SFAD2H: Selective Forwarding or Dropping Attack Detection with 2-Hop Acknowledgment Support in Wireless Sensor Networks
Journal Title: American Journal of Engineering and Applied Sciences - Year 2017, Vol 10, Issue 4
Abstract
SFAD2H: Selective Forwarding or Dropping Attack Detection with 2-Hop Acknowledgment Support in Wireless Sensor Networks Prathap Uppara, Kiran Krishnappa, Deepa Shenoy Punjalkatte and Venugopal Kuppanna Rajuk DOI : 10.3844/ajeassp.2017.908.918 American Journal of Engineering and Applied Sciences Volume 10, Issue 4 Pages 908-918 Abstract Security in wireless sensor networks is critical due to its way of open communication. In this study we have proposed a technique based on a sensor node having alternate path knowledge and 2-hop acknowledgement mechanism to detect adversary nodes which perform selective forwarding and dropping attacks. In selective forwarding attack nodes on the forwarding path refuses to transfer packets selectively. The proposed approach starts with network initialization where every node decides the list of parent nodes through which Sink can be reached with equal distance. Each node chooses a parent node among selected parents to forward the data and establishes pairwise keys with 2-hop parent nodes. During data forwarding, child forwards the packet to 1-hop distance parent, handles acknowledgement from 2-hop distance node and decides the number of packets forwarded and dropped based on successful and unsuccessful transactions. Every node sends a transaction report containing observations on the parent via alternate path to Sink at a particular interval of time called an evaluation period. Sink identifies the malicious node by comparing report received from each node with number of data packets received. Simulated the algorithm in NS-3 and performance analysis compared with other recently proposed approach. Simulation results show that proposed method detects the malicious nodes efficiently and early. Copyright © 2017 Prathap Uppara, Kiran Krishnappa, Deepa Shenoy Punjalkatte and Venugopal Kuppanna Rajuk. This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.
Authors and Affiliations
Prathap Uppara, Kiran Krishnappa, Deepa Shenoy Punjalkatte, Venugopal Kuppanna Rajuk
Anthropomorphic Solid Structures n-R Kinematics
Abstract This paper presents and treats (in an original way) the specific elements of the structures of robotic solid mobile anthropomorphic type. Are "placed on the wallpaper", the geometry and kinematics of the anthro...
Smart Orthopaedic Implants: Applications in Total Knee Arthroplasty
Abstract Total knee arthroplasty is a common orthopaedic procedure conducted in the United States with approximately 700,000 surgeries performed annually. A common complication following total knee arthroplasty is anter...
A Brief Introduction to the Bird Strike Numerical Simulation
Abstract Bird impacts can be extremely critical events for the air transport safety. Since aircraft structures have become more and more complex components, the numerical prediction of the damage onset and evolution ind...
Using of Box-Benken Method to Predict the Compressive Strength of Self-Compacting Concrete Containing Wadi Musa Bentonite, Jordan
Using of Box-Benken Method to Predict the Compressive Strength of Self-Compacting Concrete Containing Wadi Musa Bentonite, Jordan Arabi N.S. AL Qadi, Mahmoud B.A. ALhasanat, Ahmad AL Dahamsheh and Sleiman AL Zaiydneen D...
An Efficient Resource Provisioning Technique in Inter-Cloud using Peer-to-Peer Approach
Abstract Resource discovery is the process of computing systems; it supports resource management and scheduling of applications. It searches for the apposite variety of resource that satisfies the user's requirements. R...