VND-NN: Neural Network Based Vampire Node Detection in Wireless Sensor Networks

Authors

  • Rama Chaithanya Tanguturi  Department of Computer Science and Engineering, PACE Institute of Technology & Sciences, Ongole, Andhra Pradesh, India
  • C Jayakumar  Department of Computer Science and Engineering, PACE Institute of Technology & Sciences, Ongole, Andhra Pradesh, India

Keywords:

Neural network, wireless sensor network, misbehavior, security.

Abstract

Wireless sensor networks are widely used for environment monitoring. The sensor nodes are deployed in the areas of interest to obtain the physical world data. These nodes are resource constrained in power, memory and computation. Boarder security is one of the major applications of WSNs. The sensor nodes are mounted with the environmental sensors (temperature, pressure etc.,) to monitor the environment and forward the sensed data to the base station via mobile sinks. Adversary can easily capture nodes from the network because they are not tamper proof in nature. Once the attacker succeed in capturing a legitimate sensor node, can introduce a variety of attacks. Vampire attack a potential attack in WSNs, which is a resource draining attack. The compromised nodes will misbehave with the legitimate nodes in the network and tries to drain the resources continuously resulting in network collapse. In this paper a neural network based misbehavior node detection algorithm is proposed. The simulation result shows that the proposed model effectively detects the misbehavior nodes and conserves the network resources.

References

  1. I. F. Akyildiz, Y. Sankarasubramaniam, and E. Cayirci, "A survey on sensor networks," IEEE Commun. Mag., vol. 40, no. 8, pp. 102–114, Aug. 2002.
  2. D. R. Raymond, S. F. Midkiff, A. Wood, and J. Stankovic, "Denial-of-Service in Wireless Sensor Networks: Attacks and Defenses," pp. 74–81, 2008.
  3. E. Soltanmohammadi, M. Orooji, and M. Naraghi-Pour, "Decentralized hypothesis testing in wireless sensor networks in the presence of misbehaving nodes," IEEE Trans. Inf. Forensics Secur., vol. 8, no. 1, pp. 205–215, 2013.
  4. E. Y. Vasserman and N. Hopper, "Vampire attacks: Draining life from wireless ad Hoc sensor networks," IEEE Trans. Mob. Comput., vol. 12, no. 2, pp. 318–332, 2013.
  5. F. Stajano and R. Anderson, "The Resurrecting Duckling: Security Issues for Ad-Hoc Wireless Networks," in Proc. Seventh Int’l Workshop Security Protocols, 1999.
  6. C. Wang, T. Feng, J. Kim, G. Wang, and W. Zhang, "Catching packet droppers and modifiers in wireless sensor networks," IEEE Trans. Parallel Distrib. Syst., vol. 23, no. 5, pp. 835–843, 2012.

Downloads

Published

2017-12-31

Issue

Section

Research Articles

How to Cite

[1]
Rama Chaithanya Tanguturi, C Jayakumar, " VND-NN: Neural Network Based Vampire Node Detection in Wireless Sensor Networks, International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 2, Issue 2, pp.454-456, March-April-2016.