DocumentCode :
1884765
Title :
Distributed detection of flooding and gray hole attacks in Wireless Sensor Network
Author :
Dharini, N. ; Balakrishnan, Ranjith ; Renold, A. Pravin
Author_Institution :
TIFAC-CORE in Pervasive Comput. Technol., Velammal Eng. Coll., Chennai, India
fYear :
2015
fDate :
6-8 May 2015
Firstpage :
178
Lastpage :
184
Abstract :
Wireless Sensor Networks(WSN) when sorted out as groups (clusters) increases throughput, energy savings and decreases delay. These types of WSN rely on cluster heads for data aggregation and transmission towards sink node. Subsequently cluster head nodes are outfitted with high energy. Conventional hierarchical routing protocols were not created considering security; they are helpless against Denial of Service (DoS) attacks. In the event that the information supply process is hampered and in this way the normal administrations get to be inaccessible because of the purposeful endeavors of the enemies, we consider this as a Denial of Service (DoS) attack. So in order to address this issue and to disseminate the computational heap of detection complexity among the cluster heads rather than the sink nodes, a distributed intrusion detection scheme (IDS) is developed. Among the various Denial of Service attacks, Flooding attacks consumes the maximum battery life of the sensor node, on the other hand Gray hole attack consumes the minimum battery life of the nodes. Thus based on energy these attacks are distinguished and isolated from the network using the proposed IDS and extensive simulations are carried out using NS2- MANNASIM framework.
Keywords :
routing protocols; telecommunication power management; telecommunication security; wireless sensor networks; DoS attacks; NS2-MANNASIM framework; cluster head nodes; data aggregation; data transmission; denial of service attacks; detection complexity; distributed flooding detection; distributed intrusion detection scheme; energy savings; gray hole attacks; hierarchical routing protocols; information supply process; sink node; wireless sensor network; Computer crime; Delays; Energy consumption; Floods; Intrusion detection; Wireless sensor networks; Cluster head; DoS; Flooding attack; Gray hole attack; Hierarchical routing; IDS;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Smart Technologies and Management for Computing, Communication, Controls, Energy and Materials (ICSTM), 2015 International Conference on
Conference_Location :
Chennai
Print_ISBN :
978-1-4799-9854-8
Type :
conf
DOI :
10.1109/ICSTM.2015.7225410
Filename :
7225410
Link To Document :
بازگشت