Professional Documents
Culture Documents
Prevention in WSN
Ms. MeghanaShinde Prof. D. C. Mehetre
Department of Computer Engineering Department of Computer Engineering
KJCOEMR Pune KJCOEMR Pune
meghanashinde19@gmail.com dcmehetre@gmail.com
Abstract: A wireless sensor network is vast domain which The routing of data packets from a source to a sink through the
is used to while sensing information in various range of network is of more interest for the researchers in WSN
applications. The information which is sensed is further domain. Limitation of energy resources is a major impact, as
carried to base station for processing. While processing of energy is an important fundamental component in designing of
this information, security of the routed data is very the routing protocols. Furthermore, to lessen superfluous
important and is challengeable in WSN. This has occurred transmissions of the same data the coalition of sensed data
because in unattended environments WSN is implemented. needs to be considered in WSN routing protocols. In
Researchers have worked on various problem such as preference, most of the current routing protocols endeavor at
robustness, energy consumption, security etc. from an metrics like as reliability, robustness, responsiveness and
ancient period of time. However current paper focuses preserving energy. However, the non-forbearance of possible
more on the routing which is secured as well as security obstacles in the area of routing can be perilous
trustworthy pattern. Here we have used the concept of because in almost all application areas in which WSNs are
active trust routing scheme to defend various kind of used, sensor nodes are deployed in an inimical or unfavorable
attacks during routing of the data packets. Such attacks environments, providing the opportunity for antagonist to
mainly consist of black hole attack, Denial of service attack launch certain attacks against sensor nodes. Specifically, the
and selective forwarding attack. The system also protects arresting and negotiating of nodes is an imperative issue
the data by hiding during routing by using ECC because it is easy for adversaries to access the sensors
algorithm, which provides the security. Experimental substantially.
results prove that the, proposed system improves the
security along with prolong network lifetime and low Secure Routing:
energy utilization and more efficiency throughout the Routing is one thing that extricates WSN from other networks.
network lifetime. Secure routing has to be done to ignore signal spoofing,
implanting of concoct message into the network, alteration of
messages while transmission, weave formation of loops,
Keywords: Active trust, secure routing, attack prevention, data bypass redirection of shortest path. System fault, error data
encryption. may also cause the network collapse. Secure routing has to be
done to surmount the attacks and information loss. Secure
I. INTRODUCTION
routing through the trusted node is one of the ways to avoid
the attacks mentioned above [10]. Secure routing protocol
Over few last decades, the popularity of a topic and is more have to consider the sensor network limitation such as limited
prone to be important for civil and military applications are memory, energy, resource constrained.
increasing. Due to the advancement in fields like micro-
electronics, integrated electronics that are extremely enhanced Trusted Node:
energy accumulators, in the last few time of span, the To ensure the trustworthiness of the node trust has to build up
development of sensor nodes was so much intensified that the between nodes. Trusted node refers to the node which operates
magnitude of sensor nodes got below average, whereas the normally, that is sensing and forwarding packets to proper
valuation of per sensor went down contemporaneously. The destination without any information loss. To find the trust
main motive behind this was that the sensor nodes should node as well as recognizing of malicious node many types of
form a jointly together to observe events in erratic schemes are used, some of them are discussed here. In Trust
environments by acting in a self-compositely, self-harmonize based method, Trust values can be estimated from the
ad hoc manner, i.e. without the need of human intervention. reputation along with behavior of the node.
As the fact presents and notifies that the sensor’s energy, in
most cases is dependent on a battery which should be alive for
the lifetime of sensor’s, is determinant limited, the sensor Routing attacks in WSN:
nodes are restricted in their gauge power, memory and There are different types of attacks possible by malicious
transmission range. nodes to damage the network and make the network unreliable
978-1-5386-4008-1/17/$31.00 ©2017 IEEE International Conference on Computing, Communication, Control And Automation (ICCUBEA)
2017 Third Ͷ
Eelec is energy of transmitter, k is constant. Latency = Time of packets received at Destination node –
2. Packet Delivery Ratio (PDR): Time of packet generated at Source node.
The calculation of Packet Delivery Ratio (PDR) is based on
the received and generated packets as recorded in the trace
file. In general, PDR is defined as the ratio between the
received packets by the destination and the generated packets
by the source. The formula of PDR are as follows:
୭୲ୟ୪୬୳୫ୠୣ୰୭୮ୟୡ୩ୣ୲ୱୟ୲ୢୣୱ୲୧୬ୟ୲୧୭୬
PDR in %= ୭୲ୟ୪୬୳୫ୠୣ୰୭ୟୡ୩ୣ୲ୱୋୣ୬ୣ୰୲ୣୢୟ୲ୗ୭୳୰ୡୣ
* 100
C. Evaluation Results
The existing system detect only blackhole attack. When
Selective forwarding attack occurred then existing system fail.
In proposed system we detect Selective forwarding attack as Fig.5. Path Length Comparison
well as prevent it by discarding that node. This make system
more secure and consume less energy and enhance the Figure 5 represent the length of routing paths for different size
network lifetime. of network in proposed system and existing system. In
propose system, length of routing path is minimized, so that
the energy consumption gets reduced during data sending.
Path length is nothing but the number of hopes from source to
destination in particular path.
978-1-5386-4008-1/17/$31.00 ©2017 IEEE International Conference on Computing, Communication, Control And Automation (ICCUBEA)
2017 Third ͷ
Conference on Process Automation, Control and
Out of multiple trusted paths, one trusted path will be selected. Computing, Coimbatore, 2011, pp. 1-6.
Data will be sent through that selected path. But during data
sending in base system, if at any node energy is insufficient [4] Karlof and D. Wagner, "Secure routing in wireless sensor
then whole data will not be reach to the destination, which networks: attacks and countermeasures," Proceedings of
leads to load imbalanced situation. Wherein proposed system
the First IEEE International Workshop on Sensor
if same condition is occurred, data will be sent through
another trusted path and in this way whole data will reach to Network Protocols and Applications, 2003., 2003, pp.
destination. Due to this packet drop ratio in proposed system 113-127.
will be minimum as compared to base system as shown in
figure 7. [5] N. M. Alajmi and K. Elleithy, "A new approach for
detecting and monitoring of selective forwarding attack in
V. CONCLUSION wireless sensor networks," 2016 IEEE Long Island
In WSN, the security is the most challenging problem. In most Systems, Applications and Technology Conference
of the security issues, secure routing, this paper studied (LISAT), Farmingdale, NY, 2016, pp. 1-6.
various types of attacks during routing and also some recent
solutions to provide secure routing. This paper focuses on the [6] P. C. Geethu and A. R. Mohammed, "Defense
black hole attack and selective forwarding. To detect and
mechanism against selective forwarding attack in wireless
prevent such kind of attacks, system makes use of updated
active trust scheme and data routing scheme along with data sensor networks," 2013 Fourth International Conference
type checking during routing. Also system enhance the on Computing, Communications and Networking
privacy of data by encrypting it before actual routing starts, by Technologies (ICCCNT), Tiruchengode, 2013, pp. 1-4.
using ECC algorithm. Experimental results prove that,
proposed system is better that existing one in terms of [7] M. Motamedi and N. Yazdani, "Detection of black hole
security, trustable routing, and network lifetime and energy attack in wireless sensor network using UAV," 2015 7th
consumption. Conference on Information and Knowledge Technology
(IKT), Urmia, 2015, pp. 1-5.
References
[8] P. Dewal, G. S. Narula and V. Jain, "Detection and
[1] Y. Liu, M. Dong, K. Ota and A. Liu, "ActiveTrust: Secure prevention of black hole attacks in cluster based wireless
and Trustable Routing in Wireless Sensor Networks," in sensor networks," 2016 3rd International Conference on
IEEE Transactions on Information Forensics and Computing for Sustainable Global Development
Security, vol. 11, no. 9, pp. 2013-2027, Sept. 2016. (INDIACom), New Delhi, 2016, pp. 3399-3403.
[2] S. Das, Barani S, S. Wagh and S. S. Sonavane, "Energy [9] Kellner, Ansgar, Omar Alfandi, and Dieter Hogrefe. "A
efficient and trustable routing protocol for Wireless survey on measures for secure routing in wireless sensor
Sensor Networks based on Genetic Algorithm (E2TRP)," networks." International Journal of Sensor Networks and
2016 International Conference on Automatic Control and Data Communications 1 (2012): 1-17.
Dynamic Optimization Techniques (ICACDOT), Pune,
[10] Latha, D., and K. Palanivel. "Secure Routing Through
2016, pp. 154-159.
Trusted Nodes in Wireless Sensor Networks–A
[3] S. Sharmila and G. Umamaheswari, "Detection of Survey." International Journal of Advanced Research in
Sinkhole Attack in Wireless Sensor Networks Using Computer Engineering & Technology (IJARCET) 3
Message Digest Algorithms," 2011 International (2014): 8.
2017 Third International Conference on Computing, Communication, Control And Automation (ICCUBEA)
978-1-5386-4008-1/17/$31.00 ©2017 IEEE