A Survey of Resource Draining Attacks and Mitigation in Wireless Ad-Hoc Sensor Networks

  IJETT-book-cover  International Journal of Engineering Trends and Technology (IJETT)          
  
© 2014 by IJETT Journal
Volume-18 Number-7
Year of Publication : 2014
Authors : Ms. Rashmi Jangre , Mrs. R.R. Welekar
DOI :  10.14445/22315381/IJETT-V18P268

Citation 

Ms. Rashmi Jangre , Mrs. R.R. Welekar "A Survey of Resource Draining Attacks and Mitigation in Wireless Ad-Hoc Sensor Networks", International Journal of Engineering Trends and Technology (IJETT), V18(7),331-333 Dec 2014. ISSN:2231-5381. www.ijettjournal.org. published by seventh sense research group

Abstract

Wireless ad-hoc sensor networks has become crucial for everyday functioning of people and organizations. Due to their ad-hoc organization they are vulnerable to denial-of-service attacks. The most permanent DoS attack is to entirely exhaust nodes’ batteries, called “Vampire” Attacks. These vampire attacks are not impacting any specific kind of protocols. Detection of vampire attacks in the network is not easy. A single Vampire may even increase network energy usage by a factor of O(N),where N is the number of network nodes. We discuss existing routing protocols to mitigate resource draining attacks.

References

[1] Eugene Y. Vasserman and Nicholas Hopper “Vampire Attacks: Draining Life from Wireless Ad Hoc Sensor Networks”- IEEETRANSACTIONS ON MOBILE COMPUTING, VOL. 12, NO. 2, FEBRUARY 2013.
[2] Gergely Acs, Levente Buttyan, and Istvan Vajda “Provably Secure OnDemand Source Routing in Mobile Ad Hoc Networks”-IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 5, NO. 11, NOVEMBER 2006.
[3] Yi Xu and Wenye Wang “Detecting and mitigating DOS attacks in wireless networks without affecting the normal behaving nodes”-IEEE 2007.
[4] L.Lakshmanan , Dr. D.C. Tomar “Secure Routing Protocol in wireless Sensor networks for vampire attack”-INDIAN JOURNAL OF APPLIED RESEARCH April 2014.
[5] Umakanth, J. Damodhar “Detection of Energy draining attack using EWMA in Wireless Ad Hoc Sensor Networks”-International Journal of Engineering Trends and Technology (IJETT) – Volume 4 Issue 8- August 2013 .
[6] G.Vijayanand, R.Muralidharan “Overcome vampire attacks problem in wireless ad-hoc sensor network by using Distance Vector Protocols”-International Journal of Computer Science and Mobile Applications,Vol.2 Issue. 1, January- 2014.
[7] Volkan Rodoplu, Student Member, IEEE, and Teresa H. Meng, Fellow, IEEE “Minimum Energy Mobile Wireless Networks” IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 17, NO. 8, AUGUST 1999.
[8] Jae-Hwan Chang, Member, IEEE, and Leandros Tassiulas, Member, IEEE “Maximum Lifetime Routing in Wireless Sensor Networks-IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 12, NO. 4, AUGUST 2004.
[9] Volkan Rodoplu, Student Member, IEEE, and Teresa H. Meng, Fellow, IEEE” Minimum Energy Mobile Wireless Networks” IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 17, NO. 8, AUGUST 1999.
[10] Tawseef Ahmad Naqishbandi and Imthyaz Sheriff C” A Resilient Strategy against Energy Attacks in Ad-Hoc WSN and Future IoT” International Journal of Advanced Research in Computer Science and Software Engineering Volume 4, Issue 2, February 2014.
[11] David .R.Raymond, Scott F. Midkiff ” Clustered Adaptive Rate Limiting:Defeating Denial-Of-Sleep Attacks In Wireless Sensor Networks”-IEEE 2007.
[12] Sonali Swetapadma Sahu,,Pooja Priyadarshini,Saurabh Bilgaiyan “Curbing Distributed Denial Of Service Attack By Traffic Filtering In Wireless Sensor Network” 5th ICCCNT – 2014 July 11 - 13, 2014, Hefei, China.
[13] Su Man Nam, Tae Ho Cho “Energy Efficient Method for Detection and Prevention of False Reports in Wireless Sensor Networks”
[14] Chakib BEKARA and Maryline LAURENT-MAKNAVICIUS and Kheira BEKARA “H2BSAP: A Hop-by-Hop Broadcast Source AuthenticationProtocol for WSN to mitigate DoS Attacks” –IEEE 2008.
[15] Quentin MONNET, Lynda MOKDAD, Jalel BEN-OTHMAN “Energy-balancing method to detect denial of service attacks in wireless sensor networks” IEEE ICC 2014 - Ad-hoc and Sensor Networking Symposium

Keywords
ad-hoc, denial-of-service, sensor networks, wireless