scholarly journals Monitoring Agent for Detecting Malicious Packet Drops for Wireless Sensor Networks in the Microgrid and Grid-Enabled Vehicles

10.5772/50256 ◽  
2012 ◽  
Vol 9 (1) ◽  
pp. 31 ◽  
Author(s):  
Jongbin Ko ◽  
Jungtaek Seo ◽  
Eui-Jik Kim ◽  
Taeshik Shon

Of the range of wireless communication technologies, wireless sensor networks (WSN) will be one of the most appropriate technologies for the Microgrid and Grid-enabled Vehicles in the Smartgrid. To ensure the security of WSN, the detection of attacks is more efficient than their prevention because of the lack of computing power. Malicious packet drops are the easiest means of attacking WSNs. Thus, the sensors used for constructing a WSN require a packet drop monitoring agent, such as Watchdog. However, Watchdog has a partial drop problem such that an attacker can manipulate the packet dropping rate below the minimum misbehaviour monitoring threshold. Furthermore, Watchdog does not consider real traffic situations, such as congestion and collision, and so it has no way of recognizing whether a packet drop is due to a real attack or network congestion. In this paper, we propose a malicious packet drop monitoring agent, which considers traffic conditions. We used the actual traffic volume on neighbouring nodes and the drop rate while monitoring a sending node for specific period. It is more effective in real network scenarios because unlike Watchdog it considers the actual traffic, which only uses the Pathrater. Moreover, our proposed method does not require authentication, packet encryption or detection packets. Thus, there is a lower likelihood of detection failure due to packet spoofing, Man-In-the Middle attacks or Wormhole attacks. To test the suitability of our proposed concept for a series of network scenarios, we divided the simulations into three types: one attack node, more than one attack nodes and no attack nodes. The results of the simulations meet our expectations.

2017 ◽  
Vol 2 (1) ◽  
Author(s):  
Palak Aggarwal ◽  
Santosh Kumar ◽  
Neha Garg ◽  
Sumeshwar Singh

Energy and security are very important issues in Wireless Sensor Networks (WSN) which need to be handled. These issues are interrelated because of limited energy there are some restrictions on implementation of security. Insider packet drop attack is one of the dangerous attacks for wireless sensor network that causes a heavy damage to WSN functionalities by dropping packets. It becomes necessary to identify such attack for secure routing of data in WSN. To detect this attack, trust mechanism has been proven as a successful technique. In this mechanism, each node verifies the trustworthiness of its neighbor node before packet transmission so that packets can only be transmitted to trustworthy nodes. But there is a problem of False Alarm with such trust-aware scheme. False alarm occurs when a good node’s trust value goes down due to natural packet dropping and being eliminated from the routing paths. This wastes network’s resources that further shortens network lifetime. In this paper, we have proposed a system for identification and recovery of false alarms (IRFA) which is the optimization of existing trust based system. But security solution needs to be energy efficient due to scarcity of energy resources in WSN. To provide energy efficiency, we have implemented proposed IRFA system in cluster based environment which detects insider packet drop attackers in an energy efficient manner. We have conducted OMNET++ simulation and results demonstrate that the proposed system performance is better than existing trust-based system in terms of packet delivery rate and energy efficiency which improves network lifetime.


2015 ◽  
Vol 16 ◽  
pp. 22-35 ◽  
Author(s):  
Honglong Chen ◽  
Wei Lou ◽  
Zhi Wang ◽  
Junfeng Wu ◽  
Zhibo Wang ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document