Configurable Secured Adaptive Routing Protocol for Mobile Wireless Sensor Networks
Abstract
This paper aims at designing, building, and simulating a secured routing protocol to defend against packet dropping attacks in mobile WSNs (MWSNs). This research addresses the gap in the literature by proposing Configurable Secured Adaptive Routing Protocol (CSARP). CSARP has four levels of protection to allow suitability for different types of network applications. The protocol allows the network admin to configure the required protection level and the ratio of cluster heads to all nodes. The protocol has an adaptive feature, which allows for better protection and preventing the spread of the threats in the network. The conducted CSARP simulations with different conditions showed the ability of CSARP to identify all malicious nodes and remove them from the network. CSARP provided more than 99.97% packets delivery rate with 0% data packet loss in the existence of 3 malicious nodes in comparison with 3.17% data packet loss without using CSARP. When compared with LEACH, CSARP showed an improvement in extending the lifetime of the network by up to 39.5%. The proposed protocol has proven to be better than the available security solutions in terms of configurability, adaptability, optimization for MWSNs, energy consumption optimization, and the suitability for different MWSNs applications and conditions.References
R. Silva, Z. Zinonos, J. S. Silva and V. Vassiliou, “Mobility in WSNs for critical applications,” 2011 IEEE Symposium on Computers and Communications (ISCC), 2011.
https://doi.org/10.1109/ISCC.2011.5983878
D. Stevanovic and N. Vlajic, “Performance of IEEE 802.15. 4 in wireless sensor networks with a mobile sink implementing various mobility strategies,” in 2008 33rd IEEE Conference on Local Computer Networks (LCN), 2008. https://doi.org/10.1109/LCN.2008.4664265
A. Al-Nasser, R. Almesaeed and H. Al-Junaid, “A Comprehensive Survey on Routing and Security in Mobile Wireless Sensor Networks,” INTL Journal of Electronics and Telecommunications, vol. 67, no. 3, pp. 483-496, 2021. https://doi.org/10.24425/ijet.2021.137838
H. Mohapatra and A. K. Rath, “Fault tolerance in WSN through PE-LEACH protocol,” IET wireless sensor systems, vol. 9, no. 6, pp. 358--365, 2019. http://doi.org/10.1049/iet-wss.2018.5229
L. Zhou, Y. Fang, Q. Wei, Y. Jin and Z. Hu, “LEACH-TLC: a strategy of reducing and uniform energy consumption based on target location constraint,” IET Wireless Sensor Systems, vol. 9, no. 6, pp. 347--357, 2019. https://doi.org/10.1049/iet-wss.2018.5216
A. Rady, M. Shokair, E.-S. M. El-Rabaie, W. Saad and A. Benaya, “Energy-efficient routing protocol based on sink mobility for wireless sensor networks,” IET Wireless Sensor Systems, vol. 9, no. 6, pp. 405--415, 2019. https://doi.org/10.1049/iet-wss.2019.0044
H. Al-Behadili, S. AlWane, Y. Al-Yasir, N. Ojaroudi Parchin, P. Olley and R. A. Abd-Alhameed, “The use of multiple mobile sinks in wireless sensor networks for large scale areas,” IET Digital Library, 2020. https://doi.org/10.1049/iet-wss.2019.0208
H. Mohapatra and A. K. Rath, “Fault tolerance in WSN through PE-LEACH protocol,” IET wireless sensor systems, vol. 9, no. 6, pp. 358--365, 2019. http://doi.org/10.1049/iet-wss.2018.5229
J. Yin and S. K. Madria, “A hierarchical secure routing protocol against black hole attacks in sensor networks,” in IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC'06), 2006. http://doi.org/10.1109/SUTC.2006.1636203
S. Shahabi, M. Ghazvini and M. Bakhtiarian, “A modified algorithm to improve security and performance of AODV protocol against black hole attack,” Wireless Networks, vol. 22, no. 5, pp. 1505-1511, 2016. https://doi.org/10.1007/s11276-015-1032-y
L. Teng and Y. Zhang, “SeRA: a secure routing algorithm against sinkhole attacks for mobile wireless sensor networks,” in 2010 Second International Conference on Computer Modeling and Simulation, 2010. https://doi.org/10.1109/ICCMS.2010.95
V. B. Salve, L. Ragha and N. Marathe, “An Enhanced Secure Routing Algorithm Against Sinkhole Attack In Wireless Sensor Networks,” International Journal of Advanced Computational Engineering and Networking, vol. 2, no. 8, pp. 62-67, 2014.
D. B. Vishwas, C. Chinnaswamy and T. Sreenivas, “An Improved Detection and Mitigation Approach of Sinkhole in,” International Research Journal of Engineering and Technology (IRJET), vol. 3, no. 6, pp. 808-811, 2016.
Z. Karakehayov, “Using REWARD to detect team black-hole attacks in wireless sensor networks,” Wksp. Real-World Wireless Sensor Networks, 2005.
S. Dokurer, “Simulation of Black hole attack in wireless Ad-hoc networks,” Atılım University, 2006.
V. V.Kumar and R. R.Kumar, “An adaptive approach for detection of blackhole attack in mobile ad hoc network (ICCC-2015),” International Conference on Intelligent Computing, Communication & Convergence, 2015. https://doi.org/10.1016/j.procs.2015.04.122
A. Mathur, T. Newe and M. Rao, “Defence against black hole and selective forwarding attacks for medical WSNs in the IoT,” Sensors, vol. 16, no. 1, p. 118, 2016. https://doi.org/10.3390/s16010118
S. D. Roy, S. A. Singh, S. Choudhury and N. C. Debnath, “Countering sinkhole and black hole attacks on sensor networks using dynamic trust management,” in 2008 IEEE Symposium on Computers and Communications, 2008. https://doi.org/10.1109/ISCC.2008.4625768
M. Motamedi and N. Yazdani, “Detection of black hole attack in wireless sensor network using UAV,” 2015 7th Conference on Information and Knowledge Technology (IKT), 2015.
https://doi.org/10.1109/IKT.2015.7288749
H. Gao, R. Wu, M. Cao and C. Zhang, “Detection and defense technology of blackhole attacks in wireless sensor network,” in International Conference on Algorithms and Architectures for Parallel Processing, 2014. https://doi.org/10.1007/978-3-319-11194-0_53
C. Panos, C. Ntantogian, S. Malliaros and C. Xenakis, “Analyzing, quantifying, and detecting the blackhole attack in infrastructure-less networks,” Computer Networks, vol. 113, pp. 94-110, 2017. https://doi.org/10.1016/j.comnet.2016.12.006
N. Arya, U. Singh and S. Singh, “Detecting and avoiding of worm hole attack and collaborative blackhole attack on MANET using trusted AODV routing algorithm,” in 2015 International Conference on Computer, Communication and Control (IC4), 2015. https://doi.org/10.1109/IC4.2015.7375649
D. Virmani, A. Soni and N. Batra, “Reliability analysis to overcome black hole attack in wireless sensor network,” arXiv preprint arXiv:1401.2540, 2014. https://doi.org/10.48550/arXiv.1401.2540
N. Mistry, D. C. Jinwala, M. Zaveri and others, “Improving AODV protocol against blackhole attacks,” Proceedings of the international multi conference of engineers and computer scientists, 2010.
P. N. Raj and P. B. Swadas, “Dpraodv: A dyanamic learning system against blackhole attack in aodv based manet,” arXiv preprint arXiv:0909.2371, 2009.
L. Tamilselvan and V. Sankaranarayanan, “Prevention of co-operative black hole attack in MANET.,” Journal of Networks (JNW), vol. 3, no. 5, pp. 13-20, 2008. http://doi.org/10.4304/jnw.3.5.13-20
S. S. Ramaswami and S. Upadhyaya, “Smart handling of colluding black hole attacks in MANETs and wireless sensor networks using multipath routing,” IEEE workshop on Info. Assurance. USA, 2006. http://doi.org/10.1109/IAW.2006.1652103
S. Athmani, D. E. Boubiche and A. Bilami, “Hierarchical energy efficient intrusion detection system for black hole attacks in WSNs,” in 2013 World Congress on Computer and Information Technology (WCCIT), 2013. https://doi.org/10.1109/WCCIT.2013.6618693
A. A.Dhaka, A. Nandal and R. S. R.Dhaka, “Gray and black hole attack identification using control packets in MANETs,” Procedia Computer Science, vol. 54, pp. 83-91, 2015.
https://doi.org/10.1016/j.procs.2015.06.010
P. Yadav, R. K. Gill and N. Kumar, “A fuzzy based approach to detect black hole attack,” International Journal of Soft Computing and Engineering (IJSCE), pp. 2231-2307, 2012.
R. Shree, S. K. Dwivedi and R. P. Pandey, “Design Enhancements in ZRP for Detecting Multiple Black Hole Nodes in Mobile Ad Hoc Networks,” International Journal of Computer Applications, vol. 18, no. 5, pp. 6-10, 2011. http://doi.org/10.5120/2283-2959
D. Virmani, M. Hemrajani, S. Chandel and others, “Exponential trust based mechanism to detect black hole attack in wireless sensor network,” arXiv preprint arXiv:1401.2541, p. 2014.
V. F. Taylor and D. T. Fokum, “Mitigating black hole attacks in wireless sensor networks using node-resident expert systems,” 2014 wireless telecommunications symposium, 2014.
https://doi.org/10.1109/WTS.2014.6835013
C. Wang, T. Feng, J. Kim, G. Wang and W. Zhang, “Catching packet droppers and modifiers in wireless sensor networks,” 2009 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, 2009.
https://doi.org/10.1109/SAHCN.2009.5168914
S. Misra, K. Bhattarai and G. Xue, “BAMBi: Blackhole attacks mitigation with multiple base stations in wireless sensor networks,” 2011 IEEE international conference on communications (ICC), 2011. http://doi.org/10.1109/icc.2011.5962856
J. Shi, X. Wei and W. Zhu, “An efficient algorithm for energy management in wireless sensor networks via employing multiple mobile sinks,” International Journal of Distributed Sensor Networks, vol. 12, no. 1, 2016. https://doi.org/10.1155/2016/3179587
W. J. Chung and T. H. Cho, “A Multi-Path Routing Determination Method for Improving the Energy Efficiency in Selective Forwarding
Attack Detection Based MWSNs,” International Journal of Wireless & Mobile Networks (IJWMN), vol. 10, no. 4, pp. 9-19, August 2018.
A. Nazari, “Wireless Sensor Networks Simulation,” MATLAB Central File Exchange, 2018.
T. C. Hung and H. H. Trung, “Energy Savings in Applications for Wireless Sensor Networks Time Critical Requirements,” International Journal of Computer Networks & Communications (IJCNC), vol. 8, no. 4, July 2016. http://doi.org/10.5121/ijcnc.2016.8403
Downloads
Published
Issue
Section
License
Copyright (c) 2022 International Journal of Electronics and Telecommunications
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
1. License
The non-commercial use of the article will be governed by the Creative Commons Attribution license as currently displayed on https://creativecommons.org/licenses/by/4.0/.
2. Author’s Warranties
The author warrants that the article is original, written by stated author/s, has not been published before, contains no unlawful statements, does not infringe the rights of others, is subject to copyright that is vested exclusively in the author and free of any third party rights, and that any necessary written permissions to quote from other sources have been obtained by the author/s. The undersigned also warrants that the manuscript (or its essential substance) has not been published other than as an abstract or doctorate thesis and has not been submitted for consideration elsewhere, for print, electronic or digital publication.
3. User Rights
Under the Creative Commons Attribution license, the author(s) and users are free to share (copy, distribute and transmit the contribution) under the following conditions: 1. they must attribute the contribution in the manner specified by the author or licensor, 2. they may alter, transform, or build upon this work, 3. they may use this contribution for commercial purposes.
4. Rights of Authors
Authors retain the following rights:
- copyright, and other proprietary rights relating to the article, such as patent rights,
- the right to use the substance of the article in own future works, including lectures and books,
- the right to reproduce the article for own purposes, provided the copies are not offered for sale,
- the right to self-archive the article
- the right to supervision over the integrity of the content of the work and its fair use.
5. Co-Authorship
If the article was prepared jointly with other authors, the signatory of this form warrants that he/she has been authorized by all co-authors to sign this agreement on their behalf, and agrees to inform his/her co-authors of the terms of this agreement.
6. Termination
This agreement can be terminated by the author or the Journal Owner upon two months’ notice where the other party has materially breached this agreement and failed to remedy such breach within a month of being given the terminating party’s notice requesting such breach to be remedied. No breach or violation of this agreement will cause this agreement or any license granted in it to terminate automatically or affect the definition of the Journal Owner. The author and the Journal Owner may agree to terminate this agreement at any time. This agreement or any license granted in it cannot be terminated otherwise than in accordance with this section 6. This License shall remain in effect throughout the term of copyright in the Work and may not be revoked without the express written consent of both parties.
7. Royalties
This agreement entitles the author to no royalties or other fees. To such extent as legally permissible, the author waives his or her right to collect royalties relative to the article in respect of any use of the article by the Journal Owner or its sublicensee.
8. Miscellaneous
The Journal Owner will publish the article (or have it published) in the Journal if the article’s editorial process is successfully completed and the Journal Owner or its sublicensee has become obligated to have the article published. Where such obligation depends on the payment of a fee, it shall not be deemed to exist until such time as that fee is paid. The Journal Owner may conform the article to a style of punctuation, spelling, capitalization and usage that it deems appropriate. The Journal Owner will be allowed to sublicense the rights that are licensed to it under this agreement. This agreement will be governed by the laws of Poland.
By signing this License, Author(s) warrant(s) that they have the full power to enter into this agreement. This License shall remain in effect throughout the term of copyright in the Work and may not be revoked without the express written consent of both parties.