A secure routing scheme to mitigate attack in wireless adhoc sensor network

Due to the unattended nature and deployment of wireless sensors in the hostile environment, the networks are vulnerable to carousal and stretch attack that causes Denial of Service (DoS). In addition to that, the adversary may also inject bogus data into the network through compromised nodes. This c...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Computers & security 2021-04, Vol.103, p.102197, Article 102197
Hauptverfasser: R, Isaac Sajan, J, Jasper
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page 102197
container_title Computers & security
container_volume 103
creator R, Isaac Sajan
J, Jasper
description Due to the unattended nature and deployment of wireless sensors in the hostile environment, the networks are vulnerable to carousal and stretch attack that causes Denial of Service (DoS). In addition to that, the adversary may also inject bogus data into the network through compromised nodes. This cause the Base Station (BS) to take erroneous decisions and also affects the network's lifetime. To address these issues, the Base Station Controlled Secure Routing Protocol (BSCSRP) is introduced. The proposed work aims to detect the anti-nodes from safe nodes by a trust-based mechanism that secures the network from false data injection as well as provides an efficient route that is free from carousal and stretch attack. The effectiveness of BSCSRP is evaluated by comparing its performance with the existing AF-TNS, BTEM, RSA, and ERF methods.
doi_str_mv 10.1016/j.cose.2021.102197
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2503172114</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><els_id>S0167404821000213</els_id><sourcerecordid>2503172114</sourcerecordid><originalsourceid>FETCH-LOGICAL-c328t-3193923f4e58a868966bebce32da84491e48613e9ccac7b4830670d045f7d143</originalsourceid><addsrcrecordid>eNp9kMtKAzEUhoMoWKsv4CrgempuTTLgphStYsFN9yHNnGkzbSc1yVh8e6eOa1cHDv93Lh9C95RMKKHysZm4kGDCCKN9g9FSXaAR1YoVkhF9iUZ9SBWCCH2NblJqCKFKaj1C7zOcwHURcAxd9u0GJ7eFA-Ac8MFnv7EZsM3Zuh32LT75CHtICdtqG1yPtilE3EI-hbi7RVe13Se4-6tjtHp5Xs1fi-XH4m0-WxaOM50LTkteMl4LmGqrpS6lXMPaAWeV1UKUFISWlEPpnHVqLTQnUpGKiGmtKir4GD0MY48xfHaQsmlCF9t-o2FTwqli9DfFhpSLIaUItTlGf7Dx21Bizs5MY87OzNmZGZz10NMAQX_-l4dokvPQOqj6v102VfD_4T9IHHQs</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2503172114</pqid></control><display><type>article</type><title>A secure routing scheme to mitigate attack in wireless adhoc sensor network</title><source>Elsevier ScienceDirect Journals Complete</source><creator>R, Isaac Sajan ; J, Jasper</creator><creatorcontrib>R, Isaac Sajan ; J, Jasper</creatorcontrib><description>Due to the unattended nature and deployment of wireless sensors in the hostile environment, the networks are vulnerable to carousal and stretch attack that causes Denial of Service (DoS). In addition to that, the adversary may also inject bogus data into the network through compromised nodes. This cause the Base Station (BS) to take erroneous decisions and also affects the network's lifetime. To address these issues, the Base Station Controlled Secure Routing Protocol (BSCSRP) is introduced. The proposed work aims to detect the anti-nodes from safe nodes by a trust-based mechanism that secures the network from false data injection as well as provides an efficient route that is free from carousal and stretch attack. The effectiveness of BSCSRP is evaluated by comparing its performance with the existing AF-TNS, BTEM, RSA, and ERF methods.</description><identifier>ISSN: 0167-4048</identifier><identifier>EISSN: 1872-6208</identifier><identifier>DOI: 10.1016/j.cose.2021.102197</identifier><language>eng</language><publisher>Amsterdam: Elsevier Ltd</publisher><subject>Carousal attack ; Denial of service attacks ; False data injection ; Malicious nodes ; Nodes ; Radio equipment ; Routing (telecommunications) ; Secure route ; Stretch attack ; Trust mechanism ; Wireless networks</subject><ispartof>Computers &amp; security, 2021-04, Vol.103, p.102197, Article 102197</ispartof><rights>2021</rights><rights>Copyright Elsevier Sequoia S.A. Apr 2021</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c328t-3193923f4e58a868966bebce32da84491e48613e9ccac7b4830670d045f7d143</citedby><cites>FETCH-LOGICAL-c328t-3193923f4e58a868966bebce32da84491e48613e9ccac7b4830670d045f7d143</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://www.sciencedirect.com/science/article/pii/S0167404821000213$$EHTML$$P50$$Gelsevier$$H</linktohtml><link.rule.ids>314,776,780,3537,27901,27902,65306</link.rule.ids></links><search><creatorcontrib>R, Isaac Sajan</creatorcontrib><creatorcontrib>J, Jasper</creatorcontrib><title>A secure routing scheme to mitigate attack in wireless adhoc sensor network</title><title>Computers &amp; security</title><description>Due to the unattended nature and deployment of wireless sensors in the hostile environment, the networks are vulnerable to carousal and stretch attack that causes Denial of Service (DoS). In addition to that, the adversary may also inject bogus data into the network through compromised nodes. This cause the Base Station (BS) to take erroneous decisions and also affects the network's lifetime. To address these issues, the Base Station Controlled Secure Routing Protocol (BSCSRP) is introduced. The proposed work aims to detect the anti-nodes from safe nodes by a trust-based mechanism that secures the network from false data injection as well as provides an efficient route that is free from carousal and stretch attack. The effectiveness of BSCSRP is evaluated by comparing its performance with the existing AF-TNS, BTEM, RSA, and ERF methods.</description><subject>Carousal attack</subject><subject>Denial of service attacks</subject><subject>False data injection</subject><subject>Malicious nodes</subject><subject>Nodes</subject><subject>Radio equipment</subject><subject>Routing (telecommunications)</subject><subject>Secure route</subject><subject>Stretch attack</subject><subject>Trust mechanism</subject><subject>Wireless networks</subject><issn>0167-4048</issn><issn>1872-6208</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2021</creationdate><recordtype>article</recordtype><recordid>eNp9kMtKAzEUhoMoWKsv4CrgempuTTLgphStYsFN9yHNnGkzbSc1yVh8e6eOa1cHDv93Lh9C95RMKKHysZm4kGDCCKN9g9FSXaAR1YoVkhF9iUZ9SBWCCH2NblJqCKFKaj1C7zOcwHURcAxd9u0GJ7eFA-Ac8MFnv7EZsM3Zuh32LT75CHtICdtqG1yPtilE3EI-hbi7RVe13Se4-6tjtHp5Xs1fi-XH4m0-WxaOM50LTkteMl4LmGqrpS6lXMPaAWeV1UKUFISWlEPpnHVqLTQnUpGKiGmtKir4GD0MY48xfHaQsmlCF9t-o2FTwqli9DfFhpSLIaUItTlGf7Dx21Bizs5MY87OzNmZGZz10NMAQX_-l4dokvPQOqj6v102VfD_4T9IHHQs</recordid><startdate>202104</startdate><enddate>202104</enddate><creator>R, Isaac Sajan</creator><creator>J, Jasper</creator><general>Elsevier Ltd</general><general>Elsevier Sequoia S.A</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>8FD</scope><scope>JQ2</scope><scope>K7.</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>202104</creationdate><title>A secure routing scheme to mitigate attack in wireless adhoc sensor network</title><author>R, Isaac Sajan ; J, Jasper</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c328t-3193923f4e58a868966bebce32da84491e48613e9ccac7b4830670d045f7d143</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2021</creationdate><topic>Carousal attack</topic><topic>Denial of service attacks</topic><topic>False data injection</topic><topic>Malicious nodes</topic><topic>Nodes</topic><topic>Radio equipment</topic><topic>Routing (telecommunications)</topic><topic>Secure route</topic><topic>Stretch attack</topic><topic>Trust mechanism</topic><topic>Wireless networks</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>R, Isaac Sajan</creatorcontrib><creatorcontrib>J, Jasper</creatorcontrib><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>ProQuest Criminal Justice (Alumni)</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>Computers &amp; security</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>R, Isaac Sajan</au><au>J, Jasper</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>A secure routing scheme to mitigate attack in wireless adhoc sensor network</atitle><jtitle>Computers &amp; security</jtitle><date>2021-04</date><risdate>2021</risdate><volume>103</volume><spage>102197</spage><pages>102197-</pages><artnum>102197</artnum><issn>0167-4048</issn><eissn>1872-6208</eissn><abstract>Due to the unattended nature and deployment of wireless sensors in the hostile environment, the networks are vulnerable to carousal and stretch attack that causes Denial of Service (DoS). In addition to that, the adversary may also inject bogus data into the network through compromised nodes. This cause the Base Station (BS) to take erroneous decisions and also affects the network's lifetime. To address these issues, the Base Station Controlled Secure Routing Protocol (BSCSRP) is introduced. The proposed work aims to detect the anti-nodes from safe nodes by a trust-based mechanism that secures the network from false data injection as well as provides an efficient route that is free from carousal and stretch attack. The effectiveness of BSCSRP is evaluated by comparing its performance with the existing AF-TNS, BTEM, RSA, and ERF methods.</abstract><cop>Amsterdam</cop><pub>Elsevier Ltd</pub><doi>10.1016/j.cose.2021.102197</doi></addata></record>
fulltext fulltext
identifier ISSN: 0167-4048
ispartof Computers & security, 2021-04, Vol.103, p.102197, Article 102197
issn 0167-4048
1872-6208
language eng
recordid cdi_proquest_journals_2503172114
source Elsevier ScienceDirect Journals Complete
subjects Carousal attack
Denial of service attacks
False data injection
Malicious nodes
Nodes
Radio equipment
Routing (telecommunications)
Secure route
Stretch attack
Trust mechanism
Wireless networks
title A secure routing scheme to mitigate attack in wireless adhoc sensor network
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-01T12%3A36%3A55IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=A%20secure%20routing%20scheme%20to%20mitigate%20attack%20in%20wireless%20adhoc%20sensor%20network&rft.jtitle=Computers%20&%20security&rft.au=R,%20Isaac%20Sajan&rft.date=2021-04&rft.volume=103&rft.spage=102197&rft.pages=102197-&rft.artnum=102197&rft.issn=0167-4048&rft.eissn=1872-6208&rft_id=info:doi/10.1016/j.cose.2021.102197&rft_dat=%3Cproquest_cross%3E2503172114%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2503172114&rft_id=info:pmid/&rft_els_id=S0167404821000213&rfr_iscdi=true