Swarm Based Defense Technique for Denial-of-Sleep Attacks in Wireless Sensor Networks


(*) Corresponding author


Authors' affiliations


DOI's assignment:
the author of the article can submit here a request for assignment of a DOI number to this resource!
Cost of the service: euros 10,00 (for a DOI)

Abstract


In Wireless Sensor Networks (WSN), the denial of sleep attack consumes more amount of energy which leads to depletion of battery power. This consumption of power makes the nodes more susceptible to the vulnerabilities and hence denial of service through denial of sleep. If a large percentage of network nodes, or a few critical nodes, are attacked in this way, the network lifetime can be reduced severely. In order to overcome the denial of sleep attack in this paper, we propose to develop a swarm based defense technique for denial of sleep attack. Initially an anomaly detection model is developed which determines the affected traffic between the nodes and based on this, the frequency hopping technique is initiated. Ant agents of Swarm intelligence are applied in each channel to collect the communication frequency and the frequency hopping time. Based upon the frequency hopping time the faulty channel is identified and the when the administer node gets this information it deletes the faulty channel.  From our simulation results, we prove that this technique proves to be efficient in detecting the faulty channel and consumes less energy since the information about the all the attackers can be known using ants.
Copyright © 2013 Praise Worthy Prize - All rights reserved.

Keywords


Wireless Sensor Networks (WSN); Attacks; Swarm Intelligence

Full Text:

PDF


References


Michael Krishna “Intrusion Detection in Wireless Sensor Networks” 2006.

Michael Brownfield, Yatharth Gupta, and Nathaniel Davis “Wireless Sensor Network Denial of Sleep Attack” Proceedings of the 2005 IEEE Workshop on Information Assurance United States Military Academy, West Point, NY June 2005.

Shivangi Raman, Amar Prakash, Kishore Babu Pulla, and Prateek Srivastava “Wireless sensor networks: A Survey of Intrusions and their Explored Remedies” International Journal of Engineering Science and Technology Vol. 2(5), 2010, 962-969

Chen Chen,Li Hui,Qingqi Pei,Lv Ning, and Peng Qingquan “An Effective Scheme for Defending Denial-of-Sleep Attack in Wireless Sensor Networks” 2009 Fifth International Conference on Information Assurance and Security.

S.Periyanayagi and Dr.V.Sumathy “A Swarm Based Defense Technique for Jamming Attacks in Wireless Sensor Networks” IJCTE: International journal of computer theory and engineering.

Chunlai Du Jianshun Zhang Li Ma “Split-Network in Wireless Sensor Network:Attack and Countermeasures” I.J.Computer Network and Information Security, 2011, 5, 61-67 Published Online August 2011 in MECS

Ching-Tsung Hsueh, Chih-Yu Wen and Yen-Chieh Ouyang “A Secure Scheme for Power Exhausting Attacks in Wireless Sensor Networks” IEEE. Ubiquotus and Future networks conference 2011

Tapalina Bhattasali, Rituparna Chaki, and Sugata Sanyal “Sleep Deprivation Attack Detection in Wireless Sensor Network” International Journal of Computer Applications (0975 – 8887) Volume 40– No.15, February 2012.

David R. Raymond, Randy C. Marchany, Michael I. Brownfield, and Scott F. Midkiff, “Effects of Denial-of-Sleep Attacks on Wireless Sensor Network MAC Protocols” IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 58, NO. 1, JANUARY 2009.

Thomas Martin, Michael Hsiao, Dong Ha, and Jayan Krishnaswami “Denial-of-Service Attacks on Battery-powered Mobile Computers” Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications (PERCOM’04)

Matthew Pirretti, Sencun Zhu, Richard Brooksand Vijaykrishnan Narayanan “The Sleep Deprivation Attack in Sensor Networks: Analysis and Methods of Defense” International journal of distributed sensors volume 2, 2006.

Rajani Muraleedharan and Lisa Ann Osadciw “Sensor Communication Network Using Swarm Intelligence” 2003

S. Qureshi, A. Asar, A. Rehman, and A. Baseer “Swarm Intelligence based Detection of Malicious Beacon Node for Secure Localization in Wireless Sensor Networks” Journal of Emerging Trends in Engineering and Applied Sciences (JETEAS) 2 (4): 664-672© Scholarlink Research Institute Journals, 2011 (ISSN: 2141-7016).

Muhammad Saleem Gianni A. Di Caro, and Muddassar Farooq “Swarm intelligence based routing protocol for wireless sensor networks: Survey and future directions” Journal information sciences: an international journal archieve, volume 181 Issue 20 October 2011

Zayani, H., Ayed, R.B., Wireless sensor networks optimization: Cross-layer (DSR-Z-MAC) and synchronization technique (SMAC), (2009) International Review on Computers and Software (IRECOS), 4 (1), pp. 42-52.

A. Mellouk, S. Ziane, P. Lorenz, A Swarm Quality of Service Based Multi-Path Routing Algorithm (SAMRA) for Wireless Ad Hoc Networks, (2006) International Review on Computers and Software (IRECOS), 1 (1), pp. 11-19.

Network simulator, http://www.isi.edu/nsnam/ns


Refbacks

  • There are currently no refbacks.



Please send any question about this web site to info@praiseworthyprize.com
Copyright © 2005-2024 Praise Worthy Prize