抽象的

A Security Approach For Detection And Elimination Of Resource Depletion Attack In Wireless Sensor Network

Ambili M A, BijuBalakrishnan

Wireless Sensor Networks came into prominence around the start of this millennium motivated by the omnipresentscenario ofsmall-sizedsensors withlimitedpower deployedinlargenumbers overan areato monitor different phenomenon.Theapplications ofWSNwererapidlyemerging& havebeen increasingly diverse,including medicalmonitoring, homeland security, industrialautomation, military application etc.. Thishighlightstheneedforsecurityassensornodesare highly susceptibletomanykindsofattacks.Someattackscalled resourceconsumptionattacksthatare difficultto detectwill deplete thenodes energyand thuspermanentlydisablethe network.Thesolemotivationforresearchin WSNhasbeen to providesecurityandto maximizethelifetimeofthenetwork, where network lifetimeis typically measuredfromtheinstantof deploymenttothe point whenone ofthe nodeshas expendedits limitedpowersource andbecomesin-operational–commonly referredas a firstnode failure. In thispaper, we considerhow routing protocols,affectfrom attackeventhosedesignedtobe secure, lack protection from these attacks, which we call Vampire attacks, which permanently disable networks by quicklydrainingnodes’battery power.These“Vampire”attacks are notspecific toanyspecific protocolwhich aredevastating, difficult todetect,andareeasy tocarryoutusingasfewasone maliciousinsidersending onlyprotocol compliantmessages.We proposean energyconstraintintrusiondetectiontechniqueto detecttheresource drainingattack.

免责声明: 此摘要通过人工智能工具翻译,尚未经过审核或验证