抽象的な

A Security Approach for Detection And Elimination Of Resource Depletion Attack In Wireless Sensor Network

Ambili M A, BijuBalakrishnan

Wireless Sensor Networks came into prominence around the start of this millennium motivated by the omnipresentscenario ofsmall-sizedsensors withlimitedpower deployedinlargenumbers overan areato monitor different phenomenon.Theapplications ofWSNwererapidlyemerging& havebeen increasingly diverse,including medicalmonitoring, homeland security, industrialautomation, military application etc.. Thishighlightstheneedforsecurityassensornodesare highly susceptibletomanykindsofattacks.Someattackscalled resourceconsumptionattacksthatare difficultto detectwill deplete thenodes energyand thuspermanentlydisablethe network.Thesolemotivationforresearchin WSNhasbeen to providesecurityandto maximizethelifetimeofthenetwork, where network lifetimeis typically measuredfromtheinstantof deploymenttothe point whenone ofthe nodeshas expendedits limitedpowersource andbecomesin-operational–commonly referredas a firstnode failure. In thispaper, we considerhow routing protocols,affectfrom attackeventhosedesignedtobe secure, lack protection from these attacks, which we call Vampire attacks, which permanently disable networks by quicklydrainingnodes’battery power.These―Vampire‖attacks are notspecific toanyspecific protocolwhich aredevastating, difficult todetect,andareeasy tocarryoutusingasfewasone maliciousinsidersending onlyprotocol compliantmessages.We proposean energyconstraintintrusiondetectiontechniqueto detecttheresource drainingattack

免責事項: この要約は人工知能ツールを使用して翻訳されており、まだレビューまたは確認されていません