Skip to main content

Enhanced TESRP Protocol for Isolation of Selective Forwarding Attack in WSN

  • Conference paper
  • First Online:
Advanced Informatics for Computing Research (ICAICR 2018)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 956))

Abstract

A wireless sensor network is the combination of large numbers of nodes connected to each other in order to communicate with other networks over a particular territory. Within the sensor networks there are two types of attacks which are active and passive attacks. The selective forwarding is the active type of attack in which malicious nodes drop some packets in the network which affect network performance which is considered in this paper. In this research work, technique of threshold is designed which detect and isolate malicious nodes from the network. The simulation results shows improvement in terms of dead nodes, throughput and packet loss.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 79.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 99.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Joseph, J., Vijayan, V.P.: Misdirection attack in WSN due to selfish nodes. detection and suppression using longer path protocol, vol. 4 (2014)

    Google Scholar 

  2. Rezvani, M., Ignjatovic, A., Bernito, E., Jha, S.: Secure data aggregation technique for wireless sensor networks in the presence of collusion attacks. IEEE Trans. Dependable Secure Comput., 12(1) (2015)

    Article  Google Scholar 

  3. Padmavathi, G., Shanmugapriya, D.: A survey of attacks, security mechanisms and challenges in wireless sensor networks. Int. J. Comput. Sci. Inf. Secur. 4(1, 2), 1–9 (2009)

    Google Scholar 

  4. Abdullah, M.Y., Hua, G.W., Alsharabi, N.; Wireless sensor networks misdirection attacker challenges and solutions (2008). IEEE 978-1-4244-2184-8/08/

    Google Scholar 

  5. Sachan, R.S., Wazid, M., Singh, D.P., Katal, A., Goudar, R.H. Misdirection Attack in WSN: Topological Analysis and an Algorithm for Delay and Throughput Prediction (2012). IEEE 978-1-4673-4603-0/12/

    Google Scholar 

  6. Perrig, A., Stankovic, J., Wagner, D.: Security in wireless sensor networks. Commun. ACM 47(6), 53–57 (2004)

    Article  Google Scholar 

  7. Saleem, S., Ullah, S., Yoo, H.S.: On the security issues in wireless body area networks. Int. J. Digit. Content Technol. Appl. 3(3), 178–184 (2009)

    Google Scholar 

  8. Martins, D., Guyennet, H.: Wireless sensor network attacks and security mechanisms: a short survey. IEEE (2010)

    Google Scholar 

  9. Kim, J., Caytiles, R.D., Kim, K.J.: A review of the vulnerabilities and attacks for wireless sensor networks. J. Secur. Eng. 241–250 (2014)

    Google Scholar 

  10. Sastry, A.S., Sulthana, S., Vagdevi, S.: Security threats in wireless sensor networks in each layer. Int. J. Adv. Netw. Appl. 04(04), 1657–1661 (2013)

    Google Scholar 

  11. Karlof, C., Wagner, D.: Secure routing in wireless sensornetworks: attacks and countermeasures. Ad Hoc Networks Journal 1(2–3), 293–315 (2003)

    Article  Google Scholar 

  12. Sharma, K., Ghose, M.K.: Wireless sensor networks: an overview on its security threats. IJCA Special Issue on “Mob. Ad-hoc Netw.” MANETs 42–45 (2010)

    Google Scholar 

  13. Kamble, S., Dhope, T.: Reliable routing data aggregation using efficient clustering in WSN. In: International Conference on Communication Control and Computing Technologies, pp. 246–250. IEEE (2017)

    Google Scholar 

  14. Rani, L., Rani, E.V.: A novel study on data flow routing with energy optimization under different attacks in WSN (2015)

    Google Scholar 

  15. Joshi, M., Patel, S.: Centralized signature based approach for wireless sensor network using rsa algorithm. Int. J. Technol. Res. Eng. 2(8) (2015)

    Google Scholar 

  16. Anand, C., Gnanamurthy, R.K.: Localized DoS attack detection architecture for reliable data transmission over wireless sensor network. Wirel. Pers. Commun. 90, 847–859 (2016)

    Article  Google Scholar 

  17. Said, O., Elnashar, A.: Scaling of wireless sensor network intrusion detection probability: 3D sensors, 3D intruders, and 3D environments. EURASIP J. Wirel. Commun. Netw. 15, 46 (2015)

    Article  Google Scholar 

  18. Biswas, S., Adhikari, S.: A survey of security attacks, defenses and security mechanisms in wireless sensor network. Int. J. Comput. Appl. (0975–8887) 131(17), 28–35 (2015)

    Google Scholar 

  19. Ahmed, A., Bakar, K.A., Channa, M.I., Khan, A.W.: A secure routing protocol with trust and energy awareness energy routing protocol. Mobile Networks and Applications 21, 272–285 (2016)

    Article  Google Scholar 

  20. Li, W., Liu, K., Wang, S., Lei, J., Li, E., Li, X.: Full-duplex relay for enhancing physical layer security in wireless sensor networks: optimal power allocation for minimizing secrecy outage probability. In: 2017 17th IEEE International Conference on Communication Technology (2017)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Harkiranvir Kaur .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Kaur, H., Singh, P., Garg, N., Kaur, P. (2019). Enhanced TESRP Protocol for Isolation of Selective Forwarding Attack in WSN. In: Luhach, A., Singh, D., Hsiung, PA., Hawari, K., Lingras, P., Singh, P. (eds) Advanced Informatics for Computing Research. ICAICR 2018. Communications in Computer and Information Science, vol 956. Springer, Singapore. https://doi.org/10.1007/978-981-13-3143-5_41

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-3143-5_41

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-3142-8

  • Online ISBN: 978-981-13-3143-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics