Networks ", International Journal of Wireless and Microwave Technologies, Vol.10, No.1, pp. 1-16, 2020.

[9] Amin Rezaeipanah, Hamed Nazari, MohammadJavad Abdollahi, " Reducing Energy Consumption in Wireless Sensor Networks Using a Routing Protocol Based on Multi-level Clustering and Genetic Algorithm ", International Journal of Wireless and Microwave Technologies, Vol.10, No.3, pp. 1-16, 2020.

[10] Kavitha, M., B. Ramakrishnan, and Resul Das. "A novel routing scheme to avoid link error and packet dropping in wireless sensor networks." International Journal of Computer Networks and Applications (IJCNA) 3, no. 4 (2016): 86-94.

[11] Rmayti, Mohammad, Rida Khatoun, Youcef Begriche, Lyes Khoukhi, and Dominique Gaiti. "A stochastic approach for packet dropping attacks detection in mobile Ad hoc networks." Computer Networks 121 (2017): 53-64.

[12] Vanitha, K., and AMJ Zubair Rahaman. "Preventing malicious packet dropping nodes in MANET using IFHM based SAODV routing protocol." Cluster Computing 22, no. 6 (2019): 13453-13461.

[13] Gurung, Shashi, and Siddhartha Chauhan. "A novel approach for mitigating route request flooding attack in MANET." Wireless Networks 24, no. 8 (2018): 2899-2914.

[14] Jamali, Mohammad Ali Jabraeil. "A multipath QoS multicast routing protocol based on link stability and route reliability in mobile ad-hoc networks." Journal of Ambient Intelligence and Humanized Computing 10, no. 1 (2019): 107-123.

[15] Karthick, S. (2018). TDP: A novel secure and energy aware routing protocol for wireless sensor networks. International Journal of Intelligent Engineering and Systems, 11(2), 76–84.

[16] Selvi, M., Thangaramya, K., Ganapathy, S., Kulothungan, K., Nehemiah, H. K., & Kannan, A. (2019). An energy aware trust based secure routing algorithm for effective communication in wireless sensor networks. Wireless Personal Communications, 105(4), 1475–1490.

[17] Udhayavani, M., & Chandrasekaran, M. (2018). Design of TAREEN (trust aware routing with energy efficient network) and enactment of TARF: A trust-aware routing framework for wireless sensor networks. Cluster Computing, 22, 11919–11927.

[18] Asha, G., & Santhosh, R. (2019). Soft computing and trust-based self-organized hierarchical energy balance routing protocol (TSHEB) in wireless sensor networks. Soft Computing, 23(8), 2537–2543.

[19] Gilbert, E. P. K., Kaliaperumal, B., Rajsingh, E. B., & Lydia, M. (2018). Trust based data prediction, aggregation and reconstruction using compressed sensing for clustered wireless sensor networks. Computers & Electrical Engineering, 72, 894–909.

[20] Desai, S. S., & Nene, M. J. (2019). Node-level trust evaluation in wireless sensor networks. IEEE Transactions on Information Forensics and Security, 14(8), 2139–2152.