Most Read Research Articles


Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79
Call for Paper - May 2015 Edition
IJCA solicits original research papers for the May 2015 Edition. Last date of manuscript submission is April 20, 2015. Read More

A Protective Mechanism to Avoid Warm Hole and Sink-Hole Attack in Wireless Ad hoc Network: Survey

Print
PDF
International Journal of Computer Applications
© 2014 by IJCA Journal
Volume 107 - Number 20
Year of Publication: 2014
Authors:
Rajani B. Patil
Dhanashree Kulkarni
10.5120/18871-0506

Rajani B Patil and Dhanashree Kulkarni. Article: A Protective Mechanism to Avoid Warm Hole and Sink-Hole Attack in Wireless Ad hoc Network: Survey. International Journal of Computer Applications 107(20):31-33, December 2014. Full text available. BibTeX

@article{key:article,
	author = {Rajani B. Patil and Dhanashree Kulkarni},
	title = {Article: A Protective Mechanism to Avoid Warm Hole and Sink-Hole Attack in Wireless Ad hoc Network: Survey},
	journal = {International Journal of Computer Applications},
	year = {2014},
	volume = {107},
	number = {20},
	pages = {31-33},
	month = {December},
	note = {Full text available}
}

Abstract

Wireless adhoc network is autonomous and infrastructure less network. Wireless ad hoc network is particularly vulnerable due to its primary characteristics, like open medium, dynamic topology, distributed cooperation, and capability constraint. Routing plays an important role in the security of the entire network. Secure transmission of information in wireless adhoc environment is an important concern. Any attacker receive wireless signal by using transceiver and without being detected. Objective of this paper is to propose new approach for WSN security, i. e. Secure Energy Efficient ad hoc Routing (SEEAR) that consider cost of providing security and effects on energy efficiency. Shared cryptography[3] used for providing security. In this method information is divided into multiple shares and sent over multiple disjoint paths from transmitter to receiver at different point of time. At the receiver end the original information reconstructed by combining the shares received through different paths at different point of time. In this paper, cost for security in terms of time and its effect on energy efficiency is calculated. Also simulating the different types of attacks like wormhole, sink hole attack etc

References

  • Shao-Shan Chiang, , Chih-Hung Huang, and Kuang-Chiung Chang, "A Minimum Hop Routing Protocol for Home Security Systems Using Wireless Sensor Networks," IEEE Transactions on Consumer Electronics, Vol. 53, No. 4, NOVEMBER 2007.
  • Xufei Mao Shaojie Tang, Xiaohua Xu Xiang-Yang Li, and Huadong Ma, "Energy-Efficient Op-portunistic Routing in Wireless Sensor Networks," IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 22, NO. 11, NOVEMBER 2011.
  • A Novel Security Scheme for Wireless Adhoc Network, Abhijit Das Soumya Sankar Basu Atal Chaudhuri, 978-1-4577-0787-2/11 IEEE 2011.
  • Huei-Wen Ferng,Rachmarini, D. ,"A secure routing protocol for wireless sensor networks with consideration of energy efficiency/Network Operations and Management Symposium (NOMS)," 2012 IEEE .
  • Anfeng Liu, Zhongming Zheng , Chao Zhang, Zhigang Chen, and Xuemin (Sherman) Shen,"Secure and Energy-Efficient Disjoint Multipath Routing for WSNs," IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 61, NO. 7, SEPTEMBER 2012.
  • Rong Fan, Jian Chen, Jian-Qing Fu, Ling-Di Ping,,"A Steiner-Based Secure Multicast Routing Protocol for Wireless Sensor Network/Parallel and Distributed Systems," IEEE Transactions on (Volume:PP , Issue: 99 ), April 2013.
  • Anhtuan Le, Jonathan Loo, Aboubaker Lasebae, Alexey Vinel, Yue Chen, and Michael ChaiThe, Impact of Rank Attack on Network Topology of Routing Protocol for Low-Power and Lossy Networks. IEEE SENSORS JOURNAL, VOL. 13, NO. 10, OCTOBER 2013.
  • Salwa Aqeel Mahdi, Mohamed Othman, Hamidah Ibrahim, Jalil Md. Desa and Jumat Sulaiman, "PROTOCOLS FOR SECURE ROUTING AND TRANSMISSION IN MOBILE AD HOC NETWORK: A REVIEW," Journal of Computer Science 9 (5): 607-619, 2013, ISSN 1549-3636.