Open Access Open Access  Restricted Access Subscription or Fee Access

Intrusion Forbearance Routing for a Wireless Sensor Network using Dismissal Supervision of Multipath Routing (IFROST)

A. Ancey Sneha, A. Antony Prakash

Abstract


In the multipath routing, there occurs a number of intermediate nodes between source and destination. Each node will maintain information about another node and during any need of information the voting algorithm is used and each node vote about the other node. So during voting there may occur a chance of misjudging of good node as bad node and bad node as good node. This is bad mouthing attack which may lead to loss of packet transmission in wireless network. An algorithm called weighted voting is used to overcome this problem. Trust metrics is calculated based on direct trust and indirect trust. Using the trust metrics value the node is selected and the main aim is to identify the intruder and to provide solution for bad mouthing attack.


Keywords


Network Security, Wireless Sensor Network, Bad Mouthing Attack, Reliability, Weighted Voting.

Full Text:

PDF

References


Hamid Al-Hamadi and Ing-Ray Chen, “Redundancy Management of Multipath Routing for Intrusion Tolerance in Heterogeneous Wireless Sensor Networks” IEEE Conf. Wireless Sensor Networks, vol 10, No 2, june 2013.

S. Bo, L. Osborne, X. Yang, and S. Guizani, “Intrusion detection techniques in mobile ad hoc and wireless sensor networks,” IEEE Wireless Commun. Mag., vol. 14, no. 5, pp. 560–563, 2007.

B. Deb, S. Bhatnagar, and B. Nath, “ReInForM: reliable information forwarding using multiple paths in sensor networks,” in Proc. 2003 IEEE Conf. Local Computer Network, pp. 406–415. networks,” in Proc. 2007 IEEE Asia-Pacific Service Computer. Conf., pp.49–55.

Felemban, L. Chang-Gun, and E. Ekici, “MMSPEED: multipath multi-SPEED protocol for QoS guarantee of reliability and timeliness in wireless sensor networks,” IEEE Trans. Mobile Computer., vol. 5, no. 6, pp. 738–754, 2006.

Y. X. Jiang and B. H. Zhao, “A secure routing protocol with malicious nodes detecting and diagnosing mechanism for wireless sensor network ,” in Proc. 2007 IEEE Asia-Pacific Service Comput. Conf., pp.

Karlof and D. Wagner, “Secure routing in wireless sensor networks: attacks and countermeasures,” in Proc. 2003 IEEE Int. Workshop Sensor Network. Protocols Appl., pp. 113–127.

T. Shu, M. Krunz, and S. Liu, “Secure data collection in wireless sensor networks using randomized dispersive routes,” IEEE Trans. Mobile Computer., vol. 9, no. 7, pp. 941–954, 2010.

O. Younis and S. Fahmy, “HEED: a hybrid, energy-efficient, distributed clustering approach for ad hoc sensor networks,” IEEE Trans. Mobile Computer, vol. 3, no. 4, pp. 366–379, 2004. 49–55.

Somasundaram and R. Marimuthu, “A multipath reliable routing for detection and isolation of malicious nodes in MANET,” in Proc. 2008 Int. Conf. Computing, Commun. Netw., pp. 1–8.

Stavrou and A. Pitsillides, “A survey on secure multipath routing protocols in WSNs,” Comput. Netw., vol. 54, no. 13, pp. 2215–2238, 2010.

Bao, I. R. Chen, M. Chang, and J. Cho, “Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection,” IEEE Trans. Netw. Service Manage.,vol. 9, no. 2, pp. 161–183, 2012.

H.Su andX. Zhang, “Network lifetime optimization for heterogeneous sensor networks with mixed communication modes,” in Proc. 2007 IEEE Wireless Commun. Netw. Conf., pp. 3158–3163

]I. Krontiris, T. Dimitriou, and F. C. Freiling, “Towards intrusion detection in wireless sensor networks,” in Proc. 2007 European Wireless Conf.

J. Deng, R. Han, and S. Mishra, “INSENS: intrusion-tolerant routing for wireless sensor networks,” Computer Commun., vol. 29, no. 2, pp. 216–230, 2006.

J. H. Cho, I. R. Chen, and P. G. Feng, “Effect of intrusion detection on reliability of mission-oriented mobile group systems in mobile ad hoc networks,” IEEE Trans. Reliab., vol. 59, no. 1, pp. 231–241, 2010

S. Zhu, S. Setia, and S. Jajodia, “LEAP: efficient security mechanisms for large-scale distributed sensor networks,” in Proc. 2003 ACM Conf. Computer Commun. Security.

X. Du and F. Lin, “Improving routing in sensor networks with heterogeneous sensor nodes,” in Proc. 2005 IEEE Veh. Technol. Conf., pp. 2528–2532.

Y. Zhou, Y. Fang, and Y. Zhang, “Securing wireless sensor networks: a survey,” IEEE Commun. Surveys & Tutorials, vol. 10, no. 3, pp. 6–28, 2008.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.