CFP last date
20 May 2024
Reseach Article

Cluster Head Authentication Technique against Hello Flood Attack in Wireless Sensor Networks

by Rupinder Singh, Jatinder Singh, Ravinder Singh
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 156 - Number 4
Year of Publication: 2016
Authors: Rupinder Singh, Jatinder Singh, Ravinder Singh
10.5120/ijca2016912423

Rupinder Singh, Jatinder Singh, Ravinder Singh . Cluster Head Authentication Technique against Hello Flood Attack in Wireless Sensor Networks. International Journal of Computer Applications. 156, 4 ( Dec 2016), 43-49. DOI=10.5120/ijca2016912423

@article{ 10.5120/ijca2016912423,
author = { Rupinder Singh, Jatinder Singh, Ravinder Singh },
title = { Cluster Head Authentication Technique against Hello Flood Attack in Wireless Sensor Networks },
journal = { International Journal of Computer Applications },
issue_date = { Dec 2016 },
volume = { 156 },
number = { 4 },
month = { Dec },
year = { 2016 },
issn = { 0975-8887 },
pages = { 43-49 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume156/number4/26701-2016912423/ },
doi = { 10.5120/ijca2016912423 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:01:44.434160+05:30
%A Rupinder Singh
%A Jatinder Singh
%A Ravinder Singh
%T Cluster Head Authentication Technique against Hello Flood Attack in Wireless Sensor Networks
%J International Journal of Computer Applications
%@ 0975-8887
%V 156
%N 4
%P 43-49
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The need for more effective security mechanisms is increasing with the growth of Wireless Sensor Network applications in different fields as there is an increase in the number of attacks that can be launched on them. Hello flood is one of such attack in the network layer of wireless sensor network in which an attacker with high transmission power can send or replay hello packets which are used for neighbor discovery. In this way, the attacker creates an illusion of being a neighbor to other sensor nodes and underlying routing protocol can be disrupted, which facilitate further types of attacks. The attacker broadcast packets with such a high power that a large number of sensor nodes in the network choose it as the parent node. In this paper, a novel technique based on RBG color cube number, an ID, and a unique Armstrong number is proposed for the authentication of a sensor node to become cluster head. The proposed technique is implemented in NS2, the experimental results clearly indicate the proposed technique has significant capability for the detection of hello flood attack launched for making the malicious node as the cluster head.

References
  1. Rupinder Singh, Dr. Jatinder Singh, and Dr. Ravinder Singh, “Hello flood attack Countermeasures in Wireless Sensor Networks”, International Journal of Computer Science and Mobile Applications, Vol. 4, Issue 5, April 2016, pp. 1-9.
  2. C. Venkata, Mukesh Singhal, James Royalty, and Srilekha Varanasi, “Security in wireless sensor networks”, Wireless communications and mobile computing Published online in Wiley Inder Science, 2006
  3. Yaya Shen, Sanyang Liu, Zhaohui Zhang, “Detection of Hello Flood Attack Caused by Malicious Cluster Heads on LEACH Protocol”, International Journal of Advancements in Computing Technology (IJACT), Volume 7, Number 2, March 2015.
  4. Gayatri Devi, Rajeeb Sankar Bal, Nibedita Sahoo, “Hello Flood Attack Using BAP in Wireless Sensor Network”, International Journal of Advanced Engineering Research and Science, Vol. 2, Issue 1, ISSN: 2349-6495, Jan. 2015.
  5. S. Mayur, H. D. Ranjith, “Security Enhancement on LEACH Protocol From HELLO Flood Attack in WSN Using LDK Scheme”, International Journal of Innovative Research in Science, Engineering and Technology, Vol. 4, Issue 3, ISSN (Online): 2319 – 8753, ISSN (Print): 2347 – 6710, March 2015.
  6. S. Rawan, M. Suhare, A. Manal, “Intrusion Detection of Hello Flood Attack in WSNs Using Location Verification Scheme”, International Journal of Computer and Communication Engineering, Volume 4, Number 3. May 2015.
  7. Dilpreet Kaur, Rupinderpal Singh, “Energy level based Hello Flood attack Mitigation on WSN”, International Journal of Embedded Systems and Computer Engineering, ISSN 23213361, July 2015.
  8. Jyoti, Ashu Bansal, “Detection of Hello Flood Attack on Leach Protocol Based on Energy of Attacker Node”, International Journal of Innovations & Advancement in Computer Science, Volume 4, ISSN 2347 – 8616, September 2015.
  9. Shikha Magotra, Krishan Kumar, “Detection of HELLO flood Attack on LEACH Protocol”, IEEE International Advance Computing Conference (IACC), 2014.
  10. J. Steffi, Agino Priyanka, S. Tephillah, and A. M. Balamurugan, “Attacks and countermeasures in WSN”, International Journal of Electronics & Communication, Volume 2, Issue 1, ISSN 23215984, January 2014.
  11. Satwinder Kaur Saini, Mansi Gupta, “Detection of Malicious Cluster Head causing Hello Flood Attack in LEACH Protocol in Wireless Sensor Networks”, International Journal of Application or Innovation in Engineering & Management (IJAIEM), Volume 3, Issue 5, ISSN 2319 – 4847, May 2014.
  12. Akhil Dubey, Deepak Meena, Shaili Gaur, “A Survey in Hello Flood Attack in Wireless Sensor Networks”, International Journal of Engineering Research & Technology (IJERT), Vol. 3, Issue 1, ISSN: 2278-0181, January 2014.
  13. Virendra Pal Singh, S. Aishwarya, Anand Ukey, and Sweta Jain, “Signal Strength based Hello Flood Attack Detection and Prevention in Wireless Sensor Networks”, International Journal of Computer Applications, Volume 62, No.15. January 2013.
  14. Nusrat Fatema, Remus Brad, “Attacks and counterattacks on wireless sensor networks”, International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol. 4, No. 6. December 2013.
  15. A. Anup wanjari, Vidya Dhamdhere, “Evading Flooding Attack in MANET Using Node Authentication”, International Journal of Science and Research (IJSR), Volume 3, Issue 12, ISSN (Online): 2319-7064, December 2014.
  16. Mohammad Sayad Haghighi, Kamal Mohamedpour, Vijay Varadharajan, and Barry G. Quinn, “Stochastic Modeling of Hello Flooding in Slotted CSMA/CA Wireless Sensor Networks”, IEEE transactions on information forensics and security, Vol. 6, No. 4, December 2011.
  17. Virendra Pal Singh, Sweta Jain, and Jyoti Singhai, “Hello Flood Attack and its Countermeasures in Wireless Sensor Networks”, International Journal of Computer Science Issues, Vol. 7, Issue 3, No. 11, ISSN 1694-0814, May 2010.
  18. Mohamed Osama Khozium, “Hello Flood Counter Measure for Wireless Sensor Network”, International Journal of Computer Science and Security, Volume 2, Issue 3, May 2008.
  19. A. Hamid, Mamun Rashid, Choong Seon Hong, “Defense against lap-top class attacker in wireless sensor network”, The 8th International Conference Advanced Communication Technology, Print ISBN: 89-5519-129-4, IEEE, 2006.
  20. Waldir Ribeiro Pires J´ unior Thiago H. de Paula Figueiredo Hao Chi Wong, “Malicious Node Detection in Wireless Sensor Networks”, 18th International Parallel and Distributed Processing Symposium, Print ISBN:0-7695-2132-0, IEEE, 2004.
  21. Jatinder Singh, Dr. Savita Gupta, and Dr. Lakhwinder Kaur, “A MAC Layer Based Defense Architecture for Reduction-of-Quality (RoQ) Attacks in Wireless LAN”, International Journal of Computer Science and Information Security, Vol. 7, No. 1, 2010.
  22. Jatinder Singh, Dr. Savita Gupta, and Dr. Lakhwinder Kaur, “A Cross-Layer Based Intrusion Detection Technique for Wireless Networks”, The International Arab Journal of Information Technology, Vol. 9, No. 3. May 2012.
Index Terms

Computer Science
Information Sciences

Keywords

Wireless sensor networks Hello flood attack RBG color cube Armstrong number Cluster head.