Skip to main content
Top
Published in: Wireless Personal Communications 4/2019

13-05-2019

Malicious Cluster Head Detection Mechanism in Wireless Sensor Networks

Authors: Asima Ismail, Rashid Amin

Published in: Wireless Personal Communications | Issue 4/2019

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

In wireless ad hoc network, all nodes participate for the transmission of data within the network and responsible for designing network topology. Suspicious and malicious activities can be detected by different techniques like IDS that is dynamic in nature. In clustering environment all the communication is carried out through cluster heads, we are having two cluster heads a primary cluster head (PCH) and secondary cluster heads (SCH) where SCHs communicate via PCH and if one of the secondary cluster head is compromised the entire network will be affected so malfunctioning of cluster head must be detected and identified. To handle this issue, we proposed a secure mechanism that provides security by minimum utilization of the resources after detection and identification the malicious Cluster Head. The proposed mechanism based on two level thresholds for the detection and identification of malicious cluster head that is dropping packets because of some attack. We used watchdog technique for initial monitoring. An agent is launched for detection and identification of the packets dropping problem. It is specially designed for secure UDP traffic transmission and fake report detection done by any of the malicious SCH to PCH.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Tang, J., Cheng, Y., & Zhuang, W. (2014). Real-time misbehavior detection in IEEE 802.11-based wireless networks: An analytical approach. IEEE Transactions on Mobile Computing, 13(1), 146–158.CrossRef Tang, J., Cheng, Y., & Zhuang, W. (2014). Real-time misbehavior detection in IEEE 802.11-based wireless networks: An analytical approach. IEEE Transactions on Mobile Computing, 13(1), 146–158.CrossRef
2.
go back to reference Tcholtcheu, N., & Schieferdecker, I. (2014). Framework for distributed autonomic self-healing in fixed IPv6 networks. International Journal of Communication Systems, 27(12), 4103–4125.CrossRef Tcholtcheu, N., & Schieferdecker, I. (2014). Framework for distributed autonomic self-healing in fixed IPv6 networks. International Journal of Communication Systems, 27(12), 4103–4125.CrossRef
3.
go back to reference Lu, S. et al. (2006). Robust rate adaptation for 802.11 wireless networks. In Proceedings of the 12th annual international conference on mobile computing and networking (pp. 146–157). Los Angeles, CA. Lu, S. et al. (2006). Robust rate adaptation for 802.11 wireless networks. In Proceedings of the 12th annual international conference on mobile computing and networking (pp. 146–157). Los Angeles, CA.
4.
go back to reference Vishnu Balan, E., Priyan, M. K., Gokulnath, C., & Usha Devi, G. (2015). Hybrid architecture with misuse and anomaly detection techniques for wireless networl. In: This full-text paper was peer-reviewed and accepted to be presented at the IEEE ICCSP 2015 conference. Vishnu Balan, E., Priyan, M. K., Gokulnath, C., & Usha Devi, G. (2015). Hybrid architecture with misuse and anomaly detection techniques for wireless networl. In: This full-text paper was peer-reviewed and accepted to be presented at the IEEE ICCSP 2015 conference.
6.
go back to reference Li, G. Y. (2015). Adaptive and opportunistic QoS-based routing protocol in VANETs. Networking and Internet Architecture [cs.NI]. Université Paris Sud - Paris XI, English. Li, G. Y. (2015). Adaptive and opportunistic QoS-based routing protocol in VANETs. Networking and Internet Architecture [cs.NI]. Université Paris Sud - Paris XI, English.
7.
go back to reference Bradley, K. A.et. al. (1998). Detecting disruptive routers: A distributed network monitoring approach. In Proc. 1998 symposium on security and privacy (pp. 115–124).CrossRef Bradley, K. A.et. al. (1998). Detecting disruptive routers: A distributed network monitoring approach. In Proc. 1998 symposium on security and privacy (pp. 115–124).CrossRef
8.
go back to reference Hadjiantonis, A. M., & Ellinas, G. (2010). In 2010 Fourth IEEE international conference on towards autonomic wireless networking for the future internet self-adaptive and self-organizing systems workshop (SASOW). Hadjiantonis, A. M., & Ellinas, G. (2010). In 2010 Fourth IEEE international conference on towards autonomic wireless networking for the future internet self-adaptive and self-organizing systems workshop (SASOW).
9.
go back to reference Chang, J. M., Tsou, P. C., Woungang, I., Chao, H. C. & Lai, C. F. (2015). Defending against collaborative attacks by malicious nodes in MANETs: A cooperative bait detection approach. IEEE Systems Journal, 9(1), 65–75.CrossRef Chang, J. M., Tsou, P. C., Woungang, I., Chao, H. C. & Lai, C. F. (2015). Defending against collaborative attacks by malicious nodes in MANETs: A cooperative bait detection approach. IEEE Systems Journal, 9(1), 65–75.CrossRef
10.
go back to reference Butun, I., Morgera, S. D., & Sankar, R. (2014). A survey of intrusion detection systems in wireless sensor networks. IEEE Communications Surveys & Tutorials, 16(1), 266–282.CrossRef Butun, I., Morgera, S. D., & Sankar, R. (2014). A survey of intrusion detection systems in wireless sensor networks. IEEE Communications Surveys & Tutorials, 16(1), 266–282.CrossRef
11.
go back to reference Doumit, S., et.al. (2003). Self-organized criticality and stochastic learning based intrusion detection system for wireless sensor networks. In MILCOM 2003 (pp. 609–614). Doumit, S., et.al. (2003). Self-organized criticality and stochastic learning based intrusion detection system for wireless sensor networks. In MILCOM 2003 (pp. 609–614).
12.
go back to reference Karlof, C., et.al. (2004). TinySec: A link layer security architecture for wireless sensor networks. In ACM Sensys 2004 Proceedings. (pp.162–175). Baltimore, USA. Karlof, C., et.al. (2004). TinySec: A link layer security architecture for wireless sensor networks. In ACM Sensys 2004 Proceedings. (pp.162–175). Baltimore, USA.
13.
go back to reference Buchegger, S. (2004). Coping with misbehavior in mobile ad hoc networks. PhD Thesis EPFL No. 2935. Accepted Feb 2004. Buchegger, S. (2004). Coping with misbehavior in mobile ad hoc networks. PhD Thesis EPFL No. 2935. Accepted Feb 2004.
14.
go back to reference Kalambe, K. B., & Apte, S. M. (2017). An exhaustive survey on security solutions in MANETS (pp. 124–131). Kalambe, K. B., & Apte, S. M. (2017). An exhaustive survey on security solutions in MANETS (pp. 124–131).
15.
go back to reference Zhou, J., Dong, X., Cao, Z., & Vasilakos, A. V. (2015). Secure and privacy preserving protocol for cloud-based vehicular DTNs. IEEE Transactions on Information Forensics and Security, 10(6), 1299–1314.CrossRef Zhou, J., Dong, X., Cao, Z., & Vasilakos, A. V. (2015). Secure and privacy preserving protocol for cloud-based vehicular DTNs. IEEE Transactions on Information Forensics and Security, 10(6), 1299–1314.CrossRef
16.
go back to reference Albouq, S. S., & Fredericks, E. M. (2017). Lightweight detection and isolation of black hole attacks in connected vehicles. In 2017 IEEE 37th international conference on distributed computing systems workshops (ICDCSW). IEEE. Albouq, S. S., & Fredericks, E. M. (2017). Lightweight detection and isolation of black hole attacks in connected vehicles. In 2017 IEEE 37th international conference on distributed computing systems workshops (ICDCSW). IEEE.
17.
go back to reference Kasra-Kermanshahi, S., & Salleh, M. (2015). A novel authentication scheme for mobile environments in the context of elliptic curve cryptography. In Computer, communications, and control technology (I4CT), 2015 Kasra-Kermanshahi, S., & Salleh, M. (2015). A novel authentication scheme for mobile environments in the context of elliptic curve cryptography. In Computer, communications, and control technology (I4CT), 2015
18.
go back to reference Minematsu, K. (2016). Authenticated encryption with small stretch (or, how to accelerate aero). In Australasian Conference on Information Security and Privacy (pp. 347–362). Springer, Cham.CrossRef Minematsu, K. (2016). Authenticated encryption with small stretch (or, how to accelerate aero). In Australasian Conference on Information Security and Privacy (pp. 347–362). Springer, Cham.CrossRef
19.
go back to reference Cho, K., Jo, M., Kwon, T., & Chen, H. H. (2013). Classification and experimental analysis for clone detection approaches in wireless sensor networks. IEEE Systems Journal, 7(1), 26–35.CrossRef Cho, K., Jo, M., Kwon, T., & Chen, H. H. (2013). Classification and experimental analysis for clone detection approaches in wireless sensor networks. IEEE Systems Journal, 7(1), 26–35.CrossRef
20.
go back to reference Mejri, M. N., Ben-Othman, J., & Hamdi, M. (2014). Survey on VANET security challenges and possible cryptographic solutions. Vehicular Communications, 1, 53–66.CrossRef Mejri, M. N., Ben-Othman, J., & Hamdi, M. (2014). Survey on VANET security challenges and possible cryptographic solutions. Vehicular Communications, 1, 53–66.CrossRef
21.
go back to reference Du, W. et al. (2005). LAD: Localization anomaly detection for wireless sensor networks. In the 19th international parallel and distributed processing symposium (IPDPS’05), April 3–8, 2005, Denver, Colorado, USA Du, W. et al. (2005). LAD: Localization anomaly detection for wireless sensor networks. In the 19th international parallel and distributed processing symposium (IPDPS’05), April 3–8, 2005, Denver, Colorado, USA
22.
go back to reference Baadache, A., & Belmehdi, A. (2014). Struggling against simple and cooperative black hole attacks in multi-hop wireless ad hoc networks. Computer Networks, 73(14), 173–184.CrossRef Baadache, A., & Belmehdi, A. (2014). Struggling against simple and cooperative black hole attacks in multi-hop wireless ad hoc networks. Computer Networks, 73(14), 173–184.CrossRef
23.
go back to reference Biagioni, E. (2016). Distributed anonymous computation of social distance. Department of Information and Computer Sciences, University of Hawaii at M¯anoa, Honolulu, Hawaii, USA 2016. Biagioni, E. (2016). Distributed anonymous computation of social distance. Department of Information and Computer Sciences, University of Hawaii at M¯anoa, Honolulu, Hawaii, USA 2016.
24.
go back to reference Nadeem, A., & Howarth, M. P. (2014). An intrusion detection & adaptive response mechanism for MANETs. Ad Hoc Networks, 13(Part B), 368–380.CrossRef Nadeem, A., & Howarth, M. P. (2014). An intrusion detection & adaptive response mechanism for MANETs. Ad Hoc Networks, 13(Part B), 368–380.CrossRef
25.
go back to reference Venkanna, U., Agarwal, J. K., & Velusamy, R. L. (2015). A cooperative routing for MANET based on distributed trust and energy management. Wireless Personal Communications, 81(3), 961–979.CrossRef Venkanna, U., Agarwal, J. K., & Velusamy, R. L. (2015). A cooperative routing for MANET based on distributed trust and energy management. Wireless Personal Communications, 81(3), 961–979.CrossRef
26.
go back to reference Maheswara Rao, A., Varadarajan, S., & Giri Prasad, M. N. (2012) Cross-Layer Based QoS Routing (CLBQR) Protocol analysis based on data flow for 802.16 WiMAX Networks Communication and Computing (ARTCom2012). In Fourth international conference on advances in recent technologies in 2012. Maheswara Rao, A., Varadarajan, S., & Giri Prasad, M. N. (2012) Cross-Layer Based QoS Routing (CLBQR) Protocol analysis based on data flow for 802.16 WiMAX Networks Communication and Computing (ARTCom2012). In Fourth international conference on advances in recent technologies in 2012.
27.
go back to reference Krishna, S. R. M., Prasad, P. V. K., Ramanath, M. N. S., & Kumari, B. M. (2015) Security in MANET routing tables with FMNK cryptography model. In 2015 International electrical, electronics, signals, communication and optimization (EESCO). Krishna, S. R. M., Prasad, P. V. K., Ramanath, M. N. S., & Kumari, B. M. (2015) Security in MANET routing tables with FMNK cryptography model. In 2015 International electrical, electronics, signals, communication and optimization (EESCO).
Metadata
Title
Malicious Cluster Head Detection Mechanism in Wireless Sensor Networks
Authors
Asima Ismail
Rashid Amin
Publication date
13-05-2019
Publisher
Springer US
Published in
Wireless Personal Communications / Issue 4/2019
Print ISSN: 0929-6212
Electronic ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-019-06512-w

Other articles of this Issue 4/2019

Wireless Personal Communications 4/2019 Go to the issue