Skip to main content

PDMWSN: A Probable Approach to Detect Malicious Node in Wireless Sensor Network

  • Conference paper
  • First Online:
Emerging Research in Electronics, Computer Science and Technology

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 248))

  • 2232 Accesses

Abstract

Wireless sensor networks are prone to attacks as they are deployed in unattended and insecure environments that are prone to different types of attacks. Hence, security algorithms have to be implemented. This paper generates group-based encryption keys and provides a validated report to the base station which guarantees the integrity and authentication of the data that are being transmitted. This paper secures the nodes from Sybil attack by 21 %, sinkhole attack by 25 %, and wormhole attack by 30 %.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Hussain S, Schaffner S, Moseychuck D (2009) Applications of wireless sensor networks and RFID in a smart home environment, Seventh annual communication networks and services research conference, 153–157, doi:10.1109/CNSR.2009.32

  2. Zatout Y, Campo E, Llibre J-F (2009) WSN-HM: energy-efficient wireless sensor network for home monitoring “5th International conference on intelligent sensors, sensor networks and information processing (ISSNIP):367–372, doi:10.1109/ISSNIP.2009.5416757

  3. Gungor VC, Hancke GP (2009) Industrial wireless sensor networks: challenges, design principles, and technical approaches. IEEE Trans Ind Electron, 56(10):4258–4265, doi:10.1109/TIE.2009.2015754

  4. Lee SH, Lee S, Song H, Lee HS (2009) Wireless sensor network design for tactical military applications: remote large-scale environments, IEEE military communications conference, 1–7, doi:10.1109/MILCOM.2009.5379900

  5. Akyildiz E, Su W, Sanbrrsubrarnaoiam Y, Cuyirci E (2002) A survey OD SCOSUT network. IEEE Commmicariom Mngeirre, 40(8):102–114

    Google Scholar 

  6. Karlof C, Wagner D (2002) Secure routing in wireless sensor networks: attacks and countermeasures, Elsevier’s ad hoc network journal, special issue on sensor network applications and protocols

    Google Scholar 

  7. Kambourakis G, Klaoudatou E, Gritzalis S (2007) Securing medical sensor environments: the code blue framework case. In: Wagner R, Tjoa AM et al. (eds) 2nd international conference on availability, reliability, and security—1st international symposium on frontiers in availability, reliability and security, pp 637–643, Vienna, Austria, IEEE Computer Society Press

    Google Scholar 

  8. Su CC, Chang KM, Kuo YH, Horng MF (2005) The new intrusion prevention and detection approaches for clustering-based sensor networks. In: IEEE wireless communications and networking conference, pp 1927–1932

    Google Scholar 

  9. Krontiris I, Dimitriou T (2007) Towards intrusion detection in wireless sensor networks. In: 13th European wireless conference, Paris

    Google Scholar 

  10. Roman R, Zhou J, Lopez J (2006) Applying intrusion detection systems to wireless sensor networks. In: 3rd IEEE consumer communications and networking conference, pp 640–644

    Google Scholar 

  11. Farooqi AH, Khan FA, Wang J, Lee S (2012) A novel intrusion detection framework for wireless sensor networks, pers Ubiquit Comput, doi:10.1007/s00779-012-0529-y

  12. Li G, He J, Fu Y (2008) A group based intrusion detection scheme in wireless sensor networks. In: The 3rd international conference on grid and pervasive computing workshop, pp 286–291

    Google Scholar 

  13. Wang Q, Wang S, Meng Z (2009) Applying an intrusion detection algorithm to wireless sensor networks, Second international workshop on knowledge discovery and data mining

    Google Scholar 

  14. Newsome J, Shi E, Song D, Perrig A (2004) Detecting sybil attacks in wireless sensor networks using neighboring information. In: Proceedings of the 3rd international symposium on Information processing in sensor networks, ACM, New York, doi:10.1145/984622.984660

  15. Misra S, Myneni S (2010) On identifying power control performing sybil nodes in wireless sensor networks using RSSI, IEEE global telecommunications conference, doi:10.1109/GLOCOM.2010.5683728

  16. Teng L, Zhang Y (2010) SeRA: a secure routing algorithm against sinkhole attacks for mobile wireless sensor networks, Second international conference on computer modeling and simulation, pp 79–82, doi:10.1109/ICCMS.2010.95

  17. Chen C, Song M, Hsieh G (2010) Intrusion detection of sinkhole attacks in large scale wireless sensor networks, IEEE international conference on wireless communications, Networking and information security (WCNIS), pp 711–716, doi:10.1109/WCINS.2010.5541872

  18. Hu YC, Perrig A, Johnson DB (2006) Wormhole attacks in wireless networks. IEEE J Selected Areas Commun, 24(2):370–380, doi:10.1109/JSAC.2005.861394

    Google Scholar 

  19. Zhao Z, Wei B, Dong X, Yao L, Gao F (2010) Detecting wormhole attacks in wireless sensor networks with statistical analysis. WASE Int Conf Inf Eng (ICIE), pp 251–254, doi:10.1109/ICIE.2010.66

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to N. Ambika .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer India

About this paper

Cite this paper

Ambika, N., Raju, G.T. (2014). PDMWSN: A Probable Approach to Detect Malicious Node in Wireless Sensor Network. In: Sridhar, V., Sheshadri, H., Padma, M. (eds) Emerging Research in Electronics, Computer Science and Technology. Lecture Notes in Electrical Engineering, vol 248. Springer, New Delhi. https://doi.org/10.1007/978-81-322-1157-0_27

Download citation

  • DOI: https://doi.org/10.1007/978-81-322-1157-0_27

  • Published:

  • Publisher Name: Springer, New Delhi

  • Print ISBN: 978-81-322-1156-3

  • Online ISBN: 978-81-322-1157-0

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics