Abstract
Due to the significant improvement in wireless communication technology, the need of Wireless Sensor Networks (WSN) have a vital role in the areas such as military applications, environmental monitoring, health care, home or industrial automation etc. However such type of network always been vulnerable to security threats, because the WSN has the resource constraints such as low battery life, low processing power, small memory, deployment in hostile environment and the radio links for communication are insecure. Thus, it is necessary to use effective detection mechanism to prevent WSN from routing attacks for reliable data transmission. In this paper, a signature based detection approach is proposed for detecting the routing attacks. For every known attack it has certain signature, based on this the rules are designed with the rule base which are applied for detecting various routing attacks such as wormhole, black hole and sybil attack. The simulated results show that the proposed signature based approach improves the reliability of data by measuring the parameters such as throughput and packet delivery ratio while detecting the routing attacks.
Similar content being viewed by others
References
Akyildiz, I. F., Su, W., Sankarasubramaniam, Y., & Cayirci, E. (2002). Wireless sensor networks: a survey. Computer Networks, 38, 393–422.
Mohanty, P., Panigrahi, S., Sarma, N., & Sankar Satapathy, S. (2010). Security issues in wireless sensor network data gathering protocols: A survey. Journal of Theoretical and Applied Information Technology, 13(1), 14.
Rassam, M. A., Maarof, M. A., & Zainal, A. (2012). A survey of intrusion detection schemes in wireless sensor networks. American Journal of Applied Sciences, 9(10), 1636–1652.
Padmavathi, G., & Shanmugapriya, D. (2009). A survey of attacks, security mechanisms and challenges in wireless sensor networks. International Journal of Computer Science and Information Security, 4(1–2), 1–9.
Wang, Y., Attebury, G., & Ramamurthy, B. (2006). A survey of security issues in wireless sensor networks. IEEE Communications Surveys & Tutorials, 8, 2–23.
Teodoroa, P. G., Verdejo, J. D., Fernandez, G. M., & Vazquez, E. (2009). Anomaly-based network intrusion detection: techniques, systems and challenges. Computers & Security, 28, 18–28.
Alrajeh, N. A., Khan, S., & Shams, B. (2013). Intrusion detection systems in wireless sensor networks: A review. International Journal of Distributed Sensor Networks, 2013, Article ID 167575.
Zahariadas, T., Trakadas, P., Maniatis, S., & Karkazis, P. (2009). Efficient detection of routing attacks in wireless sensor networks. In 16th International conference, systems, signals and image processing, pp. 1–4, 2009.
de Silva, A. P. R., Martins, M. H. T., Rocha, B. P. S., Loureiro, A. A. F., Ruiz, L. B., & Wong, H. C. (2005). Decentralized intrusion detection in wireless sensor networks. Montreal, QC, pp. 16–23.
Hu, Y., Perring, A., & Johnson, D. B. (2003) Packet leashes: A defense against wormhole attacks in wireless networks. In Proceedings of 22nd annual conference on IEEE computer and communication society, pp. 1976–1980.
Laos, L., Poovendran, R., Meadows, C., Syverson, P., & Chang, W. (2005). Preventing wormhole attacks on wireless ad hoc networks: A graph theoretic approach. IEEE Conference Wireless Communications and Networking, 2, 1193–1199.
Dong, D., Li, M., Liu, Y., Li, X.-Y., & Liao, X. (2011). Topological detection on wormholes in wireless ad hoc and sensor networks. IEEE/ACM Transactions on Networking, 19, 1787–1796.
Tun, Z., & Maw, A. H. (2008). Wormhole attack detection in wireless sensor networks. World Academy of Science, Engineering and Technology, 46, 545–550.
Newsome, J., Shi, E., Song, D., & Perrig. A. (2004). The sybil attack in sensor networks: Analysis & defenses. In Proceedings on international symposium on information processing in sensor networks, 2004.
Sharmila, S., & Umamaheswari, G. (2012). Detection of sybil attack in mobile wireless sensor networks. International Journal Of Engineering Science & Advanced Technology, 2, 256–262.
Tamilselvan, L., & Sankarnarayanan, V. (2007). Prevention of blackhole attack in MANET. In Proceeding from AUS- WIRELESS’07: 2nd international conference on wireless broadband and ultraband communications, Sydney, 27–30, pp. 21.
Zhao, Z., Wei, B., Dong, X., Yao, L., & Gao, F. (2010) Detecting wormhole attacks in wireless sensor networks with statistical analysis. In WASE international conference on information engineering, pp. 251–254.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Saravana Kumar, N.M., Deepa, S., Marimuthu, C.N. et al. Signature Based Vulnerability Detection Over Wireless Sensor Network for Reliable Data Transmission. Wireless Pers Commun 87, 431–442 (2016). https://doi.org/10.1007/s11277-015-3070-2
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-015-3070-2