ISSN ONLINE(2320-9801) PRINT (2320-9798)

All submissions of the EM system will be redirected to Online Manuscript Submission System. Authors are requested to submit articles directly to Online Manuscript Submission System of respective journal.

Special Issue Article Open Access

A Security Approach For Detection And Elimination Of Resource Depletion Attack In Wireless Sensor Network

Abstract

Wireless Sensor Networks came into prominence around the start of this millennium motivated by the omnipresentscenario ofsmall-sizedsensors withlimitedpower deployedinlargenumbers overan areato monitor different phenomenon.Theapplications ofWSNwererapidlyemerging& havebeen increasingly diverse,including medicalmonitoring, homeland security, industrialautomation, military application etc.. Thishighlightstheneedforsecurityassensornodesare highly susceptibletomanykindsofattacks.Someattackscalled resourceconsumptionattacksthatare difficultto detectwill deplete thenodes energyand thuspermanentlydisablethe network.Thesolemotivationforresearchin WSNhasbeen to providesecurityandto maximizethelifetimeofthenetwork, where network lifetimeis typically measuredfromtheinstantof deploymenttothe point whenone ofthe nodeshas expendedits limitedpowersource andbecomesin-operational–commonly referredas a firstnode failure. In thispaper, we considerhow routing protocols,affectfrom attackeventhosedesignedtobe secure, lack protection from these attacks, which we call Vampire attacks, which permanently disable networks by quicklydrainingnodes’battery power.These“Vampire”attacks are notspecific toanyspecific protocolwhich aredevastating, difficult todetect,andareeasy tocarryoutusingasfewasone maliciousinsidersending onlyprotocol compliantmessages.We proposean energyconstraintintrusiondetectiontechniqueto detecttheresource drainingattack.

Ambili M A, BijuBalakrishnan

To read the full article Download Full Article