%0 Journal Article %T Detection and Countermeasure of Node Misbehaviour in Clustered Wireless Sensor Network %A Meenakshi Tripathi %A M. S. Gaur %A V. Laxmi %A P. Sharma %J ISRN Sensor Networks %D 2013 %R 10.1155/2013/843626 %X Wireless sensor networks are widely used in many applications like battlefield monitoring, environment monitoring, and so forth. In all of these applications the cooperation among various sensor nodes is needed to forward the data packets to the base station. However, it expends the various resources of a sensor node such as battery power, storage, and processing power. Therefore, to conserve its own resources a node may become selfish by not forwarding the data to the others. This kind of attack has serious consequences if the attacker node is the leader of a cluster. In the presence of attack the base station will not be able to get the data from the victimized cluster while resources of the member of that cluster are being consumed. In this paper we propose a scheme called window based scheme (WBS) to detect this kind of misbehavior in WSN. Our detection scheme is energy efficient because most of the computations are done at base station only. Simulation results prove that our method detects and removes the attacker effectively and efficiently. 1. Introduction A wireless sensor network (WSN) [1] is a self-organizing network consisting of hundreds to thousands of sensor nodes. Each sensor node has limited processing, storage, and computational capability. A sensor node ¡°senses¡± various parameters like humidity, temperature, pressure, motion, vibration, and so forth, according to the requirement of WSN application, converts it into appropriate signal, and forwards it to a central authority known as a base station or sink through the wireless medium. Base station may again send it to another base station or can take the decision based on acquired data on its own. These networks are widely used in various applications like battlefield surveillance [2], environmental monitoring [3], wildlife monitoring [4], and so forth. In most of the applications the WSN is set up in a hostile environment in an ad hoc manner, which makes them vulnerable to several types of security threats [5]. To enhance the survivability of WSN, traditional security mechanisms like encryption, access control, and authentication have been used by the researchers. However, due to resource limitations strong security mechanism cannot be added to prevent misbehavior of a sensor node. These reasons will lead to abnormal functioning of the network. Now a node may misbehave in various ways such as it does not forward the data at all (blackhole attack) or it may forward the data selectively or it may go into the sleep mode (snooze attack). The attacker may do it either due to any commercial %U http://www.hindawi.com/journals/isrn.sensor.networks/2013/843626/