CFP last date
20 January 2025
Reseach Article

An Approach to Locate Nasty Node and to Prevent Selective Dropping in WSN

by Dharmendra Mishra, Sunil Patel
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 129 - Number 16
Year of Publication: 2015
Authors: Dharmendra Mishra, Sunil Patel
10.5120/ijca2015907039

Dharmendra Mishra, Sunil Patel . An Approach to Locate Nasty Node and to Prevent Selective Dropping in WSN. International Journal of Computer Applications. 129, 16 ( November 2015), 31-39. DOI=10.5120/ijca2015907039

@article{ 10.5120/ijca2015907039,
author = { Dharmendra Mishra, Sunil Patel },
title = { An Approach to Locate Nasty Node and to Prevent Selective Dropping in WSN },
journal = { International Journal of Computer Applications },
issue_date = { November 2015 },
volume = { 129 },
number = { 16 },
month = { November },
year = { 2015 },
issn = { 0975-8887 },
pages = { 31-39 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume129/number16/23159-2015907039/ },
doi = { 10.5120/ijca2015907039 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:23:44.915974+05:30
%A Dharmendra Mishra
%A Sunil Patel
%T An Approach to Locate Nasty Node and to Prevent Selective Dropping in WSN
%J International Journal of Computer Applications
%@ 0975-8887
%V 129
%N 16
%P 31-39
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The fast growth in wireless communication and digital electronics has led to the development of low-cost and low-power sensor nodes that are small in size and may communicate over short distances. Sensor nodes are deployed in hostile environment in large number, which makes their physical protection against tampering difficult or more prone to be compromised by an adversary force. By doing that, an adversary can modify the behavior of the compromised nodes and launch routing misbehavior attacks. One most common type of such attacks is gray hole attack. Adhoc On Demand Distance Vector (AODV) in its pure form does not have any mechanism to deal with such type of attack. In this paper, we simulate gray hole attack on AODV routing protocol and evaluate AODV’s performance by considering different metrics and scenarios. NS2 simulator has been used to conduct simulation of gray hole attack. Our simulation results show the influence of gray hole attack on the performance of AODV which suffers from decreased delivery ratio and increased packet loss. Furthermore, some countermeasures against gray hole attack are also provided.

References
  1. Preeti Sharma. Monika Saluja and Krishna Kumar Saluja˝ A review of Selective Forwarding Attack in Wireless Sensor Networks.
  2. Aproova Joshi, Pragya Sanghi & Richa Agarwal Priyanka Sharma , “A Reserarch on Selective Forwarding Attack on Leach Network” IPASJ International Journal of Computer Science (IIJCS) ISSN 2321-5992 Vol. 2 Page No. 21-26 December 2006.
  3. K. Ioannis and T. Dimitriou, “Toward intrusion detection in sensor networks,” in 13th European Wireless Conference, Page No.1-7 April 2007.
  4. B. Lee and Y.-H. Choi, A Resilient Packet-Forwarding Scheme against Maliciously Packet-Dropping Nodes in Sensor Networks, In Proceedings of the Fourth ACM Workshop on Security of Ad Hoc and Sensor Networks(SASN’06), Page No. 59-70, January 2006.
  5. Wazir Zada Khan,Yang Xiang,Mohammad Y Aalsalem & Quratulain Arshad “Comprehensive Study of Selective Forwaring Attack in Wireless Sensor Network” I.J. Computer Network and Information Security, Page No. 1-10 February 2011.
  6. S.Sharmila & G. Umamaheshwari “Defensive Mechanisms of Selective Forward Attack in Wireless Sensor networks” International Journal of Computer Applications (0975 8887)Vol 4 Page No. 43-49 February 2012.
Index Terms

Computer Science
Information Sciences

Keywords

Wireless Sensor Networks Security and Gray Hole Attack/Selective Forwarding Attack AODV NS-2