A Secure Protocol against Selfish and Pollution Attacker Misbehavior in Clustered WSNs

Wireless sensor networks (<i>WSNs</i>) have been widely used for applications in numerous fields. One of the main challenges is the limited energy resources when designing secure routing in such networks. Hierarchical organization of nodes in the network can make efficient use of their r...

Full description

Bibliographic Details
Main Authors: Hana Rhim, Damien Sauveron, Ryma Abassi, Karim Tamine, Sihem Guemara
Format: Article
Language:English
Published: MDPI AG 2021-05-01
Series:Electronics
Subjects:
Online Access:https://www.mdpi.com/2079-9292/10/11/1244
id doaj-b7166fc43f814ccdbafb1ac4f27aee9c
record_format Article
spelling doaj-b7166fc43f814ccdbafb1ac4f27aee9c2021-06-01T00:54:56ZengMDPI AGElectronics2079-92922021-05-01101244124410.3390/electronics10111244A Secure Protocol against Selfish and Pollution Attacker Misbehavior in Clustered WSNsHana Rhim0Damien Sauveron1Ryma Abassi2Karim Tamine3Sihem Guemara4Digital Security Lab, Sup’Com, University of Carthage, Tunis 2083, TunisiaMathIS, XLIM, University of Limoges, 87032 Limoges, FranceDigital Security Lab, Sup’Com, University of Carthage, Tunis 2083, TunisiaMathIS, XLIM, University of Limoges, 87032 Limoges, FranceDigital Security Lab, Sup’Com, University of Carthage, Tunis 2083, TunisiaWireless sensor networks (<i>WSNs</i>) have been widely used for applications in numerous fields. One of the main challenges is the limited energy resources when designing secure routing in such networks. Hierarchical organization of nodes in the network can make efficient use of their resources. In this case, a subset of nodes, the cluster heads (<i>CH</i>s), is entrusted with transmitting messages from cluster nodes to the base station (<i>BS</i>). However, the existence of selfish or pollution attacker nodes in the network causes data transmission failure and damages the network availability and integrity. Mainly, when critical nodes like <i>CH</i> nodes misbehave by refusing to forward data to the <i>BS</i>, by modifying data in transit or by injecting polluted data, the whole network becomes defective. This paper presents a secure protocol against selfish and pollution attacker misbehavior in clustered <i>WSNs</i>, known as (<i>SSP</i>). It aims to thwart both selfish and pollution attacker misbehaviors, the former being a form of a Denial of Service (<i>DoS</i>) attack. In addition, it maintains a level of confidentiality against eavesdroppers. Based on a random linear network coding (<i>NC</i>) technique, the protocol uses pre-loaded matrices within sensor nodes to conceive a larger number of new packets from a set of initial data packets, thus creating data redundancy. Then, it transmits them through separate paths to the <i>BS</i>. Furthermore, it detects misbehaving nodes among <i>CH</i>s and executes a punishment mechanism using a control counter. The security analysis and simulation results demonstrate that the proposed solution is not only capable of preventing and detecting <i>DoS</i> attacks as well as pollution attacks, but can also maintain scalable and stable routing for large networks. The protocol means 100% of messages are successfully recovered and received at the <i>BS</i> when the percentage of lost packets is around 20%. Moreover, when the number of misbehaving nodes executing pollution attacks reaches a certain threshold, <i>SSP</i> scores a reception rate of correctly reconstructed messages equal to 100%. If the <i>SSP</i> protocol is not applied, the rate of reception of correctly reconstructed messages is reduced by 90% at the same case.https://www.mdpi.com/2079-9292/10/11/1244secure routingnetwork codingwireless sensor networkdata availabilityselfish behavior<i>DoS</i> attack
collection DOAJ
language English
format Article
sources DOAJ
author Hana Rhim
Damien Sauveron
Ryma Abassi
Karim Tamine
Sihem Guemara
spellingShingle Hana Rhim
Damien Sauveron
Ryma Abassi
Karim Tamine
Sihem Guemara
A Secure Protocol against Selfish and Pollution Attacker Misbehavior in Clustered WSNs
Electronics
secure routing
network coding
wireless sensor network
data availability
selfish behavior
<i>DoS</i> attack
author_facet Hana Rhim
Damien Sauveron
Ryma Abassi
Karim Tamine
Sihem Guemara
author_sort Hana Rhim
title A Secure Protocol against Selfish and Pollution Attacker Misbehavior in Clustered WSNs
title_short A Secure Protocol against Selfish and Pollution Attacker Misbehavior in Clustered WSNs
title_full A Secure Protocol against Selfish and Pollution Attacker Misbehavior in Clustered WSNs
title_fullStr A Secure Protocol against Selfish and Pollution Attacker Misbehavior in Clustered WSNs
title_full_unstemmed A Secure Protocol against Selfish and Pollution Attacker Misbehavior in Clustered WSNs
title_sort secure protocol against selfish and pollution attacker misbehavior in clustered wsns
publisher MDPI AG
series Electronics
issn 2079-9292
publishDate 2021-05-01
description Wireless sensor networks (<i>WSNs</i>) have been widely used for applications in numerous fields. One of the main challenges is the limited energy resources when designing secure routing in such networks. Hierarchical organization of nodes in the network can make efficient use of their resources. In this case, a subset of nodes, the cluster heads (<i>CH</i>s), is entrusted with transmitting messages from cluster nodes to the base station (<i>BS</i>). However, the existence of selfish or pollution attacker nodes in the network causes data transmission failure and damages the network availability and integrity. Mainly, when critical nodes like <i>CH</i> nodes misbehave by refusing to forward data to the <i>BS</i>, by modifying data in transit or by injecting polluted data, the whole network becomes defective. This paper presents a secure protocol against selfish and pollution attacker misbehavior in clustered <i>WSNs</i>, known as (<i>SSP</i>). It aims to thwart both selfish and pollution attacker misbehaviors, the former being a form of a Denial of Service (<i>DoS</i>) attack. In addition, it maintains a level of confidentiality against eavesdroppers. Based on a random linear network coding (<i>NC</i>) technique, the protocol uses pre-loaded matrices within sensor nodes to conceive a larger number of new packets from a set of initial data packets, thus creating data redundancy. Then, it transmits them through separate paths to the <i>BS</i>. Furthermore, it detects misbehaving nodes among <i>CH</i>s and executes a punishment mechanism using a control counter. The security analysis and simulation results demonstrate that the proposed solution is not only capable of preventing and detecting <i>DoS</i> attacks as well as pollution attacks, but can also maintain scalable and stable routing for large networks. The protocol means 100% of messages are successfully recovered and received at the <i>BS</i> when the percentage of lost packets is around 20%. Moreover, when the number of misbehaving nodes executing pollution attacks reaches a certain threshold, <i>SSP</i> scores a reception rate of correctly reconstructed messages equal to 100%. If the <i>SSP</i> protocol is not applied, the rate of reception of correctly reconstructed messages is reduced by 90% at the same case.
topic secure routing
network coding
wireless sensor network
data availability
selfish behavior
<i>DoS</i> attack
url https://www.mdpi.com/2079-9292/10/11/1244
work_keys_str_mv AT hanarhim asecureprotocolagainstselfishandpollutionattackermisbehaviorinclusteredwsns
AT damiensauveron asecureprotocolagainstselfishandpollutionattackermisbehaviorinclusteredwsns
AT rymaabassi asecureprotocolagainstselfishandpollutionattackermisbehaviorinclusteredwsns
AT karimtamine asecureprotocolagainstselfishandpollutionattackermisbehaviorinclusteredwsns
AT sihemguemara asecureprotocolagainstselfishandpollutionattackermisbehaviorinclusteredwsns
AT hanarhim secureprotocolagainstselfishandpollutionattackermisbehaviorinclusteredwsns
AT damiensauveron secureprotocolagainstselfishandpollutionattackermisbehaviorinclusteredwsns
AT rymaabassi secureprotocolagainstselfishandpollutionattackermisbehaviorinclusteredwsns
AT karimtamine secureprotocolagainstselfishandpollutionattackermisbehaviorinclusteredwsns
AT sihemguemara secureprotocolagainstselfishandpollutionattackermisbehaviorinclusteredwsns
_version_ 1721413549293568000