Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

An Efficient Identification of Malicious Packet Dropping in Wireless Sensor Networks


Affiliations
1 Department of CSE, KLN College of Engineering Madurai, India
2 Department of ECE, Velammal College of Engineering and Technology, Madurai, India
     

   Subscribe/Renew Journal


In the wireless sensor networks, sensor nodes monitor the environment detect the event of interest, produce data and it involves in forwarding the data towards a sink, which could be a gateway, base station, storage node or querying user. In such hostile environment it lacks physical protection and it is subjected to various attacks. Dropping packets and modifying packets are most common attacks that can be launched by an attacker to disturb the communication in wireless sensor networks. In this paper, we proposed a node categorization algorithm to indentify the nodes which are suspicious droppers/modifiers. Node categorization algorithm performs better, when compared to PNM scheme (Probabilistic Nested Marking Scheme). In our proposed scheme, a routing tree ischolar_mained at the sink is first established. Each packet is encrypted and padded so as to hide the source of the packet. The packet mark is small number of extra bits is added in each packet, such that the sink can recover the source of the packet and then find out dropping ratio associated with every sensor node. The routing tree dynamically changes in each round so that the behaviour of sensor node can be observed in different scenarios. So we are implementing this scheme which is effective in identifying both packet droppers and modifiers. It is being compatible with existing false packet filtering schemes that is, it can be deployed together with the false packet filtering schemes. In addition to identifying intruder filters, it also detects the filter modified packets immediately after the modification.


Keywords

Packet Dropping, Packet Modification, Wireless Sensor Networks.
User
Subscription Login to verify subscription
Notifications
Font Size

Abstract Views: 178

PDF Views: 4




  • An Efficient Identification of Malicious Packet Dropping in Wireless Sensor Networks

Abstract Views: 178  |  PDF Views: 4

Authors

A. S. Hemavarthinee
Department of CSE, KLN College of Engineering Madurai, India
T. R. Vedhavathy
Department of CSE, KLN College of Engineering Madurai, India
M. Bakyalakshmi
Department of ECE, Velammal College of Engineering and Technology, Madurai, India

Abstract


In the wireless sensor networks, sensor nodes monitor the environment detect the event of interest, produce data and it involves in forwarding the data towards a sink, which could be a gateway, base station, storage node or querying user. In such hostile environment it lacks physical protection and it is subjected to various attacks. Dropping packets and modifying packets are most common attacks that can be launched by an attacker to disturb the communication in wireless sensor networks. In this paper, we proposed a node categorization algorithm to indentify the nodes which are suspicious droppers/modifiers. Node categorization algorithm performs better, when compared to PNM scheme (Probabilistic Nested Marking Scheme). In our proposed scheme, a routing tree ischolar_mained at the sink is first established. Each packet is encrypted and padded so as to hide the source of the packet. The packet mark is small number of extra bits is added in each packet, such that the sink can recover the source of the packet and then find out dropping ratio associated with every sensor node. The routing tree dynamically changes in each round so that the behaviour of sensor node can be observed in different scenarios. So we are implementing this scheme which is effective in identifying both packet droppers and modifiers. It is being compatible with existing false packet filtering schemes that is, it can be deployed together with the false packet filtering schemes. In addition to identifying intruder filters, it also detects the filter modified packets immediately after the modification.


Keywords


Packet Dropping, Packet Modification, Wireless Sensor Networks.