Detection and Prevention Schemes in Mobile Ad hoc Networks

Main Article Content

Abstract

Wireless Sensor Network (WSN) has wide  range of application areas such as health care,  military and industry for real time event detection.  The sensing capability of a Wireless Sensor Network  (WSN) requires sensor node as a network of it. But  these nodes are constrained in terms of size, energy,  memory, processing power. These nodes sense  environmental data perform limited processing and  communicate over short distances. As the  applications of wireless sensor networks are  continuously growing also the need for security  mechanisms is increasing day by day. It is very  essential to save WSNs from malevolent attacks in  unfriendly situations. Such systems require security  design because of different restrictions of assets and  the noticeable attributes of a remote sensor arrange  which is a impressive test. This article is a broad  survey about issues of WSNs security, which  inspected as of late by analysts and a superior  comprehension of future bearings for WSN security. 

Article Details

References

[1] Malek Guechari, Lynda Mokdad and Sovanna Tan. "Dynamic Solution for Detecting Denial of Service Attacks in Wireless Sensor Networks" IEEE, pp. 173-177, (2012).

[2] Rolla P. and Kuar M.," Dynamic Forwarding Window Technique against DoS Attack in WSN" IEEE, pp.212-216, DOI 10.1109/ICMETE.2016.93, (2016).

[3] Patil S. and Choudhari S. "DoS attack prevention technique in Wireless Sensor Networks" IEEE, pp.715-721, DOI: 10.1016/j.procs.2016.03.094, (2016).

[4] Naik S. and Shekokar N., "Conservation of energy in wireless sensor network by preventing denial of sleep attack" ELSVIER, PP.370-379, doi: 10.1016/j.procs.2015.03.164, (2015).

[5] Chaudhary S. and Thanvi P., "Performance Analysis of Modified AODV Protocol in Context of Denial of Service (Dos) Attack in Wireless Sensor Networks" International Journal of Engineering Research and General Science Volume 3, pp.486-491(2015).

[6] S. Fouchal et al., "Recursive-clustering-based approach for denial of service (DoS) attacks in wireless sensors networks" International journal of communication systems, pp.309- 324, DOI: 10.1002/dac.2670, (2015).

[7] Mansouri D., Mokddad L., Ben-othman J. and Ioualalen M., "Preventing Denial of Service Attacks in Wireless Sensor Networks" IEEE, PP.3014-3019, (2015).

[8] Kiss I., Haller P. and Beres A., " Denial of Service attack detection in case of Tennessee Eastman challenge process" ELSEVIER, pp.835-841, doi: 10.1016/j.protcy.2015.02.120, (2015).

[9] Ballarini P., Mokdad L. and Monnennt Q., "Modeling tools for detecting DoS attacks in WSNs" Security and Communication

Networks, pp.420-436, DOI: 10.1002/sec.630, (2013).

[10] Ghildiyal S., Mishra A. K., Gupta A. and Garg N., "ANALYSIS OF DENIAL OF SERVICE (DOS) ATTACKS IN WIRELESS SENSOR NETWORKS" IJRET: International Journal of Research in Engineering and Technology, pp.140-143, (2014).

[11] Wazid M., Katal A., Sachan R. S., R H Goudar and D P Singh., "Detection and Prevention Mechanism for Blackhole Attack in Wireless Sensor Network" IEEE, pp.576- 581, (2013).

[12] Singh V. Pal, Ukey Anand A. S. and Jain S., "Signal Strength based Hello Flood Attack Detection and Prevention in Wireless Sensor Networks" International Journal of Computer Applications, pp.1-6, DOI: 10.5120/10153- 4987, (2013).

[13] Hai T. H. and Eui-Nam H., "Detecting Selective Forwarding Attacks in Wireless Sensor Networks Using Two-hops Neighbor Knowledge" IEEE, pp.325-331, DOI 10.1109/NCA.2008.13, (2008).

[14] Malik R. and Sehrawat H., "Comprehensive Study of Selective Forwarding Attack in Wireless Sensor Networks" International Journal of Advanced Research in Computer Science, vol.8, pp.1835-1838, (2017).

[15] Soni V., Modi P. and Chuadhri V., "Detecting Sinkhole Attack in Wireless Sensor Network" International Journal of Application or Innovation in Engineering & Management (IJAIEM), Vol. 2, pp.29-32, (2013).

[16] Rassam M. A., Zainal A., Maarof A. and Al Shaboti M., "A Sinkhole Attack Detection

Scheme in Mintroute Wireless Sensor Networks" IEEE, pp.71-75, DOI: 10.1109/ISTT.2012.6481568, (2012).

[17] Khanderiya M. and Panchal M.,"A Novel Approach for Detection of Sybil Attack in Wireless Sensor Networks" IJSRSET, Vol. 2, pp.113-117, (2016),.

[18] Dhamodharan U. K. R. and Vayanaperumal R., "Detecting and Preventing Sybil Attacks in Wireless Sensor Networks Using Message Authentication and Passing Method" Hindawi Publishing Corporation Scientific World Journal, pp.1-7, http://dx.doi.org/10.1155/2015/841267, (2015).

[19] Amish P. and Vaghela V. B., "Detection and Prevention of Wormhole Attack in Wireless Sensor Network using AOMDV protocol" ELSEVIER, pp.700-707, doi: 10.1016/j.procs.2016.03.092, (2016).

[20] Shaikh F. A. and Patil U. "Efficient Detection and prevention of Wormhole Attacks in

[21] Wireless Mesh Network" International Research Journal of Engineering and Technology (IRJET), Vol. 4, pp.2208-2214, (2017),.

[22] Modi rkhazeni A., Aghamahmoodi S., Modirkhazeni A. and Niknejad N., "Distributed Approach to Mitigate Wormhole Attack in Wireless Sensor Networks" IEEE, pp.122-128, (2012).

[23] Ahmad Salehi S., Razzaque M. A., Naraei P. and Farrokhtala A., "Security in Wireless Sensor Networks: Issues and Challanges" IEEE, (2013). [24] Bhalla M., Pandey N. and Kumar B. “Security Protocols for Wireless Sensor Networks” IEEE, pp. 1005-1009, (2015),.

[25] Aldhobaiban D., Elleithy K. and Almazaydeh L., "Prevention of Wormhole Attacks in Wireless Sensor Networks" IEEE, pp.287-291, DOI 10.1109/AIMS.2014.57, (2014).

[26] Sakthivel T. and Chandrasekaran R. M., "Detection and Prevention of Wormhole Attacks in MANETs using Path Tracing Approach" European Journal of Scientific Research, pp.240-252, (2012).

[27] Modirkhazeni A., Aghamahmoodi S., Modirkhazeni A. and Modirkhazeni N., "Distributed Approach to Mitigate Wormhole Attack in Wireless Sensor Networks" IEEE, pp.122-128, (2012).

[28] S. I. Eludiora, O.O. Abiona, A. O. Oluwatope, S. A. Bello, M.L Sanni, , D. O. Ayanda, C.E Onime E. R. Adagunodo and L.O. Kehinde “A Distributed Intrusion. Detection Scheme for Wireless Sensor Networks” IEEE, 2011.

[29] Ioannou C., Vassiliou V. and Sergiou C., "An Intrusion Detection System for Wireless Sensor Networks" IEEE. 2017.

[30] Shanthi. S., E. G, Rajan. “Comprehensive Analysis of Security Attacks and Intrusion Detection System in Wireless Sensor Networks” IEEE 2016, pp. 24-31, 2016