Title :
Implementing energy efficient technique for defense against Gray-Hole and Black-Hole attacks in wireless sensor networks
Author :
Dongare, Snehal P. ; Mangrulkar, Ram S.
Author_Institution :
Dept. of Comput. Eng., B.D. Coll. of Eng., Sevagram, India
Abstract :
In a Wireless Sensor Networks (WSNs), energy consumption is a key challenge due to its dynamic topology, highly decentralized infrastructure and resource constraint sensors. These entities make WSNs easily compromised by various denials of service attacks resulting in disastrous consequences. In the development of various cluster based energy efficient protocols to improve the lifetime of WSNs compromised with some malicious nodes, a challenging problem is how to adopt the most effective energy efficient cluster head selection approach to extend lifetime of WSNs. Gray-Hole and Black-Hole attack are those denial of service attacks that reduces the performance of WSNs. In order to achieve energy efficiency in WSNs, an efficient and trust based secure protocol is proposed to defend against single and cooperative Gray-Hole and Black Hole attacks. A proposed protocol incorporates efficient estimation to determine honest nodes during packets transmission phase. A proposed energy efficient technique is builds to evaluate in detecting and preventing compromised node to become cluster head. Besides, NS2 simulation result compare proposed protocol with LEACH proves that proposed system is efficiently reduces possibility of compromised node to be a part of network communication process and achieves better packet delivery ratio, throughput, less end-to-end delay and extend the lifetime of network significantly.
Keywords :
energy conservation; energy consumption; protocols; telecommunication network topology; telecommunication security; wireless sensor networks; LEACH; NS2 simulation; WSN; black-hole attacks; cluster head; dynamic topology; energy consumption; energy efficient protocols; energy efficient technique; gray-hole attacks; highly decentralized infrastructure; resource constraint sensors; service attacks; wireless sensor networks; Clustering algorithms; Energy efficiency; Routing; Routing protocols; Sensors; Wireless sensor networks; Black-Hole Attack; Cluster Head Selection; Energy Efficiency; Gray Hole Attack; LEACH; Network Lifetime; Packet Delivery Ratio; Wireless Sensor Networks;
Conference_Titel :
Computer Engineering and Applications (ICACEA), 2015 International Conference on Advances in
Conference_Location :
Ghaziabad
DOI :
10.1109/ICACEA.2015.7164689