7 research outputs found

    CMNTS: Catching malicious nodes with trust support in wireless sensor networks

    Get PDF
    Security in wireless sensor networks is critical due to its way of open communication. In this paper we have considered suite of attacks - packet modification, packet dropping, sybil attack, packet misrouting, and bad mouthing attack, and provided a solution to detect attacks. In literature, many schemes have been proposed to mitigate such attacks but very few detect the malicious nodes effectively and also no single solution detects all attacks. In the proposed approach, each node chooses the parent node for forwarding the packet towards sink. Each node adds its identity and trust on parent as a routing path marker and encrypts only the bytes added by node in packet before forwarding to parent. Sink can identify the malicious node based on trust value and node identities marked in packet. Child node observes the parent and decides the trust on parent based on successful and unsuccessful transactions. Data transmission is divided into multiple rounds of equal time duration. Each node chooses the parent node at the beginning of a round based on its own observation on parent. Simulated the algorithm in NS-3 and performance analysis is discussed by comparing the results with other two recently proposed approaches. With the combination of trust factor and fixed path routing to detect malicious activity, simulation results show that proposed method detect malicious nodes efficiently and early, and also with low percentage of false detection

    Configurable Secured Adaptive Routing Protocol for Mobile Wireless Sensor Networks

    Get PDF
    This paper aims at designing, building, and simulating a secured routing protocol to defend against packet dropping attacks in mobile WSNs (MWSNs). This research addresses the gap in the literature by proposing Configurable Secured Adaptive Routing Protocol (CSARP). CSARP has four levels of protection to allow suitability for different types of network applications. The protocol allows the network admin to configure the required protection level and the ratio of cluster heads to all nodes. The protocol has an adaptive feature, which allows for better protection and preventing the spread of the threats in the network. The conducted CSARP simulations with different conditions showed the ability of CSARP to identify all malicious nodes and remove them from the network. CSARP provided more than 99.97% packets delivery rate with 0% data packet loss in the existence of 3 malicious nodes in comparison with 3.17% data packet loss without using CSARP. When compared with LEACH, CSARP showed an improvement in extending the lifetime of the network by up to 39.5%. The proposed protocol has proven to be better than the available security solutions in terms of configurability, adaptability, optimization for MWSNs, energy consumption optimization, and the suitability for different MWSNs applications and conditions

    Secure Data Collection Using Randomized Multipath Routing

    Get PDF
    Wireless Sensor Networks (WSNs) are widely used in various real time applications such as surveillance, environment monitoring, studying wildlife habitat and so on. As the nodes in the network are resource constrained, they are vulnerable to various attacks. This is the reason there is need for secure data collection in such networks. Many solutions came into existence to provide secure communications in WSN. However, the solutions were based on different techniques. Minimization of packet failure rate is one of the objectives of many researchers in this area. The potential attacks on the network can jeopardise its purpose. Recently Alghamdi et al. proposed a solution using multipath routing in which the effect of adversaries is reduced besides ensuring secure data transmission in the presence of malicious nodes in the network. Our work is similar to this with certain improvements in terms of energy consumption and also packet delivery failure ratio. We implemented a WSN with simulations and our approach used a controller in the network which, in consultation with base station, can play a vital role in prevention of attacks. Since the solution is based on randomized multipath routing, it is able to withstand potential attacks and ensure that the failure of packet delivery is minimized and the overall network performance is improved. The simulation results reveal that the proposed approach has better performance in terms of performance level of protocol, network throughput, delay analysis, percentage of packet loss, and energy consumption. DOI: 10.17762/ijritcc2321-8169.150713

    The Internet of Everything

    Get PDF
    In the era before IoT, the world wide web, internet, web 2.0 and social media made people’s lives comfortable by providing web services and enabling access personal data irrespective of their location. Further, to save time and improve efficiency, there is a need for machine to machine communication, automation, smart computing and ubiquitous access to personal devices. This need gave birth to the phenomenon of Internet of Things (IoT) and further to the concept of Internet of Everything (IoE)
    corecore