CFP last date
20 December 2024
Reseach Article

DAP-LECP: Dos Attack Prevention and Low Energy Consumption Protocol for Wireless Sensor Networks

by Nasir Rashid, Muhammad Salam, M. Raees Khan, Fakhre Alam
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 63 - Number 5
Year of Publication: 2013
Authors: Nasir Rashid, Muhammad Salam, M. Raees Khan, Fakhre Alam
10.5120/10462-5173

Nasir Rashid, Muhammad Salam, M. Raees Khan, Fakhre Alam . DAP-LECP: Dos Attack Prevention and Low Energy Consumption Protocol for Wireless Sensor Networks. International Journal of Computer Applications. 63, 5 ( February 2013), 16-20. DOI=10.5120/10462-5173

@article{ 10.5120/10462-5173,
author = { Nasir Rashid, Muhammad Salam, M. Raees Khan, Fakhre Alam },
title = { DAP-LECP: Dos Attack Prevention and Low Energy Consumption Protocol for Wireless Sensor Networks },
journal = { International Journal of Computer Applications },
issue_date = { February 2013 },
volume = { 63 },
number = { 5 },
month = { February },
year = { 2013 },
issn = { 0975-8887 },
pages = { 16-20 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume63/number5/10462-5173/ },
doi = { 10.5120/10462-5173 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:13:21.094757+05:30
%A Nasir Rashid
%A Muhammad Salam
%A M. Raees Khan
%A Fakhre Alam
%T DAP-LECP: Dos Attack Prevention and Low Energy Consumption Protocol for Wireless Sensor Networks
%J International Journal of Computer Applications
%@ 0975-8887
%V 63
%N 5
%P 16-20
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The wide-spread deployment of wireless sensor networks (WSN) promises extensive applications in military and civilian fields. So far the major research focus has been to make WSN more useful and scalable in order to cope with future challenges of communication technologies, small emphasis is placed till now for the secure communication in WSN. A lot number of WSN protocols exist that have been designed to figure out the weaknesses and to provide feasible solutions concerning the security, Denial of service (DoS) attacks, data routing, data dissemination and power consumption. Our research work have analyzed a variety of key distribution and sharing protocols designed to detect and avoid DoS attacks in WSN. We propose a security protocol, modified form of identifier based protocol, for prevention of denial of service attack in WSN that provides a solution to battery exhaustion of sensor network by disseminating the identity of a malicious node.

References
  1. Basagni, Herrin, C. , Bruschi, D. , and Rosti, E. (2001). Secure Pebblenets. 2nd International Symposium on Mobile Ad Hoc Networking & Computing. Washington, ACM.
  2. ErikOliver, Michael Conrad, Martina Zitterbart. "A tree based approach for secure key distriobution in wireless sensor networks. " Real World Sensor Networks. June 2005.
  3. Cheng, Y. , and D. P. Agrawal (2006). Distributed Pairwise Key Establishment in Wireless Sensor Networks, Nevada, USA, International Conference on Pervasive Systems Computing.
  4. D. EstrinL. Girod, G. Pottie, M. Srivastava, "Instrumenting the World with Wireless Sensor Networks", In Proceedings of IEEE ICASSP 2001, pp. 2033-2036.
  5. Lewis, F. L. Wireless sensor networks. Wiley: D. J. Cook and S. K. Das, editors, Smart Environments: Technology, Protocols, and Applications, 2004.
  6. E. -O Blaß, M. C. , and M. Zitterbart (2005). A tree-based approach for secure key distribution in wireless sensor networks. Real World Sensor Networks, Stockholm, Sweden.
  7. Seyit A. C. Amtepe and B. Ulent Yener, "Key Distribution Mechanisms for Wireless Sensor Networks: A Survey", Rensselaer Polytechnic Institute Technical Report TR-05-07, March 2005.
  8. W. Du, J. Deng, Y. S. Han, Shigang Chen, P. K. Varshney, "A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge", IEEE INFOCOM 2004
  9. Bocheng Lai, Sungha Kim,Ingrid Verbauwhede. "Scalable Session Key Construction Protocols for Wireless Sensor Networks. " IEEE,Large Scale Real Time and Embedded Systems. usa, 2002.
  10. William Stallings, "Cryptography and Network Security, Principles and Practice", Second Edition, Prentice Hall Publishing, ISBN-13: 9780130914293, 2001.
  11. R. L Rivest, A. Shamir, and L. M. Adleman, "A method for obtaining digital signatures and public-key cryptosystems", Communications of the ACM, vol. 21, no. 2, pp. 120–126, 197
  12. Adrian Perrig, Robert Szew czyk, J. D. Tygar, Victorwen and David E. Culler "SPINS: Security Protocols for Sensor Networks", Wireless Networks, Kluwer Academic Publishers Netherlands 2002. pp 521. 534
  13. Bocheng Lai Sungha Kim, Ingrid Verbauwhede, "Scalable Session Key Construction Protocol for Wireless Sensor Networks", Report by Department of Electrical Engineering University of California, Los Angeles, CA-90095.
  14. Schwiebert , Kamran Jamshaid and Loren. "Seken (secure and efficient key exchange for sensor networks). "IEEE International Conference, Computing, and Communications,. 2004. 415–422.
  15. Shan Jiang, Sean Smith, Kazuhiro Minami. "Securing Web Servers against Insider Attack. " Computer Security Applications Conference. 2001. 131-141.
  16. Muhammad Adeel, Munir Hussain, Urooj Beenish, Shenila Mehwish, Laurissa Tokarchuk, Amer Shahzad. "Identifier Based Key Distribution Protocol for Wireless Sensor Networks. " SoftCom, Software, telecommunications nd computer networks, 16th Conference. 2008.
  17. Chien -Chun Ni, Tien-Ruey Hsiang, J. D. Tygar. "A Power- Preserving Broadcast Protocol for WSNs With DoS Resistance. " 17th International IEEE Conference on Computer Communications and Networks. 2008. 1-6.
  18. W. R. Heinzelman, and H. Balakrishnan, "Negotiation- Based Protocols for Disseminating Information in Wireless Sensor Networks," Wireless Networks, vol. 8, 2002, pp. 169–85.
Index Terms

Computer Science
Information Sciences

Keywords

Battery exhaustion denial of service data routing data dissemination key distribution malicious node