Skip to main content
Erschienen in: Wireless Personal Communications 2/2020

02.08.2020

Detection of Replica Node Attack Based on Exponential Moving Average Model in Wireless Sensor Networks

verfasst von: S. Anitha, P. Jayanthi, R. Thangarajan

Erschienen in: Wireless Personal Communications | Ausgabe 2/2020

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Due to the broadcast nature of wireless communication, wireless sensor networks (WSNs) are susceptible to several attacks. Amongst them, replica attack is one of the predominates as it facilitates the attackers to perform some other attacks. So, it is of immense significance to design a competent security method for WSNs. Introducing a trust method is the primary concern for assisting well-organized use of the available energy in each node in the energy restricted environment. In order to tradeoff between energy usage and attack detection, energy-based prediction approach is deemed to be a suitable one. A statistical method, exponential moving average (EMA) model based replica detection is proposed to detect replica node attack based on energy consumption threshold in WSNs. The difference between actual and predicted energy consumption exceeding the threshold level is considered as malicious. In this paper, future energy drop of a sensor node is forecasted using statistical measure instead of probabilistic method. In EMA model, the transition from higher power consuming state (active state) to lower power consuming states (sleep and sense states) is controlled by a fixed schedule. The accumulated average time of the node was in any state in the past is used to estimate the time duration of a node that spends in that state. Unlike Markov Model, the estimations of energy are made periodically. By this, computational overhead on the microcontroller of the sensor is greatly reduced in EMA approach. The simulation results taken using TRM simulator shows that choosing the threshold value which is neither too large nor too small results in optimum level of detection accuracy and lifetime of the network.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Andrysiak, T., Saganowski, Ł., & Kiedrowski, P. (2017). Anomaly detection in smart metering infrastructure with the use of time series analysis. Journal of Sensors, 2017, 1–5. Andrysiak, T., Saganowski, Ł., & Kiedrowski, P. (2017). Anomaly detection in smart metering infrastructure with the use of time series analysis. Journal of Sensors, 2017, 1–5.
3.
Zurück zum Zitat Rajadurai, H., & Gandhi, U. D. (2020). Fuzzy based collaborative verification system for Sybil attack detection in MANET. Wireless Personal Communications, 110(4), 2179–2193. Rajadurai, H., & Gandhi, U. D. (2020). Fuzzy based collaborative verification system for Sybil attack detection in MANET. Wireless Personal Communications, 110(4), 2179–2193.
5.
Zurück zum Zitat Alrajei, N., Corser, G., Fu, H., & Zhu, Y. (2014). Energy prediction based intrusion detection in wireless sensor networks. International Journal of Emerging Technology and Advanced Engineering, 4(2), 760–767. Alrajei, N., Corser, G., Fu, H., & Zhu, Y. (2014). Energy prediction based intrusion detection in wireless sensor networks. International Journal of Emerging Technology and Advanced Engineering, 4(2), 760–767.
6.
Zurück zum Zitat Jinhui, X., Yang, T., Feiyue, Y., Leina, P., Juan, X., & Yao, H. (2018). Intrusion detection system for hybrid DoS attacks using energy trust in wireless sensor networks. Procedia computer science, 131, 1188–1195. Jinhui, X., Yang, T., Feiyue, Y., Leina, P., Juan, X., & Yao, H. (2018). Intrusion detection system for hybrid DoS attacks using energy trust in wireless sensor networks. Procedia computer science, 131, 1188–1195.
7.
Zurück zum Zitat Numan, M., Subhan, F., Khan, W. Z., Hakak, S., Haider, S., Reddy, G. T., et al. (2020). A systematic review on clone node detection in static wireless sensor networks. IEEE Access, 8, 65450–65461. Numan, M., Subhan, F., Khan, W. Z., Hakak, S., Haider, S., Reddy, G. T., et al. (2020). A systematic review on clone node detection in static wireless sensor networks. IEEE Access, 8, 65450–65461.
9.
Zurück zum Zitat Machaka, P., Bagula, A., & Nelwamondo, F. (2017). Using exponentially weighted moving average algorithm to defend against DDoS attacks. In 2016 Pattern recognition association of South Africa and robotics and mechatronics international conference (PRASA-RobMech), 2017 (pp. 1–6). IEEE. Machaka, P., Bagula, A., & Nelwamondo, F. (2017). Using exponentially weighted moving average algorithm to defend against DDoS attacks. In 2016 Pattern recognition association of South Africa and robotics and mechatronics international conference (PRASA-RobMech), 2017 (pp. 1–6). IEEE.
10.
Zurück zum Zitat Cheng, H., Xie, Z., Shi, Y., & Xiong, N. (2019). Multi-step data prediction in wireless sensor networks based on one-dimensional CNN and bidirectional LSTM. IEEE Access, 7, 117883–117896. Cheng, H., Xie, Z., Shi, Y., & Xiong, N. (2019). Multi-step data prediction in wireless sensor networks based on one-dimensional CNN and bidirectional LSTM. IEEE Access, 7, 117883–117896.
11.
Zurück zum Zitat Devi, P., & Jaison, B. (2020). Protection on wireless sensor network from clone attack using the SDN-enabled hybrid clone node detection mechanisms. Computer Communications, 152, 316–322. Devi, P., & Jaison, B. (2020). Protection on wireless sensor network from clone attack using the SDN-enabled hybrid clone node detection mechanisms. Computer Communications, 152, 316–322.
12.
Zurück zum Zitat Han, G., Jiang, J., Shen, W., Shu, L., & Rodrigues, J. (2013). IDSEP: A novel intrusion detection scheme based on energy prediction in cluster-based wireless sensor networks. IET Information Security, 7(2), 97–105. Han, G., Jiang, J., Shen, W., Shu, L., & Rodrigues, J. (2013). IDSEP: A novel intrusion detection scheme based on energy prediction in cluster-based wireless sensor networks. IET Information Security, 7(2), 97–105.
13.
Zurück zum Zitat Yu, Q., Jibin, L., & Jiang, L. (2016). An improved ARIMA-based traffic anomaly detection algorithm for wireless sensor networks. International Journal of Distributed Sensor Networks, 12(1), 1–9. Yu, Q., Jibin, L., & Jiang, L. (2016). An improved ARIMA-based traffic anomaly detection algorithm for wireless sensor networks. International Journal of Distributed Sensor Networks, 12(1), 1–9.
14.
Zurück zum Zitat Mini, R. A., Nath, B., & Loureiro, A. A. (2002). A probabilistic approach to predict the energy consumption in wireless sensor networks. In IV Workshop de comunicao sem Fio e computao Mvel, 2002 (pp. 23–25). Mini, R. A., Nath, B., & Loureiro, A. A. (2002). A probabilistic approach to predict the energy consumption in wireless sensor networks. In IV Workshop de comunicao sem Fio e computao Mvel, 2002 (pp. 23–25).
15.
Zurück zum Zitat Mini, R. A., do Val Machado, M., Loureiro, A. A., & Nath, B. (2005). Prediction-based energy map for wireless sensor networks. Ad Hoc Networks, 3(2), 235–253. Mini, R. A., do Val Machado, M., Loureiro, A. A., & Nath, B. (2005). Prediction-based energy map for wireless sensor networks. Ad Hoc Networks, 3(2), 235–253.
16.
Zurück zum Zitat Maivizhi, R., & Yogesh, P. (2020). Concealed multidimensional data aggregation in big data wireless sensor networks. In Proceedings of the 7th ACM IKDD CoDS and 25th COMAD (pp. 19–27). Maivizhi, R., & Yogesh, P. (2020). Concealed multidimensional data aggregation in big data wireless sensor networks. In Proceedings of the 7th ACM IKDD CoDS and 25th COMAD (pp. 19–27).
17.
Zurück zum Zitat Han, G., Shen, W., Duong, T. Q., Guizani, M., & Hara, T. (2014). A proposed security scheme against denial of service attacks in cluster-based wireless sensor networks. Security and Communication Networks, 7(12), 2542–2554. Han, G., Shen, W., Duong, T. Q., Guizani, M., & Hara, T. (2014). A proposed security scheme against denial of service attacks in cluster-based wireless sensor networks. Security and Communication Networks, 7(12), 2542–2554.
18.
Zurück zum Zitat Osanaiye, O., Alfa, A. S., & Hancke, G. P. (2018). A statistical approach to detect jamming attacks in wireless sensor networks. Sensors, 18(6), 1691. Osanaiye, O., Alfa, A. S., & Hancke, G. P. (2018). A statistical approach to detect jamming attacks in wireless sensor networks. Sensors, 18(6), 1691.
19.
Zurück zum Zitat Sharma, H., Haque, A., & Jaffery, Z. A. (2018). Solar energy harvesting wireless sensor network nodes: A survey. Journal of Renewable and Sustainable Energy, 10(2), 023704. Sharma, H., Haque, A., & Jaffery, Z. A. (2018). Solar energy harvesting wireless sensor network nodes: A survey. Journal of Renewable and Sustainable Energy, 10(2), 023704.
20.
Zurück zum Zitat Jiang, Z., Jin, X., & Zhang, Y. (2010). A weather-condition prediction algorithm for solar-powered wireless sensor nodes. In 2010 6th international conference on wireless communications networking and mobile computing (WiCOM), 2010 (pp. 1–4). IEEE. Jiang, Z., Jin, X., & Zhang, Y. (2010). A weather-condition prediction algorithm for solar-powered wireless sensor nodes. In 2010 6th international conference on wireless communications networking and mobile computing (WiCOM), 2010 (pp. 1–4). IEEE.
24.
Zurück zum Zitat Shanmugam, M., & Ramasamy, A. (2014). Sensor-based turmeric finger growth characteristics monitoring using embedded system under soil. International Journal of Distributed Sensor Networks, 10(6), 476176. Shanmugam, M., & Ramasamy, A. (2014). Sensor-based turmeric finger growth characteristics monitoring using embedded system under soil. International Journal of Distributed Sensor Networks, 10(6), 476176.
25.
Zurück zum Zitat Shanmugam, M., Ramasamy, A., Paramasivam, S., & Prabhakaran, P. (2016). Monitoring the turmeric finger disease and growth characteristics using sensor based embedded system—A novel method. Circuits and Systems, 7(08), 1280. Shanmugam, M., Ramasamy, A., Paramasivam, S., & Prabhakaran, P. (2016). Monitoring the turmeric finger disease and growth characteristics using sensor based embedded system—A novel method. Circuits and Systems, 7(08), 1280.
26.
Zurück zum Zitat Hill, J. R., Szewczyk, A. Woo, Hollar, S. Culler, D., & Pister, K. (2000). System architecture directions for networked sensors. In Proceedings of the 9th ACM international conference on architectural support for programming languages and operating systems, 2000. (pp. 93–104). New York: ACM Press. Hill, J. R., Szewczyk, A. Woo, Hollar, S. Culler, D., & Pister, K. (2000). System architecture directions for networked sensors. In Proceedings of the 9th ACM international conference on architectural support for programming languages and operating systems, 2000. (pp. 93–104). New York: ACM Press.
Metadaten
Titel
Detection of Replica Node Attack Based on Exponential Moving Average Model in Wireless Sensor Networks
verfasst von
S. Anitha
P. Jayanthi
R. Thangarajan
Publikationsdatum
02.08.2020
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 2/2020
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-020-07648-w

Weitere Artikel der Ausgabe 2/2020

Wireless Personal Communications 2/2020 Zur Ausgabe

Neuer Inhalt