doi: 10.17586/2226-1494-2022-22-6-1127-1135


A multi-path secure routing for the detection of node capturing attack in wireless sensor network

J. Kolangiappan, S. Angamuthu


Read the full article  ';
Article in English

For citation:
Kolangiappan J., Senthil Kumar A. A multi-path secure routing for the detection of node capturing attack in wireless sensor network. Scientific and Technical Journal of Information Technologies, Mechanics and Optics, 2022, vol. 22, no. 6, pp. 1127–1135. doi: 10.17586/2226-1494-2022-22-6-1127-1135


Abstract

Over the past few years, the devices in Wireless Sensor Networks (WSN) are growing exponentially due to the emergence of many sophisticated applications. This tremendous growth leads to serious security challenges, and the devices of WSN should be protected from various attacks. WSN can be configured dynamically without fixed infrastructure and the devices can be talked with one another in an ad-hoc manner. Due to the dynamic nature of WSN, routing is considered as the challenging task that should be performed efficiently with robust routing mechanism. Even though many routing schemes have been emerged for WSN, they are not well scalable in very large-scale environment. This work introduces multi path routing strategy, and the routing will be selected based on trusted nodes. First, the trusted nodes are identified using trusted metrics of each node in the network. These metrics are calculated based on the threshold value of nodes. Then, secure routing is established by isolating node capturing attacks from the path. The performance of the work is analyzed in terms of packet loss, computational time and throughput. The paper compares the performance with the state-of-the-art routing schemes such as EMBTR (Enhanced Multi Attribute Based Attack Resistance), TSRM (Trust based secure routing model), and TARF (Trust-aware routing framework for WSNs). The outcome of the simulation shows that the proposed scheme outperforms the other state-of-the-work in terms of computational cost, throughput, and delay.


Keywords: routing, security, node capturing, WSN

References
  1. Albakri A., Harn L. Non-Interactive group key pre-distribution scheme (GKPS) for end-to-end routing in wireless sensor networks. IEEE Access, 2019, vol. 7, pp. 31615–31623. https://doi.org/10.1109/ACCESS.2019.2900390
  2. Airehrour D., Gutierrez J.A., Ray S.K. SecTrust-RPL: A secure trust-aware RPL routing protocol for Internet of Things. Future Generation Computer Systems, 2019, vol. 93, pp. 860–876. https://doi.org/10.1016/j.future.2018.03.021
  3. Ali R., Pal A.K., Kumari S., Karuppiah M., Conti M. A secure user authentication and key-agreement scheme using wireless sensor networks for agriculture monitoring. Future Generation Computer Systems, 2018, vol. 84, pp. 200–215. https://doi.org/10.1016/j.future.2017.06.018
  4. Han L., Zhou M., Jia W., Dalil Z., Xu X. Intrusion detection model of wireless sensor networks based on game theory and an autoregressive model. Information Sciences, 2019, vol. 476, pp. 491–504. https://doi.org/10.1016/j.ins.2018.06.017
  5. Shajilin Loret J.B., Vijayalakshmi K. Security enrichment with trust multipath routing and key management approach in WMN. IETE Journal of Research, 2018, vol. 64, no. 5, pp. 709–721. https://doi.org/10.1080/03772063.2017.1369365
  6. Usman A.B., Gutierrez J. DATM: A dynamic attribute trust model for efficient collaborative routing. Annals of Operations Research, 2019, vol. 277, no. 2, pp. 293–310. https://doi.org/10.1007/s10479-018-2864-5
  7. Zawaideh F., Salamah M. An efficient weighted trust-based malicious node detection scheme for wireless sensor networks. International Journal of Communication Systems, 2019, vol. 32, no. 3, pp. e3878. https://doi.org/10.1002/dac.3878
  8. Agrawal S., Das M.L., Lopez J. Detection of node capture attack in wireless sensor networks. IEEE Systems Journal, 2019, vol. 13, no. 1, pp. 238–247. https://doi.org/10.1109/JSYST.2018.2863229
  9. Mishra A.K., Turuk A.K. A comparative analysis of node replica detection schemes in wireless sensor networks. Journal of Network and Computer Applications, 2016, vol. 61, pp. 21–32. https://doi.org/10.1016/j.jnca.2015.12.001
  10. Lin C., Wu G. Enhancing the attacking efficiency of the node capture attack in WSN: a matrix approach. Journal of Supercomputing, 2013, vol. 66, no. 2, pp. 989–1007. https://doi.org/10.1007/s11227-013-0965-0
  11. Wang C., Wang D., Tu Y., Xu G., Wang H. Understanding node capture attacks in user authentication schemes for wireless sensor networks. IEEE Transactions on Dependable and Secure Computing, 2022, vol. 19, no. 1, pp. 507–523. https://doi.org/10.1109/TDSC.2020.2974220
  12. Khan F.A.B., Hannah L., Devi K.S., Rajalakshmi S. A multi-attribute based trusted routing for embedded devices in MANET-IoT. Microprocessors and Microsystems, 2022, vol. 89, pp. 10446. https://doi.org/10.1016/j.micpro.2022.104446
  13. Vidhya Lakshmi G., Vaishnavi P. An efficient security framework for trusted and secure routing in MANET: A comprehensive solution. Wireless Personal Communications, 2022, vol. 124, no. 1, pp. 333–348. https://doi.org/10.1007/s11277-021-09359-2
  14. Nikokheslat H.D., Ghaffari A. Protocol for controlling congestion in wireless sensor networks. Wireless Personal Communications, 2017, vol. 95, no. 3, pp. 3233–3251. https://doi.org/10.1007/s11277-017-3992-y
  15. Jin X., Liang J., Tong W., Lu L., Li Z. Multi-agent trust-based intrusion detection scheme for wireless sensor networks. Computers and Electrical Engineering, 2017, vol. 59, pp. 262–273. https://doi.org/10.1016/j.compeleceng.2017.04.013
  16. Wu F., Xu L., Kumari S., Li X. A new and secure authentication scheme for wireless sensor networks with formal proof. Peer-to-Peer Networking and Applications, 2017, vol. 10, no. 1, pp. 16–30. https://doi.org/10.1007/s12083-015-0404-5
  17. Shin S., Kwon T., Jo G.-Y., Park Y., Rhy H. An experimental study of hierarchical intrusion detection for wireless industrial sensor networks. IEEE Transactions on Industrial Informatics, 2010, vol. 6, no. 4, pp. 744–757. https://doi.org/10.1109/TII.2010.2051556
  18. Ayday E., Fekri F. An iterative algorithm for trust management and adversary detection for delay-tolerant networks. IEEE Transactions on Mobile Computing, 2012, vol. 11, no. 9, pp. 1514–1531. https://doi.org/10.1109/TMC.2011.160
  19. Kamvar S., Schlosser M., Garcia-Molina H. The EigenTrust algorithm for reputation management in P2P networks. Proc. of the 12th International Conference on World Wide Web, 2003, pp. 640–651. https://doi.org/10.1145/775152.775242
  20. Umar I.A., Hanapi Z.M., Sali A., Zulkarnain Z.A. TruFiX: A configurable trust-based cross-layer protocol for wireless sensor networks. IEEE Access, 2017, vol. 5, pp. 2550–2562. https://doi.org/10.1109/ACCESS.2017.2672827


Creative Commons License

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License
Copyright 2001-2024 ©
Scientific and Technical Journal
of Information Technologies, Mechanics and Optics.
All rights reserved.

Яндекс.Метрика