CFP last date
20 December 2024
Reseach Article

A Protective Mechanism to Avoid Warm Hole and Sink-Hole Attack in Wireless Ad hoc Network: Survey

by Rajani B. Patil, Dhanashree Kulkarni
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 107 - Number 20
Year of Publication: 2014
Authors: Rajani B. Patil, Dhanashree Kulkarni
10.5120/18871-0506

Rajani B. Patil, Dhanashree Kulkarni . A Protective Mechanism to Avoid Warm Hole and Sink-Hole Attack in Wireless Ad hoc Network: Survey. International Journal of Computer Applications. 107, 20 ( December 2014), 31-33. DOI=10.5120/18871-0506

@article{ 10.5120/18871-0506,
author = { Rajani B. Patil, Dhanashree Kulkarni },
title = { A Protective Mechanism to Avoid Warm Hole and Sink-Hole Attack in Wireless Ad hoc Network: Survey },
journal = { International Journal of Computer Applications },
issue_date = { December 2014 },
volume = { 107 },
number = { 20 },
month = { December },
year = { 2014 },
issn = { 0975-8887 },
pages = { 31-33 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume107/number20/18871-0506/ },
doi = { 10.5120/18871-0506 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:41:37.379498+05:30
%A Rajani B. Patil
%A Dhanashree Kulkarni
%T A Protective Mechanism to Avoid Warm Hole and Sink-Hole Attack in Wireless Ad hoc Network: Survey
%J International Journal of Computer Applications
%@ 0975-8887
%V 107
%N 20
%P 31-33
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Wireless adhoc network is autonomous and infrastructure less network. Wireless ad hoc network is particularly vulnerable due to its primary characteristics, like open medium, dynamic topology, distributed cooperation, and capability constraint. Routing plays an important role in the security of the entire network. Secure transmission of information in wireless adhoc environment is an important concern. Any attacker receive wireless signal by using transceiver and without being detected. Objective of this paper is to propose new approach for WSN security, i. e. Secure Energy Efficient ad hoc Routing (SEEAR) that consider cost of providing security and effects on energy efficiency. Shared cryptography[3] used for providing security. In this method information is divided into multiple shares and sent over multiple disjoint paths from transmitter to receiver at different point of time. At the receiver end the original information reconstructed by combining the shares received through different paths at different point of time. In this paper, cost for security in terms of time and its effect on energy efficiency is calculated. Also simulating the different types of attacks like wormhole, sink hole attack etc

References
  1. Shao-Shan Chiang, , Chih-Hung Huang, and Kuang-Chiung Chang, "A Minimum Hop Routing Protocol for Home Security Systems Using Wireless Sensor Networks," IEEE Transactions on Consumer Electronics, Vol. 53, No. 4, NOVEMBER 2007.
  2. Xufei Mao Shaojie Tang, Xiaohua Xu Xiang-Yang Li, and Huadong Ma, "Energy-Efficient Op-portunistic Routing in Wireless Sensor Networks," IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 22, NO. 11, NOVEMBER 2011.
  3. A Novel Security Scheme for Wireless Adhoc Network, Abhijit Das Soumya Sankar Basu Atal Chaudhuri, 978-1-4577-0787-2/11 IEEE 2011.
  4. Huei-Wen Ferng,Rachmarini, D. ,"A secure routing protocol for wireless sensor networks with consideration of energy efficiency/Network Operations and Management Symposium (NOMS)," 2012 IEEE .
  5. Anfeng Liu, Zhongming Zheng , Chao Zhang, Zhigang Chen, and Xuemin (Sherman) Shen,"Secure and Energy-Efficient Disjoint Multipath Routing for WSNs," IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 61, NO. 7, SEPTEMBER 2012.
  6. Rong Fan, Jian Chen, Jian-Qing Fu, Ling-Di Ping,,"A Steiner-Based Secure Multicast Routing Protocol for Wireless Sensor Network/Parallel and Distributed Systems," IEEE Transactions on (Volume:PP , Issue: 99 ), April 2013.
  7. Anhtuan Le, Jonathan Loo, Aboubaker Lasebae, Alexey Vinel, Yue Chen, and Michael ChaiThe, Impact of Rank Attack on Network Topology of Routing Protocol for Low-Power and Lossy Networks. IEEE SENSORS JOURNAL, VOL. 13, NO. 10, OCTOBER 2013.
  8. Salwa Aqeel Mahdi, Mohamed Othman, Hamidah Ibrahim, Jalil Md. Desa and Jumat Sulaiman, "PROTOCOLS FOR SECURE ROUTING AND TRANSMISSION IN MOBILE AD HOC NETWORK: A REVIEW," Journal of Computer Science 9 (5): 607-619, 2013, ISSN 1549-3636.
Index Terms

Computer Science
Information Sciences

Keywords

Shared cryptography Secure energy efficient ad hoc routing