LAUSR.org creates dashboard-style pages of related content for over 1.5 million academic articles. Sign Up to like articles & get recommendations!

Swarm-based defense technique for tampering and cheating attack in WSN using CPHS

Photo by actuallyjoel from unsplash

Nowadays, Wireless Sensor Networks (WSN) have been seen as one of the most essential technologies which play a vital role in several important areas, such as healthcare, military, critical infrastructure… Click to show full abstract

Nowadays, Wireless Sensor Networks (WSN) have been seen as one of the most essential technologies which play a vital role in several important areas, such as healthcare, military, critical infrastructure monitoring, environment monitoring, and manufacturing. The desirable nature of WSN introduces many security challenges which have necessitated the introduction of several classical security methodologies over the last few years for various security attacks. A defense technique using Swarm Based Trusted Node for Tampering and Cheating Attack (SBTN-TC) model has been proposed to identify the physical layer attacks in a WSN. This model, first selects a trusted node (TN) within the network for identifying the tampered or cheating nodes using swarm intelligence. The trusted node monitors and processes the nodes session receipts involved in the transmission session to extract the contextual information such as broken links, frequent packet droppers, and fair and cheating sessions. Based on the session receipts, the trusted node renews the nodes certificate and ignores the tampered node or cheating node. In order to maintain a secure communication of contextual information between node and trusted node, a Cryptographic Puzzle Hiding Scheme (CPHS) is used for submitting the session receipts to trusted node. The effectiveness of the proposed method has been proved from the simulation results based on packet delivery ratio, packet drop, residual energy, and overhead.

Keywords: swarm based; tampering cheating; defense technique; trusted node; cheating attack

Journal Title: Personal and Ubiquitous Computing
Year Published: 2018

Link to full text (if available)


Share on Social Media:                               Sign Up to like & get
recommendations!

Related content

More Information              News              Social Media              Video              Recommended



                Click one of the above tabs to view related content.