Detection of Energy draining attack using EWMA in Wireless Ad Hoc Sensor Networks
|International Journal of Engineering Trends and Technology (IJETT)||
|© 2013 by IJETT Journal|
|Year of Publication : 2013|
|Authors : B. Umakanth , J. Damodhar|
B. Umakanth , J. Damodhar. "Detection of Energy draining attack using EWMA in Wireless Ad Hoc Sensor Networks". International Journal of Engineering Trends and Technology (IJETT). V4(8):3691-3695 Aug 2013. ISSN:2231-5381. www.ijettjournal.org. published by seventh sense research group.
Wireless Sensor Networks came into prominence around the start of this millennium motivated by the omnipresent scenario of small - sized sensors with limited power deployed in large numbers over an area to monitor different phenomenon. The so le motivation of a large portion of research efforts has been to maximize the lifetime of the network, where network lifetime is typically measured from the instant of deployment to the point when one of the nodes has expended its limited power source and becomes in - operational – commonly referred as first node failure. Over the years, research has increasingly adopted ideas from wireless communications. In this paper we consider how routing protocols, affect from attack even those designed to be secure, lack protection from these attacks, which we call Vampire attacks, which permanently disable networks by quickly draining nodes’ battery power. These “Vampire” attacks are not specific to any specific protocol which are devastating, difficult to detect, and are easy to carry out using as few as one malicious insider sending only protocol - compliant messages. We proposed a EWMA method to bound the damage caused by these vampire types of attacks during the packet forwarding phase
 “The Network Simulator - ns - 2,” http://www.isi.edu/nsnam/ns,2012 .
 H. Chan and A. Perrig, “Security and Privacy in Sensor Networks,” c omputer, vol. 36, no. 10, pp. 103 - 105, Oct. 2003.
 J. - H. Chang and L. Tassiulas, “Maximum Lifetime Routing in Wireless Sensor Networks,” IEEE/ACM Trans. Networking, vol. 12,no. 4, pp . 609 - 619, Aug. 2004.
 J. Deng, R. Han, and S. Mishra, “Defending against Path - Based DoS Attacks in Wireless Sensor Networks,” Proc. ACM Workshop Security of Ad Hoc and Sensor Networks, 2005.
 L.M. Feeney, “An Energy Consumption Model for Performance Analy sis of Routing Protocols for Mobile Ad Hoc Networks,” Mobile Networks and Applications, vol. 6, no. 3, pp. 239 - 249, 2001.
 J.R. Douceur, “The Sybil Attack,” Proc. Int’l Workshop Peer - to - Peer Sys
Ad Hoc sensor networks, Energy consumption , Routing, Security