Secure Cooperative Routing in Wireless Sensor Networks

Author:

Batool Rida1,Bibi Nargis1ORCID,Alhazmi Samah2ORCID,Muhammad Nazeer3ORCID

Affiliation:

1. Department of Computer Science, Fatima Jinnah Women University, The Mall, Rawalpindi 44000, Pakistan

2. Computer Science Department, College of Computing and Informatics, Saudi Electronic University, Riyadh 11673, Saudi Arabia

3. School of Computing Scienes, Pak-Austria Fachhochschule Institute of Applied Sciences and Technology, Haripur 22621, Pakistan

Abstract

In wireless sensor networks (WSNs), sensor nodes are randomly distributed to transmit sensed data packets to the base station periodically. These sensor nodes, because of constrained battery power and storage space, cannot utilize conventional security measures. The widely held challenging issues for the network layer of WSNs are the packet-dropping attacks, mainly sinkhole and wormhole attacks, which focus on the routing pattern of the protocol. This thesis presents an improved version of the second level of the guard to the system, intrusion detection systems (IDSs), to limit the hostile impact of these attacks in a Low Energy Adaptive Clustering Hierarchy (LEACH) environment. The proposed system named multipath intrusion detection system (MIDS) integrates an IDs with ad hoc on-demand Multipath Distance Vector (AOMDV) protocol. The IDS agent uses the number of packets transmitted and received to calculate intrusion ratio (IR), which helps to mitigate sinkhole attacks and from AOMDV protocol round trip time (RTT) is computed by taking the difference between route request and route reply time to mitigate wormhole attack. MATLAB simulation results show that this cooperative model is an effective technique due to the higher packet delivery ratio (PDR), throughput, and detection accuracy. The proposed MIDS algorithm is proven to be more efficient when compared with an existing LEACH-based IDS system and MS-LEACH in terms of overall energy consumption, lifetime, and throughput of the network.

Publisher

MDPI AG

Reference34 articles.

1. Wormhole attack detection techniques in ad-hoc network: A systematic review;Gupta;Open Comput. Sci.,2022

2. Detection of Black Hole Attack Using Honeypot Agent-Based Scheme with Deep Learning Technique on MANET;Srinivasan;Ing. Syst. d’Inf.,2021

3. Annie, M., and Terence, J.S. (2017, January 6–8). A Survey on Various Detection Techniques of Sinkhole Attacks in WSN. Proceedings of the 2017 IEEE International Conference on Communication and Signal Processing, Chennai, India.

4. A hybrid wormhole attack detection in mobile ad-hoc network (MANET);Tahboush;IEEE Access,2021

5. A review on the security of IoT networks: From network layer’s perspective;Jahangeer;IEEE Access,2023

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3