Download as pdf or txt
Download as pdf or txt
You are on page 1of 5

Volume 7, Issue 2, 2021

International Journal of
DOI (Journal): 10.37591/IJWNS

Wireless Network Security


http://computers.journalspub.info/index.php?journal=JWNS&page=index

Review IJWNS

Analysis of Wireless Sensor Networks Through Secure


Routing Protocols Using Directed Diffusion Methods.
E.N. Ganesh*

Abstract
The point of this paper is to talk about secure directing in Remote Sensor systems. I have made an
endeavor to display an examination on the security of Coordinated Dissemination, a convention utilized
for steering in remote sensor systems. Beside this the paper too examines the different assaults
conceivable on this directing convention and the conceivable countermeasures to anticipate theses
assaults. In this paper data centric internet-based protocol called Diffusion methods for secure routing
is described. This protocol is novel routing protocol and is provided to remove possible threats and
attacks in routing structure and hence it is taken to analyze in terms of security issues. This protocol is
implanted in wireless sensor nodes and the network taken is wireless sensor networks. Interest
dissemination procedure is used, and three types of attacks are studied here: denial of service attacks,
routing information modification and spoofing, and data dropping or selective forwarding. External
attacks may be mitigated by link layer encryption, but compromised nodes within the network would be
the most difficult to prevent We conclude the drooping the data and when required and modifying or
spoofing the will give the solution of the problem mentioned. Direct Diffusion (DD) is a routing protocol
that allows communication between sink and source nodes in networks with random and mesh
topologies. This routing protocol takes a data-centric approach, with intermediate nodes aggregating
data and sending it to a sink node. The solution provided is useful for further analysis of extended WSN
networks.

Keywords: Wireless Sensor Networks, Interference, Secure Routing, Routing Protocol, Detector
Network

INTRODUCTION
The advancements in wireless communication and electronics have resulted in an increased interest
in the field of wireless detector networks. A detector network involves the deployment of an array of
sensors for the distributed monitoring of real-time events. Because the detector nodes are battery
powered, the detector networks have limited energy. The detector nodes even have restricted memory
and procedure capability and may be deployed in remote areas or inhospitable piece of land. There has
been AN increasing use of detector networks always
vital applications like watching patients in hospitals
*Author for Correspondence
E.N. Ganesh
and military applications. These applications create
E-mail: enganesh50@gmail.com it vital to own a decent security infrastructure for
detector networks. The readying of those networks
Dean, School of Engineering, Vels Institute of Science,
Technology & Advanced Studies (VISTAS), Chennai, Tamil
in military applications and therefore the restricted
Nadu, India power and memory, create the planning of a security
protocol terribly difficult. during this paper security
Received Date: December 22, 2021
Accepted Date: December 27, 2021
problems in Directed diffusion are self-addressed.
Published Date: December 31, 2021 Directed Diffusion could be a novel routing
protocol for detector networks. A look-in to
Citation: E.N. Ganesh. Analysis of Wireless Sensor networks
through Secure Routing Protocols using Directed Diffusion
potential attacks and counter measures is provided.
methods. International Journal of Wireless Network Security. In [1] to [3] sensor networks security and
2021; 7(2): 28–32p. optimization discussed in detail. Performance

© JournalsPub 2021. All Rights Reserved 28


Analysis of Wireless Sensor networks through Secure Routing Protocols E.N. Ganesh

improvement like power, efficiency and throughput is explained for wireless networks in detail in [4]
to [6]. Application of WSN its challenges and design compatibility is briefed in [7] and [8] respectively.
In [9] and [10] WSN Study and IOT related WSN Issues are explained in detail. Directed Diffusion: An
insight briefly covers the directed diffusion protocol followed by a discussion on the potential attacks
on this routing protocol. The paper is finished with a short analysis on the potential countermeasures to
forestall such attacks.

DIRECTED DIFFUSION: AN INSIGHT


Directed Diffusion [1] could be a data-centric, interest-based routing protocol. AN interest could be
a request for a particular sort of information. For ex: during a detector network to observe varied
properties of water during a lake, the interest can be letter of invitation for information on toxins to be
sent each ten seconds for consecutive fifty seconds from a specific space of the detector network. This
interest message would be sent as a packet. The node that sends out interests is spoken because the sink
node. The sink node resends these interest packets sporadically. A base station node ordinarily will the
interest dissemination. This node broadcasts its interests to all or any its neighbors within the network.
This method is spoken as interest-dissemination. The interests consists of the subsequent parameters:
• Type of knowledge needed by the sink node.
• Area of detector network from that the info is needed (X, Y co-ordinates).
• How typically {the information|the info|the information} must be sent to the sink node? this is
often spoken as data refreshing rate..
• Expiration time.

Based on these parameters for the interest dissemination, a gradient is set-up within the reverse
direction for information flow. This gradient is set-up in response to the interest dissemination instantiated
by the sink node. This method of interest dissemination and therefore the corresponding gradient
institution continues till we have a tendency to reach the nodes generating the events. These are spoken
as supply nodes. the info is routed through ways, that have the next gradient price. Those nodes, that
transmit information a lot of often to the sink node, would be completely strengthened. this is able to mean
that the ways to those nodes would acquire higher gradient values, by increasing the info refresh rate. The
sink node should refresh and reinforce the interest once it begins to receive information from the supply
node. additionally every node stores a replica of the interest it receives in AN interest cache, before it
forwards the interest. this is often done to avoid routing loops and continual flooding. therefore the directed
diffusion relies on information central routing wherever the sink node broadcasts the interest.

ATTACKS ON DIRECTED DIFFUSION


The potential attacks on directed diffusion protocol will be classified under:
1. Denial of Service attacks.
2. Modification and spoofing of routing data.
3. Dropping or selective forwarding of knowledge.

In the following sections these attacks at the side of the potential countermeasures against these
attacks is mentioned.

Denial of Service Attacks


The simplest variety of the denial of service attack would need AN assaulter to deploy a malicious
node with a strong transmitter and an oversized battery power. this is able to change the assaulter to jam
the communications within the entire detector network along with his powerful transmitter. a traditional
malicious node would solely be ready to jam the communication link in its immediate section.[2] A
second variety of denial of service attack would involve spoofing negative reinforcements. A malicious
node may spoof negative reinforcements to sure nodes. If the latter nodes communicate with the bottom
station or a sink node via the malicious node, they'd be denied service to the bottom station owing to
the spoofed negative reinforcements that they received from the malicious node. The Figure 1 below
depicts this:

© JournalsPub 2021. All Rights Reserved 29


International Journal of Wireless Network Security
Volume 7, Issue 2

Sink node or Base


Station

Malicious node

Spoofing Negative Reinforcements

Processing
Communication
Sensing unit Unit
Unit

Blocked sensor nodes

Figure 1. Simple DOS attack.

Modification and Spoofing of Routing Information


In Directed Diffusion the routing is finished on the premise of interest dissemination and therefore
the corresponding gradient institution. If a malicious node receives interests from the bottom station, it
may replay the interest with itself listed because the base station. this is able to change the malicious
node to receive a replica of the events, that are sent to the bottom station. A malicious node will
influence the opposite nodes to route information through it by spoofing positive and negative
reinforcements and false information events. as an example contemplate that a malicious node receives
interests from the bottom station or a sink node. It adopts the subsequent procedure.

Base Station

Interest Dissemination Spoofed


High-rate events

Malicious node
Spoofed positive
Reinforcements

Opposite Node

Source Node Intermediate Node

Nodes generating and sending event data as they have a high gradient path to malicious node

© JournalsPub 2021. All Rights Reserved 30


Analysis of Wireless Sensor networks through Secure Routing Protocols E.N. Ganesh

Figure 2. Spoofing Positive Reinforcements.


(Also enables easy selective forwarding)

• Rebroadcasts the interests to its upstream nodes. Upstream is that the direction from sink node to
supply node.
• Sends robust positive reinforcements to the upstream nodes. this is able to change the malicious
node to receive a gradual flow of events from the its upstream nodes.
• Send spoofed events at a high rate to the sink node or base station.
• This would create the bottom station to completely reinforce the malicious node as against the
alternate routes, because the node is generating a gradual stream of events.
• Thus the malicious node has with success been ready to embody itself within the path of the
bottom station and observes all packets sent to the bottom station. The Figure 2 below depicts this

Dropping or Selective Forwarding of Data


Most detector networks are multi hop networks. These networks have confidence all the nodes to
properly forward the messages. during this situation a malicious node may drop or by selection forward
solely sure messages. If a malicious node drops all messages, it'd be nearly as good because the node
not being gift within the network. The detector network is meant to adapt to the present. However, a lot
of severe variety of this attack would be if a malicious node by selection forwards solely sure messages.
With the spoofed positive and negative reinforcements mentioned within the previous section, we have
a tendency to saw however a malicious node will with success embody itself within the path of
knowledge flow. This currently makes selective forwarding trivial. The malicious node will currently
forward solely sure messages and suppress the remainder. Therefore, once a malicious node includes
itself within the path of knowledge flow, the selective forwarding will be simply achieved. The
following are a number of the issues with the directed diffusion protocol, that create the protocol a lot
of vulnerable:

COUNTERMEASURES
The following are number of the issues with the directed diffusion protocol, that create the protocol
a lot of vulnerable:
1. The interest packet within the Directed diffusion protocol doesn't have any data concerning the
sink node that generated the interest. There can be some provision to specify the identity of the
sink node within the interest packet. This at the side of the encoding of the info would create
spoofing interests troublesome.
2. {the data|the info|the data} packets received from the supply nodes contain no information
concerning the identity of the supply node. This data not to mention encoding {of information|of
knowledge|of information} would to some extent stop malicious nodes from spoofing high data
rates to the bottom station.

One of the helpful steps that may be taken to forestall a number of the attacks is to use encoding at
the link layer. The nodes may share a key with the bottom station and therefore information flow can
be documented. it's very important that economical symmetrical key cryptological schemes use. Public
key cryptography would be too expensive and impossible to use in detector networks with the restricted
memory and procedure capabilities of the nodes. The link layer encoding would stop most external
attacks against detector networks. Internal attacks from compromised nodes are more durable to defend
against. One novel theme of preventing a number of the attacks would be for the bottom station to limit
the amount of neighbors a node will have. this is able to prohibit the compromised node to human action
with its immediate neighbors. it'd be terribly laborious to defend against a denial of service attack if the
malicious node contains a robust transmitter. it's very important to style the protection infrastructure
into the routing protocol instead of attempting to retrofit. With the challenges of restricted node power
and memory, the protection for detector networks is AN open analysis issue.

© JournalsPub 2021. All Rights Reserved 31


International Journal of Wireless Network Security
Volume 7, Issue 2

CONCLUSION
This Article addresses a number of routing protection issues in detector networks by using the
directed diffusion protocol as an example to analyse attacks and general potential countermeasures.
Link layer encoding could also be spare for external attacks, however compromised nodes at intervals
the network would be the foremost troublesome attacks to forestall. This has got to be achieved with
careful and aware planning of the routing protocol.
REFERENCES
1. Intanagonwiwat C, Govindan R, Estrin D. Directed diffusion: A scalable and robust
communication paradigm for sensor networks. In Proceedings of the 6th annual international
conference on Mobile computing and networking 2000 Aug 1 (pp. 56-67).
2. Karlof C, Wagner D. Secure routing in wireless sensor networks: Attacks and countermeasures.
Ad hoc networks. 2003;1(2-3):293-315.
3. Stella K, Manikandan T, Ganesh EN. Detection of Optimized Intermediate Sensor Nodes Using
Carrier Sensing Power and Genus Factor for Energy Efficient Multipath Routing Protocol in
Wireless Sensor Networks. Sensor Letters. 2019 Apr 1;17(4):290-295.
4. Sathyasri B, Ganesh EN, Senthilkumar P. Enhance packet transmission using improved channel
assignment in wireless mess network. Concurrency and Computation: Practice and Experience.
2021 Feb 10;33(3): e5357.
5. Mathivilasini S. and Ganesh E.N. Design of a Low Power Smart Wireless Sensor” alochana chakra
journal. 2020; 9: 3097-3102.
6. Ravikumar D., Ganesh E.N. Research issues in wireless sensor networks – a review. International
journal of information and computing science. 2019;6: 457-462.
7. Stella K, Ganesh EN, Manikandan T. Experimental Analysis of Fault Tolerant Authentication in
Non-Invasive Epidermal Glucose Sensor Using SQEZLMRP Based Information Transmission in
Wireless Sensor Networks. Sensor Letters. 2018 Mar 1;16(3):224-33.
8. Ganesh EN. Wireless Sensor Network: The Challenges of Design and Programmability.
International Journal of Telecommunications & Emerging Technologies. 2017 Apr 10;3(1):23-34.
9. Ganesh E. IOT based environment monitoring using wireless sensor network. International Journal
of Advanced Research. 2017;5(2):964-970.
10. Sathyasri B, Ganesh EN, Kumar PS. Comparative study of routing protocols in wireless mesh
networks. IIOAB journal. 2017 Jan 1;8(2):27-35.

© JournalsPub 2021. All Rights Reserved 32

You might also like