Intruder Attacks on Wireless Sensor Networks: A Soft Decision and Prevention Mechanism
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2019, Vol 10, Issue 5
Abstract
Because of the wide-ranging of applications in a variety of fields, such as medicine, environmental studies, robotics, warfare and security, and so forth, the research on wireless sensor networks (WSNs) has attracted much attention recently. WSNs offer economical, flexible, scalable and pragmatic solutions in many situations. Sensor nodes are tiny and have a limited, non-rechargeable battery source, small memory/computational abilities and low transmitter power. Energy resources are vital as once the battery is depleted, the node is no longer usable. Multiple medium access control (MAC) protocols are designed to increase the life cycle of a node by minimizing its unnecessary energy consumption. In some critical applications like the surveillance of enemy movements on a battlefield, opponents deploy adversary nodes to disturb the performance of WSNs by mainly depleting the battery sources of legitimate nodes. In this work, an intrusion detection mechanism has been adapted to detect different kinds of intruders’ attacks in MAC protocols of WSN’s. A soft decision mechanism has been implemented to detect collision and exhaus-tion attacks. A preventative mechanism has also been introduced, which helps a node to avoid these intrusive attacks. Results show how the lifetime of a node increases and network performance also increases with better throughput and reduced delay.
Authors and Affiliations
Iftikhar Hussain, Samman Zahra, Abrar Hussain, Hayat Dino Bedru, Shahzad Haider, Diana Gumzhacheva
Designing an IMS-LD Model for Collaborative Learning
The context of this work is that of designing an IMS-LD model for collaborative learning. Our work is specifically in the field or seeking to promote, by means of information technology from a distance, a collective know...
Automatic Short Answer Scoring based on Paragraph Embeddings
Automatic scoring systems for students’ short answers can eliminate from instructors the burden of grading large number of test questions and facilitate performing even more assessments during lectures especially when nu...
IRS for Computer Character Sequences Filtration: a new software tool and algorithm to support the IRS at tokenization process
Tokenization is the task of chopping it up into pieces, called tokens, perhaps at the same time throwing away certain characters, such as punctuation. A token is an instance of token a sequence of characters in some part...
A Comparison Study between Data Mining Tools over some Classification Methods
Nowadays, huge amount of data and information are available for everyone, Data can now be stored in many different kinds of databases and information repositories, besides being available on the Internet or in printed f...
Energy Management Strategy of a PV/Fuel Cell/Supercapacitor Hybrid Source Feeding an off-Grid Pumping Station
This work aims to develop an accurate energy management strategy for a hybrid renewable energy system feeding a pumping station. A developed model under Simulink environment is used to compare the performance of the pump...