Detecting Wormhole Attack on Data Aggregation in Hierarchical WSN

2017 ◽  
Vol 11 (1) ◽  
pp. 35-51 ◽  
Author(s):  
Mukesh Kumar ◽  
Kamlesh Dutta

Wireless networks are used by everyone for their convenience for transferring packets from one node to another without having a static infrastructure. In WSN, there are some nodes which are light weight, small in size, having low computation overhead, and low cost known as sensor nodes. In literature, there exists many secure data aggregation protocols available but they are not sufficient to detect the malicious node. The authors require a better security mechanism or a technique to secure the network. Data aggregation is an essential paradigm in WSN. The idea is to combine data coming from different source nodes in order to achieve energy efficiency. In this paper, the authors proposed a protocol for worm hole attack detection during data aggregation in WSN. Main focus is on wormhole attack detection and its countermeasures.

2020 ◽  
pp. 1332-1349
Author(s):  
Mukesh Kumar ◽  
Kamlesh Dutta

Wireless networks are used by everyone for their convenience for transferring packets from one node to another without having a static infrastructure. In WSN, there are some nodes which are light weight, small in size, having low computation overhead, and low cost known as sensor nodes. In literature, there exists many secure data aggregation protocols available but they are not sufficient to detect the malicious node. The authors require a better security mechanism or a technique to secure the network. Data aggregation is an essential paradigm in WSN. The idea is to combine data coming from different source nodes in order to achieve energy efficiency. In this paper, the authors proposed a protocol for worm hole attack detection during data aggregation in WSN. Main focus is on wormhole attack detection and its countermeasures.


2018 ◽  
Vol 2018 ◽  
pp. 1-9 ◽  
Author(s):  
Ki-Wook Kim ◽  
Sung-Gi Min ◽  
Youn-Hee Han

Making an SDN data plane flexible enough to satisfy the various requirements of heterogeneous IoT applications is very desirable in terms of software-defined IoT (SD-IoT) networking. Network devices with a programmable data plane provide an ability to dynamically add new packet- and data-processing procedures to IoT applications. The previously proposed solutions for the addition of the programmability feature to the SDN data plane provide extensibility for the packet-forwarding operations of new protocols, but IoT applications need a more flexible programmability for in-network data-processing operations (e.g., the sensing-data aggregation from thousands of sensor nodes). Moreover, some IoT models such as OMG DDS, oneM2M, and Eclipse SCADA use the publish-subscribe model that is difficult to represent using the operations of the existing message-centric data-plane models. We introduce a new in-network data-processing scheme for the SD-IoT data plane that defines an event-driven data-processing model that can express a variety of in-network data-processing cases in the SD-IoT environment. Also, the proposed model comprises a language for the programming of the data-processing procedures, while a flexible data-plane structure that can install and execute the programs at runtime is additionally presented. We demonstrate the flexibility of the proposed scheme by using sample programs in a number of example SD-IoT cases.


Author(s):  
Vinod Kumar

Data sensing and collection over vast coverage areas form an integral part of IoT applications such as Smart Farming. Selection of adequate IoT connectivity technologies is an important step in the design process. Overall energy efficiency, availability of low-cost and long-life sensor nodes and achievability of long coverage range of the fixed infrastructure are the main criteria of selection. After a brief description of the scenario of connectivity technologies, this article demonstrates the usefulness of a Low Power Wide Area Networking technology named SigFox for the applications mentioned above. Performance figures in terms of coverage range and protocol throughput (manageable IoT node density) justify this claim.


2021 ◽  
Author(s):  
John Clement Sunder A ◽  
K.P. Sampoornam KP ◽  
R.Vinodkumar R

Abstract Detection and isolation of Sybil and wormhole attack nodes in healthcare WSN is a significant problem to be resolved. Few research works have been designed to identify Sybil and wormhole attack nodes in the network. However, the detection performance of Sybil and wormhole attack nodes was not effectual as the false alarm rate was higher. In order to overcome such limitations, Delta Ruled First Order Iterative Deep Learning based Intrusion Detection (DRFOIDL-ID) Technique is proposed. The DRFOIDL-ID Technique includes two main phase namely attack detection and isolation. The DRFOIDL-ID Technique constructs Delta Ruled First Order Iterative Deep Learning in attack detection phase with aim of detecting the occurrence of Sybil and wormhole attacks in healthcare WSN. After detecting the attack nodes, DRFOIDL-ID Technique carried outs isolation process with the objective of increasing the routing performance. During the isolation phase, DRFOIDL-ID Technique keep always the identified Sybil and wormhole attack nodes through transmitting the isolation messages to all sensor nodes in healthcare WSN. Hence, DRFOIDL-ID Technique improves the routing performance with lower packet loss rate. The DRFOIDL-ID Technique conducts the simulation process using factors such as attack detection rate, attack detection time, false alarm rate and packet loss rate with respect to a diverse number of sensor nodes and data packets. The simulation result proves that the DRFOIDL-ID Technique is able to improve the attack detection rate and also reduces the attack detection time as compared to state-of-the-art works.


Author(s):  
Ashim Pokharel ◽  
Ethiopia Nigussie

Due to limited energy resources, different design strategies have been proposed in order to achieve better energy efficiency in wireless sensor networks, and organizing sensor nodes into clusters and data aggregation are among such solutions. In this work, secure communication protocol is added to clustered wireless sensor network. Security is a very important requirement that keeps the overall system usable and reliable by protecting the information in the network from attackers. The proposed and implemented AES block cipher provides confidentiality to the communication between nodes and base station. The energy efficiency of LEACH clustered network and with added security is analyzed in detail. In LEACH clustering along with the implemented data aggregation technique 48% energy has been saved compared to not clustered and no aggregation network. The energy consumption overhead of the AES-based security is 9.14%. The implementation is done in Contiki and the simulation is carried out in Cooja emulator using sky motes.


Author(s):  
Neeraj Kumar ◽  
R.B. Patel

In a wireless sensor network (WSN), the sensor nodes obtain data and communicate its data to a centralized node called base station (BS) using intermediate gateway nodes (GN). Because sensors are battery powered, they are highly energy constrained. Data aggregation can be used to combine data of several sensors into a single message, thus reducing sensor communication costs and energy consumption. In this article, the authors propose a QoS aware framework to support minimum energy data aggregation and routing in WSNs. To minimize the energy consumption, a new metric is defined for the evaluation of the path constructed from source to destination. The proposed QoS framework supports the dual goal of load balancing and serving as an admission control mechanism for incoming traffic at a particular sensor node. The results show that the proposed framework supports data aggregation with less energy consumption than earlier strategies.


Author(s):  
Sharanappa P. H. ◽  
◽  
Mahabaleshwar S. Kakkasageri ◽  

The use of wireless sensor technology in various Internet of Things (IoT) applications is growing rapidly. With the exponential increase of smart devices and their applications, collecting and analyzing data is gradually becoming one of the most difficult tasks. As sensor nodes are powered by batteries, energy efficiency is essential. To that intention, before passing the final data to the central station, a sensor node should reduce redundancies in the received data from neighbor nodes. There will be some redundancy in the data because different sensor nodes typically notice the same phenomenon. Data aggregation is one of the most important approaches for eliminating data redundancy and improving energy efficiency, as well as extending the life time of wireless sensor networks. Furthermore, the effective data aggregation technique might help to reduce network traffic. In this paper we have proposed cluster based data aggregation using intelligent agents. The performance of the proposed scheme is compared with Centralized Data Aggregation (CDA) mechanism in IoT.


Author(s):  
Nadjib Benaouda ◽  
Ammar Lahlouhi

Purpose The purpose of this paper is to present a novel delay-bounded and power-efficient routing for in-network data aggregation, called DPIDA, which aims to ensure a compromise between the energy consumed during the collection of data sensed by a set of source sensor nodes and their timely delivery to the sink node. Design/methodology/approach Based on the ant-colony-optimization metaheuristic, the proposal establishes a routing structure that maximizes the number of overlapping routes and minimizes the total transmission power while ensuring delay-bounded paths and a symmetric transmission power assignment to reliably deliver the sensed data. Findings The proposal was extensively compared to two other known protocols regarding different keys factors. Simulation results, including topology snapshots, show the ability of DPIDA to ensure the energy–latency tradeoff. They also show the superiority of DPIDA compared to the two considered protocols. Originality/value This paper presents a novel ant-based protocol that uses in-network data aggregation and transmission power-adjustment techniques to conserve the energy of nodes while ensuring delay-bounded paths and a reliable deliverance of data which is ensured by providing a symmetric transmission power assignment.


2020 ◽  
pp. 1215-1232
Author(s):  
George William Kibirige ◽  
Camilius A. Sanga

Wireless Sensor Networks (WSN) consists of large number of low-cost, resource-constrained sensor nodes. The constraints of the WSN which make it to be vulnerable to attacks are based on their characteristics which include: low memory, low computation power, they are deployed in hostile area and left unattended, small range of communication capability and low energy capabilities. Examples of attacks which can occur in a WSN are sinkhole attack, selective forwarding attack and wormhole attack. One of the impacts of these attacks is that, one attack can be used to launch other attacks. This book chapter presents an exploration of the analysis of the existing solutions which are used to detect and identify passive and active attack in WSN. The analysis is based on advantages and limitations of the proposed solutions.


Sign in / Sign up

Export Citation Format

Share Document