Cross-layer Planes Framework for Detection of Malicious Nodes in WSN
Devaraju B. M.1, Raju G. T.2

1Devaraju B M, Assistant Professor, Department of CSE, RNS Institute of Technology, Bengaluru (Karnataka), India.

2G T Raju, Vice Principal, Professor and Head, Department of CSE, RNS Institute of Technology, Bengaluru (Karnataka), India.

Manuscript received on 05 December 2019 | Revised Manuscript received on 13 December 2019 | Manuscript Published on 31 December 2019 | PP: 502-509 | Volume-9 Issue-2S December 2019 | Retrieval Number: B11311292S19/2019©BEIESP | DOI: 10.35940/ijitee.B1131.1292S19

Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open-access article under the CC-BY-NC-ND license (

Abstract: Cross-layer planes design is relatively new security approach for future technological era in which different parameters are analyzed across protocols stack, so that the internet connected exchange their information with utmost security. The traditional existing approaches operates at single layer security and across few cross layers on TCP/IP model. Hence intruder can monitor loop holes on victim nodes in Wireless Sensor Network (WSN), which is serious issue for sensitive data. For example, Intrusion Detection System (IDS) operates on network layer and identifies routing attacks, but it does not react to physical layer, MAC layer and transport layers anomalies. Cross-layer design among few layers can monitor and detect some intrusions but this consumes more energy at node and node will become inactive early in the network. Hence, in this article, we are proposing Cross-layer Planes Framework for Detecting Malicious Activities (CPFDMA) at different layers is proposed to secure the WSN as viable security framework is based on the Cross-layer planes which interact attributes in different layers of the protocol stack and monitor & analyze anomaly patterns, notifying them to avoid their malicious activities from the network.

Keywords: WSN, Cross-layer Framework, Malicious Activities.
Scope of the Article: WSN