INTRUSION TOLERANCE IN HETEROGENEOUS WIRELESS SENSOR NETWORKS USING VOTING BASED ALGORITHM WITH DYNAMIC REDUNDANCY MANAGEMENT OF MULTIPATH ROUTING

Choudhari Raghuraj, Prof.Chandrasekhar S

Abstract


In this paper our main concern is detecting fault and malicious node and evict malicious node in HWSN and also reducing energy consumption. The algorithm known as dynamic redundancy management of multipath routing in a clustered Heterogeneous Wireless Sensor Network isefficient to tolerate intrusions which are responsible for packet loss and jamming attack. The main goal and objective of the paper is to use dynamic redundancy management on multipath routing to tolerate and detect intrusions. The key concept of this algorithm is to make balance between the energy consumption and satisfy QoS requirements to increases the system useful lifetime.To satisfy the reliability requirement of a Heterogeneous WSN, a modified multipath routing scheme is proposed for finding another path in presence of malicious node in chosen path. The optimal amount of redundancy that has to be applied to achieve reliable yet energy efficient packet transfer will be estimated. Thus the proposed methodology satisfies both the energy efficiency and reliability requirements of a WSN in the presence of intrusion.


Keywords


Heterogeneous wireless sensor networks; multipath routing; intrusion detection; reliability; security;

References


I. R. Chen, A. P. Speer, and M. Eltoweissy, “Adaptive fault-tolerant QoS control algorithms for maximizing system lifetime of query-based wireless sensor networks,” IEEE Trans. Dependable Secure Computing, vol. 8, no. 2, pp. 161–176, 2011.

J. H. Cho, I. R. Chen, and P. G. Feng, “Effect of intrusion detection on reliability of mission-oriented mobile group systems in mobile ad hoc networks,” IEEE Trans. Reliab., vol. 59, no. 1, pp. 231–241, 2010.

Y. Yang, C. Zhong, Y. Sun, and J. Yang, “Network coding based reliable disjoint and braided multipath routing for sensor networks,” J. Netw. Comput. Appl., vol. 33, no. 4, pp. 422–432, 2010.

R. Machado, N. Ansari, G. Wang, and S. Tekinay, “Adaptive density control in heterogeneous wireless sensor networks with and without power management,” IET Commun., vol. 4, no. 7, pp. 758–767, 2010.

T. Shu, M. Krunz, and S. Liu, “Secure data collection in wireless sensor networks using randomized dispersive routes,” IEEE Trans. Mobile Comput., vol. 9, no. 7, pp. 941–954, 2010

F. Bao, I. R. Chen, M. Chang, and J. Cho, “Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection,” IEEE Trans. Netw. Service Manage., vol. 9, no. 2, pp. 161–183, 2012.

E. Felemban, L. Chang-Gun, and E. Ekici, “MMSPEED: multipath multi-SPEED protocol for QoS guarantee of reliability and timeliness in wireless sensor networks,” IEEE Trans. Mobile Comput., vol. 5, no. 6, pp. 738–754, 2006.

Y. Yang, C. Zhong, Y. Sun, and J. Yang, “Network coding based reliable disjoint and braided multipath routing for sensor networks,” J. Netw. Comput. Appl., vol. 33, no. 4, pp. 422–432, 2010.

J. Deng, R. Han, and S. Mishra, “INSENS: intrusion-tolerant routing for wireless sensor networks,” Computer Commun., vol. 29, no. 2, pp. 216–230, 2006.

K. D. Kang, K. Liu, and N. Abu-Ghazaleh, “Securing geographic routing in wireless sensor networks,” in Proc. 2006 Cyber Security Conf. Inf. Assurance.

W. Lou and Y. Kwon, “H-SPREAD: a hybrid multipath scheme for secure and reliable data collection in wireless sensor networks,” IEEE Trans. Veh. Technol., vol. 55, no. 4, pp. 1320–1330, 2006.

Y. Lan, L. Lei, and G. Fuxiang, “A multipath secure routing protocol based on malicious node detection,” in Proc. 2009 Chinese Control Decision Conf., pp. 4323–4328.

B. Deb, S. Bhatnagar, and B. Nath, “ReInForM: reliable information forwarding using multiple paths in sensor networks,” in Proc. 2003 IEEE Conf. Local Computer Netw., pp. 406–415.

Y. X. Jiang and B. H. Zhao, “A secure routing protocol with malicious nodes detecting and diagnosing mechanism for wireless sensor networks,” in Proc. 2007 IEEE Asia-Pacific Service Comput. Conf., pp. 49–55.

G. Bravos and A. G. Kanatas, “Energy consumption and trade-offs on wireless sensor networks,” in Proc. 2005 IEEE Int. Symp. Pers., Indoor Mobile Radio Commun., pp. 1279–1283.

C. Haowen and A. Perrig, “PIKE: peer intermediaries for key estab- lishment in sensor networks,” in Proc. 2005 IEEE Conf. Computer Commun., pp. 524–535.

S. Zhu, S. Setia, and S. Jajodia, “LEAP: efficient security mechanisms for large-scale distributed sensor networks networks,” in Proc. 2003 ACM Conf. Computer Commun. Security.

Hamid Al-Hamadi and Ing-Ray Chen, Member, “Redundancy Management of Multipath Routing for Intrusion Tolerance in Heterogeneous Wireless Sensor Networks” in IEEE Transaction on netwoks and service management,vol.10,no. 2, June 2013.


Full Text: PDF

Refbacks

  • There are currently no refbacks.




Copyright © 2012 - 2018, All rights reserved.| ijitr.com

Creative Commons License
International Journal of Innovative Technology and Research is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJITR , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.