A malicious attacker can exploit a vulnerability of a sensor node within a wireless sensor networkto easily create a compromised node and attack the sensor network. The main purpose of a flooding attack, which is one kind of denial of service (DoS) attack, is to shorten the lifetime of the sensor network by exhausting the energy of the compromised node and of other sensor nodes along the path to the base station (BS).Existing security schemes to protect against flooding attacks do not take into account the amount of energy remaining in each sensor node. Therefore, in the case where the sensor network was installed long ago and its nodes have little remaining energy, such schemes are unsuitable because they are likely to completely drain individual nodes. In this paper, we propose a security scheme that includes multipath routing to reduce the load on each sensor node and thereby increase the sensor network lifetime. Experimental results herein confirm that the proposed scheme extends the network lifetime, increasing the energy efficiency of one sensor node included in the path by 40% compared with an existing scheme and reducing the number of exhausted sensor nodes by more than 60%.Copy Right, IJAR, 2017,. All rights reserved. …………………………………………………………………………………………………….... Introduction:-A wireless sensor network (WSN) consists of a number of small sensor nodes that detect events and a base station (BS) that receives and analyzes data collected by the sensor nodes. WSNs are deployed in areas that are hardtoreach or where information needs to be received in real time. When a relevant event occurs in the region where the WSN is deployed, the sensor node located closest to the region is selected as the source node, and the event is detected. The source node collects the detected event information, generates an event packet, and transmits the event packet to the BS [1]. However, sensor nodes are vulnerable to attack because they have limited computing power, low energy, and use wireless communication. Using these vulnerabilities, an attacker can easily compromise a node. Using a compromised node, attackers can subject the sensor network to various attacks such as eavesdropping or other attacks that do not yield important event messages in the network. Typical attacks include denial of service (DoS), selective forwarding, sybil, sinkhole, and wormhole attacks [2][3][4]. Security techniques that can detect or prevent attacks continue to be studied. In this paper, we propose the energy efficiency of each node and the lifetime extension of the sensor network when a flooding attack, which is one kind of DoS, attacks the sensor network. The rest of this paper is organized as follows. Section 2 describes flooding attacks and multipath routing. Section 3
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.