Mobile Malicious Node Detection Using Mobile Agent in Cluster-Based Wireless Sensor Networks

  • PDF / 1,844,582 Bytes
  • 14 Pages / 439.37 x 666.142 pts Page_size
  • 78 Downloads / 192 Views

DOWNLOAD

REPORT


Mobile Malicious Node Detection Using Mobile Agent in Cluster-Based Wireless Sensor Networks L. Gandhimathi1   · G. Murugaboopathi1 Received: 5 November 2019 / Revised: 27 July 2020 / Accepted: 29 October 2020 © Springer Science+Business Media, LLC, part of Springer Nature 2020

Abstract Many application domains require that sensor node to be deployed in harsh or hostile environments, such as active volcano area tracking endangered species, etc. making these nodes more prone to failures. The most challenging problem is monitoring the illegal movement within the sensor networks. Attacker prefers mobile malicious node because by making the diversity of path intruder maximize his impact. The emerging technology of sensor network expected Intrusion detection technique for a dynamic environment. In this paper, a defective mechanism based on three-step negotiation is performed for identifying the mobile malicious node using the mobile agent. In many approaches, the multi-mobile agents are used to collect the data from all the sensor nodes after verification. But it is inefficient to verify all the sensor nodes (SNs) in the network, because of mobility, energy consumption, and high delay. In the proposed system this can be solved by grouping sensor nodes into clusters and a single mobile agent performs verification only with all the cluster heads instead of verifying all the SNs. The simulation result shows the proposed system shows a better result than the existing system. Keywords  Mobile agent · Dynamic environment · Three-step negotiation · Cluster head · Malicious node · Wireless sensor network

1 Introduction The mobile agent is a software code that migrates among the sensor node to collect the data in the sensor network [1]. The sensor nodes which are located nearer to one another generate highly redundant data while sensing the environment. So the volume of data transmitted to the sink is high. But MA visits the sensor node one after other, collects the sensed data, and performs data aggregation function at each node. If the redundancy exists in the data, which means it will be eliminated automatically. By this way, the volume of data transmitted to the sink is reduced by using the mobile agent. The data traffic of the sensor network may higher than the network capacity but the link bandwidth is limited. * L. Gandhimathi [email protected] 1



Department of Computer Science and Engineering, Kalasalingam Academy of Research and Education, Anand Nagar, Krishnankoil, Tamilnadu, India

13

Vol.:(0123456789)



L. Gandhimathi, G. Murugaboopathi

For this problem mobile agent offers the best solution [2, 3]. The communication problem increases smoothly when the percentage of malicious node increases. The static malicious node can be detected easily by using any cryptographic techniques. But Mobile malicious node maximizes this impact by the diversity of the paths and change with respect to time. So this kind of dynamic intruder can be easily detected by the mobile agent [4, 5]. The attacker may easily attack the