Skip to main content
Erschienen in: Wireless Personal Communications 2/2016

01.03.2016

Signature Based Vulnerability Detection Over Wireless Sensor Network for Reliable Data Transmission

verfasst von: N. M. Saravana Kumar, S. Deepa, C. N. Marimuthu, T. Eswari, S. Lavanya

Erschienen in: Wireless Personal Communications | Ausgabe 2/2016

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Due to the significant improvement in wireless communication technology, the need of Wireless Sensor Networks (WSN) have a vital role in the areas such as military applications, environmental monitoring, health care, home or industrial automation etc. However such type of network always been vulnerable to security threats, because the WSN has the resource constraints such as low battery life, low processing power, small memory, deployment in hostile environment and the radio links for communication are insecure. Thus, it is necessary to use effective detection mechanism to prevent WSN from routing attacks for reliable data transmission. In this paper, a signature based detection approach is proposed for detecting the routing attacks. For every known attack it has certain signature, based on this the rules are designed with the rule base which are applied for detecting various routing attacks such as wormhole, black hole and sybil attack. The simulated results show that the proposed signature based approach improves the reliability of data by measuring the parameters such as throughput and packet delivery ratio while detecting the routing attacks.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Akyildiz, I. F., Su, W., Sankarasubramaniam, Y., & Cayirci, E. (2002). Wireless sensor networks: a survey. Computer Networks, 38, 393–422.CrossRef Akyildiz, I. F., Su, W., Sankarasubramaniam, Y., & Cayirci, E. (2002). Wireless sensor networks: a survey. Computer Networks, 38, 393–422.CrossRef
2.
Zurück zum Zitat Mohanty, P., Panigrahi, S., Sarma, N., & Sankar Satapathy, S. (2010). Security issues in wireless sensor network data gathering protocols: A survey. Journal of Theoretical and Applied Information Technology, 13(1), 14. Mohanty, P., Panigrahi, S., Sarma, N., & Sankar Satapathy, S. (2010). Security issues in wireless sensor network data gathering protocols: A survey. Journal of Theoretical and Applied Information Technology, 13(1), 14.
3.
Zurück zum Zitat Rassam, M. A., Maarof, M. A., & Zainal, A. (2012). A survey of intrusion detection schemes in wireless sensor networks. American Journal of Applied Sciences, 9(10), 1636–1652.CrossRef Rassam, M. A., Maarof, M. A., & Zainal, A. (2012). A survey of intrusion detection schemes in wireless sensor networks. American Journal of Applied Sciences, 9(10), 1636–1652.CrossRef
4.
Zurück zum Zitat Padmavathi, G., & Shanmugapriya, D. (2009). A survey of attacks, security mechanisms and challenges in wireless sensor networks. International Journal of Computer Science and Information Security, 4(1–2), 1–9. Padmavathi, G., & Shanmugapriya, D. (2009). A survey of attacks, security mechanisms and challenges in wireless sensor networks. International Journal of Computer Science and Information Security, 4(1–2), 1–9.
5.
Zurück zum Zitat Wang, Y., Attebury, G., & Ramamurthy, B. (2006). A survey of security issues in wireless sensor networks. IEEE Communications Surveys & Tutorials, 8, 2–23.CrossRef Wang, Y., Attebury, G., & Ramamurthy, B. (2006). A survey of security issues in wireless sensor networks. IEEE Communications Surveys & Tutorials, 8, 2–23.CrossRef
6.
Zurück zum Zitat Teodoroa, P. G., Verdejo, J. D., Fernandez, G. M., & Vazquez, E. (2009). Anomaly-based network intrusion detection: techniques, systems and challenges. Computers & Security, 28, 18–28.CrossRef Teodoroa, P. G., Verdejo, J. D., Fernandez, G. M., & Vazquez, E. (2009). Anomaly-based network intrusion detection: techniques, systems and challenges. Computers & Security, 28, 18–28.CrossRef
7.
Zurück zum Zitat Alrajeh, N. A., Khan, S., & Shams, B. (2013). Intrusion detection systems in wireless sensor networks: A review. International Journal of Distributed Sensor Networks, 2013, Article ID 167575. Alrajeh, N. A., Khan, S., & Shams, B. (2013). Intrusion detection systems in wireless sensor networks: A review. International Journal of Distributed Sensor Networks, 2013, Article ID 167575.
8.
Zurück zum Zitat Zahariadas, T., Trakadas, P., Maniatis, S., & Karkazis, P. (2009). Efficient detection of routing attacks in wireless sensor networks. In 16th International conference, systems, signals and image processing, pp. 1–4, 2009. Zahariadas, T., Trakadas, P., Maniatis, S., & Karkazis, P. (2009). Efficient detection of routing attacks in wireless sensor networks. In 16th International conference, systems, signals and image processing, pp. 1–4, 2009.
9.
Zurück zum Zitat de Silva, A. P. R., Martins, M. H. T., Rocha, B. P. S., Loureiro, A. A. F., Ruiz, L. B., & Wong, H. C. (2005). Decentralized intrusion detection in wireless sensor networks. Montreal, QC, pp. 16–23. de Silva, A. P. R., Martins, M. H. T., Rocha, B. P. S., Loureiro, A. A. F., Ruiz, L. B., & Wong, H. C. (2005). Decentralized intrusion detection in wireless sensor networks. Montreal, QC, pp. 16–23.
10.
Zurück zum Zitat Hu, Y., Perring, A., & Johnson, D. B. (2003) Packet leashes: A defense against wormhole attacks in wireless networks. In Proceedings of 22nd annual conference on IEEE computer and communication society, pp. 1976–1980. Hu, Y., Perring, A., & Johnson, D. B. (2003) Packet leashes: A defense against wormhole attacks in wireless networks. In Proceedings of 22nd annual conference on IEEE computer and communication society, pp. 1976–1980.
11.
Zurück zum Zitat Laos, L., Poovendran, R., Meadows, C., Syverson, P., & Chang, W. (2005). Preventing wormhole attacks on wireless ad hoc networks: A graph theoretic approach. IEEE Conference Wireless Communications and Networking, 2, 1193–1199. Laos, L., Poovendran, R., Meadows, C., Syverson, P., & Chang, W. (2005). Preventing wormhole attacks on wireless ad hoc networks: A graph theoretic approach. IEEE Conference Wireless Communications and Networking, 2, 1193–1199.
12.
Zurück zum Zitat Dong, D., Li, M., Liu, Y., Li, X.-Y., & Liao, X. (2011). Topological detection on wormholes in wireless ad hoc and sensor networks. IEEE/ACM Transactions on Networking, 19, 1787–1796.CrossRef Dong, D., Li, M., Liu, Y., Li, X.-Y., & Liao, X. (2011). Topological detection on wormholes in wireless ad hoc and sensor networks. IEEE/ACM Transactions on Networking, 19, 1787–1796.CrossRef
13.
Zurück zum Zitat Tun, Z., & Maw, A. H. (2008). Wormhole attack detection in wireless sensor networks. World Academy of Science, Engineering and Technology, 46, 545–550. Tun, Z., & Maw, A. H. (2008). Wormhole attack detection in wireless sensor networks. World Academy of Science, Engineering and Technology, 46, 545–550.
14.
Zurück zum Zitat Newsome, J., Shi, E., Song, D., & Perrig. A. (2004). The sybil attack in sensor networks: Analysis & defenses. In Proceedings on international symposium on information processing in sensor networks, 2004. Newsome, J., Shi, E., Song, D., & Perrig. A. (2004). The sybil attack in sensor networks: Analysis & defenses. In Proceedings on international symposium on information processing in sensor networks, 2004.
15.
Zurück zum Zitat Sharmila, S., & Umamaheswari, G. (2012). Detection of sybil attack in mobile wireless sensor networks. International Journal Of Engineering Science & Advanced Technology, 2, 256–262. Sharmila, S., & Umamaheswari, G. (2012). Detection of sybil attack in mobile wireless sensor networks. International Journal Of Engineering Science & Advanced Technology, 2, 256–262.
16.
Zurück zum Zitat Tamilselvan, L., & Sankarnarayanan, V. (2007). Prevention of blackhole attack in MANET. In Proceeding from AUS- WIRELESS’07: 2nd international conference on wireless broadband and ultraband communications, Sydney, 27–30, pp. 21. Tamilselvan, L., & Sankarnarayanan, V. (2007). Prevention of blackhole attack in MANET. In Proceeding from AUS- WIRELESS’07: 2nd international conference on wireless broadband and ultraband communications, Sydney, 27–30, pp. 21.
17.
Zurück zum Zitat Zhao, Z., Wei, B., Dong, X., Yao, L., & Gao, F. (2010) Detecting wormhole attacks in wireless sensor networks with statistical analysis. In WASE international conference on information engineering, pp. 251–254. Zhao, Z., Wei, B., Dong, X., Yao, L., & Gao, F. (2010) Detecting wormhole attacks in wireless sensor networks with statistical analysis. In WASE international conference on information engineering, pp. 251–254.
Metadaten
Titel
Signature Based Vulnerability Detection Over Wireless Sensor Network for Reliable Data Transmission
verfasst von
N. M. Saravana Kumar
S. Deepa
C. N. Marimuthu
T. Eswari
S. Lavanya
Publikationsdatum
01.03.2016
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 2/2016
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-015-3070-2

Weitere Artikel der Ausgabe 2/2016

Wireless Personal Communications 2/2016 Zur Ausgabe

Neuer Inhalt