Full Paper View Go Back
Md. Ibrahim Abdullah1 , Md. Atiqur Rahman2 , Mohammad Alamgir Hossain3 , Md. Shohidul Islam4 , Md. Shamim Hossain5
- Department of Computer Science and Engineering, Islamic University, Kushat-7003, Bangladesh.
- Department of Computer Science and Engineering, Islamic University, Kushat-7003, Bangladesh.
- Department of Computer Science and Engineering, Islamic University, Kushat-7003, Bangladesh.
Section:Research Paper, Product Type: Journal-Paper
Vol.10 ,
Issue.6 , pp.30-39, Dec-2022
Online published on Dec 31, 2022
Copyright © Md. Ibrahim Abdullah, Md. Atiqur Rahman, Mohammad Alamgir Hossain, Md. Shohidul Islam, Md. Shamim Hossain . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: Md. Ibrahim Abdullah, Md. Atiqur Rahman, Mohammad Alamgir Hossain, Md. Shohidul Islam, Md. Shamim Hossain, “To Identify the Untrustworthy Leader of a Hierarchical Wireless Sensor Network Using Received Signal Strength,” International Journal of Scientific Research in Computer Science and Engineering, Vol.10, Issue.6, pp.30-39, 2022.
MLA Style Citation: Md. Ibrahim Abdullah, Md. Atiqur Rahman, Mohammad Alamgir Hossain, Md. Shohidul Islam, Md. Shamim Hossain "To Identify the Untrustworthy Leader of a Hierarchical Wireless Sensor Network Using Received Signal Strength." International Journal of Scientific Research in Computer Science and Engineering 10.6 (2022): 30-39.
APA Style Citation: Md. Ibrahim Abdullah, Md. Atiqur Rahman, Mohammad Alamgir Hossain, Md. Shohidul Islam, Md. Shamim Hossain, (2022). To Identify the Untrustworthy Leader of a Hierarchical Wireless Sensor Network Using Received Signal Strength. International Journal of Scientific Research in Computer Science and Engineering, 10(6), 30-39.
BibTex Style Citation:
@article{Abdullah_2022,
author = {Md. Ibrahim Abdullah, Md. Atiqur Rahman, Mohammad Alamgir Hossain, Md. Shohidul Islam, Md. Shamim Hossain},
title = {To Identify the Untrustworthy Leader of a Hierarchical Wireless Sensor Network Using Received Signal Strength},
journal = {International Journal of Scientific Research in Computer Science and Engineering},
issue_date = {12 2022},
volume = {10},
Issue = {6},
month = {12},
year = {2022},
issn = {2347-2693},
pages = {30-39},
url = {https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=2998},
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
UR - https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=2998
TI - To Identify the Untrustworthy Leader of a Hierarchical Wireless Sensor Network Using Received Signal Strength
T2 - International Journal of Scientific Research in Computer Science and Engineering
AU - Md. Ibrahim Abdullah, Md. Atiqur Rahman, Mohammad Alamgir Hossain, Md. Shohidul Islam, Md. Shamim Hossain
PY - 2022
DA - 2022/12/31
PB - IJCSE, Indore, INDIA
SP - 30-39
IS - 6
VL - 10
SN - 2347-2693
ER -
Abstract :
There are a multitude of privacy and safety concerns that arise as a result of wireless sensor nodes being carelessly put in potentially hazardous regions. An adversary has the capability of either seizing a node that is located in an area that is not under their control or introducing a node that is acting under the guise of a genuine node. The lack of adequate security in sensor networks presents a substantial barrier to many potential applications. A form of protection known as intrusion detection can be utilized to thwart attacks of this nature. Because of this, traditional methods of intrusion detection cannot be utilized in a sensor network due to the restricted resources of individual nodes. In this paper, we have presented a method to detect intruder in hierarchical wireless sensor networks using a sensor fusion algorithm. This method is intended to be utilized in situations in which malevolent nodes are performing the duties of Cluster Head. Clustering is an approach that sensor networks take in order to produce their detections. A technique that only requires a modest amount of communication yet is nevertheless capable of thwarting an attack on a hierarchical routing system has been described.
Key-Words / Index Term :
Wireless Sensor Network, Security, LEACH, Malicious Node, RSS, Hello Flood attack.
References :
[1] F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci. “A survey on sensor networks”, IEEE Communications Magazine, 40(8):102–114, August 2002.
[2] A. D.Wood, J. A. Stankovic, “Denial of service in sensor networks,” Computer, vol. 35, no. 10, pp. 54–62, 2002.
[3] T. Roosta, S. Shieh, S. Sastry, “Taxonomy of Security Attacks in Sensor Networks and Countermeasures”, In Proc. of the 1st Int. Conference on System Integration and Reliability Improvements, vol 25, p. 94, 2006.
[4] S. Rajasegarar , C. Leckie , M. Palaniswami, “Distributed anomaly detection in wireless sensor networks” in Proceedings of Tenth IEEE International Conference on Communications Systems IEEE ICCS, 2006.
[5] C. Karlof, D. Wagner, “Secure Routing in Sensor Networks: Attacks and Countermeasures,” in Ad Hoc Networks, volume 1, issues 2--3 (Special Issue on Sensor Network Applications and Protocols), Elsevier, September, pp 113-127, 2003.
[6] J. N. Al-Karaki, A. E. Kamal. “Routing techniques in wireless sensor networks: a survey”, Elsevier Ad Hoc Networks Journal, pp. 325–349, 2005.
[7] H.A. Obeidat, Y.A.S. Dama, R.A. Abd-Alhameed, Y.F. Hu, R. Qahwaji, J.M. Noras, S.M.R. Jones, “A comparison between vector algorithm and CRSS algorithms for indoor localization using received signal strength,” Applied Computational Electromagnetics Society Journal, vol. 31 pp. 868–876, 2016.
[8] X. Wang, P. Xu, W. Xue, “Research on online signal matching of indoor positioning based on AL-KNN algorithm,” In Proceedings of International Applied Computational Electromagnetics Society Symposium China, pp. 1–4, August 2017.
[9] N.M. Drawil, H. M. Amar, O. A. Basir, “GPS localization accuracy classification: A context-based approach”, IEEE Transaction of Intell. Transp. System, vol. 14, pp. 262–273, 2013.
[10] Y. Zhang, W. Wu, Y. Chen, “A Range-Based Localization Algorithm for Wireless Sensor Networks,” Journal of Communication Network, vol. 7, pp. 429–437, 2005.
[11] H. Xiong, Z. Chen, B. Yang, R. Ni, “TDOA localization algorithm with compensation of clock offset for wireless sensor networks”, China Communication, vol. 12, iss. 10, pp. 193-201, 2015.
[12] H. Shen, Z. Ding, S. Dasgupta, C. Zhao, “Multiple source localization in wireless sensor networks based on time of arrival measurement,” IEEE Trans. Signal Processing, vol. 62, pp. 1938–1949, 2014.
[13] X. Sheng, Y. H. Hu, “Maximum likelihood multiple-source localization using acoustic energy measurements with wireless sensor networks,” IEEE Trans. Signal Processing, vol. 53, pp. 44–53, 2005.
[14] M. Malajner, D. Gleich, P. Planinši?, “Angle of arrival measurement using multiple static monopole antennas,” IEEE Sens. Journal, vol. 15, pp. 3328–3337, 2015.
[15] W. Mardini, Y. Khamayseh, A. A. Almodawar, E. Elmallah, “Adaptive RSSI-based localization scheme for wireless sensor networks,” Peer-to-Peer Networking and Applications, 9, pp. 991–1004, 2016.
[16] C. W. Trueman, D. Davis, B. Segal, “Relationship between the path loss exponent and the room absorption for line-of-sight communication,” The Applied Computational Electromagnetics Society Journal, vol. 24, Iss. 4, pp. 361–367, 2009.
[17] S. Kurt, B. Tavli, “Path-Loss Modeling for Wireless Sensor Networks: A review of models and comparative evaluations,” IEEE Antennas Propagation Magazine,59, pp. 18–37, 2017.
[18] M. Meenalochani, S. Sudha, “Fuzzy based estimation of received signal strength in a wireless sensor network,” In Proceedings of the ACM International Conference Proceeding Series; Association for Computing Machinery, NY, USA, pp. 624–628, 2015.
[19] M. Meenalochani, S. Sudha, “Jammed Node Detection and Routing in a Multihop Wireless Sensor Network Using Hybrid Techniques,” Wireless Personal Communication, Springer, 104, pp. 663–675, 2019.
[20] S. MakalYucedag, A. Kizilay, “Time domain analysis of ultra-wide band signals from buried objects under flat and slightly rough surfaces,” Applied Computational Electromagnetics Society Journal, 28(8), pp. 646–652, 2013.
[21] A. Al Sayyari, I. Kostanic, C.E. Otero, “An empirical path loss model for Wireless Sensor Network deployment in a concrete surface environment,” In Proceedings of the IEEE 16th Annual Wireless and Microwave Technology Conference, WAMICON, NY, USA, pp. 13–15, April 2015.
[22] M. Passafiume, S. Maddio, M. Lucarelli, A. Cidronali, “An enhanced triangulation algorithm for a distributed RSSI-DoA positioning system,” In Proceedings of the 13th European Radar Conference, EuRAD, London, UK, pp. 185–188, 2016.
[23] W. R. Heinzelman, A. Chandrakasan, H. Balakrishnan, “Energy efficient communication protocol for wireless microsensor networks,” in 33rd Annual Hawaii International Conference on System Sciences, pp. 3005–3014, 2000.
[24] S. Lindsey, C. S. Raghavendra, "PEGASIS: Power Efficient GAthering in Sensor Information Systems," in the Proceedings of the IEEE Aerospace Conference, pp. 3-1125-3-1130, 2002.
[25] A. Manjeshwar and D. P. Agrawal, “TEEN: A Protocol for Enhanced Efficiency in Wireless Sensor Networks," in the Proceedings of the 1st International Workshop on Parallel and Distributed Computing Issues in Wireless Networks and Mobile Computing, San Francisco, CA, April 2001.
[26] Chipcon. SmartRF CC1000: http://www.chipcon.com/files/CC1000_Data_ Sheet_2_1.pdf, 2003.
[27] Waldir R. P. J´unior, T. H. de Paula, F. H. C. Wong, “Malicious Node Detection in Wireless Sensor Networks”, Proceedings of the 18th International Parallel and Distributed Processing Symposium (IPDPS’04), 2004.
[28] J. Wang, G. Yang, Y. Sun, S. Chen, “Sybil Attack Detection Based on RSSI for Wireless Sensor Network”, International Conference on Wireless Communications, Networking and Mobile Computing, pp. 2684-2687, 2007.
[29] M. A. Hamid, M. Mamun-Or-Rashid, C. S. Hong, “Routing Security in Sensor Network: HELLO Flood Attack and Defense”, Proceedings of IEEE International Conference on Next-generation Wireless Systems, pp. 77 – 81, 2006.
[30] T. S. Rappaport. “Wireless communications: principles and practice”, Prentice Hall, 2nd edition, 2002.
[31] J. Polastre, J. Hill, D. Culler, “Versatile low power media access for wireless sensor networks,” in SenSys ’04: Proceedings of the 2nd international conference on Embedded networked sensor systems. USA: ACM Press, 2004.
[32] T. Park and K. Shin, “LiSP: A lightweight security protocol for wireless sensor networks,” in ACM Transactions on Embedded Computing Systems, Vol. 3, No. 3, pp. 634-660, August 2004.
[33] K. Ren, W. Lou, Patrick J. Moran, “A Proactive Data Security Framework for Mission-Critical Sensor Networks,” in Proceeding IEEE Military Communications conference, MILCOM 2006, pp. 1-7, 2006.
[34] MICA2: Crossbow Technologies Inc. 100 3317.73 http://www.xbow.com/Products/Product_pdf_files/Wireless_pdf/MICA2_Datasheet.pdf , 2009.
You do not have rights to view the full text article.
Please contact administration for subscription to Journal or individual article.
Mail us at support@isroset.org or view contact page for more details.