Cover Image

Securing Ad Hoc Wireless Sensor Networks under Byzantine Attacks by Implementing Non-Cryptographic Methods

Shabir Ahmad Sofi, Roohie Naaz

Abstract


Ad Hoc wireless sensor network (WSN) is a collection of nodes that do not need to rely on predefined infrastructure to keep the network connected. The level of security and performance are always somehow related to each other, therefore due to limited resources in WSN, cryptographic methods for securing the network against attacks is not feasible. Byzantine attacks disrupt the communication between nodes in the network without regard to its own resource consumption. This paper discusses the performance of cluster based WSN comparing LEACH with Advanced node based clusters under byzantine attacks. This paper also proposes an algorithm for detection and isolation of the compromised nodes to mitigate the attacks by non-cryptographic means. The throughput increases after using the algorithm for isolation of the malicious nodes, 33% in case of Gray Hole attack and 62% in case of Black Hole attack.


Keywords


Byzantine attacks, cluster based wireless sensor network, advanced node, gray hole, black hole, non-cryptographic algorithm

Full Text:

PDF

References


A. Perrig, J. Stankovic, and D. Wager, “Security in wireless sensor networks,” Communication of the ACM, vol. 47, no. 6, pp. 53-57, June 2004.

D. Estrin, R. Govindan, and J. Heidemann, S. Kumar, “Next century challenges: scalable coordination in sensor networks,” Proc. ACM International Conf. Mobile Computing and Networking, ACM Press, 1999, pp. 263-270.

Y. Yu, B. Krishnamachari, V. K. Prasanna, “Ener-gy-latency tradeoffs for data gathering in wireless sensor networks,” Proc. IEEE Computer and Communication Societies, IEEE Press, 2004.

S. E. Khediri, N. Nasri, A. Wei, and A. Kachouri, “A new approach for clustering in wireless sensors networks based on LEACH,” Procedia Computer Science, vol. 32, pp. 1180-1185, 2014.

S. A. Sofi and R. Naaz, “Energy efficient routing pro-tocol for structured deployment of wireless sensor networks,” International Conf. Next Generation Networks, IET Press, September 2010, p. 10.

S. Sofi, E. Malik, R. Baba, H. Baba, and R. Mir, “Analysis of byzantine attacks in ad hoc networks and their mitigation,” International Conf. Computing and Information Technology, February 2012, pp.794-799.

W. Li and A. Joshi, “Security issues in mobile ad hoc networks - a survey,” https://pdfs.semanticscholar.org/b221/99c61df5445836c5f1bbd0ea6f02dabefd6b.pdf, 2007.

Y. C. Hu, A. Perrig, and D. B. Johnson, “Rushing attacks in wireless ad hoc network routing protocols,” Proc. 2nd ACM workshop on Wireless security, ACM Press, 2003, pp. 30-40.

C. Karlof and D. Wagner, “Secure routing in wireless sensor networks: attacks and countermeasures,” Ad hoc networks, vol. 1, no. 2, pp. 293-315, 2003.

S. Marti, T. J. Giuli, K. Lai, and M. Baker, “Mitigating routing misbehavior in mobile ad-hoc networks,” Proc. 6th Annual International Conf. Mobile Computing and Networking, pp. 255-265, August 2000.

H. Li, K. Li, W. Qu, and I. Stojmenovic, “Secure and energy efficient data aggregation with malicious aggregator identification in wireless sensor networks,” Future Generation Computer Systems, vol. 37, pp. 108-116, 2014.

Y. Zhao, Y. Zhang, Z. Qin, and T. Znati, “A co-commitment based secure data collection scheme for tiered wireless sensor networks,” Journal of Systems Architecture , vol. 57, no. 6, pp. 655-662, 2011.

Manju, S. Chand, and B. Kumar, “Improved-coverage preserving clustering protocol in wireless sensor networks,” International Journal of Engineering and Technology of Innovation, vol. 6, no. 1, pp. 16-29, 2016.

R. Duche and N. Sawade, “Energy efficient fault tolerant sensor node failure detection in WSNS,” International Journal of Engineering and Technology of Innovation, vol. 6, no. 3, pp. 190-210, 2016.

M. Abdelhakim, L. E. Lightfoot, J. Ren, and T. Li, “Distributed detection in mobile access wireless sensor networks under byzantine attacks,” IEEE Transactions on Parallel and Distributed Systems, vol. 25, no. 4, pp. 950-959, April 2014.

M. Young and R. Boutaba, “Overcoming adversaries in sensor networks: a survey of theoritical models and algorithm approaches for tolerating malicious interferences,” IEEE Communications Survey and Tutorials, vol. 13, no. 4, 2011.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.

www.reliablecounter.com

audio recording mixing