Detection and Prevention Schemes in Mobile Ad hoc Networks
Main Article Content
Abstract
Wireless Sensor Network (WSN) has wide range of application areas such as health care, military and industry for real time event detection. The sensing capability of a Wireless Sensor Network (WSN) requires sensor node as a network of it. But these nodes are constrained in terms of size, energy, memory, processing power. These nodes sense environmental data perform limited processing and communicate over short distances. As the applications of wireless sensor networks are continuously growing also the need for security mechanisms is increasing day by day. It is very essential to save WSNs from malevolent attacks in unfriendly situations. Such systems require security design because of different restrictions of assets and the noticeable attributes of a remote sensor arrange which is a impressive test. This article is a broad survey about issues of WSNs security, which inspected as of late by analysts and a superior comprehension of future bearings for WSN security.
Article Details
References
[1] Malek Guechari, Lynda Mokdad and Sovanna Tan. "Dynamic Solution for Detecting Denial of Service Attacks in Wireless Sensor Networks" IEEE, pp. 173-177, (2012).
[2] Rolla P. and Kuar M.," Dynamic Forwarding Window Technique against DoS Attack in WSN" IEEE, pp.212-216, DOI 10.1109/ICMETE.2016.93, (2016).
[3] Patil S. and Choudhari S. "DoS attack prevention technique in Wireless Sensor Networks" IEEE, pp.715-721, DOI: 10.1016/j.procs.2016.03.094, (2016).
[4] Naik S. and Shekokar N., "Conservation of energy in wireless sensor network by preventing denial of sleep attack" ELSVIER, PP.370-379, doi: 10.1016/j.procs.2015.03.164, (2015).
[5] Chaudhary S. and Thanvi P., "Performance Analysis of Modified AODV Protocol in Context of Denial of Service (Dos) Attack in Wireless Sensor Networks" International Journal of Engineering Research and General Science Volume 3, pp.486-491(2015).
[6] S. Fouchal et al., "Recursive-clustering-based approach for denial of service (DoS) attacks in wireless sensors networks" International journal of communication systems, pp.309- 324, DOI: 10.1002/dac.2670, (2015).
[7] Mansouri D., Mokddad L., Ben-othman J. and Ioualalen M., "Preventing Denial of Service Attacks in Wireless Sensor Networks" IEEE, PP.3014-3019, (2015).
[8] Kiss I., Haller P. and Beres A., " Denial of Service attack detection in case of Tennessee Eastman challenge process" ELSEVIER, pp.835-841, doi: 10.1016/j.protcy.2015.02.120, (2015).
[9] Ballarini P., Mokdad L. and Monnennt Q., "Modeling tools for detecting DoS attacks in WSNs" Security and Communication
Networks, pp.420-436, DOI: 10.1002/sec.630, (2013).
[10] Ghildiyal S., Mishra A. K., Gupta A. and Garg N., "ANALYSIS OF DENIAL OF SERVICE (DOS) ATTACKS IN WIRELESS SENSOR NETWORKS" IJRET: International Journal of Research in Engineering and Technology, pp.140-143, (2014).
[11] Wazid M., Katal A., Sachan R. S., R H Goudar and D P Singh., "Detection and Prevention Mechanism for Blackhole Attack in Wireless Sensor Network" IEEE, pp.576- 581, (2013).
[12] Singh V. Pal, Ukey Anand A. S. and Jain S., "Signal Strength based Hello Flood Attack Detection and Prevention in Wireless Sensor Networks" International Journal of Computer Applications, pp.1-6, DOI: 10.5120/10153- 4987, (2013).
[13] Hai T. H. and Eui-Nam H., "Detecting Selective Forwarding Attacks in Wireless Sensor Networks Using Two-hops Neighbor Knowledge" IEEE, pp.325-331, DOI 10.1109/NCA.2008.13, (2008).
[14] Malik R. and Sehrawat H., "Comprehensive Study of Selective Forwarding Attack in Wireless Sensor Networks" International Journal of Advanced Research in Computer Science, vol.8, pp.1835-1838, (2017).
[15] Soni V., Modi P. and Chuadhri V., "Detecting Sinkhole Attack in Wireless Sensor Network" International Journal of Application or Innovation in Engineering & Management (IJAIEM), Vol. 2, pp.29-32, (2013).
[16] Rassam M. A., Zainal A., Maarof A. and Al Shaboti M., "A Sinkhole Attack Detection
Scheme in Mintroute Wireless Sensor Networks" IEEE, pp.71-75, DOI: 10.1109/ISTT.2012.6481568, (2012).
[17] Khanderiya M. and Panchal M.,"A Novel Approach for Detection of Sybil Attack in Wireless Sensor Networks" IJSRSET, Vol. 2, pp.113-117, (2016),.
[18] Dhamodharan U. K. R. and Vayanaperumal R., "Detecting and Preventing Sybil Attacks in Wireless Sensor Networks Using Message Authentication and Passing Method" Hindawi Publishing Corporation Scientific World Journal, pp.1-7, http://dx.doi.org/10.1155/2015/841267, (2015).
[19] Amish P. and Vaghela V. B., "Detection and Prevention of Wormhole Attack in Wireless Sensor Network using AOMDV protocol" ELSEVIER, pp.700-707, doi: 10.1016/j.procs.2016.03.092, (2016).
[20] Shaikh F. A. and Patil U. "Efficient Detection and prevention of Wormhole Attacks in
[21] Wireless Mesh Network" International Research Journal of Engineering and Technology (IRJET), Vol. 4, pp.2208-2214, (2017),.
[22] Modi rkhazeni A., Aghamahmoodi S., Modirkhazeni A. and Niknejad N., "Distributed Approach to Mitigate Wormhole Attack in Wireless Sensor Networks" IEEE, pp.122-128, (2012).
[23] Ahmad Salehi S., Razzaque M. A., Naraei P. and Farrokhtala A., "Security in Wireless Sensor Networks: Issues and Challanges" IEEE, (2013). [24] Bhalla M., Pandey N. and Kumar B. “Security Protocols for Wireless Sensor Networks” IEEE, pp. 1005-1009, (2015),.
[25] Aldhobaiban D., Elleithy K. and Almazaydeh L., "Prevention of Wormhole Attacks in Wireless Sensor Networks" IEEE, pp.287-291, DOI 10.1109/AIMS.2014.57, (2014).
[26] Sakthivel T. and Chandrasekaran R. M., "Detection and Prevention of Wormhole Attacks in MANETs using Path Tracing Approach" European Journal of Scientific Research, pp.240-252, (2012).
[27] Modirkhazeni A., Aghamahmoodi S., Modirkhazeni A. and Modirkhazeni N., "Distributed Approach to Mitigate Wormhole Attack in Wireless Sensor Networks" IEEE, pp.122-128, (2012).
[28] S. I. Eludiora, O.O. Abiona, A. O. Oluwatope, S. A. Bello, M.L Sanni, , D. O. Ayanda, C.E Onime E. R. Adagunodo and L.O. Kehinde “A Distributed Intrusion. Detection Scheme for Wireless Sensor Networks” IEEE, 2011.
[29] Ioannou C., Vassiliou V. and Sergiou C., "An Intrusion Detection System for Wireless Sensor Networks" IEEE. 2017.
[30] Shanthi. S., E. G, Rajan. “Comprehensive Analysis of Security Attacks and Intrusion Detection System in Wireless Sensor Networks” IEEE 2016, pp. 24-31, 2016
