Total views : 269

Avert Compromised Node in Wireless Sensor Network with Honeypot System


  • Bharathiar University,Coimbatore - 641046, Tamil Nadu, India
  • Periyar University, PG Extn Centre, Dharmapuri, Salem - 636011, Tamil Nadu, India


Objectives:To avoid node become compromised and achieve secure data aggregationwith energy efficiency in the Wireless Sensor Network(WSN)by using Honeypot system. Methods/ Statistical Analysis: Honeypot system is a fake node plays vital role in the sensor network that attract the attackers, find attackers ID, analysis type of attacks and energy consumption by the attacks subsequently alert Base Station without disturbing the sensor network. Base Station can easily identify intruder or attacker using Honeypot and alert all sensor nodes. So each node able to identify the attackers before the actual attack. Findings:When node become compromised, itleads problem in data aggregation.Honeypot avoids compromised node and achieves good level of energy efficiency, life span, throughput ratio and success rate. Also it degrades the vulnerablility of attacks. Application/Improvement:Honeypot system makes deception and deterrence to the attackers. Its used for early warning, to detect attackers and type of attacks, it enhances the intrusion detection systems and helps in designing better tools for security.


Attackers, Compromised Node, Data Aggregation, Energy Efficiency,Honeypot, Type of Attack.

Full Text:

 |  (PDF views: 180)


  • Butun I, Salvatore D, Morgera M, Sankar R. A survey of intrusion detection systems in wireless sensor networks. IEEE. 2013;16(1):266–82.
  • Kheirkhah E, Amin SMP, Sistani HAJ, Acharya H. An experimental study of SSH attacks by using honeypot decoys. Indian Journal of Science and Technology. 2013 Dec; 6(12):1–12.
  • Wang YT, Bagrodia R. Comsen: A detection system for identifying compromised node in wireless sensor networks. The Sixth International Conference on Emerging Security Information, System and Technologies; 2012.
  • Rawatp, Goel S, Agarwal M, Singh R. Securing WMN using hybrid honeypot system. International Journal of Distributed Parallel Systems. 2012; 3(3):1–6.
  • Shamsh S, Vandana D. Roaming honeypots along with IDS in mobile ad-hoc networks. International Journal of Computer Application. 2013; 69(23):1–8.
  • Singh G, Sharma S, Singh P. Design and develop a honeypot for small scale organization. International Journal of Innovative Technology and Exploring Engineering. 2013; 2(3):1–5.
  • Baykara M, Das R. A survey on potential applications of honeypot technology in intrusion detection systems. International Journal of Computer Networks and Applications. 2015; 2(5):1–9.
  • Saranya J, Lekha J. A review on trap- tracking and preventing intruders in WSN using honeypot driven game theory. International Journal of Infinite Innovations in Engineering and Technology. 2015; 2(4):1–8.
  • Divya D, Chugh A. GHIDS: A hybrid honeypot system using genetic algorithm. International Journal of Computer Technology and Applications. 2012; 3(1):187–91.
  • Siles R. Honeypot: The wireless honeypot- monitoring the attackers activities in wireless networks. The Spanish Honeynet Project; 2007 Dec.
  • Shankar T, Karthikeyan A, Sivasankar P, Neha RR. Implementation of smart sleep mechanism and hybrid data collection technique for maximizing network lifetime in WSN’s. Indian Journal of Science and Technology. 2015 May; 8(S9):1–8.
  • Jayamurugan G, Kamalakkannan P. Position-based key sharing with higher connectivity and multivariate optimized resource consumption in WSN. Indian Journal of Science and Technology. 2015 Dec; 8(35):1–9.
  • Fanian F, Rafsanjani MK. A novel routing efficient algorithm based on clustering in WSNs. Indian Journal of Science and Technology. 2013 Dec; 6(12):1–4.
  • Markert J, MAssoth M. Honeypot effectiveness in different categories of attacks on wireless sensor networks. 25th International Workshop on Database and Expert Systems Applications, IEEE UK; 2014.
  • Chen R-C, Hsieh C-F, Huang Y-F. An isolation intrusion detection system for hierarchical wireless sensor networks. Journal of Networks. 2010 Mar,5(3):1–8.
  • Huo G, Wang X. DIDS: A dynamic model of intrusion detection system in wireless sensor networks. Information and Automation Conference; 2008.
  • Bhattasali T, Chaki T. A survey of recent intrusion detection systems for wireless sensor networks. Advances in Network Security and Applications, 4th international Conference CNSA 2011, Chennai, India; 2011 Jul.


  • There are currently no refbacks.

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.