Security Services for DoS, Hello Flooding and Traffic Analysis in WSN Using Mobile Agents


(*) Corresponding author


Authors' affiliations


DOI's assignment:
the author of the article can submit here a request for assignment of a DOI number to this resource!
Cost of the service: euros 10,00 (for a DOI)

Abstract


Sensor networks are dense wireless networks of small, low-cost sensors, which collect and disseminate environmental data. Wireless Sensor Networks have many characteristics that make them very vulnerable to malicious attacks. Lot of security algorithms were implemented to provide security system of WSN. Still it is an open area to research. Because, It is difficult to perform continuous surveillance after network deployment since WSN is usually deployed in hostile areas without any fixed infrastructure. Recently, mobile agents have been proposed for efficient data dissemination in sensor networks. In the traditional client/server-based computing architecture, data at multiple sources are transferred to a destination; whereas in the mobile-agent based computing paradigm, a task specific executable code traverses the relevant sources to gather data. Mobile agents can be used to greatly reduce the communication cost, especially over low bandwidth links, by moving the processing function to the data rather than bringing the data to a central processor. Here a mobile agent paradigm is proposed for implementing security system against hello flooding, Path based Denial of Service attack and traffic analysis.
Copyright © 2013 Praise Worthy Prize - All rights reserved.

Keywords


WSN; Dos Attack; Hello Flooding Attack; Traffic Confidentiality; Mobile Agent

Full Text:

PDF


References


Yun zhou and Yuguang fang, university of florida, Yanchao zhang, new jersey institute of technology, Securing Wireless Sensor Networks : A survey, IEEE Communications, 3rd quarter 2008, Vol 10, no. 3.

Ivan Vukasinovic, Zoran Babovic, Ooran Rakocevic , A Survey on the Use of Mobile Agents in Wireless Sensor Networks, ICIT 2012,IEEE 2012.

Olatunde O. Abiona,Yu Cheng, Mobile Agent based Authentication for Wireless Network Security, 2008 IEEE.

Mansouri, H., Benhaddou, S., Medromi, H., Energy security optimization in wireless sensor network based on multi agent system architecture, (2012) International Review on Computers and Software (IRECOS), 7 (2), pp. 518-524.

Rehana Yasmin, Eike Ritter, Guilin Wang , An Authentication Framework forWireless Sensor Networks using Identity-Based Signatures, CIT 2010, IEEE 2010.

Vorugunti Chandra Sekhar, Mrudula Sarvabhatla, Security In Wireless Sensor Networks With Public Key Techniques, ICCCI -2012, Coimbatore, INDIA, IEEE 2012.

B. Li, R. Doss, L.M. Batten and W. Schott, Fast Recovery from Node Compromise in Wireless Sensor Networks, IEEE 2009.

Wenjun Gu, Neelanjana Dutta, Sriram Chellappan, and Xiaole Bai A , Providing End-to-End Secure Communications in Wireless Sensor Networks, IEEE transactions on network and service management, Vol. 8, no. 3, September 2011.

Maxwell Young and Raouf Boutaba, "Overcoming Adversaries in Sensor Networks: A Survey of Theoretical Models and Algorithmic Approaches for Tolerating Malicious Interference, IEEE Communications surveys & tutorials, Vol. 13, no. 4, fourth quarter 2011.

D.Sheela,G.Mahadevan ,Mollifying the Effect of Cloning, Sink Hole and Black Hole Attacks in Wireless Sensor Networks using Mobile Agents with Several Base Stations, International Journal of Computer Applications (0975 – 8887),Vol 55– No.9, October 2012.

M. Ketel, N. Dogan, A. Homaifar, Distributed Sensor Networks Based on Mobile Agents Paradigm, Proc. 37th Southeastern Symposium on System Theory, Tuskegee, AL, USA, 2005: 411-414.

Sejun Song, Haijie Wu and Baek-Young Choi ,USA, Statistical Wormhole Detection for Mobile Sensor Networks, ICUFN 2012, 2012 IEEE.

Ashish Kumar Srivastava,Aditya Goel, MANIT Bhopal, India, Security Solution for WSN Using Mobile Agent Technology, International Journal of Research and Reviews in Wireless Sensor Networks (IJRRWSN)Vol. 1, No. 3, September 2011, ISSN: 2047-0037.

Alejandro Proano,Loukas Lazos, Hiding Contextual Information in WSNs, 2012 IEEE.

L. Tong, Q. Zhao, S. Adireddy, Sensor Networks with Mobile Agents, IEEE Military Communications Conference, Boston, MA, USA, 2003:688-693.

H. Qi, Y. Xu, X. Wang, Mobile-Agent-based Collaborative Signal and Information Processing in Sensor Networks, Proc. IEEE, 2003, 91(8):1172-1183.

Chia-Mu Yu, Student Member, IEEE, Yao-Tung Tsou, Chun-Shien Lu, Member, IEEE, and Sy-Yen Kuo, Fellow, IEEE, Constrained Function-Based Message Authentication for Sensor Networks, IEEE transactions on information forensics and security, Vol. 6, no. 2, June 2011.

Kissoum, Y., Sahnoun, Z., Barkaoui, K., Unit testing of mobile agents using the nets within nets paradigm, (2009) International Review on Computers and Software (IRECOS), 4 (2), pp. 254-265.


Refbacks

  • There are currently no refbacks.



Please send any question about this web site to info@praiseworthyprize.com
Copyright © 2005-2024 Praise Worthy Prize