Professional Documents
Culture Documents
(28-32) Analysis of Wireless Sensor Networks Through Secure Routing Protocols
(28-32) Analysis of Wireless Sensor Networks Through Secure Routing Protocols
International Journal of
DOI (Journal): 10.37591/IJWNS
Review IJWNS
Abstract
The point of this paper is to talk about secure directing in Remote Sensor systems. I have made an
endeavor to display an examination on the security of Coordinated Dissemination, a convention utilized
for steering in remote sensor systems. Beside this the paper too examines the different assaults
conceivable on this directing convention and the conceivable countermeasures to anticipate theses
assaults. In this paper data centric internet-based protocol called Diffusion methods for secure routing
is described. This protocol is novel routing protocol and is provided to remove possible threats and
attacks in routing structure and hence it is taken to analyze in terms of security issues. This protocol is
implanted in wireless sensor nodes and the network taken is wireless sensor networks. Interest
dissemination procedure is used, and three types of attacks are studied here: denial of service attacks,
routing information modification and spoofing, and data dropping or selective forwarding. External
attacks may be mitigated by link layer encryption, but compromised nodes within the network would be
the most difficult to prevent We conclude the drooping the data and when required and modifying or
spoofing the will give the solution of the problem mentioned. Direct Diffusion (DD) is a routing protocol
that allows communication between sink and source nodes in networks with random and mesh
topologies. This routing protocol takes a data-centric approach, with intermediate nodes aggregating
data and sending it to a sink node. The solution provided is useful for further analysis of extended WSN
networks.
Keywords: Wireless Sensor Networks, Interference, Secure Routing, Routing Protocol, Detector
Network
INTRODUCTION
The advancements in wireless communication and electronics have resulted in an increased interest
in the field of wireless detector networks. A detector network involves the deployment of an array of
sensors for the distributed monitoring of real-time events. Because the detector nodes are battery
powered, the detector networks have limited energy. The detector nodes even have restricted memory
and procedure capability and may be deployed in remote areas or inhospitable piece of land. There has
been AN increasing use of detector networks always
vital applications like watching patients in hospitals
*Author for Correspondence
E.N. Ganesh
and military applications. These applications create
E-mail: enganesh50@gmail.com it vital to own a decent security infrastructure for
detector networks. The readying of those networks
Dean, School of Engineering, Vels Institute of Science,
Technology & Advanced Studies (VISTAS), Chennai, Tamil
in military applications and therefore the restricted
Nadu, India power and memory, create the planning of a security
protocol terribly difficult. during this paper security
Received Date: December 22, 2021
Accepted Date: December 27, 2021
problems in Directed diffusion are self-addressed.
Published Date: December 31, 2021 Directed Diffusion could be a novel routing
protocol for detector networks. A look-in to
Citation: E.N. Ganesh. Analysis of Wireless Sensor networks
through Secure Routing Protocols using Directed Diffusion
potential attacks and counter measures is provided.
methods. International Journal of Wireless Network Security. In [1] to [3] sensor networks security and
2021; 7(2): 28–32p. optimization discussed in detail. Performance
improvement like power, efficiency and throughput is explained for wireless networks in detail in [4]
to [6]. Application of WSN its challenges and design compatibility is briefed in [7] and [8] respectively.
In [9] and [10] WSN Study and IOT related WSN Issues are explained in detail. Directed Diffusion: An
insight briefly covers the directed diffusion protocol followed by a discussion on the potential attacks
on this routing protocol. The paper is finished with a short analysis on the potential countermeasures to
forestall such attacks.
Based on these parameters for the interest dissemination, a gradient is set-up within the reverse
direction for information flow. This gradient is set-up in response to the interest dissemination instantiated
by the sink node. This method of interest dissemination and therefore the corresponding gradient
institution continues till we have a tendency to reach the nodes generating the events. These are spoken
as supply nodes. the info is routed through ways, that have the next gradient price. Those nodes, that
transmit information a lot of often to the sink node, would be completely strengthened. this is able to mean
that the ways to those nodes would acquire higher gradient values, by increasing the info refresh rate. The
sink node should refresh and reinforce the interest once it begins to receive information from the supply
node. additionally every node stores a replica of the interest it receives in AN interest cache, before it
forwards the interest. this is often done to avoid routing loops and continual flooding. therefore the directed
diffusion relies on information central routing wherever the sink node broadcasts the interest.
In the following sections these attacks at the side of the potential countermeasures against these
attacks is mentioned.
Malicious node
Processing
Communication
Sensing unit Unit
Unit
Base Station
Malicious node
Spoofed positive
Reinforcements
Opposite Node
Nodes generating and sending event data as they have a high gradient path to malicious node
• Rebroadcasts the interests to its upstream nodes. Upstream is that the direction from sink node to
supply node.
• Sends robust positive reinforcements to the upstream nodes. this is able to change the malicious
node to receive a gradual flow of events from the its upstream nodes.
• Send spoofed events at a high rate to the sink node or base station.
• This would create the bottom station to completely reinforce the malicious node as against the
alternate routes, because the node is generating a gradual stream of events.
• Thus the malicious node has with success been ready to embody itself within the path of the
bottom station and observes all packets sent to the bottom station. The Figure 2 below depicts this
COUNTERMEASURES
The following are number of the issues with the directed diffusion protocol, that create the protocol
a lot of vulnerable:
1. The interest packet within the Directed diffusion protocol doesn't have any data concerning the
sink node that generated the interest. There can be some provision to specify the identity of the
sink node within the interest packet. This at the side of the encoding of the info would create
spoofing interests troublesome.
2. {the data|the info|the data} packets received from the supply nodes contain no information
concerning the identity of the supply node. This data not to mention encoding {of information|of
knowledge|of information} would to some extent stop malicious nodes from spoofing high data
rates to the bottom station.
One of the helpful steps that may be taken to forestall a number of the attacks is to use encoding at
the link layer. The nodes may share a key with the bottom station and therefore information flow can
be documented. it's very important that economical symmetrical key cryptological schemes use. Public
key cryptography would be too expensive and impossible to use in detector networks with the restricted
memory and procedure capabilities of the nodes. The link layer encoding would stop most external
attacks against detector networks. Internal attacks from compromised nodes are more durable to defend
against. One novel theme of preventing a number of the attacks would be for the bottom station to limit
the amount of neighbors a node will have. this is able to prohibit the compromised node to human action
with its immediate neighbors. it'd be terribly laborious to defend against a denial of service attack if the
malicious node contains a robust transmitter. it's very important to style the protection infrastructure
into the routing protocol instead of attempting to retrofit. With the challenges of restricted node power
and memory, the protection for detector networks is AN open analysis issue.
CONCLUSION
This Article addresses a number of routing protection issues in detector networks by using the
directed diffusion protocol as an example to analyse attacks and general potential countermeasures.
Link layer encoding could also be spare for external attacks, however compromised nodes at intervals
the network would be the foremost troublesome attacks to forestall. This has got to be achieved with
careful and aware planning of the routing protocol.
REFERENCES
1. Intanagonwiwat C, Govindan R, Estrin D. Directed diffusion: A scalable and robust
communication paradigm for sensor networks. In Proceedings of the 6th annual international
conference on Mobile computing and networking 2000 Aug 1 (pp. 56-67).
2. Karlof C, Wagner D. Secure routing in wireless sensor networks: Attacks and countermeasures.
Ad hoc networks. 2003;1(2-3):293-315.
3. Stella K, Manikandan T, Ganesh EN. Detection of Optimized Intermediate Sensor Nodes Using
Carrier Sensing Power and Genus Factor for Energy Efficient Multipath Routing Protocol in
Wireless Sensor Networks. Sensor Letters. 2019 Apr 1;17(4):290-295.
4. Sathyasri B, Ganesh EN, Senthilkumar P. Enhance packet transmission using improved channel
assignment in wireless mess network. Concurrency and Computation: Practice and Experience.
2021 Feb 10;33(3): e5357.
5. Mathivilasini S. and Ganesh E.N. Design of a Low Power Smart Wireless Sensor” alochana chakra
journal. 2020; 9: 3097-3102.
6. Ravikumar D., Ganesh E.N. Research issues in wireless sensor networks – a review. International
journal of information and computing science. 2019;6: 457-462.
7. Stella K, Ganesh EN, Manikandan T. Experimental Analysis of Fault Tolerant Authentication in
Non-Invasive Epidermal Glucose Sensor Using SQEZLMRP Based Information Transmission in
Wireless Sensor Networks. Sensor Letters. 2018 Mar 1;16(3):224-33.
8. Ganesh EN. Wireless Sensor Network: The Challenges of Design and Programmability.
International Journal of Telecommunications & Emerging Technologies. 2017 Apr 10;3(1):23-34.
9. Ganesh E. IOT based environment monitoring using wireless sensor network. International Journal
of Advanced Research. 2017;5(2):964-970.
10. Sathyasri B, Ganesh EN, Kumar PS. Comparative study of routing protocols in wireless mesh
networks. IIOAB journal. 2017 Jan 1;8(2):27-35.