Abstract

This paper proposes a routing protocol for wireless sensor networks to deal with energy-depleting vampire attacks. This resource-conserving protection against energy-draining (RCPED) protocol is compatible with existing routing protocols to detect abnormal signs of vampire attacks and identify potential attackers. It responds to attacks by selecting routes with the maximum priority, where priority is an indicator of energy efficiency and estimation of security level calculated utilizing an analytic hierarchy process (AHP). RCPED has no dependence on cryptography, which consumes less energy and hardware resources than previous approaches. Simulation results show the benefits of RCPED in terms of energy efficiency and security awareness.

Highlights

  • Wireless sensor networks (WSNs) made up of wirelessly interconnected sensor nodes are a subset of ad hoc networks that are self-configuring networks without fixed infrastructure [1,2,3]

  • As sensors adopted in WSNs have limited computation and energy resources, they are naturally vulnerable to resource depletion attacks, such as denial of service (DoS) attacks and forced authentication attacks [15]

  • Note that this metric does represent energy efficiency performance and is an indicator of safety and latency performance; reasons are later provided in Sections 6.6.2 and 6.6.3

Read more

Summary

Introduction

Wireless sensor networks (WSNs) made up of wirelessly interconnected sensor nodes are a subset of ad hoc networks that are self-configuring networks without fixed infrastructure [1,2,3]. Most previous studies have concluded that many attacks share the goal of stopping the network from functioning instantly, either adequately or within a short time period. The origin of these attacks may not be identified promptly, but the disruptions caused can draw attention to underway attacks. Since data transmissions will be accomplished at the end of the day (but with much higher costs in resources), it is difficult for network operators to detect and prevent vampire attacks. The protection is independent of cryptography, consuming less energy and hardware resources This advantage is significant to sensors in WSNs as they are usually in possession of very limited energy storage and computational capability.

Related Works
General Concept and Passive Detection
Defining Normal Case and Significant Deviation
Practical Issues in Passive Detection
Estimation of Transmission Cost on a Specific Route
Node Localisation
Active Detection
Detection of Suspicious Routes
Detection of Route Stretch Attackers
Monitoring Information Aggregation Utilizing Bayesian Network
Security Information Distribution
Route Discovery Based on AHP
Details of AHP
Priority Calculation in Optimal Route Determination
Optimal Route Determination
Theoretical Definition of Performance
Theoretical Computational Complexities
Overview of PLGPa
Overview of AODV-EHA
Simulation Setup
Experimental Results
Energy Efficiency Performance
Security Performance
Average Route Length
Effect of Buffer Size
Conclusions and Future-Work
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call