Table of Contents
ISRN Sensor Networks
Volume 2013, Article ID 843626, 9 pages
Research Article

Detection and Countermeasure of Node Misbehaviour in Clustered Wireless Sensor Network

Malaviya National Institute of Technology, Jaipur 302017, India

Received 15 August 2013; Accepted 18 September 2013

Academic Editors: J. Li and Y.-C. Wang

Copyright © 2013 Meenakshi Tripathi et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. K. Sohraby, D. Minoli, and T. Znati, Wireless Sensor Networks Technology, Protocols, and Applications, John Wiley & Sons, New York, NY, USA, 2007.
  2. T. Bokareva, W. Hu, S. Kanhere et al., “Wireless sensor networks for battlefield surveillance,” in Proceedings of the Land Warfare Conference, Brisbane, Australia, 2006.
  3. F. Ingelrest, G. Barrenetxea, G. Schaefer, M. Vetterli, O. Couach, and M. Parlange, “SensorScope: application-specific sensor network for environmental monitoring,” ACM Transactions on Sensor Networks, vol. 6, pp. 1033–1047, 2010. View at Google Scholar
  4. A. Garcia-Sanchez, F. Garcia-Sanchez, F. Losilla et al., “Wireless sensor network deployment for monitoring wildlife passages,” Sensors, vol. 10, no. 8, pp. 7236–7262, 2010. View at Publisher · View at Google Scholar · View at Scopus
  5. C. Karlof and D. Wagner, “Secure routing in wireless sensor networks: attacks and countermeasures,” Special Issue on Sensor Network Applications and Protocols, vol. 1, no. 2-3, pp. 1293–1303, 2003. View at Google Scholar
  6. W. R. Heinzelman, J. Kulik, and H. Balakrishnan, “Adaptive protocols for information dissemination in wireless sensor networks,” in Proceedings of the 5th annual ACM/IEEE international conference on Mobile computing and networking, pp. 174–185, Seattle, Wash, USA, 1999.
  7. D. Braginsky and D. Estrin, “Rumor routing algorithm for sensor networks,” in Proceedings of the 1st ACM International Workshop on Wireless Sensor Networks and Applications (WSNA '02), pp. 22–31, Atlanta, Ga, USA, September 2002. View at Scopus
  8. C. Intanagonwiwat, R. Govindan, and D. Estrin, “Directed diffusion: a scalable and robust communication paradigm for sensor networks,” in Proceedings of the 6th Annual International Conference on Mobile Computing and Networking (MOBICOM '00), pp. 56–57, New York, NY, USA, August 2000. View at Scopus
  9. C. Qing, T. Abdelzaher, H. Tian, and R. Kravets, “Cluster-based forwarding for reliable end-to-end delivery in wireless sensor networks,” in Proceedings of the 26th IEEE International Conference on Computer Communications (INFOCOM '07), pp. 1928–1936, San Diego, Calif, USA, May 2007. View at Publisher · View at Google Scholar · View at Scopus
  10. W. R. Heinzelman, A. Chandrakasan, and H. Balakrishnan, “Energy-efficient communication protocol for wireless microsensor networks,” in Proceedings of the 33rd Annual Hawaii International Conference on System Siences, pp. 3005–3014, January 2000. View at Scopus
  11. A. Manjeshwar and D. P. Agrawal, “A protocol for enhanced efficiency in wireless sensor networks,” in Proceedings of the 1st International Workshop on Parallel and Distributed Computing Issues in Wireless Networks and Mobile Computing, in Conjunction with 2001 IPDPS, San Francisco, Calif, USA, 2001.
  12. S. Lindsey and C. S. Raghavendra, “PEGASIS: power-efficient gathering in sensor information systems,” in Proceedings of the IEEE Aerospace Conference, pp. 1125–1131, Big Sky, Mont, USA, March 2002.
  13. W. B. Heinzelman, A. P. Chandrakasan, and H. Balakrishnan, “An application-specific protocol architecture for wireless microsensor networks,” IEEE Transactions on Wireless Communications, vol. 1, no. 4, pp. 660–670, 2002. View at Publisher · View at Google Scholar · View at Scopus
  14. T. Murata and H. Ishibuchi, “Performance evaluation of genetic algorithms for flowshop scheduling problems,” in Proceedings of the 1st IEEE Conference on Evolutionary Computation, pp. 812–817, June 1994. View at Scopus
  15. J. R. Douceur, “The sybil attack,” in Proceedings of the Workshop on Peer-to-Peer Systems (IPTPS '02), Cambridge, Mass, USA, 2002.
  16. Y. C. Hu, A. Perrig, and D. B. Johns, “Wormhole attacks in wireless networks,” IEEE Journal on Selected Areas in Communications, vol. 24, no. 2, pp. 370–381, 2006. View at Google Scholar
  17. M. Tripathi, M. S. Gaur, and V. Laxmi, “Simulation of Snooze attack in LEACH,” in Proceedings of the 3rd International Conference of Computer Science, Engineering and Applicaions (ICCSEA '13), pp. 393–399, New Delhi, India, May 2013.
  18. L. B. Oliveira, A. C. Ferreira, and M. Aurelio, “SecLEACH-on the security of clustered sensor networks,” Signal Processing, vol. 87, no. 12, pp. 2882–2895, 2007. View at Google Scholar
  19. L. Yang, Centralized security protocols for wireless sensor network [M.S. thesis], San Jose State University, 2011.
  20. K. Ioannis and T. Dimitriou, “Toward intrusiondetection in sensor networks,” in Proceedings of the 13th European Wireless Conference, pp. 1–7, April 2007.
  21. P. Banerjee, D. Jacobson, and S. N. Lahiri, Performance and security measure of clustering protocols for sensor networks [Ph.D. thesis], Iowa State University, Ames, Iowa, USA.
  22. S. Pal, D. Bhattacharyya, G. S. Tomar, and T. Kim, “Wireless sensor networks and its routing protocols: a comparative study,” in Proceedings of the International Conference on Computational Intelligence and Communication Networks (CICN '10), pp. 314–319, November 2010. View at Publisher · View at Google Scholar · View at Scopus