Dutta, Chaitali Biswas; Biswas, Utpal
September 2012
International Journal of Network Security & Its Applications;Sep2012, Vol. 4 Issue 5, p57
Academic Journal
Wireless sensor network (WSN) is basically a wireless network, comprised of a large number of sensor nodes which are densely deployed, small in size, lightweight and portable. AODV is a well known, standardized routing protocol used in WSNs. AODV is subject to several attacks like black hole, worm hole, mad in the middle etc. Several Intrusion detection systems (IDS) have been proposed which successfully detect these attacks. Among these IDSs signature based and anomaly based are simple in nature but generate false alarms. To cater to this issue, recently specification based IDS is proposed for WSNs which have low false alarms yet detect most of the attacks. Lots of works have been reported on enhancement of AODV to improve throughput, PDR, NRO, End to End delay, power etc. Power Aware AODV (POW-AODV), enhances WNSs from the perspective of lifetime of nodes (in terms of power). In this paper we show that POW-AODV gets subject to more vulnerability, compared to AODV, in the effort to reduce power. Such attacks reduce life time of nodes instead of increasing them. Following that we propose a specification based IDS for this protocol to detect these vulnerabilities. We also show a using NS-2 simulation that using the IDS POW-AODV leads to increase in lifetime of nodes, even in presence of attacks.


Related Articles

  • Performance Comparison of LEACH and LEACH-N Protocols BY MATLAB. Parashar, Sunita; Sharma, Poonam // International Journal of Advanced Research in Computer Science;Jul/Aug2012, Vol. 3 Issue 4, p216 

    In recent years, there has been a growing interest in wireless sensor networks. In Wireless Sensor Networks sensor nodes life time is the most critical parameter. Minimizing energy dissipation and maximizing network lifetime are important issues in the design of applications and protocols for...

  • A Specification Based Intrusion Detection Mechanism for the LEACH Protocol. Soojin Lee; Yunho Lee; Sang-Guun Yoo // Information Technology Journal;2012, Vol. 11 Issue 1, p40 

    With the improvement of the wireless communication and embedded technology, the application of wireless sensor network has increased to various fields. However, such type of network embeds more vulnerabilities than others because of its resource-constrained characteristic. To counteract such...

  • Survey on Intrusion Detection Mechanisms for MANETS. Shwetha, M.; Mamatha, A. // International Journal of Computer Science & Information Technolo;2014, Vol. 5 Issue 2, p1492 

    Security is a most important service in Mobile Adhoc Network from past few years. MANETs are more vulnerable to various kinds of security attacks and hence secure routing is very important. MANETs communicate in a dynamically built network that lacks centralized access and fixed infrastructure....

  • Provisioning Fairness for Data Collection in Wireless Sensor Networks. Hamid, Abdul // IETE Technical Review;Jul-Aug2010, Vol. 27 Issue 4, p326 

    The well-known many-to-one data routing paradigm in wireless sensor networks (WSNs) demands nonuniform medium access and forwarding strategy to achieve the ultimate node level fairness. Since nodes closer to the sink have more traffic than that of far-away nodes, close-by nodes need to employ...

  • An Intrusion Tolerance Method Based on Energy Attack for Wireless Sensor Network. Jiang, Yu; Huang, Jie // International Journal of Distributed Sensor Networks;10/5/2015, Vol. 2015, p1 

    Wireless sensor network is vulnerable to malicious attacks because of the broadcast nature of wireless signal. In order to overcome the shortcomings of existing methods, this paper presents an intrusion tolerance method against malicious nodes. Different from the traditional intrusion tolerance...

  • A Survey on IDS Techniques to Detect Misbehavior Nodes in Mobile Ad-hoc Network. Patil, Sarika; Borade, Deepali // International Journal of Computer Science & Information Technolo;2014, Vol. 5 Issue 3, p2783 

    MANET is tremendous increasing area now days for researcher in mobile computing and wireless technology. Mobile Ad-hoc Networks (MANETs) is group of wireless mobile nodes which dynamically exchange data among themselves without the reliance on a fixed base station. Since of MANET challenges,...

  • Utilizing Joint Routing and Capacity Assignment Algorithms to Achieve Inter- and Intra-Group Delay Fairness in Multi-Rate Multicast Wireless Sensor Networks. Frank Yeong-Sung Lin; Chiu-Han Hsiao; Leo Shih-Chang Lin; Yean-Fu Wen // Sensors (14248220);Mar2013, Vol. 13 Issue 3, p3588 

    Recent advance in wireless sensor network (WSN) applications such as the Internet of Things (IoT) have attracted a lot of attention. Sensor nodes have to monitor and cooperatively pass their data, such as temperature, sound, pressure, etc. through the network under constrained physical or...

  • Energy Balance Based Lifetime Maximization in Wireless Sensor Networks Employing Joint Routing and Asynchronous Duty Cycle Scheduling Techniques. Kariman-Khorasani, Mohsen; Pourmina, Mohammad; Salahi, Ahmad // Wireless Personal Communications;Jul2015, Vol. 83 Issue 2, p1057 

    This paper introduces a novel energy balance based lifetime maximization issue in wireless sensor networks employing joint routing and asynchronous duty cycle scheduling techniques titled as EB-JRADCS problem. To formulate the EB-JRADCS problem a new asynchronous MAC protocol utilizing flooding...

  • A HIERARCHICAL INTRUSION DETECTION ARCHITECTURE FOR WIRELESS SENSOR NETWORKS. Jadidoleslamy, Hossein // International Journal of Network Security & Its Applications;Sep2011, Vol. 3 Issue 5, p131 

    Networks protection against different types of attacks is one of most important posed issue into the network and information security application domains. This problem on Wireless Sensor Networks (WSNs), in attention to their special properties, has more importance. Now, there are some of...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics