Abstract
Wireless sensor networks are prone to attacks as they are deployed in unattended and insecure environments that are prone to different types of attacks. Hence, security algorithms have to be implemented. This paper generates group-based encryption keys and provides a validated report to the base station which guarantees the integrity and authentication of the data that are being transmitted. This paper secures the nodes from Sybil attack by 21 %, sinkhole attack by 25 %, and wormhole attack by 30 %.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Hussain S, Schaffner S, Moseychuck D (2009) Applications of wireless sensor networks and RFID in a smart home environment, Seventh annual communication networks and services research conference, 153–157, doi:10.1109/CNSR.2009.32
Zatout Y, Campo E, Llibre J-F (2009) WSN-HM: energy-efficient wireless sensor network for home monitoring “5th International conference on intelligent sensors, sensor networks and information processing (ISSNIP):367–372, doi:10.1109/ISSNIP.2009.5416757
Gungor VC, Hancke GP (2009) Industrial wireless sensor networks: challenges, design principles, and technical approaches. IEEE Trans Ind Electron, 56(10):4258–4265, doi:10.1109/TIE.2009.2015754
Lee SH, Lee S, Song H, Lee HS (2009) Wireless sensor network design for tactical military applications: remote large-scale environments, IEEE military communications conference, 1–7, doi:10.1109/MILCOM.2009.5379900
Akyildiz E, Su W, Sanbrrsubrarnaoiam Y, Cuyirci E (2002) A survey OD SCOSUT network. IEEE Commmicariom Mngeirre, 40(8):102–114
Karlof C, Wagner D (2002) Secure routing in wireless sensor networks: attacks and countermeasures, Elsevier’s ad hoc network journal, special issue on sensor network applications and protocols
Kambourakis G, Klaoudatou E, Gritzalis S (2007) Securing medical sensor environments: the code blue framework case. In: Wagner R, Tjoa AM et al. (eds) 2nd international conference on availability, reliability, and security—1st international symposium on frontiers in availability, reliability and security, pp 637–643, Vienna, Austria, IEEE Computer Society Press
Su CC, Chang KM, Kuo YH, Horng MF (2005) The new intrusion prevention and detection approaches for clustering-based sensor networks. In: IEEE wireless communications and networking conference, pp 1927–1932
Krontiris I, Dimitriou T (2007) Towards intrusion detection in wireless sensor networks. In: 13th European wireless conference, Paris
Roman R, Zhou J, Lopez J (2006) Applying intrusion detection systems to wireless sensor networks. In: 3rd IEEE consumer communications and networking conference, pp 640–644
Farooqi AH, Khan FA, Wang J, Lee S (2012) A novel intrusion detection framework for wireless sensor networks, pers Ubiquit Comput, doi:10.1007/s00779-012-0529-y
Li G, He J, Fu Y (2008) A group based intrusion detection scheme in wireless sensor networks. In: The 3rd international conference on grid and pervasive computing workshop, pp 286–291
Wang Q, Wang S, Meng Z (2009) Applying an intrusion detection algorithm to wireless sensor networks, Second international workshop on knowledge discovery and data mining
Newsome J, Shi E, Song D, Perrig A (2004) Detecting sybil attacks in wireless sensor networks using neighboring information. In: Proceedings of the 3rd international symposium on Information processing in sensor networks, ACM, New York, doi:10.1145/984622.984660
Misra S, Myneni S (2010) On identifying power control performing sybil nodes in wireless sensor networks using RSSI, IEEE global telecommunications conference, doi:10.1109/GLOCOM.2010.5683728
Teng L, Zhang Y (2010) SeRA: a secure routing algorithm against sinkhole attacks for mobile wireless sensor networks, Second international conference on computer modeling and simulation, pp 79–82, doi:10.1109/ICCMS.2010.95
Chen C, Song M, Hsieh G (2010) Intrusion detection of sinkhole attacks in large scale wireless sensor networks, IEEE international conference on wireless communications, Networking and information security (WCNIS), pp 711–716, doi:10.1109/WCINS.2010.5541872
Hu YC, Perrig A, Johnson DB (2006) Wormhole attacks in wireless networks. IEEE J Selected Areas Commun, 24(2):370–380, doi:10.1109/JSAC.2005.861394
Zhao Z, Wei B, Dong X, Yao L, Gao F (2010) Detecting wormhole attacks in wireless sensor networks with statistical analysis. WASE Int Conf Inf Eng (ICIE), pp 251–254, doi:10.1109/ICIE.2010.66
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer India
About this paper
Cite this paper
Ambika, N., Raju, G.T. (2014). PDMWSN: A Probable Approach to Detect Malicious Node in Wireless Sensor Network. In: Sridhar, V., Sheshadri, H., Padma, M. (eds) Emerging Research in Electronics, Computer Science and Technology. Lecture Notes in Electrical Engineering, vol 248. Springer, New Delhi. https://doi.org/10.1007/978-81-322-1157-0_27
Download citation
DOI: https://doi.org/10.1007/978-81-322-1157-0_27
Published:
Publisher Name: Springer, New Delhi
Print ISBN: 978-81-322-1156-3
Online ISBN: 978-81-322-1157-0
eBook Packages: EngineeringEngineering (R0)