A Trust Election based Mechanism for finding selfish node and preventing them from Attack
DOI:
https://doi.org/10.26438/ijcse/v7i2.223229Keywords:
Wireless Sensor Networks (WSN), MANET (Mobile AD-Hoc Networks), Selfish node, network failure, data packet transmissionAbstract
Wireless sensor network is an important communication resource in wireless area. It enable to recognize many resources and file data such as temperature, humidity and many other dynamic functional data which needed observation. In many remote areas where the different terminology adaption is difficult while dealing with opposite situations wireless sensor network help in establish a proper communication between them. A proper network and communication also get disadvantage of intruder and anomaly within the network. WSN deals with attack resistance and finding such node which participate in such activity. Many algorithm used for finding such selfish attack nodes and preventing data from them. In this paper the proposed algorithm shown is proposed for the selfish node detection and prevention. The approach is performed using NS-2 simulation tool with dynamic node number selection model. The observe outcome while running the script observe high performance over existing scenario.
References
[1] Pushpendu Kar, Student Member, IEEE and Sudip Misra, Senior Member, IEEE, Reliable and Efficient Data Acquisition in Wireless Sensor Networks in the Presence of Transfaulty Nodes, 1932-4537 (c) 2015 IEEE.
[2] Abdul Razaque, M. Abdulghafour, Meer Jaro Khan, Detection of Selfish Attack over Wireless Body Area Networks, 2017 IEEE Conference on Open Systems (ICOS), November 13-14, 2017, Miri, Sarawak, Malaysia.
[3] JaydipSen, and Kaustav Goswami2, an Algorithm for Detection of Selfish Nodes in Wireless Mesh Networks, Oct. 28-30, 2009.
[4] Naveen Kumar Gupta, **Ashish Kumar Sharma, Abhishek Gupta, Selfish Behaviour Prevention and Detection in Mobile Ad-Hoc Network Using Intrusion Prevention System (IPS), Volume-1 Issue-2, September 2012.
[5] SonaTaheri, Musa Mammadov , Learning The Naive Bayes Classifier With Optimization Models, Vol. 23, No. 4, 787–795 DOI: 10.2478/amcs-2013-0059.
[6] Peng Jiang, A New Method for Node Fault Detection in Wireless Sensor Networks, 24 February 2009.
[7] AbolfazlAkbari, NedaBeikmahdavi, Ali khosrozadeh, OmidPanah, A Survey Cluster-Based and Cellular Approach to Fault Detection and Recovery in Wireless Sensor Networks, Journal 8 (1): 76-85, 2010.
[8] Meenakshi Panda, Pabitra Mohan Khilar, Distributed Soft Fault Detection Algorithm in Wireless Sensor Networks using Statistical Test, 2012 2nd IEEE International Conference on Parallel, Distributed and Grid Computing.
[9] Amol Shende1, Prof. Vikrant Chole2, A Review on Improving Packet Analysis in Wireless Sensor Network using Bit Rate Classifier, Vol.5 Issue.6, June- 2016, pg. 102-107.
[10] Charles E. Perkins, Ad-hoc On-Demand Distance Vector Routing.
[11] G. Vigna, S. Gwalani, K. Srinivasan, E.M. Belding-Royer, and R.A. Kemmerer, “An intrusion detection tool for AODV-based ad hoc wireless networks,” in Proc of Annual Comp. Sec. Appl. Conf (ACSAC) 2004, pp. 16-27.
[12] A. Pirzada and C. McDonald, “Establishing trust in pure ad hoc networks,” in Proceedings of the 27th Australian Conference on Computer Science, 2004, pp. 181-199.
[13] M. Conti, E. Gregori, and G. Maselli, “Reliable and efficient forwarding in MANETs,” Ad Hoc Networks Journal, Vol 4, No 3, 2006, pp. 398-415.
[14] L. Santhanam et al, “Distributed self-policing architecture for fostering node cooperation in wireless mesh networks,” in Proc. of PWC 2006, Vol 4217, pp. 147-158. [15] D. Johnson, C. Perkins, J. Arkko, Mobility Support in IPv6, RFC 3775, June 2004
[16] V. Devarapalli, R. Wakikawa, A. Petrescu, P. Thubert, Network Mobility (NEMO) Basic Support Protocol, RFC 3963, January 2005
[17] T. Ernst, H-Y. Lach, Network Mobility Support Terminology, draftietf-nemo-terminology-04.txt, October, 2005
[18] A.Vani ,Detection and Elimination of Wormhole Attacks in a MANET ,Int. J. Sci. Res. in Computer Science and Engineering Vol-5(5), Oct 2017,
[19] Dipali Koshtiand Supriya Kamoji ,Comparative study of Techniques used for Detection of Selfish Nodes in Mobile Ad hoc Networks IJSCE Volume-1, Issue-4, September 2011
[20] Neenavath Veeraiah, Dr.B.T.Krishna Selfish ,Node Detection IDSM Based Approach Using Individual Master Cluster Node in Proceedings of the Second International Conference on Inventive Systems and Control (ICISC 2018) IEEE
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
