Advertisement

Shift Reduce Parser Based Malicious Sensor Detection for Predicting Forest Fire in WSNs

  • A. Komathi
  • M. Pushparani
Article

Abstract

Nowadays wireless sensor networks (WSNs) has been used in enormous applications for data collection in an unfriendly environment. Forest fire makes vast hazard to the consuming plant of the world. To preserve the forest from fire, sensor nodes monitor the environment temperature. If the temperature is increased and it exceeds the threshold, the sensor sends the notification message to the fire monitoring system. The forest fire is measured by Fire Weather Index. Most of the existing fire monitoring systems only highlight in detection, but not the verification of the sensor. Suppose, if the attacker inserts any malicious sensor, the malicious sensor sends false information or create an additional delay in fire monitoring system. As a result, the more chances for the forest to be destroyed by fire. To solve this problem, Shift Reduce Parser based Malicious Sensor Detection (SRP_MSD) in WSN is proposed. The Bivariate Pascal Triangle method hides the original identity of nodes, data route from the malicious observer and sends confidential information to the Base Station. This method is analyzed and evaluated using network simulator-2. The results show that it is possible to detect malicious sensor nodes and send the reliable information to the forest fire monitoring system.

Keywords

Forest fire detection Shift Reduce Parser Bivariate Pascal Triangle algorithm Malicious node Monitoring temperature 

Notes

References

  1. 1.
    Lloret, J., Garcia, M., Bri, D., & Sendra, S. (2009). A wireless sensor network deployment for rural and forest fire detection and verification. Sensors, 9(11), 8722–8747.CrossRefGoogle Scholar
  2. 2.
    Li, W., & Zhu, X. (2016). BAN-trust: An attack-resilient malicious node detection scheme for body area networks. In 2016 IEEE International conference on computing, networking, and communications, 1–5.Google Scholar
  3. 3.
    Molina-Pico, A., Cuesta-Frau, D., Araujo, A., Alejandre, J., & Rozas, A. (2016). Forest monitoring and wildland early fire detection by a hierarchical wireless sensor network. Journal of Sensors.  https://doi.org/10.1155/2016/8325845.CrossRefGoogle Scholar
  4. 4.
    Aravindh, S., Vinoth, R. S., & Vijayan, R. (2013). A trust-based approach for detection and isolation of malicious nodes in MANETs. International Journal of Engineering and Technology, 5(1), 193–199.Google Scholar
  5. 5.
    Sajjad, S. M., Bouk, S. H., & Yousaf, M. (2015). Neighbor node trust based intrusion detection system for WSN. 6th International Conference on Emerging Ubiquitous Systems and Pervasive Networks, 63, 183–188.Google Scholar
  6. 6.
    Prabha, V. R., & Latha, P. (2017). Fuzzy trust protocol for malicious node detection in wireless sensor networks. Wireless Personal Communications, 94(4), 2549–2559.CrossRefGoogle Scholar
  7. 7.
    Ho, J. W., Wright, M., & Das, S. K. (2012). Distributed detection of mobile malicious node attacks in wireless sensor networks. Ad Hoc Networks, 10(3), 512–523.CrossRefGoogle Scholar
  8. 8.
    Lal, N., Kumar, S., Saxena, A., & Chaurasiya, V. K. (2015). Detection of malicious node behaviour via I-watchdog protocol in mobile Ad Hoc network with DSDV routing scheme. Procedia Computer Science, 49, 264–273.CrossRefGoogle Scholar
  9. 9.
    Subba, B., Biswas, S., & Karmakar, S. (2016). Intrusion detection in Mobile Ad hoc networks: Bayesian game formulation. Engineering Science and Technology, An International Journal, 19(2), 782–799.CrossRefGoogle Scholar
  10. 10.
    Anjana, K. P., & Preetha, K. G. (2016). A novel approach for malicious node detection in MANET. In A. Abraham (Ed.), Innovations in bio-inspired computing and applications (pp. 163–173). Springer.Google Scholar
  11. 11.
    Zhang, Y., Shen, Y., Wang, H., Yong, J., & Jiang, X. (2016). On secure wireless communications for IoT under eavesdropper collusion. IEEE Transactions on Automation Science and Engineering, 13(3), 1281–1293.CrossRefGoogle Scholar
  12. 12.
    Zhang, H., Cheng, P., Shi, L., & Chen, J. (2016). Optimal DoS attack scheduling in wireless networked control system. IEEE Transactions on Control Systems Technology, 24(3), 843–852.CrossRefGoogle Scholar
  13. 13.
    Kumar, P., Gurtov, A., Iinatti, J., Ylianttila, M., & Sain, M. (2016). Lightweight and secure session-key establishment scheme in smart home environments. IEEE Sensors Journal, 16(1), 254–264.CrossRefGoogle Scholar
  14. 14.
    Li, Y. (2013). Design of a key establishment protocol for smart home energy management system. In Computational intelligence, fifth international conference on communication systems and networks (CICSyN), June 2013 (pp. 88–93).Google Scholar
  15. 15.
    Han, K., Kim, J., Shon, T., & Ko, D. (2013). A novel secure key pairing protocol for rf4ce ubiquitous smart home systems. Personal and Ubiquitous Computing, 17(5), 945–949.CrossRefGoogle Scholar
  16. 16.
    Sun, B., Li, C. C., Wu, K., & Xiao, Y. (2006). A lightweight secure protocol for wireless sensor networks. Computer Communications, 29(13), 2556–2568.CrossRefGoogle Scholar
  17. 17.
    Delgado-Mohatar, O., Fúster-Sabater, A., & Sierra, J. M. (2011). A light-weight authentication scheme for wireless sensor networks. Ad Hoc Networks, 9(5), 727–735.CrossRefGoogle Scholar
  18. 18.
    Raja Rajeswari, S., & Seenivasagam, V. (2015). Secured energy conserving slot-based topology maintenance protocol for wireless sensor networks. Wireless Personal Communications, 87(2), 527–550.CrossRefGoogle Scholar
  19. 19.
    Qiu, Y., Zhou, J., Baek, J., & Lopez, J. (2010). Authentication and key establishment in dynamic wireless sensor networks. Sensors, 10(4), 3718–3731.CrossRefGoogle Scholar
  20. 20.
    Wang, R., Du, W., Liu, X., & Ning, P. (2009). ShortPK: A short-term public key scheme for broadcast authentication in sensor networks. ACM Transactions on Sensor Networks, 6(1), Article 9.CrossRefGoogle Scholar
  21. 21.
    Khan, S. U., Pastrone, C., Lavagno, L., & Spirito, M. A. (2012). An authentication and key establishment scheme for the IP-based wireless sensor networks. Procedia Computer Science, 10, 1039–1045.CrossRefGoogle Scholar
  22. 22.
    Kwon, T., & Hong, J. (2010). Secure and efficient broadcast authentication in wireless sensor networks. IEEE Transactions on Computers, 59(8), 1120–1133.MathSciNetCrossRefGoogle Scholar
  23. 23.
    He, D., Chan, S., Tang, S., & Guizani, M. (2013). Secure data discovery and dissemination based on hash tree for wireless sensor networks. IEEE Transactions on Wireless Communications, 12(9), 4638–4646.CrossRefGoogle Scholar
  24. 24.
    Tang, D., Li, T., Ren, J., & Wu, J. (2015). Cost-Aware SEcure Routing (CASER) protocol design for wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems, 26(4), 960–973.CrossRefGoogle Scholar
  25. 25.
    Han, S., Han, Y., Jin, Y., & Zhou, W. (1992). The method for calculating forest fire behavior index. Fire Safety Science, 1, 77–82.Google Scholar
  26. 26.
    Johnson, E. A., Keith, D. M., & Martin, Y. E. (2013). Comparing measured duff moisture with a water budget model and the Duff and Drought Codes of the Canadian Fire Weather Index. Forest Science, 59(1), 78–92.CrossRefGoogle Scholar
  27. 27.
    Bouabdellah, K., Noureddine, H., & Larbi, S. (2013). Using wireless sensor networks for reliable forest fires detection. Procedia Computer Science, 19, 794–801.CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2018

Authors and Affiliations

  1. 1.Department of Computer ScienceBharathiar UniversityCoimbatoreIndia
  2. 2.Department of Computer ScienceMother Teresa Women’s UniversityKodaikanalIndia

Personalised recommendations