Абстрактный

A Security Approach For Detection And Elimination Of Resource Depletion Attack In Wireless Sensor Network

Ambili M A, BijuBalakrishnan

Wireless Sensor Networks came into prominence around the start of this millennium motivated by the omnipresentscenario ofsmall-sizedsensors withlimitedpower deployedinlargenumbers overan areato monitor different phenomenon.Theapplications ofWSNwererapidlyemerging& havebeen increasingly diverse,including medicalmonitoring, homeland security, industrialautomation, military application etc.. Thishighlightstheneedforsecurityassensornodesare highly susceptibletomanykindsofattacks.Someattackscalled resourceconsumptionattacksthatare difficultto detectwill deplete thenodes energyand thuspermanentlydisablethe network.Thesolemotivationforresearchin WSNhasbeen to providesecurityandto maximizethelifetimeofthenetwork, where network lifetimeis typically measuredfromtheinstantof deploymenttothe point whenone ofthe nodeshas expendedits limitedpowersource andbecomesin-operational–commonly referredas a firstnode failure. In thispaper, we considerhow routing protocols,affectfrom attackeventhosedesignedtobe secure, lack protection from these attacks, which we call Vampire attacks, which permanently disable networks by quicklydrainingnodes’battery power.These“Vampire”attacks are notspecific toanyspecific protocolwhich aredevastating, difficult todetect,andareeasy tocarryoutusingasfewasone maliciousinsidersending onlyprotocol compliantmessages.We proposean energyconstraintintrusiondetectiontechniqueto detecttheresource drainingattack.

Отказ от ответственности: Этот реферат был переведен с помощью инструментов искусственного интеллекта и еще не прошел проверку или верификацию

Индексировано в

Индекс Коперника
Академические ключи
CiteFactor
Космос ЕСЛИ
РефСик
Университет Хамдарда
Всемирный каталог научных журналов
Импакт-фактор Международного инновационного журнала (IIJIF)
Международный институт организованных исследований (I2OR)
Cosmos

Посмотреть больше