Skip to main content
Erschienen in: Cluster Computing 3/2019

12.03.2018

M optimal routes hops strategy: detecting sinkhole attacks in wireless sensor networks

verfasst von: Zhaohui Zhang, Sanyang Liu, Yiguang Bai, Yalin Zheng

Erschienen in: Cluster Computing | Sonderheft 3/2019

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Sinkhole malicious nodes attacks are quite hard to handle in wireless sensor networks, due to the reason that the results of the attacks may cut off the communications by spreading false hops, absorbing data packets. Those terrible attacks are formed from the unique destroying method, which will preferentially destroy the nodes with higher communication function and shorter distance from the Sink node (Base station). In this paper, we propose a secure and energy-efficient detection scheme which can detect the malicious nodes more precisely than the traditional methods. In particularly, a new measure method is introduced in this paper, which is the frequency of each node by establishing M routes with optimal hops from per node to the Sink node. Using the proposed measure and dynamic programming, the malicious nodes can easily tell apart from the network according to the various satisfaction levels and hop difference. Compared with the traditional algorithms, simulation results show that our scheme can significantly promote the detection rate and the false positive rate. The detection rate increased about by 6–30%, the false positive rate decreased about by 5–25%. We also obtain a high energy-saving results in wireless sensor networks.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Li, H., Li, K., Qu, W., Stojmennovic, I.: Secure and energy-efficient data aggregation with malicious aggregator identification in wireless sensor networks. Future Gener. Comput. Syst. 37, 108–116 (2014)CrossRef Li, H., Li, K., Qu, W., Stojmennovic, I.: Secure and energy-efficient data aggregation with malicious aggregator identification in wireless sensor networks. Future Gener. Comput. Syst. 37, 108–116 (2014)CrossRef
2.
Zurück zum Zitat Lu, W., Gong, Y., Liu, X., et al.: Collaborative energy and information transfer in green wireless sensor networks for smart cities. IEEE Trans. Ind. Inf. 99, 1–1 (2017) Lu, W., Gong, Y., Liu, X., et al.: Collaborative energy and information transfer in green wireless sensor networks for smart cities. IEEE Trans. Ind. Inf. 99, 1–1 (2017)
3.
Zurück zum Zitat Mishra, A.K., Turuk, A.K.: A comparative analysis of node replica detection schemes in wireless sensor networks. J. Netw. Comput. Appl. 61, 21–32 (2016)CrossRef Mishra, A.K., Turuk, A.K.: A comparative analysis of node replica detection schemes in wireless sensor networks. J. Netw. Comput. Appl. 61, 21–32 (2016)CrossRef
4.
Zurück zum Zitat Xiao, B., Yu, B., Gao, C.: CHEMAS: identify suspect nodes in selective forwarding attacks. J. Parallel Distrib. Comput. 67, 1218–1230 (2007)CrossRef Xiao, B., Yu, B., Gao, C.: CHEMAS: identify suspect nodes in selective forwarding attacks. J. Parallel Distrib. Comput. 67, 1218–1230 (2007)CrossRef
5.
Zurück zum Zitat Kavitha, R.J., Caroline, B.E.: Secured and reliable data transmission on multi-hop wireless sensor network. Clust. Comput. 2, 1–10 (2017) Kavitha, R.J., Caroline, B.E.: Secured and reliable data transmission on multi-hop wireless sensor network. Clust. Comput. 2, 1–10 (2017)
6.
Zurück zum Zitat Salehi, S.A., Razzaque, M.A., Naraei, P., Farrokhtala, A.: Detection of sinkhole attack in wireless sensor networks. In: Proceedings of the 2013 IEEE International Conference on Space Science and Communication, pp. 361–365 (2013) Salehi, S.A., Razzaque, M.A., Naraei, P., Farrokhtala, A.: Detection of sinkhole attack in wireless sensor networks. In: Proceedings of the 2013 IEEE International Conference on Space Science and Communication, pp. 361–365 (2013)
7.
Zurück zum Zitat Ibrahim, A., Rahman, M.M., Roy, M.C.: Detecting sinkhole attacks in wireless sensor network using hop count. Int. J. Comput. Netw. Inf. Secur. 7(3), 50–56 (2015) Ibrahim, A., Rahman, M.M., Roy, M.C.: Detecting sinkhole attacks in wireless sensor network using hop count. Int. J. Comput. Netw. Inf. Secur. 7(3), 50–56 (2015)
8.
Zurück zum Zitat Tumrongwittayapak, C., Varakulsiripunth, R.: Detecting sinkhole attacks in wireless sensor networks. In: ICROS-SICE International Joint Conference, pp. 1966–1971 (2009) Tumrongwittayapak, C., Varakulsiripunth, R.: Detecting sinkhole attacks in wireless sensor networks. In: ICROS-SICE International Joint Conference, pp. 1966–1971 (2009)
9.
Zurück zum Zitat Qi, J., Hong, T., Kuang, X.H., Liu, Q.: Detection and defense of sinkhole attack in wireless sensor network. In: 2012 IEEE 14th International Conference on Communication Technology (ICCT), pp. 809–813 (2012) Qi, J., Hong, T., Kuang, X.H., Liu, Q.: Detection and defense of sinkhole attack in wireless sensor network. In: 2012 IEEE 14th International Conference on Communication Technology (ICCT), pp. 809–813 (2012)
10.
Zurück zum Zitat Han, G.J., Jiang, J.F., Shen, W., Shu, L., Rodrigues, J.: IDSEP: a novel intrusion detection scheme based on energy prediction in cluster-based wireless sensor networks. Inst. Eng. Technol. 72, 97–105 (2013) Han, G.J., Jiang, J.F., Shen, W., Shu, L., Rodrigues, J.: IDSEP: a novel intrusion detection scheme based on energy prediction in cluster-based wireless sensor networks. Inst. Eng. Technol. 72, 97–105 (2013)
11.
Zurück zum Zitat Zhang, F.J., Zhai, L.D., Yang, J.C., Cui, X.: Sinkhole attack detection based on redundancy mechanism in wireless sensor networks. Procedia Comput. Sci. 31, 171–720 (2014) Zhang, F.J., Zhai, L.D., Yang, J.C., Cui, X.: Sinkhole attack detection based on redundancy mechanism in wireless sensor networks. Procedia Comput. Sci. 31, 171–720 (2014)
12.
Zurück zum Zitat Ye, N., Chen, Q.: An anomaly detection technique based on a Chi square statistic for detecting intrusions into information systems. Qual. Reliab. Eng. Int. 17(2), 105–112 (2001)CrossRef Ye, N., Chen, Q.: An anomaly detection technique based on a Chi square statistic for detecting intrusions into information systems. Qual. Reliab. Eng. Int. 17(2), 105–112 (2001)CrossRef
13.
Zurück zum Zitat Heinzelman, W.R., Chandrakasan, A., Balakrishnan, H.: Energy-efficient communication protocol for wireless micro sensor networks. In: Proceedings of the 33rd Hawaii International Conference on System Sciences, pp. 1–10 (2000) Heinzelman, W.R., Chandrakasan, A., Balakrishnan, H.: Energy-efficient communication protocol for wireless micro sensor networks. In: Proceedings of the 33rd Hawaii International Conference on System Sciences, pp. 1–10 (2000)
Metadaten
Titel
M optimal routes hops strategy: detecting sinkhole attacks in wireless sensor networks
verfasst von
Zhaohui Zhang
Sanyang Liu
Yiguang Bai
Yalin Zheng
Publikationsdatum
12.03.2018
Verlag
Springer US
Erschienen in
Cluster Computing / Ausgabe Sonderheft 3/2019
Print ISSN: 1386-7857
Elektronische ISSN: 1573-7543
DOI
https://doi.org/10.1007/s10586-018-2394-6

Weitere Artikel der Sonderheft 3/2019

Cluster Computing 3/2019 Zur Ausgabe

Premium Partner