IJSRSET calls volunteers interested to contribute towards the scientific development in the field of Science, Engineering and Technology

Home > IJSRSET1622132                                                     


VND-NN: Neural Network Based Vampire Node Detection in Wireless Sensor Networks

Authors(2):

Rama Chaithanya Tanguturi, C Jayakumar
  • Abstract
  • Authors
  • Keywords
  • References
  • Details
Wireless sensor networks are widely used for environment monitoring. The sensor nodes are deployed in the areas of interest to obtain the physical world data. These nodes are resource constrained in power, memory and computation. Boarder security is one of the major applications of WSNs. The sensor nodes are mounted with the environmental sensors (temperature, pressure etc.,) to monitor the environment and forward the sensed data to the base station via mobile sinks. Adversary can easily capture nodes from the network because they are not tamper proof in nature. Once the attacker succeed in capturing a legitimate sensor node, can introduce a variety of attacks. Vampire attack a potential attack in WSNs, which is a resource draining attack. The compromised nodes will misbehave with the legitimate nodes in the network and tries to drain the resources continuously resulting in network collapse. In this paper a neural network based misbehavior node detection algorithm is proposed. The simulation result shows that the proposed model effectively detects the misbehavior nodes and conserves the network resources.

Rama Chaithanya Tanguturi, C Jayakumar

Neural network, wireless sensor network, misbehavior, security.

  1. I. F. Akyildiz, Y. Sankarasubramaniam, and E. Cayirci, "A survey on sensor networks," IEEE Commun. Mag., vol. 40, no. 8, pp. 102–114, Aug. 2002.
  2. D. R. Raymond, S. F. Midkiff, A. Wood, and J. Stankovic, "Denial-of-Service in Wireless Sensor Networks: Attacks and Defenses," pp. 74–81, 2008.
  3. E. Soltanmohammadi, M. Orooji, and M. Naraghi-Pour, "Decentralized hypothesis testing in wireless sensor networks in the presence of misbehaving nodes," IEEE Trans. Inf. Forensics Secur., vol. 8, no. 1, pp. 205–215, 2013.
  4. E. Y. Vasserman and N. Hopper, "Vampire attacks: Draining life from wireless ad Hoc sensor networks," IEEE Trans. Mob. Comput., vol. 12, no. 2, pp. 318–332, 2013.
  5. F. Stajano and R. Anderson, "The Resurrecting Duckling: Security Issues for Ad-Hoc Wireless Networks," in Proc. Seventh Int’l Workshop Security Protocols, 1999.
  6. C. Wang, T. Feng, J. Kim, G. Wang, and W. Zhang, "Catching packet droppers and modifiers in wireless sensor networks," IEEE Trans. Parallel Distrib. Syst., vol. 23, no. 5, pp. 835–843, 2012.

Publication Details

Published in : Volume 2 | Issue 2 | March-April - 2016
Date of Publication Print ISSN Online ISSN
2016-04-30 2395-1990 2394-4099
Page(s) Manuscript Number   Publisher
454-456 IJSRSET1622132   Technoscience Academy

Cite This Article

Rama Chaithanya Tanguturi, C Jayakumar, "VND-NN: Neural Network Based Vampire Node Detection in Wireless Sensor Networks", International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 2, Issue 2, pp.454-456, March-April-2016.
URL : http://ijsrset.com/IJSRSET1622132.php

IJSRSET Xplore

Subscribe

Conferences

National Conference on Advances in Mechanical Engineering 2017(NCAME 2017)

National Conference on Emerging Trends in Civil Engineering 2017( NCETCE 2017)