International Journal of Scientific & Technology Research

IJSTR@Facebook IJSTR@Twitter IJSTR@Linkedin
Home About Us Scope Editorial Board Blog/Latest News Contact Us

IJSTR >> Volume 3- Issue 8, August 2014 Edition

International Journal of Scientific & Technology Research  
International Journal of Scientific & Technology Research

Website: http://www.ijstr.org

ISSN 2277-8616

Saving Wireless Networks By Detecting, And Designing Efficient From Masquerade Attacks

[Full Text]



Sonu Kumar, Anshul Anand



Keywords: Wireless Sensor Network, Security, Attack, AODV Routing.



Abstract : Wireless sensor networks (WSNs) have gained worldwide attention in recent years, particularly with the proliferation in Micro-Electro-Mechanical Systems (MEMS) technology which has facilitated the development of smart sensors. These sensors are small, with limited processing and computing resources, and they are inexpensive compared to traditional sensors. Wireless medium is inherently broadcast in nature. This makes them vulnerable to attacks. These attacks can disrupt the operation of WSN and can even defeat the purpose of their deployment. An adversary can launch DoS attacks without much effort (e.g. even without cracking keys used for cryptography-based solutions). Masquerade attacks can be very dangerous because adversaries can launch other attacks and can still hide and project themselves as legitimate nodes. Therefore, masquerade detection mechanisms are necessary. To be practical for real life WSN deployments techniques for detecting masquerade attacks should be lightweight. In our research, we proposed AODV routing protocol is used in detection technique. Time factors with rest of parameters are set to detect the malicious node.



[1] F. Akyildiz and W. Su and Y. Sankarasubramaniam and E. Cayirci, “Wireless sensor networks: a survey", Computer Networks, Vol.38, pp. 393{422, March 2002.

[2] Jangra1,A. Goel and N. Priyanka and Bhati,K. “Security Aspects in Mobile Ad Hoc Networks (MANETs)” A Big Picture”, International Journal of Electronics Engineering, pp. 189-196, 2010

[3] K. Jones and A.Waada and S. Olaniu and L.Wison and M. Eltoweissy, “Towards a new paradigm for Securing Wireless Sensor Networks”, New Security Paradigms workshop 2003, Ascona, Switzerland.

[4] Vijay Bhuse and Ajay Gupta and Ala Al-Fuqaha “Detection of masquerade attacks on Wireless Sensor Networks” , Department of Computer Science, Western Michigan University, Kalamazoo, MI 49008 2 Institute of Security Technology Studies, Dartmouth College, Hanover, NH 03755

[5] Security Goals By PFleeger http://www.cis.temple.edu/~jfiore/2012/spring/4 378/handouts/pfleeger/ch01/ch01.pdf

[6] Yinfei Pan “Design Routing Protocol Performance Comparison in NS2: AODV comparing to DSR as Example”, Department of Computer Science SUNY Binghamton Vestal Parkway East, Vestal, NY 13850.