Вы находитесь на странице: 1из 6

IDL - International Digital Library Of

Technology & Research


Volume 1, Issue 5, May 2017 Available at: www.dbpublications.org

International e-Journal For Technology And Research-2017

Secure and Reliable Data Routing in


Wireless Sensor Network
Ahmad Omid Ahmadi
M. Tech Computer Science Engineering,
Dept of C&IT, REVA University, Bangalore, India
omid.ahmadi365@gmail.com

Abstract Wireless Sensor Networks (WSNs) are materializing as one of the dominant technologies of the
future because of their large range of applications in military and civilian fields. Because of their operating
behavior, they are often neglected and thus vulnerable to various types of attacks. For instance, an attacker
could catch sensor nodes, getting all the information saved therein-sensor nodes are generally considered to
not be temper-proof. Hence, an attacker may clone cached sensor nodes and use them in the network to
conduct a variety of mischievous activities. As the decisions taken by a sensor network rely on the
information gathered by the sensor nodes, if an adversary inhibits the necessary or confidential data from
being forwarded to the BS/ target, this will cause the whole breakdown of the network or outcomes in the
wrong judgment being made, possibly causing deliberate loss. There are many types of attacks such as
compromised node, denial of service attack, black hole attack, etc. Hence there is a necessity to find all such
attacks in WSN, and to safely route our sensitive information to the target. This paper represents the survey
of some types of attacks and there detection techniques. Also the survey includes different techniques for
secure and reliable data collection in Wireless Sensor Networks.

Index Terms Wireless Sensor Networks, Network lifetime, Security, Trust, Attacks

INTRODUCTION
Wireless Sensor Networks (WSNs) are materializing familiarity of its computing, communication, and
as a encouraging technology because of their large power resources. Each of these dispersed sensor
range of uses and applications in industrial, nodes has the ability to gather and forward
environmental watching, military and civilian fields. information either to other sensor nodes or back to an
Because of economic deliberation, the sensor nodes outside base station. A base station may be a static
are commonly simple and of less cost. node or a dynamic node which is capable of
connecting the wireless sensor network to an already
Sensor nodes are basically dispersed in a sensor presented communications structure or to the network
field, which is the region where the sensor nodes are where a user can have entry to the reported
placed. Sensor nodes cooperate between themselves information.
to generate good quality information about the
physical surroundings. Every sensor node takes its In the working of Wireless Sensor network, the
decisions on its goal, the data it presently has, and its sensor nodes are often neglected, nevertheless, and

IDL - International Digital Library 1|P a g e Copyright@IDL-2017


IDL - International Digital Library Of
Technology & Research
Volume 1, Issue 5, May 2017 Available at: www.dbpublications.org

International e-Journal For Technology And Research-2017


are thus likely to go through from various types of
novel attacks such as compromised node attack, The MDT strategy can find the mischievous sensor
Denial of service attack, Black hole attack, etc. nodes. When the Sink or base station drops some
A black hole attack (BLA) is one of the most basic packets, it will pinpoint all probable areas that the
and common type of attacks, in which the attacker mischievous sensor nodes may be distributed in.
captures a sensor node and drops all data packets that Following that, the base station can collect and
are forwarded through this sensor node, concluding monitor the information about all probable lost areas;
in important and sensitive data being rejected or not thus the base station can use the information to detect
able to be forwarded to the BS/ target. Because the the mischievous sensor nodes.
network comes on the conclusion depending on the
sensor nodes captured data, the aftermath is that the Also the MDT strategies do not require to obtain its
network will totally break and, more seriously, take geological location. In the MDT strategy, the base
wrong decisions. And hence, how to find and prevent station
BLA is of great implication for security in WSNs. only require to recognize the probable areas that the
sensor
nodes may be placed in if the base station wish to
LITERATURE SURVEY locate the
mischievous sensor nodes.
In this paper [1], authors have proposed active
detection- based security and trust routing technique
for wireless sensor network called as Active Trust. In In this paper [3], authors have introduced a hybrid
multipath scheme (H-SPREAD) to enhance both
this, numbers of detection routes are actively created
security and reliability. H-SPREAD integrates the
to immediately detect and calculate nodes trust values
in order to enhance the data packet route security. proposed path formation process in N-to-1 Multipath
More necessarily, the creation and dispersion of Routing Protocol in addition to a hybrid message
detection routes are introduced in the Active Trust transportation scheme to enhance the reliability and
technique, which can entirely use the power in non- security of data transportation in wireless sensor
hotspots to generate as many detection paths as networks. HSPREAD holds the benefits of a
threshold secret sharing technique and route
required to obtain the expected security and power
diversification of multipath data promoting to boost
efficiency. Both exhaustive hypothetical monitoring
and experimental results shows that the working of path flexibility against node breakdown or
the ActiveTrust technique is better as compared to compromise routes. As per the invulnerable property
existing techniques. ActiveTrust can considerably of the threshold secret distribution technique, data
enhance the data route accomplishment probability packets can be protectively forwarded on the way to
and capability opposed of black hole attacks and can the sink node even when a short number of sensor
increase the network lifespan. nodes or routes have breached or are attacked during
the data transportation process.
In this paper [2], author has introduced a multi
In this, the source node splits every data packet to the
dataflow topologies (MDT) strategy to confront the
various shares, S1, S2, S3... Sn, and then sends them
SFA i.e. selective forwarding attack. In the MDT
on the way to the BS via different paths. Based on the
strategy, the network is isolated into two dataflow
specific disparateness of the threshold secret
topologies. Alike if one topology has a mischievous
distribution technique, even when some number of
sensor node, the BS can still receive data packets via
routes has broken due to link or node breakdown, the
other topology.

IDL - International Digital Library 2|P a g e Copyright@IDL-2017


IDL - International Digital Library Of
Technology & Research
Volume 1, Issue 5, May 2017 Available at: www.dbpublications.org

International e-Journal For Technology And Research-2017


distinct communication can still be recapture through the technique just enhances the power utilization in
other obtained shares at the target node. non-hotspot regions and does not enhance the power
utilization in hotspot regions. Furthermore, the
N-to-1 Multipath Routing Protocol is introduced as PHACK technique largely clarifies the protocol and
per the converge cast traffic pattern of WSN. The is simple to implement. Both intellectual and
core aim is to locate numerous node-disjoint routes simulation outcomes are given to determine the
from all the sensor nodes on the way to a sink node. efficiency of the introduced technique in terms of
In extension, via data transportation step, all the large detection possibility and the capability to find
transitional nodes use packet recover technique at doubtful sensor nodes.
each node to enhance data transportation reliability.
In spite of, since this way uses the N-to-1 multipath In this paper [5], authors have introduced a
routing algorithm to build various routes, this randomized multi-path routing procedure. This
protocol may goes from the effects of wireless algorithm estimates various paths in a arbitrary
barrier. Hence, large packet drop ratio caused by manner every time an information packet wish to be
barrier can decrease the possibility of successful transmit, such that the set of paths taken by multiple
packet recovery at the sink sensor node. Furthermore, shares of distinct packets keep altering over time. As
H-SPREAD an outcome, a more number of routes can be possibly
enhances perseverance and security of data produces for each source and target. To interrupt
deployment in the network, but it cannot enhance various packets, the attacker has to compromise or
security of distinctive nodes. trouble all probable routes from the source node to
the target node, which is virtually impractical.
In this paper [4], a Per-Hop Acknowledgement
(PHACK)- based technique is introduced for every Here authors have achieved the goal by introducing
packet transposition to find selective forwarding four dispersed schemes for inseminating information
attacks. Here, the BS and every sensor node along the shares: purely random propagation (PRP), directed
prolonging path produces an acknowledgement random propagation (DRP), non-repetitive random
(ACK)/ feedback message for every obtained packet propagation (NRRP), and multicast tree-assisted
to certify the ordinary packet transmission. The random propagation (MTRP).
scheme, in which every ACK message is revert to the
sending sensor node along a disparate routing path, In this paper [6], authors have exposed the ineffective
can considerably enhance the flexibility against utilization of watchdog mechanism in currently
attacks because it prohibits an adversary from available trust systems, and by that proposed a series
compromising sensor n des in the restoration routing of escalation methods to reduce the energy
path, which can alternatively intrude the return of expenditure of watchdog usage, while maintaining
sensor nodes ACK message. The PHACK technique the systems security in a satisfactory level. Authors
also has superior capability to find anomalous packet donation subsists of hypothetical analyses and
loss and detect doubtful nodes as well as superior practicable algorithms, which can conveniently and
flexibility against attacks. Other central issue is the effectively line up the watchdog job depending on the
network lifespan of the PHACK technique, as it sensor nodes position and the destination nodes
produces more acknowledgement messages than past truthfulness.
ACK-based techniques. It is observed that the
network lifespan of the PHACK technique is not less The watchdog technique is reformed in two levels.
than that of another ACK-based technique because First, watchdog locations are reformed by seeing the

IDL - International Digital Library 3|P a g e Copyright@IDL-2017


IDL - International Digital Library Of
Technology & Research
Volume 1, Issue 5, May 2017 Available at: www.dbpublications.org

International e-Journal For Technology And Research-2017


fact- despite the sensor nodes that are placed more is consists of various routing rings and routing lines
nearly may utilize less power to observe each other where the nodes data is not directly transmitted to the
because of smaller communication range; these sink but to the closest routing ring. In this, data is
sensor nodes are more hopeful of being negotiate transmitted via each sensor node in the ring and then
together and perform coordinated attacks. Hence transmitted to other routing rings via routing lines,
optimal watchdog position (given a destination node) where the number of ambiguity sink nodes is same as
is explored to reduce the comprehensive risk (in the total number of sensor nodes in the network.
terms of power utilization and security). Second, More precisely, under the RBR technique the routing
watchdog frequency is optimized and decreased its rings move in random arrangements which can
repetition. trouble attackers even if the sink position is static and
this extremely enhances the sink position secrecy.
In this paper [7], authors have proposed a new trusted Also the routing rings are formed as per the
path which considers communication reliability and exhaustive monitoring of network energy, which can
route length for a reliable and feasible date packet entirely utilize the remaining energy and enhance
delivery in a MANET. In most of the MANET energy efficiency and network lifespan. Both
routing techniques, security is extra layer above the hypothetical analysis and simulation outcomes
routing layer. Authors have proposed the term called specify that proposed technique can protect position
attribute similarity in detecting possibly friendly secrecy of sinks efficiently.
sensor nodes among immigrant; so security is
naturally added into the routing protocol where nodes An attacked node can produce a bogus report, which
estimates trust levels of others on the basis of a set of appears in wrong alarms, data loss, and a desolation
attributes. Unlike the fixed possibilities of loosing of valuable network energy. In this paper [9], authors
data packets followed in previous routing techniques, have proposed interweaved hop-by-hop
novel proposed forwarding rule is implemented on authentication (IHA) technique to reduce such
the basis of the attribute similarity and gives a genuine harm by finding and filtering wrong reports
suggested method in evaluating the degree of at the very initial en-route sensor nodes. Unluckily,
similarity among attributes. The simulations show hop-by-hop authentication (IHA), with a one route
that the introduced pathing technique works better as from the source to the base station, cant retain its
compared to Dynamic Source Routing (DSR) security objective if more than t intervening nodes
protocol against the black hole attack and behavior are compromised. Here authors have proposed an
altering attacks and that it is not affected by slander enhanced multi-path interleaved hop-by-hop
attacks. The effects of transportation range, velocity, authentication (MIHA) technique. MIHA forms
and number of sensor nodes on pathing performances dislocated and interweaved paths and transforms to
is also examined by authors. replacement paths when there is more than t attacked
nodes on the current route to continue negotiating
Sink position secrecy is one of the big issues in with en-route insider attacks. A new key assignation
Wireless Sensor Networks (WSNs) where attackers scheme was also practiced to increase network
may find the sink by monitoring the destination of security and to decrease key storage overhead.
data packets, controlling and scaling the flow of data, Through monitoring and simulations, MIHA shows
which causes disclosure of the sink position secrecy. enhanced resilience to en-route insider attacks and
In this paper [8], authors have proposed a Ring Based refines more fraudulent reports at initial hops than
Routing (RBR) technique to focus on the problem of IHA.
sink-position secrecy in WSNs. The RBR technique

IDL - International Digital Library 4|P a g e Copyright@IDL-2017


IDL - International Digital Library Of
Technology & Research
Volume 1, Issue 5, May 2017 Available at: www.dbpublications.org

International e-Journal For Technology And Research-2017


In this paper [10], authors have designed and studied compromise routs. [3] Data packets can be
DoS attacks to determine the harm that crucial-to- protectively forwarded towards the sink node even
find attackers can cause. The first attack which is when a short number of sensor nodes or routes have
studied by authors named the JellyFish attack is are attacked during the data transportation process.
applied on the closed-loop flows like TCP; even
though protocol obedient, it has destructive effects. A Per-Hop Acknowledgment (PHACK) based
The second type of attack is the Black Hole attack, technique is introduced for every packet transposition
which has consequence same as that of JellyFish, but to find selective forwarding attacks. [4] Here the BS
on open-loop flows. Authors measure through and every sensor node along the prolonging path
simulations and examining the scalability of DoS produce and (ACK) acknowledgment / feedback
attacks as a job of key performance attributes like message for every obtained packet to certify the
mobility, size of system, node density, and counter- ordinary packet transmission.
DoS approach. The result shows that such DoS
attacks can enhance the capability of ad hoc In this algorithm estimates various paths in a
networks, as they refrain multi-hop flows and only arbitrary manner every time an information packets
enable one-hop communication, a capacity- wish to be transmit, such that the set of paths taken
enhancing, still clearly unacceptable condition. by multiple shares of distinct packets keep altering
over time. As an outcome a more number of routes
can possibly produces for each source and target. [5]
COMPARATIVE SURVEY
[7] Authors have proposed a new trusted path which
Authors have proposed active detection-based
considers communication reliability and route length
security and trust routing technique for wireless
for a reliable and feasible data packet delivery in a
sensor network called as ActiveTrust. In this, [1]
MANET. Attribute similarity concepts is proposed in
numbers of detection routs are actively created to
detecting possible friendly sensor nodes among
immediately detect and calculate nodes trust values in
immigrant. It provide communication reliability and
order to enhance the data packet route security. It
allows feasible data packet delivery.
allows energy efficient, reliable and secure routing of
data.
Authors have proposed a RBR technique to focus on
the issue of sink-position secrecy [8]. Under RBR
In this, MDT strategy is used which isolates the
technique the routing rings more in random
network into two dataflow topologies. Alike if one
arrangement which can trouble attackers even if the
topology has a mischievous sensor node, the BS can
sink position is static and this extremely enhances the
still receive data packets via other topology. [2], The
sink position secrecy.
BS receive the information time without responding
it even some packets have been lost, Scheme is
Authors have proposed [9] MIHA scheme to reduce
lightweight as simple.
such genuine harm by finding and filtering wrong
reports at the very initial en-route sensor nodes which
H-SPREAD integrates the parth formation process
forms dislocated and interweaved paths and
and hybrid message transportation scheme. It hold
transform to replacement paths when there is more
the benefits of a threshold secret sharing and route
than attacked node on the current route to continue
diversification of multipath data promoting to boost
negotiating with the en-route insider attacks.
path flexibility against node breakdown or

IDL - International Digital Library 5|P a g e Copyright@IDL-2017


IDL - International Digital Library Of
Technology & Research
Volume 1, Issue 5, May 2017 Available at: www.dbpublications.org

International e-Journal For Technology And Research-2017


In this [10], two types of attacks named JellyFish W. Lou,Y.Kwon, "H-Spread: A Hybrid Multipath
attack and Black Hole attack are studied. JellyFish Scheme for Secure and Reliable Data Collection in
attacks is applied on the closed-loop flows like TCP. Wireless Sensor Networks," IEEE Transaction on
Black Hole attack is applied on the open-loop flows. vehicular technology, vol. 55, no. 4, pp. 1320-1330,
2006.
A.Liu, M.Dong, K.Ota, et al."PHACK:An Efficient
CONCLUSION Scheme for Selective Forwarding Attack Detecting in
WSNs have hugely extended in playing a key job for WSNs," Sensors, vol. 15, no. 12, pp. 30942-30963,
the data decisive selection and shipment. As the 2015.
sensor nodes are deployed in neglected environment, T. Shu, M. Krunz,S. Liu, "Secure data collection in
they are more vulnerable to the attacks. If the attack wireless sensor networks using randomized
is not detected in WSN, there is a chance of taking dispersive routes," IEEE Transactions on Mobile
wrong decision and it is a serious issue in the Computing, vol. 9, no. 7, pp. 941-954, 2010.
sensitive fields such as in military, defense, etc. So
P. Zhou, S. Jiang, A. Irissappane, et al. "Toward
there is a need to consider the issue of detecting and
Energy-Efficient Trust System Through Watchdog
preventing such types of attacks and make the safe
Optimization for WSNs," IEEE Transactions on
and reliable routing of data packets.
Information Forensics and Security, vol. 10, no. 3,
pp. 613-625, 2015.
In this paper spotlight is on the studying various
J. Wang, Y. H. Liu, Y. Jiao, "Building a trusted
types of attacks that can be performed on the sensor
route in a mobile ad hoc network considering
node such as denial of service, Black hole attack, etc.
communication reliability and path length," Journal
Also the techniques to detect the sensor node under
of Network and
the control of adversary and the type of attack
happened on the node are presented in the paper. It Computer Applications, vol. 34, no. 4,pp. 1138-
also includes a solution for secure and reliable 1149, 2011.
routing of the data in WSN. J. Long, A. Liu, M. Dong, et al. "An energy-
efficient and sink-location privacy enhanced scheme
for WSNs through ring based routing," Journal of
Parallel and Distributed Computing, vol. 81, pp. 47-
REFERENCES 65, 2015.
Yuxin Liu, Mianxiong Dong, Member, IEEE, Kaoru T. P. Nghiem, T. H. Cho, "A multi-path interleaved
Ota, Member, IEEE, Anfeng Liu, ActiveTrust: hop-by-hop en-route filtering scheme in wireless
Secure and Trustable Routing in Wireless Sensor sensor networks," Computer Communications, vol.
Networks, IEEE Transactions on Information 33, no. 10, pp. 1202-1209, 2010.
Forensics and Security, 1556-6013 (c) 2016. I. Aad,P. J. Hubaux and W. E. Knightly, "Impact of
[H.Sun, C. Chen,Y. Hsiao, "An efficient Denial-of-Service Attacks on Ad-Hoc Networks,"
countermeasure to the selective forwarding attack in IEEE-ACM Transactions on Networking, vol. 16, no.
wireless sensor networks," in Proc. Of IEEE 4, pp. 791-802, 2008.
TENCON 2007, pp. 1-4, 2007.

IDL - International Digital Library 6|P a g e Copyright@IDL-2017

Вам также может понравиться