VND-NN: Neural Network Based Vampire Node Detection in Wireless Sensor Networks

Authors(2) :-Rama Chaithanya Tanguturi, C Jayakumar

Wireless sensor networks are widely used for environment monitoring. The sensor nodes are deployed in the areas of interest to obtain the physical world data. These nodes are resource constrained in power, memory and computation. Boarder security is one of the major applications of WSNs. The sensor nodes are mounted with the environmental sensors (temperature, pressure etc.,) to monitor the environment and forward the sensed data to the base station via mobile sinks. Adversary can easily capture nodes from the network because they are not tamper proof in nature. Once the attacker succeed in capturing a legitimate sensor node, can introduce a variety of attacks. Vampire attack a potential attack in WSNs, which is a resource draining attack. The compromised nodes will misbehave with the legitimate nodes in the network and tries to drain the resources continuously resulting in network collapse. In this paper a neural network based misbehavior node detection algorithm is proposed. The simulation result shows that the proposed model effectively detects the misbehavior nodes and conserves the network resources.

Authors and Affiliations

Rama Chaithanya Tanguturi
Department of Computer Science and Engineering, PACE Institute of Technology & Sciences, Ongole, Andhra Pradesh, India
C Jayakumar
Department of Computer Science and Engineering, PACE Institute of Technology & Sciences, Ongole, Andhra Pradesh, India

Neural network, wireless sensor network, misbehavior, security.

  1. I. F. Akyildiz, Y. Sankarasubramaniam, and E. Cayirci, "A survey on sensor networks," IEEE Commun. Mag., vol. 40, no. 8, pp. 102–114, Aug. 2002.
  2. D. R. Raymond, S. F. Midkiff, A. Wood, and J. Stankovic, "Denial-of-Service in Wireless Sensor Networks: Attacks and Defenses," pp. 74–81, 2008.
  3. E. Soltanmohammadi, M. Orooji, and M. Naraghi-Pour, "Decentralized hypothesis testing in wireless sensor networks in the presence of misbehaving nodes," IEEE Trans. Inf. Forensics Secur., vol. 8, no. 1, pp. 205–215, 2013.
  4. E. Y. Vasserman and N. Hopper, "Vampire attacks: Draining life from wireless ad Hoc sensor networks," IEEE Trans. Mob. Comput., vol. 12, no. 2, pp. 318–332, 2013.
  5. F. Stajano and R. Anderson, "The Resurrecting Duckling: Security Issues for Ad-Hoc Wireless Networks," in Proc. Seventh Int’l Workshop Security Protocols, 1999.
  6. C. Wang, T. Feng, J. Kim, G. Wang, and W. Zhang, "Catching packet droppers and modifiers in wireless sensor networks," IEEE Trans. Parallel Distrib. Syst., vol. 23, no. 5, pp. 835–843, 2012.

Publication Details

Published in : Volume 2 | Issue 2 | March-April 2016
Date of Publication : 2017-12-31
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 454-456
Manuscript Number : IJSRSET1622132
Publisher : Technoscience Academy

Print ISSN : 2395-1990, Online ISSN : 2394-4099

Cite This Article :

Rama Chaithanya Tanguturi, C Jayakumar, " VND-NN: Neural Network Based Vampire Node Detection in Wireless Sensor Networks, International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 2, Issue 2, pp.454-456, March-April-2016.
Journal URL : http://ijsrset.com/IJSRSET1622132

Article Preview

Follow Us

Contact Us