Securing Cluster Head Selection in Wireless Sensor Networks

Authors

  • Rupinder Singh

  • Dr. Jatinder Singh

  • Rupinder Singh

Keywords:

wireless sensor networks, leach, hello flood attack, armstrong number, aes, encryption, decryption, cluster head

Abstract

Wireless Sensor network routing protocols are prone to various attacks as these protocols mainly provide the function of routing data towards the sink. LEACH is a one of the routing protocol used for clustered implementation of wireless sensor network with Received Signal Strength based dynamic selection of Cluster Heads. But, as with other routing protocols, LEACH is also prone to HELLO flood attack when the malicious sensor node becomes the Cluster Head. Cryptographic and non-cryptographic approaches to detect the presence of HELLO flood attack also exist but they lack efficiency in some way. In this paper, an efficient protocol is proposed for the detection and prevention of HELLO Flood attack in wireless sensor network. Cluster heads are vulnerable to various malicious attacks and this greatly affects the performance of the wireless sensor network. Cryptographic approaches to prevent this attack are not so helpful though some non-cryptographic methods to detect the HELLO Flood attack also exist but they are not too efficient as they result in large test packet overhead. In this paper, we propose HRSRP (Hello flood attack Resistant Secure Routing Protocol) extension to LEACH protocol so as to protect the cluster head against Hello flood attack. HRSRP is base on encryption using Armstrong number and decryption using AES algorithm to verify the identity of cluster head. The proposed technique is implemented in NS2, the experimental results clearly indicate the proposed technique has significant capability for the detection of hello flood attack launched for making the malicious node as the cluster head.

How to Cite

Rupinder Singh, Dr. Jatinder Singh, & Rupinder Singh. (2016). Securing Cluster Head Selection in Wireless Sensor Networks. Global Journal of Computer Science and Technology, 16(E7), 31–40. Retrieved from https://computerresearch.org/index.php/computer/article/view/1486

Securing Cluster Head Selection in Wireless Sensor Networks

Published

2016-05-15