Identification of Dropout Packets in Wireless Sensor Networks

Authors(2) :-S. Thiruvengadam, Dr. K. Thamodaran

The wireless networks formulate significant revolution in the field of information and communications technology. The wireless networks connect multiple computers and communications devices mutually devoid of wires. The security of data is very important issue in any kind of wireless networks. Wireless sensor network and its applications by intrusions and other attacks to interrupt the characteristics it serves. Normally packet loss is occurring by network congestion. Packet loss is measured as a percentage of packets lost with respect to packets sent. Network congestion in data networking is reducing the quality of service that occurs when a network node is carrying more data than it can handle. In this paper, a network security framework is developed to detect the packet loss and the nodes are offering statement about packet losses. This framework is also offering the features for improving the detection accuracy, and identification of correlations between lost packets. This technique affords privacy preserving, collusion proof, and incurs low communication and storage overheads.

Authors and Affiliations

S. Thiruvengadam
MPhil Research Scholar, Department of Computer Science, Maruthupandiyar College, Thanjavur, Tamilnadu, India
Dr. K. Thamodaran
Professor, Department of Computer Science, Marudupandiyar College, Thanjavur, Tamilnadu, India

Detection Accuracy, Network Congestion, Packet Losses, Security, Wireless Networks.

  1. Marti.S., T. J. Giuli, K. La and M. Baker, “Mitigating Routing Misbehavior in a Mobile Ad-hoc Environment”, Proc. 6th Annual ACM/IEEE International Conference on Mobile Computing and Networking, pp. 255- 265, August 2000.
  2. Mayank .S ”Security in Wireless Sensor Networks,” In ACM SenSys, 2004.
  3. Simmonds, A; Sandilands, P; van Ekert, L, "An Ontology for Network Security Attacks". Lecture Notes in Computer Science, 3285- pp 317 -323, 2004.
  4. Alpcan.T and T. Basar, ”A Game Theoretic Approach to Decision and Analysis in Network Intrusion Detection,” Proc. 43rd IEEE Conference on Decision and Control, December 2004.
  5. Starsky.H.Y. Wong, Hao Yang, Songwu Lu and Vaduvur Bharghavan, “Robust Rate Adaptation for 802.11 Wireless Networks”, pp146-147, 2006.
  6. F. Anjum and P. Mouchtaris “Security for Wireless AD HOC Networks” Wiley, 2007.
  7. Hoang.T. Hai and E-N. Huh, “Optimal Selection and Activation of Intrusion Detection Agents for Wireless Sensor Networks”, Proc. Future Generation Communication and Networking, vol.1, no., pp.350-355, Dec. 2007.
  8. Jagannathan Sarangapani, “Wireless Ad Hocand Sensor Networks Protocols, Performance, and Control”, CRC Press-Taylor & Francis, 2007
  9. Lili Qiu, Yin Zhang, Feng Wang, Mi Kyung Han, Ratul Mahajan, “A General Model of Wireless Interference”, 2007.
  10. Nicolas Sklavos and Xinmiao Zhang, “Wireless Security and Cryptography : Specifications and Implementations”, CRC Press-Taylor & Francis, 2007.
  11. Yang.S., S.Vasudevan, and J. Kurose, “Witness-based detection of forwarding misbehaviors in wireless networks”, in UMass Computer Science Technical Report UM-CS-2009-001, 2009.
  12. J.Tang, Y. Cheng, Y. Hao, and C. Zhou, “Real-Time Detection of Selfish Behavior in IEEE 802.11 Wireless Net works,” Proc. IEEE 72nd Vehicular Technology Conf. Fall (VTC-Fall), 2010.
  13. D. Dong, X. Liao, Y. Liu, C. Shen and X. Wang, ”Edge Self-Monitoring for Wireless Sensor Networks,” IEEE Transactions on Parallel and Distributed Systems,” vol. 22, no. 3, March 2011, pp. 514-527.
  14. Igli Tashi and Solange Ghernaouti-Helie, “Information Security Evaluation-A Holistic Approach”, EPFL Press, 2011.
  15. Shen.S., “A game-theoretic approach for optimizing intrusion detection strategy in WSNs”, Proc. International Conference on Artificial Intelligence, Management Science and Electronic Commerce, pp.4510-4513, Aug. 2011.
  16. Zeadally.S , R. Hunt, Y-S. Chen, A. Irwin and A. Hassan, “Vehicular ad hoc networks (VANETS): status, results, and challenges”, Telecommunication Systems, vol. 50, no. 4, pp. 217-241, 2012.
  17. U.Paul, Anand Kashya p, S.R.Das, and R.Maheshwari, “Passive Measurement of Interference in WiFi Networks with Application in Misbehavior Detection”, IEEE Transcations on mobile computing Vol 12,No 3.March 2013.
  18. Matthew S. Gast, “ 802.11ac: A Survival Guide”, O’Reilly Publishers, August 2013.
  19. Zheng.R., T. Le and Z. Han, “Approximate Online Learning Algorithms for Optimal Monitoring in Multi-Channel Wireless Networks”, IEEE Transactions on Wireless Communications, vol.13, no.2, pp.1023-1033, February 2014.
  20. Bhoi.S.K. and P. M. Khilar, “Vehicular communication: a survey”, IET Networks, vol. 3, no. 3, pp. 204 - 217, 2014.
  21. Tsikoudis.N, A. Papadogiannakis and E. P. Markatos, ”LEoNIDS: a Low-latency and Energy-efficient Network-level Intrusion Detection System,” IEEE Transactions on Emerging Topics in Computing, Vol. no. 99, PP142-155, 2014.
  22. Mohammad Al-Rousan, Muneer Bani Yassein, Ahmed Al-Dubai, Barraq Ghaleb, Ibrahim Mahmoud, A Novel Situation Specific Network Security for Wireless Sensor Networks, Sensors & Transducers, Vol. 186, Issue 3, pp. 33-42, March 2015.
  23. G.Premkumar, C.Vinoth, R. Srinivasan, “Detecting MAC Layer Misbehavior in Wi-Fi Networks by Co-ordinated Sampling of Network Monitoring”, International Journal of Innovative Research in Computer and Communication Engineering Vol. 3, Issue 5, pp3772-3778, May 2015.
  24. R.Muradore and D. Quaglia, ”Energy-Efficient Intrusion Detection and Mitigation for Networked Control Systems Security,” IEEE Transactions on Industrial Informatics, Vol. 11, no. 3, pp. 830-840, 2015.
  25. Manoj Kumar Gupta, Lokesh Singh , A Novel Approach to Detect Intruder for Hierarchical WSN Network, International Journal of Advanced Research in Computer and Communication Engineering Vol. 5, Issue 2, pp88-92, February 2016.
  26. Priti Kharche et. al, International Journal for Innovative Research in Science and Technology, Volume 2, Issue 11, pp 71-75, April 2016.
  27. Waleed Al Shehri, A Survey on Security in Wireless Sensor Networks, International Journal of Network Security & Its Applications Vol.9, No.1, pp 25-32, January 2017.
  28. A Boudries, M Amad, P Siarry, Novel approach for replacement of a failure node in wireless sensor network. Telecommun Syst. 65, pp 341350, 2017.
  29. J Li, S Cheng, Z Cai, J Yu, C Wang, Y Li, Approximate holistic aggregation in wireless sensor networks. ACM Trans. Sensor Netw. 13(2), Article 11, pp 124, 2017.
  30. T Qiu, N Chen, K Li, D Qiao, Z Fu, Heterogeneous ad hoc networks: Architectures, advances and challenges. Ad Hoc Netw. 55, pp143152 , 2017.

Publication Details

Published in : Volume 2 | Issue 5 | September-October 2017
Date of Publication : 0000-00-00
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 636-645
Manuscript Number : CSEIT1725125
Publisher : Technoscience Academy

ISSN : 2456-3307

Cite This Article :

S. Thiruvengadam, Dr. K. Thamodaran, "Identification of Dropout Packets in Wireless Sensor Networks", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 2, Issue 5, pp.636-645, September-October-2017.
Journal URL :

Article Preview

Follow Us

Contact Us