A novel technique for detecting the misbehavior nodes in wireless adhoc networks

  • Authors

    • Kumar Narayanan
    • R Anandan
    • Swaraj Paul Chinnaraju
    • A Manikandan
    2018-04-20
    https://doi.org/10.14419/ijet.v7i2.21.12385
  • Wireless Ad-hoc sensor network, depletion attack.
  • Wireless adhoc network acts as the most emerging platform in the current trend that plays a vital role in the field of sensing, analyzing the network route, rectifying the problem within the network. This also pays route for many advanced studies. Observing aid depletion attacks on the routing layers is the main objective of this paper. It also attempts to entirely disable community nodes by draining their battery strength immediately. Such an attempt to drain their battery strength is said to be as depletion attack, and these attacks are not specific to any particular protocol. Under the worst case, even a single depletion can empower a community-wide usage by O(N), where N is the total number of network nodes used.

     

     

  • References

    1. [1] Rajesh Khanna M, Divya S & Rengarajan A, “Securing Wireless Ad-Hoc Sensor Networkâ€, International Journal of Innovative Research in Computer and communication Engineering(IJIRCC), Vol.2, (2014).

      [2] Sivakumar K & Murugapriya P, “Efficient Detection and Elimination of Depletion attacks in Wireless Ad-Hoc Sensor Networksâ€, IJIRCCE, Vol.2, (2014).

      [3] Mohana M & Kaviya P, “A Survey on Secure Packet Transmission against Depletion Attack in Wireless Ad-hoc Sensor Networksâ€, IJARCCE, Vol.3, No.11, (2014).

      [4] Vijayanand G & Muralidharan R, ‘Overcome Depletion attacks Problem In Wireless Ad-Hoc Sensor Network By Using Distance Vector Protocolsâ€, IJCSMA, Vol.2, No.1, (2014).

      [5] Anand J & Sivachandar K , ‘ Depletion Attack Detection in Wireless Sensor Networkâ€, IJESIT, Vol.3, No.4, (2014).

      [6] Vasserman EY & Hopper N, “Depletion attacks: Draining life from wireless ad-hoc sensor networksâ€, IEEE Transactions on Mobile Computing, Vol.12, No.2, (2013).

      [7] Khandakar A, “Step by Step Procedural Comparison of DSR, AODV and DSDV Routing protocolâ€, 4th International Conference on Computer Engineering and Technology (ICCET), Vol.40, (2012).

      [8] Ning X & Cassandras CG, “On Maximum Lifetime Routing in Wireless Sensor Networksâ€, Joint 48th IEEE Conference on Decision and Control and 28th Chinese Control Conference, (2009).

      [9] Acs G, Buttyan L & Vajda I, “Provably Secure On-Demand Source Routing in Mobile Ad Hoc Networksâ€, IEEE Trans. Mobile Computing, Vol.5, No.11, (2006), pp.1533-1546.

      [10] Deng J, Han R & Mishra S, “Defending against Path based DoS Attacks in Wireless Sensor Networksâ€, Alexandria, Virginia, USA, (2005).

  • Downloads

  • How to Cite

    Narayanan, K., Anandan, R., Paul Chinnaraju, S., & Manikandan, A. (2018). A novel technique for detecting the misbehavior nodes in wireless adhoc networks. International Journal of Engineering & Technology, 7(2.21), 296-300. https://doi.org/10.14419/ijet.v7i2.21.12385