A Resilient Strategy against Energy Attacks in Ad-Hoc WSN and Future IoT

The widespread growth of Ad-hoc sensor networks represents the next evolution of internet having the ability to gather, analyze, and distribute data that can turn data into information, knowledge, intelligent decision making and ultimately for future prediction. This latest state-of-the-art sensing, computing and communication system are not only changing consumer expectation in people’s everyday lives but gradually taking them closer to the future era of connected everyday things, using mixtures of wired and wireless connectivity. The communication of these network devices creates the Internet of Things (IoT), wherein Ad-Hoc Wireless Sensor Networks (WSN) are ready to dynamically be a part for accomplishing distinctive tasks. To attain this vision, there is a need for energy efficient systems to support the challenging requirements for future internet to survive. Ad hoc sensor networks are susceptible to attacks which will drain the battery life. IoT will be susceptible to same problems but at a larger level. This paper explores the energy issues and attacks that challenge that are faced by Ad-Hoc WSNs and eventually the future IoT. It also discusses a resilient strategic approach for handling energy attacks.

[1]  Frank Stajano,et al.  The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks , 1999, Security Protocols Workshop.

[2]  Samir R. Das,et al.  On-demand multipath routing for mobile ad hoc networks , 1999, Proceedings Eight International Conference on Computer Communications and Networks (Cat. No.99EX370).

[3]  J.A. Stankovic,et al.  Denial of Service in Sensor Networks , 2002, Computer.

[4]  Adrian Perrig,et al.  Security and Privacy in Sensor Networks , 2003, Computer.

[5]  C. Karlof,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[6]  Stefan Savage,et al.  802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions , 2003, USENIX Security Symposium.

[7]  Edward W. Knightly,et al.  Denial of service resilience in ad hoc networks , 2004, MobiCom '04.

[8]  Shivakant Mishra,et al.  Defending against path-based DoS attacks in wireless sensor networks , 2005, SASN '05.

[9]  Anand Raghunathan,et al.  Battery discharge characteristics of wireless sensor nodes: an experimental analysis , 2005, 2005 Second Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2005. IEEE SECON 2005..

[10]  Adrian Perrig,et al.  Secure sensor network routing: a clean-slate approach , 2006, CoNEXT '06.

[11]  Jie Gao,et al.  Boundary recognition in sensor networks by topological methods , 2006, MobiCom '06.

[12]  Shivakant Mishra,et al.  INSENS: Intrusion-Tolerant Routing in Wireless Sensor Networks , 2002 .

[13]  Sándor P. Fekete,et al.  Deterministic boundary recognition and topology extraction for large sensor networks , 2005, SODA '06.

[14]  Christos G. Cassandras,et al.  On maximum lifetime routing in Wireless Sensor Networks , 2009, Proceedings of the 48h IEEE Conference on Decision and Control (CDC) held jointly with 2009 28th Chinese Control Conference.

[15]  Jürgen Valldorf,et al.  Smart systems for electric, safe and networked mobility , 2011 .

[16]  Nicholas Hopper,et al.  Vampire Attacks: Draining Life from Wireless Ad Hoc Sensor Networks , 2013, IEEE Transactions on Mobile Computing.

[17]  Yasir Saleem,et al.  Network Simulator NS-2 , 2015 .