International Journal of Computer Networks and Applications (IJCNA)

Published By EverScience Publications

ISSN : 2395-0455

International Journal of Computer Networks and Applications (IJCNA)

International Journal of Computer Networks and Applications (IJCNA)

Published By EverScience Publications

ISSN : 2395-0455

Mitigation of Energy Depletion in Wireless Ad-hoc Sensor Networks through Path Optimization

Author NameAuthor Details

Sandhya Rani G, Santosh Naidu P

Sandhya Rani G[1]

Santosh Naidu P[2]

[1]Computer Science and Engineering, MVGR College of Engineering, Andhra Pradesh, India.

[2]Computer Science and Engineering, MVGR College of Engineering, Andhra Pradesh, India.

Abstract

Low-power wireless networks are an exciting research direction in sensing and widespread figuring out/calculating. Prior security work in this area has focused mostly on denial of communication at the routing or medium access control levels. This paper explores useful thing/valuable supply using everything up (completely) attacks at the routing rules of conduct layer, which permanently disable networks by quickly draining nodes' battery power. These "Vampire" attacks are not specific to any specific rules of conduct, but rather depend on the properties of many popular classes of routing rules of conduct. We find that all examined rules of conduct are easily able to be harmed or influenced by Vampire attacks, which are terrible and destructive, very hard to detect, and are easy to carry out using as few as one evil and cruel insider sending only rules of conduct cooperative messages.

Index Terms

Vampire attacks

draining nodes

Stretch Attack

ad-hoc wireless sensor networks

Reference

  1. 1.
    David Marchany, Randy Brownfield, M. Raymond and S. Midkiff, "Effects of Denial of Sleep Attacks on Wireless Sensor Network MAC Protocols," in Information Assurance Workshop, 2006 IEEE, West Point, NY, 2006, pp. 297 - 304.
  2. 2.
    A. Anuba Merlyn and A. Anuja Merlyn, “Energy Efficient Routing (EER) For Reducing Congestion and Time Delay in Wireless Sensor Network”, International Journal of Computer Networks and Applications, Volume 1, Issue 1, PP: 1 – 10, November – December (2014).
  3. 3.
    SARIKA KHATARKAR and RACHANA KAMBLE-Wireless Sensor Network MAC Protocol:SMAC & TMAC(IJCSE:Aug-Sep:2013).
  4. 4.
    John A.Stankovic Anthony D.Wood, "Denial of Service in Sensor Networks," IEEE, pp. 54-62, October 2002.
  5. 5.
    Sharon Goldberg, David Xiao, Eran Tromer,Boaz Barak, and Jennifer Rexford,Princeton University (Path-Quality Monitoring in the Presence of Adversaries, June 21-2009.
  6. 6.
    Richard Han, and Shivakant Mishra Jing Deng, "Defending against Pathbased DoS Attacks in Wireless Sensor Networks," in SASN, 2005, pp. 89-96.
  7. 7.
    Perrig, A. Yih-Chun Hu and D.B Johnson, "Packet Leashes: A Defense against Wormhole Attacks in Wireless Networks," in INFOCOM 2003. Twenty-Second Annual Joint Conference of the IEEE Computer and Communications. IEEE Societies, 2003, pp. 1976 - 1986.
  8. 8.
    Jae-Hwan Chang and Leandros Tassiulas (Energy Conserving Routing in Wireless Ad-hoc Networks).
  9. 9.
    J.Vijay Daniel, G.Murugaboopathi K.Venkatraman, "Various Attacks in Wireless Sensor Network:Survey," International Journal of Soft Computing and Engineering (IJSCE), vol. 3, no. 1, pp. 208-211, March 2013.
  10. 10.
    Hong-Ning Dai, Qiu Wang, Dong Li, and Raymond Chi-Wing Wong On Eavesdropping Attacks in Wireless Sensor Networks with Directional Antennas (International Journal of Distributed Sensor Networks Volume 2013).
  11. 11.
    Dr. Shahriar Mohammadi and Hossein Jadidoleslamy-A OMPARISONNETWORKS (International journal on applications of graph theory in wireless ad hoc networks and sensor networks (GRAPH-HOC) Vol.3, No.1, March 2011).
  12. 12.
    TEODOR-GRIGORE LUPU-Main Types of Attacks in Wireless Sensor Networks (Recent Advances in Signals and Systems).
  13. 13.
    James Newsome, Elaine Shi, Dawn Song and Adrian Perrig -The Sybil Attack in Sensor Networks: Analysis & Defenses(2004 ACM).
  14. 14.
    Lina r.deshmukh, amol d.potgantwar-prevention of vampire attacks in wsn using routing loop Proceedings of IRF International Conference, 5th & 6th February 2014).
  15. 15.
    P.Rajipriyadharshini, V.Venkatakrishnan,S.Suganya,A.Masanam-Vampire Attacks Deploying Resources in Wireless Sensor etworks(IJCSIT-2014).
  16. 16.
    David Xia, Eran Tromery, Boaz Barak, and Jennifer Rexford Sharon Goldberg, "Path-Quality Monitoring in the Presence of Adversaries," in METRICS Measurement and Modeling of Computer Systems, New York, NY, June 2009, pp. 193-204.
  17. 17.
    D. J. Bernstein. (1996, September) TCP/IP SYN cookies. [Online]. HYPERLINK"http://cr.yp.to/syncookies.html" ,http://cr.yp.to/syncookies.html .
  18. 18.
    Leo Selavo, and John A. Stankovic Anthony D. Wood, Springer, pp. 531-543, 2008.
  19. 19.
    Kai Xing , Shyaam Sundhar Rajamadam Srinivasan , Manny Rivera ,Jiang Li , Xiuzhen Cheng (Attacks and Countermeasures in Sensor Networks: A Survey-2005 Springer).
  20. 20.
    Farzana T, Mrs.Aswathy Babu-A light weight PLGP based method for mitigating vampire attacks in Wireless Sensor Networks (International Journal Of Engineering And Computer Science:Volume 03 Issue 07 July, 2014).
SCOPUS
SCImago Journal & Country Rank