A novel technique for detecting the misbehavior nodes in wireless adhoc networks
DOI:
https://doi.org/10.14419/ijet.v7i2.21.12385Published:
2018-04-20Keywords:
Wireless Ad-hoc sensor network, depletion attack.Abstract
Wireless adhoc network acts as the most emerging platform in the current trend that plays a vital role in the field of sensing, analyzing the network route, rectifying the problem within the network. This also pays route for many advanced studies. Observing aid depletion attacks on the routing layers is the main objective of this paper. It also attempts to entirely disable community nodes by draining their battery strength immediately. Such an attempt to drain their battery strength is said to be as depletion attack, and these attacks are not specific to any particular protocol. Under the worst case, even a single depletion can empower a community-wide usage by O(N), where N is the total number of network nodes used.
References
[1] Rajesh Khanna M, Divya S & Rengarajan A, “Securing Wireless Ad-Hoc Sensor Networkâ€, International Journal of Innovative Research in Computer and communication Engineering(IJIRCC), Vol.2, (2014).
[2] Sivakumar K & Murugapriya P, “Efficient Detection and Elimination of Depletion attacks in Wireless Ad-Hoc Sensor Networksâ€, IJIRCCE, Vol.2, (2014).
[3] Mohana M & Kaviya P, “A Survey on Secure Packet Transmission against Depletion Attack in Wireless Ad-hoc Sensor Networksâ€, IJARCCE, Vol.3, No.11, (2014).
[4] Vijayanand G & Muralidharan R, ‘Overcome Depletion attacks Problem In Wireless Ad-Hoc Sensor Network By Using Distance Vector Protocolsâ€, IJCSMA, Vol.2, No.1, (2014).
[5] Anand J & Sivachandar K , ‘ Depletion Attack Detection in Wireless Sensor Networkâ€, IJESIT, Vol.3, No.4, (2014).
[6] Vasserman EY & Hopper N, “Depletion attacks: Draining life from wireless ad-hoc sensor networksâ€, IEEE Transactions on Mobile Computing, Vol.12, No.2, (2013).
[7] Khandakar A, “Step by Step Procedural Comparison of DSR, AODV and DSDV Routing protocolâ€, 4th International Conference on Computer Engineering and Technology (ICCET), Vol.40, (2012).
[8] Ning X & Cassandras CG, “On Maximum Lifetime Routing in Wireless Sensor Networksâ€, Joint 48th IEEE Conference on Decision and Control and 28th Chinese Control Conference, (2009).
[9] Acs G, Buttyan L & Vajda I, “Provably Secure On-Demand Source Routing in Mobile Ad Hoc Networksâ€, IEEE Trans. Mobile Computing, Vol.5, No.11, (2006), pp.1533-1546.
[10] Deng J, Han R & Mishra S, “Defending against Path based DoS Attacks in Wireless Sensor Networksâ€, Alexandria, Virginia, USA, (2005).
How to Cite
License
Authors who publish with this journal agree to the following terms:- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution Licensethat allows others to share the work with an acknowledgement of the work''s authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal''s published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).
Accepted 2018-05-03
Published 2018-04-20