Notification: Our email services are now fully restored after a brief, temporary outage caused by a denial-of-service (DoS) attack. If you sent an email on Dec 6 and haven't received a response, please resend your email.
CFP last date
20 December 2024
Call for Paper
January Edition
IJCA solicits high quality original research papers for the upcoming January edition of the journal. The last date of research paper submission is 20 December 2024

Submit your paper
Know more
Reseach Article

Sleep Deprivation Attack Detection in Wireless Sensor Network

by Tapalina Bhattasali, Rituparna Chaki, Sugata Sanyal
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 40 - Number 15
Year of Publication: 2012
Authors: Tapalina Bhattasali, Rituparna Chaki, Sugata Sanyal
10.5120/5056-7374

Tapalina Bhattasali, Rituparna Chaki, Sugata Sanyal . Sleep Deprivation Attack Detection in Wireless Sensor Network. International Journal of Computer Applications. 40, 15 ( February 2012), 19-25. DOI=10.5120/5056-7374

@article{ 10.5120/5056-7374,
author = { Tapalina Bhattasali, Rituparna Chaki, Sugata Sanyal },
title = { Sleep Deprivation Attack Detection in Wireless Sensor Network },
journal = { International Journal of Computer Applications },
issue_date = { February 2012 },
volume = { 40 },
number = { 15 },
month = { February },
year = { 2012 },
issn = { 0975-8887 },
pages = { 19-25 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume40/number15/5056-7374/ },
doi = { 10.5120/5056-7374 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:28:09.541971+05:30
%A Tapalina Bhattasali
%A Rituparna Chaki
%A Sugata Sanyal
%T Sleep Deprivation Attack Detection in Wireless Sensor Network
%J International Journal of Computer Applications
%@ 0975-8887
%V 40
%N 15
%P 19-25
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Deployment of sensor network in hostile environment makes it mainly vulnerable to battery drainage attacks because it is impossible to recharge or replace the battery power of sensor nodes. Among different types of security threats, low power sensor nodes are immensely affected by the attacks which cause random drainage of the energy level of sensors, leading to death of the nodes. The most dangerous type of attack in this category is sleep deprivation, where target of the intruder is to maximize the power consumption of sensor nodes, so that their lifetime is minimized. Most of the existing works on sleep deprivation attack detection involve a lot of overhead, leading to poor throughput. The need of the day is to design a model for detecting intrusions accurately in an energy efficient manner. This paper proposes a hierarchical framework based on distributed collaborative mechanism for detecting sleep deprivation torture in wireless sensor network efficiently. Proposed model uses anomaly detection technique in two steps to reduce the probability of false intrusion.

References
  1. Eludiora, S.I., Abiona, O.O., Oluwatope, A.O., Bello, S.A., Sanni, M.L., Ayanda, D.O., Onime, C.E., Adagunodo, E.R., Kehinde, L.O.: “A distributed intrusion detection scheme for wireless sensor networks”, IEEE International Conference on Electro/Information Technology (EIT 2011),Mankato, MN , pp 1-5, ISBN: 978-1-61284-465-7 DOI: 10.1109/ EIT.2011. 5978609.
  2. Mostarda L., Navarra A.: “Distributed Intrusion Detection Systems for Enhancing Security in Mobile Wireless Sensor Networks”, International Journal of Distributed Sensor Networks, Special Issue: Advances on Heterogeneous Wireless Sensor Networks,2008, Vol. 4, No. 2, pp. 83-109, DOI:10.1080/15501320802001119.
  3. Brownfield M. , Gupta Y., Davis N. ,“Wireless Sensor Network Denial of Sleep Attack”, Proceedings of the 2005 IEEE, Workshop on Information Assurance, United States Military Academy, West Point, NY, June 2005, DOI:10.1.1.133.8865.
  4. Raymond D. R., Marchany R. C., Brownfield M. I., Midkiff S. F., “Effects of Denial-of Sleep Attacks on Wireless Sensor Network MAC Protocols”, IEEE Transactions on Vehicular Technology, Vol. 58, Issue 1, pp. 367-380, January 2009. ISSN: 0018-9545, DOI: 10.1109 / TVT.2008.921621.
  5. Pirretti M., Zhu S., Vijaykrishnan N., Mcdaniel P., Kandemir M., Brooks R., “The Sleep Deprivation Attack in Sensor Networks: Analysis and Methods of Defense”, International Journal of Distributed Sensor Networks, Vol. 2, Issue 3, 2006, pp. 267-287,DOI: 10.1080/15501320600642718.
  6. Raymond D. R., Midkiff S. F., “Clustered Adaptive Rate Limiting: Defeating Denial-Of-Sleep Attacks In Wireless Sensor Networks”, Military Communications Conference, 2007, MILCOM 2007, IEEE, pp. 1-7.
  7. Chen C., Hui L., Pei Q., Ning L., Qingquan P. , “An Effective Scheme for Defending Denial-of-Sleep Attack in Wireless Sensor Networks”, Proceedings of the 2009 Fifth International Conference on Information Assurance and Security, Vol. 02, IEEE CS, Washington DC, USA, ISBN: 978-0-7695-3744-3, DOI:10.1109/IAS.2009.33.
  8. Premkumar K., Kumar A., “Optimal Sleep-Wake Scheduling for Quickest Intrusion Detection using Sensor Networks”, The 27th Conference on Computer Communications; IEEE INFOCOM 2008, 13-18 April 2008, Phoenix, AZ, USA,pp. 1400-1408, ISBN: 978-1-4244-2025-4.
  9. Bhattasali T., Chaki R.: “Lightweight Hierarchical Model For HWSNET”, International Journal of Advanced Smart Sensor Network Systems (IJASSN), October 2011, Vol. 1, No. 2, pp. 17-32, ISSN: 2231-4482 [Online], 2231-5225[Print],DOI:10.5121/ ijassn. 2011.1202.
  10. Chaki R., Chaki N., “IDSX: A Cluster Based Collaborative Intrusion Detection Algorithm for Mobile Ad-Hoc Network”, Proceedings of the 6th International Conference on Computer Information Systems and Industrial Management Applications (CISIM '07). Minneapolis, MN, USA, pp.179 - 184, June 28-30, 2007, ISBN: 0-7695-2894-5, DOI:10.1109/ CISIM.2007.38.
Index Terms

Computer Science
Information Sciences

Keywords

Sleep Deprivation Attack Wireless Sensor Network Hierarchical Collaborative