Routing and securing the clustered step sized Wireless sensor Networks

International Journal of Mobile Computing and Application
© 2017 by SSRG - IJMCA Journal
Volume 4 Issue 1
Year of Publication : 2017
Authors : Dr. B Anjanee Kumar, N. Anuradha and M. Supriya
pdf
Citation:
MLA Style:

 Dr. B Anjanee Kumar, N. Anuradha and M. Supriya , "Routing and securing the clustered step sized Wireless sensor Networks" SSRG International Journal of Mobile Computing and Application 4.1 (2017): 13-20.

APA Style:

 Dr. B Anjanee Kumar, N. Anuradha and M. Supriya ,(2017). Routing and securing the clustered step sized Wireless sensor Networks. SSRG International Journal of Mobile Computing and Application 4(1), 13-20.

Abstract:

Popularity of wireless sensor networks (WSNs) is increasing continuously in different domains of daily life, as they provide efficient method of collecting valuable data from the surroundings for use in different applications. Routing in WSNs is the vital functionality that allows the flow of information generated by sensor nodes to the base station, while considering the severe energy constraint and the limitations of computational and storage resources. Indeed, this functionality may be vulnerable and must be in itself secured, since conventional routing protocols in WSNs provide efficient routing techniques with low power consumption, but they do not take into account the possible attacks. As sensor nodes may be easily captured and compromised, the classical cryptographic solutions become insufficient to provide optimal routing security, especially, for cluster-based WSNs, where cluster heads can be still among the compromised nodes. In this work, we propose a hierarchical, robust and well-adapted intrusion detection system, named THIDS (Threshold Hierarchical Intrusion Detection System), which is intended to be integrated into the secure hierarchical cluster-based routing protocols. We have chosen the protocol RLEACH to be equipped with the proposed IDS. The results of simulation performed under NS2 simulator show that the resulting protocol ORLEACH is much more resistant to compromised nodes exercising the most dangerous attacks.

References:

[1]  F. C. García-Hernández, et al, “Wireless sensor networks and  applications :  a  survey,” International Journal of Computer Science and Network Security (IJCSNS), vol. 7, No. 3, pp. 264-273, March 2007.
[2]  R. Patel, S. Pariyani, V. Ukani, “Energy and throughput analysis of Hierarchical routing protocol (LEACH) for wireless sensor network,” International Journal of Computer  Applications,  Vol.  20,  No.  4,  pp.  32-36, April 2011.
[3] K. Sharama, M. K. Ghose, “Security model for hierarchical clustered wireless sensor networks,” International Journal of Computer Science and Security (IJCSS), vol. 5, No. 1, pp. 85-97, 2011.
[4]  W. R. Heinzelman, A. Chandarkasan, H. Balakrishanan, “Energy efficient communication protocol for wireless micro sensor networks”,   33rd IEEE International Conference on System Sciences, pp. 1–10, Hawaii, January 2000.
[5]  S. Lindsey, C. Raghavendra, “PEGASIS: power-efficient gathering in sensor information systems”, IEEE Aerospace Conference, pp. 1125-1130, 2002.
[6] D. E. Boubiche, A. Bilami, “HEEP (hybrid energy efficient  protocol)  based  chain  clustering,”  Int.  J. Sensor Networks, vol. 10, No. ½, pp. 25-35, 2011.
[7] Y. Wang, G. Attebury, B. Ramamurthy, “A survey of security issues in wireless sensor networks,’’ IEEE communications surveys & tutorials, vol. 8, No. 2, pp.2-21, 2006.
[8]  C. Karlof, D. Wagner, “Secure routing in wireless sensor networks: attacks and countermeasures,” University of California at Berkeley, 2003.
[9]  A. C. Ferreira, et al, “On the security of cluster-based communication protocols for wireless sensor networks”, Fourth IEEE International Conference on Networking (ICNŠ), Berlin, pp. 449–458, 2005.
[10] D.Wu, G. Hu, and G. Ni, “Research and improve on secure routing protocols in wireless sensor networks”, Fourth IEEE International Conference on Circuits and Systems for Communications (ICCSC), pp. 853–856, Shanghai, May 2008.
[11] K.  Zhang,  C.  Wang,  C.  Wang,  “A  secure  routing protocol  for  cluster-based  wireless  sensor  networks using  group  key  management”,  IEEE  Computer Society, pp. 1-5, 2008.
[12] H.  Chan,  A.  Perrig,  D.  Song,  “Random  key  pre- distribution schemes for sensor networks,” Proceedings of the IEEE Computer Society Symposium on Security and  Privacy,  Piscataway,  USA:  IEEE,  pp.  197-213,2003.
[13] A.M. El-Semary, M. M. Abdel-Azim, “New Trends in Secure Routing Protocols for Wireless Sensor Networks”, International Journal of Distributed Sensor Networks, pp. 1-17, 2013.
[14] V. T. Kesavan, S. Radhakrishnan, “Multiple Secret Keys based   Security   for   Wireless   Sensor   Networks”, International Journal of Communication Networks and Information Security (IJCNIS), Vol.  4,  No.  1,  April 2012.
[15] G.  Wroblewski,  “General  method  of  program  code obfusction,” Proc. Int’l Conf. Software Eng. Research and Practise (SERP), June 2002.
[16] T. Park, S. Member, K. G. Shin, “Soft tamper-proofing via program integrity verification in wireless sensor networks,” IEEE Transactions on mobile computing, vol. 4, No. 3, pp. 297-308, May/June 2005.
[17] http://cordis.europa.eu/projects/rcn/95511_en.html.
[18] A. Abduvaliyev, et al, “On the Vital areas of Intrusion Detection Systems in Wireless Sensor Networks”, IEEE Communications Surveys & Tutorials, Vol. 15, No. 3, pp. 1223-1237, 2013.
[19] N. A. Alrajeh, S. Khan, B. Shams, “Intrusion Detection Systems in Wireless Sensor Networks: A Review”, International Journal of Distributed Sensor Networks, pp. 1-7, 2013.
[20] E. Darra, S. K. Katsikas, “Attack Detection Capabilities of Intrusion Detection Systems for Wireless Sensor Networks”, IEEE Fourth International Conference on Information, Intelligence, Systems and Applications (IISA), Piraeus, 10-12 July 2013
[21] H.   Jalali,  A.   Baraani,  “Process  Aware  Host-based Intrusion Detection Model”, International Journal of Communication Networks and Information Security (IJCNIS) Vol. 4, No. 2, August 2012.
[22] R. C. Chen, C. F. Hsieh, Y. F. Huang, “An isolation intrusion detection system for hierarchical wireless sensor networks,” Journal of networks, vol. 5, No. 3, pp. 335-342, March 2010.
[23] A. Abduvaliyev, S. Lee, Y. K. Lee, “Energy efficient hybrid intrusion detection system for wireless sensor networks,” International Conference on Electronics and Information Engineering (ICEIE), Vol. 2, pp. 25-29, Kyoto, 2010.
[24] D.  E.  Boubiche,  A.  Bilami,  “A  cross  layer  intrusion detection system for wireless sensor network,” International Journal of Network Security & Its Applications (IJNSA), vol. 4, No, 2, pp. 35-52, March 2012.
[25] S. Sharma, S. Kumar, “A survey on secure hierarchical routing protocols in wireless sensor networks,” proceedings of ACM ICCCS’11, India, pp. 146-151, February 2011.
[26] “The  MIT  uAMPSns code  extensions, Version 1.0,” Massachusetts Institute of Technology. Cambridge, August, 2000.
 

Key Words:

cluster-based wireless sensor networks, secure routing protocols, hierarchical intrusion detection system.