Affiliation:
1. Master of Computer Applications, RV College of Engineering®, Bengaluru, India
2. Master of Computer Applications, RV College of Engineering, Bengaluru, India
Abstract
Wireless sensor networks (WSN) are highly vulnerable to
attacks and constraints on resources like power, processing, and
radio signal. In high constraint and vulnerable environments
adapting to detection and defence mechanisms is a challenge. In
this paper analysis of Distributed Denial of Service detection
mechanisms of Sybil, Sinkhole, and Wormhole attack for power
optimization is carried out based on the power consumption
parameter. Power consumption attributes affects the efficiency of
nodes during the time of attacks. Energy utilization and
conservation also depend upon certain parameters comprising
usage of network, changes in topology, climatic changes, no of
sensors connected, memory utilization on sensors, and security
issues. The analysis takes various attacks detection mechanisms
into consideration and a comparative study is projected upon
power optimization parameters. This study could contribute to the
aspect of extending the activity of the sensor in various
applications such as whether monitoring and recording of wildlife
movement.
Publisher
Blue Eyes Intelligence Engineering and Sciences Engineering and Sciences Publication - BEIESP
Subject
Electrical and Electronic Engineering,Mechanics of Materials,Civil and Structural Engineering,General Computer Science
Reference29 articles.
1. Zhou, Hai-Ying, et al. "Modeling of node energy consumption for wireless sensor networks." Wireless Sensor Network 3.1 (2011): 18.
2. Zhang, Fan, Reiner Dojen, and Tom Coffey. "Comparative performance and energy consumption analysis of different AES implementations on a wireless sensor network node." International Journal of Sensor Networks 10.4 (2011): 192-201.
3. Chou, Pai H., and Chulsung Park. "Energy-efficient platform designs for real-world wireless sensing applications." ICCAD-2005. IEEE/ACM International Conference on Computer-Aided Design, 2005.. IEEE, 2005.
4. Raymond, David R., et al. "Effects of denial-of-sleep attacks on wireless sensor network MAC protocols." IEEE transactions on vehicular technology 58.1 (2008): 367-380.
5. Newsome, James, et al. "The sybil attack in sensor networks: analysis & defenses."Proceedings of the 3rd international symposium on Information processing in sensor networks. ACM, 2004.