CFP last date
22 April 2024
Reseach Article

Detection of Malicious Sensor Node in Ad Hoc Sensor Networks based on Processor Utilization

by Deepak Sharma
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 50 - Number 14
Year of Publication: 2012
Authors: Deepak Sharma
10.5120/7843-1101

Deepak Sharma . Detection of Malicious Sensor Node in Ad Hoc Sensor Networks based on Processor Utilization. International Journal of Computer Applications. 50, 14 ( July 2012), 40-46. DOI=10.5120/7843-1101

@article{ 10.5120/7843-1101,
author = { Deepak Sharma },
title = { Detection of Malicious Sensor Node in Ad Hoc Sensor Networks based on Processor Utilization },
journal = { International Journal of Computer Applications },
issue_date = { July 2012 },
volume = { 50 },
number = { 14 },
month = { July },
year = { 2012 },
issn = { 0975-8887 },
pages = { 40-46 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume50/number14/7843-1101/ },
doi = { 10.5120/7843-1101 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:48:20.503885+05:30
%A Deepak Sharma
%T Detection of Malicious Sensor Node in Ad Hoc Sensor Networks based on Processor Utilization
%J International Journal of Computer Applications
%@ 0975-8887
%V 50
%N 14
%P 40-46
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

This paper proposes a strategy based on processor utilization value provided by each sensor node of the network for detecting their malicious activities by comparing the node's present processor utilization value with the old estimated value . If the difference between the two values is higher or less than the expected value then that particular node become suspicious. A knowledge based system can take decision to expel the malicious node from the network topology

References
  1. Song JianHua, Ma ChuanXiang :A reputation-based Scheme against Malicious Packet Dropping for Mobile Ad Hoc Network.
  2. Y-C. Hu, A. Perrig, and D. Johnson, "Wormhole Attacks in Wireless Networks," IEEE JSAC,vol. 24, no. 2, Feb. 2006.
  3. Lee, B. Han, and M. Shin, "Robust Routing in Wireless Ad Hoc Networks," 2002 Int'l. Conf. Parallel Processing Wksps. , Vancouver, Canada, Aug. 18–21, 2002.
  4. P. Yi et al. , "A New Routing Attack in Mobile Ad Hoc Networks," Int'l. J. Info. Tech. , vol. 11,no. 2, 2005.
  5. D. Raffo et al. , "Securing OLSR Using Node Locations," Proc. 2005 Euro. Wireless, Nicosia,Cyprus, Apr. 10–13, 2005.
  6. B. Kannhavong et al. , "A Collusion Attack Against OLSR-Based Mobile Ad Hoc Networks,"IEEE GLOBECOM '06.
  7. Waldir Riberio Pires Junior, Thiago H. de Paula Figueiredo Hao Chi Wong :Malicious Node Detection in Wireless Sensor Networks .
  8. Rashid Hafeez Khokhar, Md Asri Ngadi , Satria Mandala:A Review of Current Routing Attacks in Mobile Ad Hoc Networks
  9. C. Karlof and D. Wagner. Secure routing in wireless sensor network: Attacks and countermeasures. First IEEE International Workshop on Sensor Network Protocols and Applications May 2003
  10. Daniel-Ioan Curiac,Ovidiu Banias,Octavian Dranga: Malicious Node Detection in Wireless Sensor Network Using an Auto regression Technique
  11. C. Perkins, E. Belding-Royer, and S. Das, "Ad Hoc On demand Distance Vector (AODV)Routing," IETF RFC 3561, July 2003.
  12. B. Kannhavong, H. Nakayama, Y. Nemoto, N. Kato, A. Jamalipour. A survey of routing attacks in mobile ad hoc networks. Security in wireless mobile ad hoc and sensor networks, October 2007, page, 85-91
  13. B. Kannhavong et al. , "A Collusion Attack Against OLSR-Based Mobile Ad Hoc Networks,"IEEE GLOBECOM '06.
  14. Z. Karakehayov, "Using REWARD to Detect Team Black-Hole Attacks in Wireless Sensor Networks," Wksp. Real-World Wireless Sensor Networks, June 20–21, 2005.
  15. S. Kurosawa et al. , "Detecting Blackhole Attack on AODV-Based Mobile Ad Hoc Networks by Dynamic Learning Method," Proc. Int'l. J. Network Sec. , 2006.
  16. D. Johnson and D. Maltz, "Dynamic Source Routing in Ad Hoc Wireless Networks," Mobile Computing, T. Imielinski and H. Korth, Ed. , pp. 153-81. Kluwer, 146.
  17. Jyoti Raju and J. J. Garcia-Luna-Aceves, " A comparison of On-Demand and Table-Driven Routing for Ad Hoc Wireless etworks'," in Proceeding of IEEE ICC, June 2000.
  18. Y-C. Hu, A. Perrig, and D. Johnson, "Wormhole Attacks in Wireless Networks," IEEE JSAC, vol. 24, no. 2, Feb. 2006.
  19. C. Perkins and E Royer, "Ad Hoc On-Demand Distance Vector Routing," 2nd IEEE Wksp. Mobile Comp. Sys. and Apps. , 149.
  20. L. Qian, N. Song, and X. Li, "Detecting and Locating Wormhole Attacks in Wireless Ad Hoc Networks Through Statistical Analysis of Multi-path," IEEE Wireless Commun. And Networking Conf. '05.
  21. D. Raffo et al. , "Securing OLSR Using Node Locations," Proc. 2005 Euro. Wireless, Nicosia, Cyprus, Apr. 10–13, 2005.
  22. K. Sanzgiri et al. , "A Secure Routing Protocol for Ad Hoc Networks," Proc. 2002 IEEE Int'l. Conf. Network Protocols, Nov. 2002.
  23. P. Yi et al. , "A New Routing Attack in Mobile Ad Hoc Networks," Int'l. J. Info. Tech. , vol. 11,no. 2, 2005.
  24. http://spie. org/x8693. xml?ArticleID=x8693,Internet28 Feb 2011
  25. Vera, A. & Kuntz, L. (2007), Process-based organization design and hospital efficiency, Health Care Management Review, 32(1), 55-65.
  26. Bruner Rick E. The decade in online advertising :1994 2004. http://www. doubleclick. com/us/knowlwdge_central/documents/REARSEH/dc_decaderinonline_0504. pdf2005.
  27. Charnes A, Copper WW,Rhodes E, Golany B. A development study of data envelopment analysis in measuring the maintenance untis in the U. S. air forces. In: Thompson R, Thrall RM, editors. The annals of operations research , vol. 2. Norwell, MA: Kluwer; 1985. p. 96-112.
  28. Ritu Lohtia, Naveen Donthu, and Idil Yaveroglu. "Evaluating the Efficiency of Internet Banner Ads," Journal of Business Research, 60 (2007), 365-370.
  29. S. Meguerdichian, F. Koushanfar, G. Qu and M. Potkonjak, "Exposure In Wireless Ad-Hoc Sensor Networks," Computer Science Department, University of California, Los Angeles, Electrical Engineering and Computer Science Department, University of California, Berkeley, Electrical and Computer Engineering Department, University of Maryland, March 2002.
  30. H. Bau, N. F. DeRooij and B. Kloeck, Mechanical Sensors, Volume 7, Sensors: A Comprehensive Survey, John Wiley & Sons, USA, December 1993.
  31. A. Perrig, R. Szeczyk, V. Wen, D. Culler and J. D. Tygar, "SPINS: Security Protocols for Sensor Networks," Department of Electrical Engineering and Computer Sciences University of California, Berkeley April 2001.
Index Terms

Computer Science
Information Sciences

Keywords

Malicious node Node profile Threshold value Regression analysis Technical efficiency