A secure routing scheme to mitigate attack in wireless adhoc sensor network
Due to the unattended nature and deployment of wireless sensors in the hostile environment, the networks are vulnerable to carousal and stretch attack that causes Denial of Service (DoS). In addition to that, the adversary may also inject bogus data into the network through compromised nodes. This c...
Gespeichert in:
Veröffentlicht in: | Computers & security 2021-04, Vol.103, p.102197, Article 102197 |
---|---|
Hauptverfasser: | , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | |
container_start_page | 102197 |
container_title | Computers & security |
container_volume | 103 |
creator | R, Isaac Sajan J, Jasper |
description | Due to the unattended nature and deployment of wireless sensors in the hostile environment, the networks are vulnerable to carousal and stretch attack that causes Denial of Service (DoS). In addition to that, the adversary may also inject bogus data into the network through compromised nodes. This cause the Base Station (BS) to take erroneous decisions and also affects the network's lifetime. To address these issues, the Base Station Controlled Secure Routing Protocol (BSCSRP) is introduced. The proposed work aims to detect the anti-nodes from safe nodes by a trust-based mechanism that secures the network from false data injection as well as provides an efficient route that is free from carousal and stretch attack. The effectiveness of BSCSRP is evaluated by comparing its performance with the existing AF-TNS, BTEM, RSA, and ERF methods. |
doi_str_mv | 10.1016/j.cose.2021.102197 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2503172114</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><els_id>S0167404821000213</els_id><sourcerecordid>2503172114</sourcerecordid><originalsourceid>FETCH-LOGICAL-c328t-3193923f4e58a868966bebce32da84491e48613e9ccac7b4830670d045f7d143</originalsourceid><addsrcrecordid>eNp9kMtKAzEUhoMoWKsv4CrgempuTTLgphStYsFN9yHNnGkzbSc1yVh8e6eOa1cHDv93Lh9C95RMKKHysZm4kGDCCKN9g9FSXaAR1YoVkhF9iUZ9SBWCCH2NblJqCKFKaj1C7zOcwHURcAxd9u0GJ7eFA-Ac8MFnv7EZsM3Zuh32LT75CHtICdtqG1yPtilE3EI-hbi7RVe13Se4-6tjtHp5Xs1fi-XH4m0-WxaOM50LTkteMl4LmGqrpS6lXMPaAWeV1UKUFISWlEPpnHVqLTQnUpGKiGmtKir4GD0MY48xfHaQsmlCF9t-o2FTwqli9DfFhpSLIaUItTlGf7Dx21Bizs5MY87OzNmZGZz10NMAQX_-l4dokvPQOqj6v102VfD_4T9IHHQs</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2503172114</pqid></control><display><type>article</type><title>A secure routing scheme to mitigate attack in wireless adhoc sensor network</title><source>Elsevier ScienceDirect Journals Complete</source><creator>R, Isaac Sajan ; J, Jasper</creator><creatorcontrib>R, Isaac Sajan ; J, Jasper</creatorcontrib><description>Due to the unattended nature and deployment of wireless sensors in the hostile environment, the networks are vulnerable to carousal and stretch attack that causes Denial of Service (DoS). In addition to that, the adversary may also inject bogus data into the network through compromised nodes. This cause the Base Station (BS) to take erroneous decisions and also affects the network's lifetime. To address these issues, the Base Station Controlled Secure Routing Protocol (BSCSRP) is introduced. The proposed work aims to detect the anti-nodes from safe nodes by a trust-based mechanism that secures the network from false data injection as well as provides an efficient route that is free from carousal and stretch attack. The effectiveness of BSCSRP is evaluated by comparing its performance with the existing AF-TNS, BTEM, RSA, and ERF methods.</description><identifier>ISSN: 0167-4048</identifier><identifier>EISSN: 1872-6208</identifier><identifier>DOI: 10.1016/j.cose.2021.102197</identifier><language>eng</language><publisher>Amsterdam: Elsevier Ltd</publisher><subject>Carousal attack ; Denial of service attacks ; False data injection ; Malicious nodes ; Nodes ; Radio equipment ; Routing (telecommunications) ; Secure route ; Stretch attack ; Trust mechanism ; Wireless networks</subject><ispartof>Computers & security, 2021-04, Vol.103, p.102197, Article 102197</ispartof><rights>2021</rights><rights>Copyright Elsevier Sequoia S.A. Apr 2021</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c328t-3193923f4e58a868966bebce32da84491e48613e9ccac7b4830670d045f7d143</citedby><cites>FETCH-LOGICAL-c328t-3193923f4e58a868966bebce32da84491e48613e9ccac7b4830670d045f7d143</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://www.sciencedirect.com/science/article/pii/S0167404821000213$$EHTML$$P50$$Gelsevier$$H</linktohtml><link.rule.ids>314,776,780,3537,27901,27902,65306</link.rule.ids></links><search><creatorcontrib>R, Isaac Sajan</creatorcontrib><creatorcontrib>J, Jasper</creatorcontrib><title>A secure routing scheme to mitigate attack in wireless adhoc sensor network</title><title>Computers & security</title><description>Due to the unattended nature and deployment of wireless sensors in the hostile environment, the networks are vulnerable to carousal and stretch attack that causes Denial of Service (DoS). In addition to that, the adversary may also inject bogus data into the network through compromised nodes. This cause the Base Station (BS) to take erroneous decisions and also affects the network's lifetime. To address these issues, the Base Station Controlled Secure Routing Protocol (BSCSRP) is introduced. The proposed work aims to detect the anti-nodes from safe nodes by a trust-based mechanism that secures the network from false data injection as well as provides an efficient route that is free from carousal and stretch attack. The effectiveness of BSCSRP is evaluated by comparing its performance with the existing AF-TNS, BTEM, RSA, and ERF methods.</description><subject>Carousal attack</subject><subject>Denial of service attacks</subject><subject>False data injection</subject><subject>Malicious nodes</subject><subject>Nodes</subject><subject>Radio equipment</subject><subject>Routing (telecommunications)</subject><subject>Secure route</subject><subject>Stretch attack</subject><subject>Trust mechanism</subject><subject>Wireless networks</subject><issn>0167-4048</issn><issn>1872-6208</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2021</creationdate><recordtype>article</recordtype><recordid>eNp9kMtKAzEUhoMoWKsv4CrgempuTTLgphStYsFN9yHNnGkzbSc1yVh8e6eOa1cHDv93Lh9C95RMKKHysZm4kGDCCKN9g9FSXaAR1YoVkhF9iUZ9SBWCCH2NblJqCKFKaj1C7zOcwHURcAxd9u0GJ7eFA-Ac8MFnv7EZsM3Zuh32LT75CHtICdtqG1yPtilE3EI-hbi7RVe13Se4-6tjtHp5Xs1fi-XH4m0-WxaOM50LTkteMl4LmGqrpS6lXMPaAWeV1UKUFISWlEPpnHVqLTQnUpGKiGmtKir4GD0MY48xfHaQsmlCF9t-o2FTwqli9DfFhpSLIaUItTlGf7Dx21Bizs5MY87OzNmZGZz10NMAQX_-l4dokvPQOqj6v102VfD_4T9IHHQs</recordid><startdate>202104</startdate><enddate>202104</enddate><creator>R, Isaac Sajan</creator><creator>J, Jasper</creator><general>Elsevier Ltd</general><general>Elsevier Sequoia S.A</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>8FD</scope><scope>JQ2</scope><scope>K7.</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>202104</creationdate><title>A secure routing scheme to mitigate attack in wireless adhoc sensor network</title><author>R, Isaac Sajan ; J, Jasper</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c328t-3193923f4e58a868966bebce32da84491e48613e9ccac7b4830670d045f7d143</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2021</creationdate><topic>Carousal attack</topic><topic>Denial of service attacks</topic><topic>False data injection</topic><topic>Malicious nodes</topic><topic>Nodes</topic><topic>Radio equipment</topic><topic>Routing (telecommunications)</topic><topic>Secure route</topic><topic>Stretch attack</topic><topic>Trust mechanism</topic><topic>Wireless networks</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>R, Isaac Sajan</creatorcontrib><creatorcontrib>J, Jasper</creatorcontrib><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>ProQuest Criminal Justice (Alumni)</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>Computers & security</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>R, Isaac Sajan</au><au>J, Jasper</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>A secure routing scheme to mitigate attack in wireless adhoc sensor network</atitle><jtitle>Computers & security</jtitle><date>2021-04</date><risdate>2021</risdate><volume>103</volume><spage>102197</spage><pages>102197-</pages><artnum>102197</artnum><issn>0167-4048</issn><eissn>1872-6208</eissn><abstract>Due to the unattended nature and deployment of wireless sensors in the hostile environment, the networks are vulnerable to carousal and stretch attack that causes Denial of Service (DoS). In addition to that, the adversary may also inject bogus data into the network through compromised nodes. This cause the Base Station (BS) to take erroneous decisions and also affects the network's lifetime. To address these issues, the Base Station Controlled Secure Routing Protocol (BSCSRP) is introduced. The proposed work aims to detect the anti-nodes from safe nodes by a trust-based mechanism that secures the network from false data injection as well as provides an efficient route that is free from carousal and stretch attack. The effectiveness of BSCSRP is evaluated by comparing its performance with the existing AF-TNS, BTEM, RSA, and ERF methods.</abstract><cop>Amsterdam</cop><pub>Elsevier Ltd</pub><doi>10.1016/j.cose.2021.102197</doi></addata></record> |
fulltext | fulltext |
identifier | ISSN: 0167-4048 |
ispartof | Computers & security, 2021-04, Vol.103, p.102197, Article 102197 |
issn | 0167-4048 1872-6208 |
language | eng |
recordid | cdi_proquest_journals_2503172114 |
source | Elsevier ScienceDirect Journals Complete |
subjects | Carousal attack Denial of service attacks False data injection Malicious nodes Nodes Radio equipment Routing (telecommunications) Secure route Stretch attack Trust mechanism Wireless networks |
title | A secure routing scheme to mitigate attack in wireless adhoc sensor network |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-01T12%3A36%3A55IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=A%20secure%20routing%20scheme%20to%20mitigate%20attack%20in%20wireless%20adhoc%20sensor%20network&rft.jtitle=Computers%20&%20security&rft.au=R,%20Isaac%20Sajan&rft.date=2021-04&rft.volume=103&rft.spage=102197&rft.pages=102197-&rft.artnum=102197&rft.issn=0167-4048&rft.eissn=1872-6208&rft_id=info:doi/10.1016/j.cose.2021.102197&rft_dat=%3Cproquest_cross%3E2503172114%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2503172114&rft_id=info:pmid/&rft_els_id=S0167404821000213&rfr_iscdi=true |