Abstract
A wireless sensor network is the combination of large numbers of nodes connected to each other in order to communicate with other networks over a particular territory. Within the sensor networks there are two types of attacks which are active and passive attacks. The selective forwarding is the active type of attack in which malicious nodes drop some packets in the network which affect network performance which is considered in this paper. In this research work, technique of threshold is designed which detect and isolate malicious nodes from the network. The simulation results shows improvement in terms of dead nodes, throughput and packet loss.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Joseph, J., Vijayan, V.P.: Misdirection attack in WSN due to selfish nodes. detection and suppression using longer path protocol, vol. 4 (2014)
Rezvani, M., Ignjatovic, A., Bernito, E., Jha, S.: Secure data aggregation technique for wireless sensor networks in the presence of collusion attacks. IEEE Trans. Dependable Secure Comput., 12(1) (2015)
Padmavathi, G., Shanmugapriya, D.: A survey of attacks, security mechanisms and challenges in wireless sensor networks. Int. J. Comput. Sci. Inf. Secur. 4(1, 2), 1–9 (2009)
Abdullah, M.Y., Hua, G.W., Alsharabi, N.; Wireless sensor networks misdirection attacker challenges and solutions (2008). IEEE 978-1-4244-2184-8/08/
Sachan, R.S., Wazid, M., Singh, D.P., Katal, A., Goudar, R.H. Misdirection Attack in WSN: Topological Analysis and an Algorithm for Delay and Throughput Prediction (2012). IEEE 978-1-4673-4603-0/12/
Perrig, A., Stankovic, J., Wagner, D.: Security in wireless sensor networks. Commun. ACM 47(6), 53–57 (2004)
Saleem, S., Ullah, S., Yoo, H.S.: On the security issues in wireless body area networks. Int. J. Digit. Content Technol. Appl. 3(3), 178–184 (2009)
Martins, D., Guyennet, H.: Wireless sensor network attacks and security mechanisms: a short survey. IEEE (2010)
Kim, J., Caytiles, R.D., Kim, K.J.: A review of the vulnerabilities and attacks for wireless sensor networks. J. Secur. Eng. 241–250 (2014)
Sastry, A.S., Sulthana, S., Vagdevi, S.: Security threats in wireless sensor networks in each layer. Int. J. Adv. Netw. Appl. 04(04), 1657–1661 (2013)
Karlof, C., Wagner, D.: Secure routing in wireless sensornetworks: attacks and countermeasures. Ad Hoc Networks Journal 1(2–3), 293–315 (2003)
Sharma, K., Ghose, M.K.: Wireless sensor networks: an overview on its security threats. IJCA Special Issue on “Mob. Ad-hoc Netw.” MANETs 42–45 (2010)
Kamble, S., Dhope, T.: Reliable routing data aggregation using efficient clustering in WSN. In: International Conference on Communication Control and Computing Technologies, pp. 246–250. IEEE (2017)
Rani, L., Rani, E.V.: A novel study on data flow routing with energy optimization under different attacks in WSN (2015)
Joshi, M., Patel, S.: Centralized signature based approach for wireless sensor network using rsa algorithm. Int. J. Technol. Res. Eng. 2(8) (2015)
Anand, C., Gnanamurthy, R.K.: Localized DoS attack detection architecture for reliable data transmission over wireless sensor network. Wirel. Pers. Commun. 90, 847–859 (2016)
Said, O., Elnashar, A.: Scaling of wireless sensor network intrusion detection probability: 3D sensors, 3D intruders, and 3D environments. EURASIP J. Wirel. Commun. Netw. 15, 46 (2015)
Biswas, S., Adhikari, S.: A survey of security attacks, defenses and security mechanisms in wireless sensor network. Int. J. Comput. Appl. (0975–8887) 131(17), 28–35 (2015)
Ahmed, A., Bakar, K.A., Channa, M.I., Khan, A.W.: A secure routing protocol with trust and energy awareness energy routing protocol. Mobile Networks and Applications 21, 272–285 (2016)
Li, W., Liu, K., Wang, S., Lei, J., Li, E., Li, X.: Full-duplex relay for enhancing physical layer security in wireless sensor networks: optimal power allocation for minimizing secrecy outage probability. In: 2017 17th IEEE International Conference on Communication Technology (2017)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Kaur, H., Singh, P., Garg, N., Kaur, P. (2019). Enhanced TESRP Protocol for Isolation of Selective Forwarding Attack in WSN. In: Luhach, A., Singh, D., Hsiung, PA., Hawari, K., Lingras, P., Singh, P. (eds) Advanced Informatics for Computing Research. ICAICR 2018. Communications in Computer and Information Science, vol 956. Springer, Singapore. https://doi.org/10.1007/978-981-13-3143-5_41
Download citation
DOI: https://doi.org/10.1007/978-981-13-3143-5_41
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-3142-8
Online ISBN: 978-981-13-3143-5
eBook Packages: Computer ScienceComputer Science (R0)