Sensor devices are small devices used to capture information from environment. Capture, store and transmission are the main operations of sensor devices. Temperature, humidity, density of carbon dioxide and pressure details are captured by sensor devices. Battery power is the main limitation of sensor devices. The intrusion detection system identifies the legitimate and attackers in the network area. The intrusion detection system is designed in two categories. In the first model a system component is used for monitoring the security of a WSN and diagnosing compromised/vulnerable. Second model is the monitoring or surveillance system for detecting a malicious intruder that invades the network domain. Denial of communication is raised at the routing or medium access control levels. Resource depletion attacks are initiated at the routing protocol layer to permanently disable networks by consuming the battery power. Vampire attacks disrupt the network resources at the routing protocol levels. Stateful (Link state and distance vector) protocols and stateless (Dynamic Source Routing) protocols are verified with attacks. Clean-slate secure sensor network routing protocol is modified to control vampire attacks with resource usage analysis. Clean-slate secure sensor network routing protocol is improved with optimal boundary estimation model. Topology estimation and packet forwarding prediction is integrated. Transmission coverage factors are integrated with the detection scheme. Energy levels and forwarding packet count information are analyzed to improve the network lifetime.
[1]
Levente Buttyán,et al.
Provably Secure On-Demand Source Routing in Mobile Ad Hoc Networks
,
2006,
IEEE Transactions on Mobile Computing.
[2]
Yuting Zhang,et al.
Reduction of quality (RoQ) attacks on Internet end-systems
,
2005,
Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[3]
R. Srikant,et al.
A tutorial on cross-layer optimization in wireless networks
,
2006,
IEEE Journal on Selected Areas in Communications.
[4]
Shivakant Mishra,et al.
Defending against path-based DoS attacks in wireless sensor networks
,
2005,
SASN '05.
[5]
M.Kanchana,et al.
VAMPIRE ATTACKS: DRAINING LIFE FROM WIRELESS AD HOC SENSOR NETWORKS
,
2014
.
[6]
Adrian Perrig,et al.
Secure sensor network routing: a clean-slate approach
,
2006,
CoNEXT '06.
[7]
Xiapu Luo,et al.
On a New Class of Pulsing Denial-of-Service Attacks and the Defense
,
2005,
NDSS.
[8]
Scott F. Midkiff,et al.
Effects of Denial-of-Sleep Attacks on Wireless Sensor Network MAC Protocols
,
2009,
IEEE Transactions on Vehicular Technology.
[9]
Shivakant Mishra,et al.
INSENS: Intrusion-Tolerant Routing in Wireless Sensor Networks
,
2002
.
[10]
Scott F. Midkiff,et al.
Denial-of-Service in Wireless Sensor Networks: Attacks and Defenses
,
2008,
IEEE Pervasive Computing.