Open Access Open Access  Restricted Access Subscription or Fee Access

Byzantine Attacks in Energy Constrained Wireless Sensor Networks

Shabir A. Sofi, Roohie Naaz

Abstract


Byzantine attacks disrupt the communication between nodes in the network without regard to its own resource consumption. In Wireless Sensor Networks (WSN) the wireless shared medium is susceptible to attacks; also communication is the biggest source of energy consumption in WSN. The jamming of physical layer, disruption of MAC layer, control packets, attack against routing, attacks on transport protocol etc. The performance of nodes in wireless sensor networks is critical because of limited power. This paper discusses the performance of WSN under byzantine attacks and their mitigation by using advanced node as cluster head and proposed protocol. Results have shown improvement in energy efficiency in WSN.


Keywords


Byzantine Attacks, Wireless Sensor Network, Advanced Node, Gray Hole, Black Hole, Energy Efficiency.

Full Text:

PDF

References


Adrian Perrig, et al., 2004 “Security in Wireless Sensor Networks”, Communication of the ACM,Vol. 47, No. 6.

D. Estrin, et al., 1999 “Next Century Challenges: Scalable coordination in sensor networks”, Proceedings of the ACM International Conference on Mobile Computing and Networking, Mobicom.

S. Madden, et al., 2002 “a Tiny AGgregreation service for ad-hoc sensor networks”, Proceedings of the Symposium on Operating Systems Design and implementation, OSDI.

Wendi Rabiner Heinzelman, et al., 2000 “Energy-Efficient Communication Protocol for Wireless Micro sensor Networks”, Proceedings of the Hawaii International Conference on System Sciences, Maui, Hawaii.

Salim EL KHEDIRI, et al., 2014”A New Approach for Clustering in Wireless Sensors Networks Based on LEACH” International Workshop on Wireless Networks and Energy Saving Techniques (WNTEST), Belgium.

S. A. Sofi, Roohie Naaz, 2010 “Energy efficient routing protocol for structured deployment of wireless sensor networks”, Proceedings of International Conference on Next Generation Networks, IET, pp10

Medadian, et al., 2009 “M, Combat with black hole attack in AODV routing protocol in MANET”, AH-ICI, First Asian Himalayas Interntional Conference, pp 1-5.

A. Pacha and A. Mishra, 2003, “Collaborative security architecture for black hole and grey hole attack prevention in mobile ad hoc networks”, Radio and Wireless Conference, Proceedings, pp 75-78

D. M. Shila, et al., 2009 “Channel-aware detection of grey hole attacks in wireless mesh networks”, Global Telecommunication Conference (GLOBECOM), pp1-6

Y. C. Hu, A Perrig, and D. B. Johnson, 2003, “Rushing attacks in wireless ad hoc network routing protocols”, ACM Workshop on Wireless Security (WiSe).

Hongjuan li, et al., 2014 "Secure and Energy Efficient data aggregation with malicious aggregator identification in Wireless Sensor Networks”, Future Generation Computer Systems, 37, 08-116.

Yang Zhao, et al., 2011 "A Co-commitment based secure data collection scheme for tiered wireless sensor networks", 57, 655-6

Shabir Sofi, et al., 2012 “Analysis of Byzantine Attacks in Ad hoc Networks and Their Mitigation”, 1st Taibah University International Conference on Computing and Information Technology, ICCI.

Ameer Ahmed Abbasi et al, 2007, "A survey on clustering algorithms for wireless sensor networks", Elsevier B.V.

D. Culler et al, 2004, "Overview of sensor networks, IEEE Comput. 37(8), 41-49

Y. Zou, K. Chakrabarty, 2003, " Sensor deployment and target localization based on virtual forces", IEEE 22nd annual joint conference, Vol. 2, pp 1293-1303

C. Karlof, D. Wagner, 2003, "Secure routing in wireless sensor networks: Attacks and countermeasures", Special issue on Sensor Network Applications and Protocols ", Ad Hoc Networks, Journal, Elsevier

J. Cai, et al. 2010, "An adaptive approach to detecting black and gray hole attacks in ad hoc network", 4th IEEE international conference on Advanced Information networking and Applications, pp 775-780


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.