BEHAVIORAL MODEL FOR DETECTION OF COMPROMISED NODES IN WSN

Manyam Thaile, Dr. O.B.V. Ramanaiah

Abstract


Node Compromise Detection (NCD) is an important requirement for dealing with potential attacks in regular and random deployment in Wireless Sensor Networks. Intrusion Detection method is proposed to detect the compromised nodes. We proposed Parameter Grouping (PG) model for compromised nodes. We reduced communication overhead , attestation overhead, false negatives and energy consumption when compared with existing methods, like ZoneTrust. An NS-2 based simulation work was carried out and found that the proposed PG model detects compromised nodes effectively.

Keywords


AND-OR; node compromise; attestation; parameter grouping; WSN security

Full Text:

PDF

References


B. Parno, A. Perrig, and V.D. Gligor, "Distributed Detection of Node Replication Attacks in Sensor Networks," Proc. IEEE Symp. Security and Privacy (S&P), May 2005

Mr. Manish M Patel, Dr. Akshai Aggarwal, "Security Attacks in Wireless Sensor Networks: A Survey," International Conference on Intelligent Systems and Signal Processing (ISSP), pp. 329 - 333, 2013.

F. Li and J. Wu, “Mobility Reduces Uncertainty in MANET,” Proc. IEEE INFOCOM, May 2007.

S. Ganeriwal and M. Srivastava, "Reputation-Based Framework for High Integrity Sensor Networks," Proc. ACM Workshop Security of Ad Hoc and Sensor Networks (SASN), Oct. 2004

Y. Sun, Z. Han, W. Yu, and K. Liu, "A Trust Evaluation Framework in Distributed Networks: Vulnerability Analysis and Defense against Attacks," Proc. IEEE INFOCOM, Apr. 2006.

A. Seshadri, A. Perrig, L. van Doorn, and P. Khosla, “SWATT:SoftWare-Based Attestation for Embedded Devices,” Proc. IEEE Symp. Security and Privacy (S & P), May 2004.

T. Abuhmed, N. Nyamaa, and D. Nyang, “Software-Based Remote Code Attestation in Wireless Sensor Network,” Proc. of IEEE GLOBECOM, December. 2009.

T. Park and K. G. Shin, “Soft Tamper-Proofing via Program Integrity Verification in Wireless Sensor Networks,” IEEE Trans.Mobile Computing, May/June 2005, vol. 4, no. 3, pp. 297-309.

Y. Yang, X. Wang, S. Zhu, and G. Cao, "Distributed Software-Based Attestation for Node Compromise Detection in Sensor Networks," Proc. IEEE 26th Int’l Symp. Reliable Distributed Systems (SRDS), Oct. 2007.

Jun-Won Ho, Matthew Wright, and Sajal K. Das, ”ZoneTrust: Fast Zone-Based Node Compromise Detection and Revocation in Wireless Sensor Networks Using Sequential Hypothesis Testing,” IEEE Transactions on Dependable and Secure Computing, July/August 2012, vol. 9, no. 4, pp. 494-511.

Manyam Thaile, and O.B.V Ramanaiah, "Node Compromise Detection Based on NodeTrust

in Wireless Sensor Networks," An IEEE International Conference on Computer Communication and Informatics (ICCCI), Jan. 07 – 09, 2016, pp. 193-197, Coimbatore, INDIA.

Manyam Thaile, and O.B.V Ramanaiah, "Node Compromise Detection Based on Parameter Grouping in Wireless Sensor Networks," SECURWARE 2016:The Tenth International Conference on Emerging Security Information, Systems and Technologies, July. 24 – 28, 2016, pp. 14-20, ISBN: 978-1-61208-493-0, Nice, France.

Yan Lindsay Sun , Zhu Han , Wei Yu , K. J. Ray Liu , "A Trust Evaluation Framework in Distributed Networks: Vulnerability Analysis and Defense Against Attacks," IEEE INFOCOM, 2006.

Thomas M. Cover, Joy A. Thomas, "Elements of Information Theory," 2006.

Haroon Rashid, "Localization in Wireless Sensor Networks," Thesis, july,2013.

G. Padmavathi and M. D. Shanmugapriya, "A survey of attacks, security mechanisms and challenges in wireless sensor networks," Int. J. Comput. Sci., vol. 4, no. 1, pp. 1–9, Aug. 2009.

R. Rivest, "The MD5 Message-Digest Algorithm," MIT Laboratory for Computer Science and RSA Data Security Inc, 1992.

Teerawat Issariyakul, Ekram Hossain, "Introduction to Network Simulator NS2",Textbook,2008.




DOI: https://doi.org/10.26483/ijarcs.v9i2.5422

Refbacks

  • There are currently no refbacks.




Copyright (c) 2018 International Journal of Advanced Research in Computer Science