A novel technique for detecting the misbehavior nodes in wireless adhoc networks

  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract

    Wireless adhoc network acts as the most emerging platform in the current trend that plays a vital role in the field of sensing, analyzing the network route, rectifying the problem within the network. This also pays route for many advanced studies. Observing aid depletion attacks on the routing layers is the main objective of this paper. It also attempts to entirely disable community nodes by draining their battery strength immediately. Such an attempt to drain their battery strength is said to be as depletion attack, and these attacks are not specific to any particular protocol. Under the worst case, even a single depletion can empower a community-wide usage by O(N), where N is the total number of network nodes used.



  • Keywords

    Wireless Ad-hoc sensor network, depletion attack.

  • References

      [1] Rajesh Khanna M, Divya S & Rengarajan A, “Securing Wireless Ad-Hoc Sensor Network”, International Journal of Innovative Research in Computer and communication Engineering(IJIRCC), Vol.2, (2014).

      [2] Sivakumar K & Murugapriya P, “Efficient Detection and Elimination of Depletion attacks in Wireless Ad-Hoc Sensor Networks”, IJIRCCE, Vol.2, (2014).

      [3] Mohana M & Kaviya P, “A Survey on Secure Packet Transmission against Depletion Attack in Wireless Ad-hoc Sensor Networks”, IJARCCE, Vol.3, No.11, (2014).

      [4] Vijayanand G & Muralidharan R, ‘Overcome Depletion attacks Problem In Wireless Ad-Hoc Sensor Network By Using Distance Vector Protocols”, IJCSMA, Vol.2, No.1, (2014).

      [5] Anand J & Sivachandar K , ‘ Depletion Attack Detection in Wireless Sensor Network”, IJESIT, Vol.3, No.4, (2014).

      [6] Vasserman EY & Hopper N, “Depletion attacks: Draining life from wireless ad-hoc sensor networks”, IEEE Transactions on Mobile Computing, Vol.12, No.2, (2013).

      [7] Khandakar A, “Step by Step Procedural Comparison of DSR, AODV and DSDV Routing protocol”, 4th International Conference on Computer Engineering and Technology (ICCET), Vol.40, (2012).

      [8] Ning X & Cassandras CG, “On Maximum Lifetime Routing in Wireless Sensor Networks”, Joint 48th IEEE Conference on Decision and Control and 28th Chinese Control Conference, (2009).

      [9] Acs G, Buttyan L & Vajda I, “Provably Secure On-Demand Source Routing in Mobile Ad Hoc Networks”, IEEE Trans. Mobile Computing, Vol.5, No.11, (2006), pp.1533-1546.

      [10] Deng J, Han R & Mishra S, “Defending against Path based DoS Attacks in Wireless Sensor Networks”, Alexandria, Virginia, USA, (2005).




Article ID: 12385
DOI: 10.14419/ijet.v7i2.21.12385

Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.