Malicious Node Detection inWireless Sensor Networks
#1

Abstract
This work provides a solution to identify malicious nodesin wireless sensor networks through detection of maliciousmessage transmissions in a network. A message transmissionis considered suspicious if its signal strength is incompatiblewith its originator’s geographical position. We provideprotocols for detecting suspicious transmissions – andthe consequent identification of malicious nodes – and fordisseminating this information in the network. We evaluatethe detection rate and the efficiency of our solution along anumber of parameters.
1. Introduction
A wireless sensor network (WSN) consists of a set ofcompact and automated devices called sensing nodes. Asensing node is a computational device that has memory,battery, processor, transceiver, and a sensing device. TheBerkeley MICA Mote [4, 1], SmartDust [7, 8, 12], andCotsDust [5] are examples of such nodes. These nodes aredistributed across an area and communicate among themselves,forming an ad hoc network. Sensor networks containspecial nodes that process and store the information collectedby the network; they are called sink nodes. Communicationbetween two nodes is performed in multiple hopsif they are not within each other’s transmission range.Wireless sensor networks can collect data from the environmentwhere they are embedded. The data are often firstprocessed by the sensor nodes and then sent over non-securechannels to the sink node for further processing. Some ofthe applications envisioned for sensor networks are environmentalmonitoring, infrastructure management, publicsafety, medical, home and office security, transportation,and battlefield surveillance. Given their criticality, these applicationsare likely to be attacked.There are a number of ways one can attack a WSN. Forexample, one can spoof the various fields of a messagewhile it is in transit, in such a way that what the recipientreceives is an altered copy of the original message. Onecan also tamper with a node (its hardware and/or software),so as to alter its behavior. Different types of attacks willrequire different types of countermeasures.In this work, we focus on two types of attacks: HELLOflood attacks [9] and wormhole attacks [6]. HELLO messagesare used in many protocols by nodes that want toannounce their presence and proximity to their neighbors.Most of these protocols rely on the assumption that a nodeA is within the radio transmission range of another node Bif A is able to receive messages from B. In a HELLO floodattack, a malicious node may try to transmit a message withan abnormally high power so as to make all nodes believethat it is their neighbor.Wormhole attacks can be described in the followingsteps. An adversary A tunnels a message received to a secondadversary B in a distant part of the network using a lowlatencyout-of-band channel. B then retransmits the messageexactly as received to the nodes in its neighborhood.An immediate result of a wormhole attack is that nodes thathear the transmission from B are tricked into thinking thatthey are neighbors of whichever node originated the message(this node is most likely located in a distant part of thenetwork).Both the HELLO flood attack and the wormhole attackare typically carried out to compromise route establishmentin a network. For example, a malicious node that broadcastsa routing beacon with an extra high power could lead a largenumber of nodes to attempt to use it as their next hop in theirroute to the sink. But those sufficiently far away would besimply sending their messages into the oblivion. A similarscenario results from a wormhole attack. A malicious nodecould convince nodes that are normally multiple hops fromthe sink node that they are just one hop away.


Download full report
http://doi.ieeecomputersociety10.1109/IP...04.1302934
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: movement assisted connectivity restoration inwireless sensor and actor networks docx, malicious node on opnet, malicious node identification ns2 code, malicious node in ns2 source code, java code for detecting malicious node, oblivion, eliminating malicious node using trust value evaluation,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  AUTOMATIC STREET LIGHT CONTROL WITH SENSOR TECHNOLOGY seminar class 2 11,761 22-05-2017, 11:07 AM
Last Post: yasminoth93
  ULTRASONIC TECHNIQUES FOR HIDDEN CORROSION DETECTION IN AIRCRAFT WING SKIN smart paper boy 2 3,102 13-04-2017, 03:53 PM
Last Post: jaseela123d
  WORMHOLE ATTACK DETECTION IN WIRELESS ADHOC SENSOR NETWORKS seminar class 7 19,093 17-08-2016, 09:23 AM
Last Post: jaseela123d
  Brain Tumour Detection Using Water shedding and basic Image Processing Techniques smart paper boy 2 3,077 01-08-2015, 02:53 PM
Last Post: seminar report asees
  Measuring the Performance of IEEE 802.11p Using ns-2 Simulator for Vehicular Networks smart paper boy 3 2,575 07-10-2014, 06:34 PM
Last Post: seminar report asees
  MOBILE DETECTION AND JAMMING computer science crazy 14 12,417 13-11-2013, 05:35 AM
Last Post: Guest
  AUTOMATIC ENERGY SAVING SYSTEM WITH HUMAN HEAT DETECTION smart paper boy 11 7,134 27-08-2013, 10:41 AM
Last Post: computer topic
  AUTOMATED TOLL COLLECTION AND ALCHCOL DETECTION USING PSOC full report project topics 6 7,357 08-04-2013, 03:28 PM
Last Post: computer topic
  AUTOMATIC VEHICLE ACCIDENT DETECTION AND MESSAGING SYSTEM USING GSM AND GPS MODEM smart paper boy 14 10,776 02-01-2013, 06:16 PM
Last Post: naidu sai
  PON Topologies for Dynamic Optical Access Networks smart paper boy 1 1,802 12-12-2012, 12:40 PM
Last Post: seminar details

Forum Jump: