18Feb 2017

NETWORK LIFETIME EXTENSION SCHEME USING MULTIPATH ROUTING IN FLOODING ATTACK DETECTION OF WIRELESS SENSOR NETWORKS.

  • College of Information and Communication Engineering, SungkyunkwanUniversity, Republic of Korea.
  • College of Software, Sungkyunkwan University, Republic of Korea.
Crossref Cited-by Linking logo
  • Abstract
  • Keywords
  • References
  • Cite This Article as
  • Corresponding Author

A malicious attacker can exploit a vulnerability of a sensor node within a wireless sensor networkto easily create a compromised node and attack the sensor network. The main purpose of a flooding attack, which is one kind of denial of service (DoS) attack, is to shorten the lifetime of the sensor network by exhausting the energy of the compromised node and of other sensor nodes along the path to the base station (BS).Existing security schemes to protect against flooding attacks do not take into account the amount of energy remaining in each sensor node. Therefore, in the case where the sensor network was installed long ago and its nodes have little remaining energy, such schemes are unsuitable because they are likely to completely drain individual nodes. In this paper, we propose a security scheme that includes multipath routing to reduce the load on each sensor node and thereby increase the sensor network lifetime. Experimental results herein confirm that the proposed scheme extends the network lifetime, increasing the energy efficiency of one sensor node included in the path by 40% compared with an existing scheme and reducing the number of exhausted sensor nodes by more than 60%.


  1. F. Akyildiz, W. Su, Y. Sankarasubramaniam and E. Cayirci, "A survey on sensor networks," Communications Magazine, IEEE, vol. 40, pp. 102-114, 2002.
  2. Karlof and D. Wagner, "Secure routing in wireless sensor networks: Attacks and countermeasures," Ad Hoc Networks, vol. 1, pp. 293-315, 2003.
  3. Wang, G.Attebury and B. Ramamurthy, ?A survey of security issues in wireless sensor networks,? IEEE Communications Surveys & Tutorials, vol. 8, pp. 2-23, 2007
  4. R. Raymond and S. F. Midkiff, ?Denial-of-Service in Wireless Sensor Networks: Attacks and Defenses,? IEEE Pervasive Computing, vol. 7, pp. 74-81, 2008
  5. Radi, B. Dezfouli, K.A. Bakar and M. Lee, ?Multipath routing in wireless sensor networks: survey and research challenges,? Sensors, vol. 12, pp. 650-685, 2012
  6. N. Al-Karaki and A. E. Kamal, ?Routing techniques in wireless sensor networks: a survey,? IEEE wireless communications, vol. 11, pp. 6-28, 2004
  7. Deng, R. Han and S. Mishra, ?Defending against path-based DoS attacks in wireless sensor networks? Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks, pp. 89-96, 2005
  8. Ping, H. Yafei, Z. Yiping, Z. Shiyong and D. Zhoulin, ?Flooding attack and defence in ad hoc networks,? Journal of Systems Engineering and Electronics, vol. 17, pp. 410-416, 2006
?

[Won JinChung and Tae Ho Cho. (2017); NETWORK LIFETIME EXTENSION SCHEME USING MULTIPATH ROUTING IN FLOODING ATTACK DETECTION OF WIRELESS SENSOR NETWORKS. Int. J. of Adv. Res. 5 (Feb). 853-860] (ISSN 2320-5407). www.journalijar.com


Won Jin Chung


DOI:


Article DOI: 10.21474/IJAR01/3226      
DOI URL: http://dx.doi.org/10.21474/IJAR01/3226