Open Access Open Access  Restricted Access Subscription Access

Cluster Head and RREQ Based Malicious Behaviour Detecting and Preventing Approach in WSN

Reena Rajpoot, Krishna K Joshi

Abstract


Wireless sensor network is a type of network which has no communications pattern for communicate between nodes, new nodes easily integrate in network so attacks easily deploy on it. Gray hole is additionally one of the attacks that are tough to notice as a result of it will behave each as normal node and malicious node. For detecting and preventing malicious behavior of node we propose a technique Cluster head and RREQ based malicious behavior detecting and preventing approach in WSN. In our propose work we select a node which have highest energy as a cluster head and remaining node work as a cluster member, for each node we decide a thresh hold for sending RREQ if any node generate RREQ more than thresh hold than we check its RREP thresh hold value if it’s less than one than cluster head broad cast the node id of this node so that all node drop the request arrive from this malicious node, and for gray hole detection if node does not send RREP frequently then for checking its malicious behavior we send RREQ which is generate by flooder node if any node reply positively so same as we do with this malicious node and drop the route which is generate by this malicious node.

Keywords: WSN, denial of service attack, gray hole attack, AODV

 

Cite this Article
Reena Rajpoot, Krishna K Joshi. Cluster head and rreq based malicious behaviour detecting and preventing approach in WSN. Journal of Operating Systems Development & Trends. 2015; 2(3): 1–9p.


Full Text:

PDF

References


Pahune Vaishali, Khode Sharda. Security Issues, Attacks And Challenges In Wireless Sensor Network. International Journal Of Engineering Sciences & Research Technology. 2015.

Kumar Vikash, Jain Anshu, Barwal PN. Wireless Sensor Networks: Security Issues, Challenges and Solutions. International Journal of Information & Computation Technology. 2014.

Royer Elizabeth M, Perkins Charles E. An Implementation Study of the AODV Routing Protocol. Wireless Communications and Networking Confernce, 2000. WCNC. IEEE. 2000; 3.

Kumar Mahendra, Bhushan Ajy, Kumar Amit. A Study of wireless Ad -Hoc Network attack and Routing Protocol attack. 2012; 2(4).

Gunasekaran M, Premalatha K. A Survey on DoS Attacks and Countermeasures in Mobile Ad Hoc Networks. International Journal of Advanced Research in Computer Science. 2010.

Sen J et al. A Mechanism for Detection of Gray Hole Attack in Mobile Ad Hoc Networks. ICICS. 2007.

Dharini N, Balakrishnan Ranjith, Renold A Pravin. Distributed Detection Of Flooding And Gray Hole Attacks In Wireless Sensor Network. International Conference On Smart Technologies And Management For Computing, Communication, Controls, Energy And Materials (ICSTM). 2015.

Sawant PV, Sable MP, Kore PV, Bhosale SR. A System For Denialofservice Attack Detectionbased On Multivariate Correlation Analysis. Multidisciplinary Journal of Research in Engineering and Technology. 2015.

Kumar Avenash, Chawla Meenu. Destination based group gray hole attack detection in WSN through AODV. Internationl Journal of Computer Science. 2012.

AK Hizbullah Khatt, Nizamuddin, Khurshid Fahad, Amin Noor ul. Preventing Black and Gray Hole Attacks in AODV using Optimal Path Routing and Hash. IEEE. 2013.

Lokare DeepaliA, Kanthe AM, Simunic Dina. Cooperative Gray Hole Attack Discovery and Elimination using Credit based Technique in WSN. International Journal of Computer Applications. 2014.


Refbacks

  • There are currently no refbacks.


This site has been shifted to https://stmcomputers.stmjournals.com/