Open Access
Subscription Access
NDTRA-MAT: A Novel Technique for Evaluating the Data Transfer Rate, Reducing the False Alarm Rate, and avoiding Packet Droppings Rate against Malicious Activity in Wireless Sensor Networks
Wireless Sensor Networks (WSN) are under attack from insider packet drops. Each node will employ a trust mechanism to assess the trustworthiness of its neighbor nodes to send packets to only the trustworthy neighbors to distinguish packets dropped by inside intruders from network faults. The false alert arises when a normal node's trust value decreases and is removed from the routing paths using trust-aware routing algorithms. Optimizing the packet delivery ratio is a critical design consideration for WSNs. WSNs have long benefited from a secure zone-based routing mechanism already in place. A new routing criterion was developed for packet transfer in multi-hop communication. The routing metric was designed to protect against message manipulation, dropping, and flooding assaults. The method used an alternative way to route a packet while avoiding dangerous zones safely and efficiently in the routing process. Despite energy conservation and greater attack resilience, congestion in the WSN has increased, and the packet delivery ratio has been reduced. Each node has computing power that serves as a transceiver for the network. A packet-dropping node is hacked and forwards any or all the packets it receives. All or some boxes are packages modified by a hacked node that is intended to deliver them. In multi-hop sensor networks, packet dropping and alteration are two popular methods that an adversary can use to interrupt communication. The proposed model NDTRA-MAT is used to avoid packet loss with reduced false alarms. It is compared with the existing models, and the performance is calculated in terms of Malicious Node Detection Accuracy Levels, Packet Loss Rate, and Packet Data rate.
Keywords
Network Security, Packet Delivery Rate, Packet Loss, Routing, Malicious Node, False Alarms, Network Performance
User
Font Size
Information
- Vasanthi, G., and N. Prabakaran. "An Implementation of Low Energy Consumed Long Life Network (LECLLN) with Reliable Routing Protocol (RRP)." 2021 3rd International Conference on Advances in Computing, Communication Control and Networking (ICAC3N). IEEE, 2021.
- Raymond, David R., and Scott F. Midkiff. "Denial-of-service in wireless sensor networks: Attacks and defenses." IEEE Pervasive Computing 7.1 (2008): 74-81.
- C. John and C. Wahi, “Security analysis of routing protocols for wireless sensor networks,” International Journal of Applied Engineering Research, vol. 11, no. 6, pp. 4235-4242, 2016.
- S. Madria and J. Yin, “SeRWA: a secure routing protocol against wormhole attacks in sensor networks,” Ad Hoc Networks, vol. 7, no. 6, pp. 1051-1063, 2009.
- R. E. Mohamed, A. I. Saleh, M. Abdelrazzak, and A. S. Samra, “Survey on wireless sensor network applications and energy efficient routing protocols,” Wireless Personal Communications, vol. 101, no. 2, pp. 1019–1055, 2018.
- Salehi, S. Ahmad, et al. "Detection of sinkhole attack in wireless sensor networks." 2013 IEEE international conference on space science and communication (IconSpace). IEEE, 2013.
- Goyal, Priyanka, Sahil Batra, and Ajit Singh. "A literature review of security attack in mobile ad-hoc networks." International Journal of Computer Applications 9.12 (2010): 11-15
- D. Kumar, S. Chand, and B. Kumar, “Cryptanalysis and improvement of an authentication protocol for wireless sensor networks applications like safety monitoring in coal mines,” Journal of Ambient Intelligence and Humanized Computing, vol. 10, no. 2, pp. 641–660, 2019.
- Ben-Othman, Jalel, and Bashir Yahya. "Energy efficient and QoS based routing protocol for wireless sensor networks." Journal of Parallel and Distributed Computing 70.8 (2010): 849-857.
- Ye, Wei, John Heidemann, and Deborah Estrin. "An energy-efficient MAC protocol for wireless sensor networks." Proceedings. Twenty-first annual joint conference of the IEEE computer and communications societies. Vol. 3. IEEE, 2002.
- Salehi, S. Ahmad, et al. "Detection of sinkhole attack in wireless sensor networks." 2013 IEEE international conference on space science and communication (IconSpace). IEEE, 2013.
- Chhabra, Gurpreet Singh, and Shahista Navaz. "Enhancing Network Lifetime in Wireless Sensor Networks using Cluster-Tree based Data Gathering." International Journal of Engineering Innovations and Research 3.4 (2014): 548.
- Younis, Ossama, Marwan Krunz, and Srinivasan Ramasubramanian. "Node clustering in wireless sensor networks: Recent developments and deployment challenges." IEEE network 20.3 (2006): 20-25.
- M. Y. Su, “Prevention of selective black hole attacks on mobile ad hoc networks through intrusion detection systems,” Computer Communications, vol. 34, no. 1, pp. 107-117, 2011.
- Ghugar, U., and J. Pradhan. "ML-IDS: MAC layer trust-based intrusion detection system for wireless sensor networks." Computational Intelligence in Data Mining. Springer, Singapore, 2020. 427-434.
- Sohraby, Kazem, Daniel Minoli, and Taieb Znati. Wireless sensor networks: technology, protocols, and applications. John wiley & sons, 2007.
- John, Jacob, and Paul Rodrigues. "A survey of energy-aware cluster head selection techniques in wireless sensor network." Evolutionary Intelligence (2019): 1-13.
- H. Shafiei, A. Khonsari, H. Derakhshi, and P. Mousavi, “Detection and mitigation of sinkhole attacks in wireless sensor networks,” Journal of Computer and System Sciences, vol. 80, no. 3, pp. 644-653, 2014.
- Tyagi, Sudhanshu, and Neeraj Kumar. "A systematic review on clustering and routing techniques based upon LEACH protocol for wireless sensor networks." Journal of Network and Computer Applications 36.2 (2013): 623-645.
- Sánchez-Casado, Leovigildo, et al. "Identification of contamination zones for sinkhole detection in MANETs." Journal of Network and Computer Applications 54 (2015): 62-77.
- K. Balakrishnan, J. Deng, and V. K. Varshney, “TWOACK: preventing selfishness in mobile ad hoc networks,” in Proceedings of 2005 IEEE Wireless Communications and Networking Conference, New Orleans, LA, 2005, pp. 2137-2142.
- K. Liu, J. Deng, P. K. Varshney, and K. Balakrishnan, “An acknowledgment-based approach for the detection of routing misbehavior in MANETs,” IEEE Transactions on Mobile Computing, vol. 6, no. 5, pp. 536-550, 2007.
- V. Heydari and S. M. Yoo, “Lightweight acknowledgement-based method to detect misbehavior in MANETs,” KSII Transactions on Internet And Information Systems, vol. 9, no. 12, pp. 5150-5169, 2015.
- R. K. Sundararajan and U. Arumugam, “Intrusion detection algorithm for mitigating sinkhole attack on LEACH protocol in wireless sensor network,” Journal of Sensors, vol. 2015, Article ID. 203814, 2015.
- Madria, Sanjay, and Jian Yin. "SeRWA: A secure routing protocol against wormhole attacks in sensor networks." Ad Hoc Networks 7.6 (2009): 1051-1063.
- Q. Liu, J. Yin, V. C. Leung, and Z. Cai, “FADE: forwarding assessment based detection of collaborative grey hole attacks in WMNs,” IEEE Transactions on Wireless Communications, vol. 12, no. 10, pp. 5124-5137, 2013.
- M. Sathish, K. Arumugam, S. N. Pari, and V. S. Harikrishnan, “Detection of single and collaborative black hole attack in MANET,” in Proceedings of International Conference on Wireless Communications, Signal Processing and Networking, Chennai, India, 2016, pp. 2040-2044.
- Siddiqua, Ayesha, Kotari Sridevi, and Arshad Ahmad Khan Mohammed. "Preventing black hole attacks in MANETs using secure knowledge algorithm." 2015 International Conference on Signal Processing and Communication Engineering Systems. IEEE, 2015.
- D. Qin, S. Yang, S. Jia, Y. Zhang, J. Ma, and Q. Ding, “Research on trust sensing based secure routing mechanism for wireless sensor network,” IEEE Access, vol. 5, pp. 9599–9609, 2017.
- V. Kumar and R. Kumar, “An adaptive approach for detection of blackhole attack in mobile Ad hoc network,” Procedia Computer Science, vol. 48, pp. 472-479, 2015.
- N. K. Sreelaja and G. A. Vijayalakshmi Pai, “Swarm intelligence-based approach for sinkhole attack detection in wireless sensor networks,” Applied Soft Computing, vol. 19, pp. 68-79, 2014.
Abstract Views: 256
PDF Views: 1