A Survey on Energy Depletion Attacks in Wireless Sensor Networks

Wireless Sensor Network (WSN), a collection of mobile nodes, is vulnerable to various attacks due to their mobility and resource constrained nature. As this network and its applications became ubiquitous for machine critical applications, it is indispensable to safeguard its communications in energy efficient fashion. Availability of such network is crucial for productivity. Wireless Ad Hoc Sensor Networks are vulnerable Denial of Service (DoS) is the that cause short term unavailability of network. However, the attacks that affect long term availability of the network are resource depletion attacks that cause more damage to the applications for which availability of network is important. This paper presents QoS issues and energy depletion issues and the countermeasures employed. As security QoS, and availability of network are to be given paramount importance, this paper provides insights into the present state of the art pertaining to resource depletion attacks and prevention methods employed.

[1]  Feng Xia,et al.  QoS Challenges and Opportunities in Wireless Sensor/Actuator Networks , 2008, Sensors.

[2]  David A. Maltz,et al.  DSR: the dynamic source routing protocol for multihop wireless ad hoc networks , 2001 .

[3]  Sasikanth Avancha,et al.  Security for Sensor Networks , 2004 .

[4]  B. Umakanth,et al.  Detection of Energy draining attack using EWMA in Wireless Ad Hoc Sensor Networks , 2013 .

[5]  A AmbiliM,et al.  A Security Approach for Detection AndElimination Of Resource Depletion Attack InWireless Sensor Network , 2014 .

[6]  Charles E. Perkins,et al.  Highly dynamic Destination-Sequenced Distance-Vector routing (DSDV) for mobile computers , 1994, SIGCOMM.

[7]  Harsh K. Verma,et al.  On Denial of Service Attacks for Wireless Sensor Networks , 2012 .

[8]  Y.A. Sekercioglu,et al.  Detecting Selective Forwarding Attacks in Wireless Sensor Networks using Support Vector Machines , 2007, 2007 3rd International Conference on Intelligent Sensors, Sensor Networks and Information.

[9]  Seoung-Bum Lee,et al.  Adaptive Quality of Service for Wireless Ad hoc Networks , 2006 .

[10]  Rajib Mall,et al.  Quality of Service (QoS) Provisions in Wireless Sensor Networks and Related Challenges , 2010, Wirel. Sens. Netw..

[11]  M. Phil,et al.  DEFENDING AGAINST VAMPIRE ATTACKS IN WIRELESS SENSOR NETWORKS , 2014 .

[12]  G. Padmavathi,et al.  A Survey of Attacks, Security Mechanisms and Challenges in Wireless Sensor Networks , 2009, ArXiv.

[13]  K.Sivakumar,et al.  Efficient Detection and Elimination of VampireAttacks in Wireless Ad-Hoc Sensor Networks , 2014 .

[14]  Chang-Gun Lee,et al.  Probabilistic QoS guarantee in reliability and timeliness domains in wireless sensor networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[15]  Saswati Sarkar,et al.  Maximum Damage Battery Depletion Attack in Mobile Sensor Networks , 2011, IEEE Transactions on Automatic Control.

[16]  Ing-Ray Chen,et al.  A survey of intrusion detection in wireless network applications , 2014, Comput. Commun..

[17]  S. Neduncheliyan,et al.  Design issues, Topology issues, Quality of Service Support for Wireless Sensor Networks: Survey and Research Challenges , 2010 .

[18]  Charles Riley,et al.  Quality of Service (QoS) , 2020, CCNA Certification Study Guide.

[19]  Özlem Durmaz Incel,et al.  QoS-aware MAC protocols for wireless sensor networks: A survey , 2011, Comput. Networks.

[20]  A Resilient Strategy against Energy Attacks in Ad-Hoc WSN and Future IoT , 2014 .

[21]  M.Kanchana,et al.  VAMPIRE ATTACKS: DRAINING LIFE FROM WIRELESS AD HOC SENSOR NETWORKS , 2014 .

[22]  Ivan Stojmenovic,et al.  Sensor Networks , 2005 .

[23]  Wenjing Lou,et al.  Multi-user Broadcast Authentication in Wireless Sensor Networks , 2007, 2007 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.

[24]  K. Ramakrishnan,et al.  A Valuable Secure Protocol to Prevent Vampire Attacks In Wireless Ad Hoc Sensor , 2014 .

[25]  Gregory A. Hansen,et al.  The Optimized Link State Routing Protocol , 2003 .

[26]  K.Vanitha,et al.  A Valuable Secure Protocol to PreventVampire Attacks In Wireless Ad Hoc SensorNetworks , 2014 .

[27]  Milos Blagojevic,et al.  Dynamic data prioritization for quality-of-service differentiation in heterogeneous Wireless Sensor Networks , 2011, 2011 8th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.

[28]  Ali Payandeh,et al.  Detection Collision Attacks In Wireless Sensor Network Usingrule-Based Packet Flow Rate , 2013 .

[29]  Adrian Perrig,et al.  Secure sensor network routing: a clean-slate approach , 2006, CoNEXT '06.

[30]  1 Vidya,et al.  Denial of Service Attacks in Wireless Sensor Networks , 2014 .

[31]  R. Bharathi,et al.  Defending against Energy Draining attack in Wireless Ad-Hoc Sensor Networks , 2014 .

[32]  Soram Rakesh Singh,et al.  Improving the Performance of Energy Attack Detection in Wireless Sensor Networks by Secure forward mechanism , 2014 .

[33]  R. Sumathi,et al.  A Survey of QoS Based Routing Protocols for Wireless Sensor Networks , 2012, J. Inf. Process. Syst..

[34]  Philippe Jacquet,et al.  Optimized Link State Routing Protocol (OLSR) , 2003, RFC.

[35]  N. Kaleeswari,et al.  Implementation of Energy Balancing in Wireless Sensor Networks , 2012 .