Recent advancements in technology, tiny size, cost effectiveness have made sensors as a crucial part of real
world sensitive applications. These sensor nodes are scattered over an area to monitor the situations like fire,
flood and record the data and to forward meaningful data to the center head node for observation, resulting an
advance prompt to control the situation. In last decade, WSN have grown significantly in variety of areas and
applications, resulted the high, consistent security mechanism. Also, there is variety of attacks on WSN at their
different layers of architecture. Though sensor nodes are not capable enough in terms of power, processing etc.
but applications based on these sensors demand on-time collection of information or data and then to send same
on reliable, secure delivery medium. Small sensors with limited hardware, processing cannot afford traditional
security mechanisms to face or sustain the attacks. There is variety of attacks at different layers of WSN
architecture to affect sensor‟s roles like signaling, framing, transmission etc. Many Denial of Service (DoS)
attacks are identified at each layer of WSN which are purposeful, planned attacks to hamper the availability of
service, restricting the sensor node‟s utility for problem solution. In this paper we will focus on the WSN
architecture, characteristics, constraints and various types of DoS attacks primarily on physical and data link
layer and particularly at network layer in details with some suggestions against attacks.
Analysis of denial of service (dos) attacks in wireless sensor networkseSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Wireless Sensor Networks: An Overview on Security Issues and ChallengesIJAEMSJORNAL
Wireless Sensor Networks (WSNs) are formed by deploying as large number of sensor nodes in an area for the surveillance of generally remote locations. A typical sensor node is made up of different components to perform the task of sensing, processing and transmitting data. WSNs are used for many applications in diverse forms from indoor deployment to outdoor deployment. The basic requirement of every application is to use the secured network. Providing security to the sensor network is a very challenging issue along with saving its energy. Many security threats may affect the functioning of these networks. WSNs must be secured to keep an attacker from hindering the delivery of sensor information and from forging sensor information as these networks are build for remote surveillance and unauthorized changes in the sensed data may lead to wrong information to the decision makers. This paper gives brief description about various security issues and security threats in WSNs.
This document summarizes a research paper about denial of service (DoS) attacks on wireless sensor networks. It begins by outlining some key security goals for wireless sensor networks, including data confidentiality, integrity, availability, and authentication. It then discusses DoS attacks specifically, noting they aim to degrade efficient use of network resources. The document proposes that DoS attacks can occur at different layers of the OSI model. It provides examples of physical layer attacks like jamming and describes how frequency hopping can help counter jamming. In closing, it notes DoS attacks threaten the availability security goal for wireless sensor networks.
Analysis of security threats in wireless sensor networkijwmn
Wireless Sensor Network(WSN) is an emerging technology and explored field of researchers worldwide
in the past few years, so does the need for effective security mechanisms. The sensing technology
combined with processing power and wireless communication makes it lucrative for being exploited in
abundance in future. The inclusion of wireless communication technology also incurs various types of
security threats due to unattended installation of sensor nodes as sensor networks may interact with
sensitive data and /or operate in hostile unattended environments. These security concerns be addressed
from the beginning of the system design. The intent of this paper is to investigate the security related
issues in wireless sensor networks. In this paper we have explored general security threats in wireless
sensor network with extensive study.
This document summarizes the analysis of wireless sensor networks, including security issues, attacks, and challenges. It discusses the characteristics of wireless sensor networks and their architecture. It outlines various security goals for wireless sensor networks, including confidentiality, integrity, authentication, and availability. It then describes different types of attacks against wireless sensor networks at the physical, link, network, and transport layers. These include jamming, tampering, exhaustion, collision, and flooding attacks. Finally, it discusses key challenges for wireless sensor networks, such as limited resources, heterogeneous platforms, dynamic network topologies, and handling mixed traffic from different applications.
Analysis of wireless sensor networks security, attacks and challengeseSAT Publishing House
This document summarizes the analysis of wireless sensor networks, including security issues, attacks, and challenges. It discusses the characteristics of wireless sensor networks and their architecture. It outlines various security goals for wireless sensor networks, including confidentiality, integrity, authentication, and availability. It then describes different types of attacks against wireless sensor networks at the physical, link, network, and transport layers. These include jamming, tampering, exhaustion, collision, and flooding attacks. Finally, it discusses key challenges for wireless sensor networks, such as limited resources, heterogeneous platforms, dynamic network topologies, and handling mixed traffic from different applications.
A NOVEL TWO-STAGE ALGORITHM PROTECTING INTERNAL ATTACK FROM WSNSIJCNC
Wireless sensor networks (WSNs) consists of small nodes with constrain capabilities. It enables numerous
applications with distributed network infrastructure. With its nature and application scenario, security of
WSN had drawn a great attention. In malicious environments for a functional WSN, security mechanisms
are essential. Malicious or internal attacker has gained attention as the most challenging attacks to
WSNs. Many works have been done to secure WSN from internal attacks but most of them relay on either
training data set or predefined thresholds. It is a great challenge to find or gain knowledge about the
Malicious. In this paper, we develop the algorithm in two stages. Initially, Abnormal Behaviour
Identification Mechanism (ABIM) which uses cosine similarity. Finally, Dempster-Shafer theory (DST)is
used. Which combine multiple evidences to identify the malicious or internal attacks in a WSN. In this
method we do not need any predefined threshold or tanning data set of the nodes.
Analysis of denial of service (dos) attacks in wireless sensor networkseSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Wireless Sensor Networks: An Overview on Security Issues and ChallengesIJAEMSJORNAL
Wireless Sensor Networks (WSNs) are formed by deploying as large number of sensor nodes in an area for the surveillance of generally remote locations. A typical sensor node is made up of different components to perform the task of sensing, processing and transmitting data. WSNs are used for many applications in diverse forms from indoor deployment to outdoor deployment. The basic requirement of every application is to use the secured network. Providing security to the sensor network is a very challenging issue along with saving its energy. Many security threats may affect the functioning of these networks. WSNs must be secured to keep an attacker from hindering the delivery of sensor information and from forging sensor information as these networks are build for remote surveillance and unauthorized changes in the sensed data may lead to wrong information to the decision makers. This paper gives brief description about various security issues and security threats in WSNs.
This document summarizes a research paper about denial of service (DoS) attacks on wireless sensor networks. It begins by outlining some key security goals for wireless sensor networks, including data confidentiality, integrity, availability, and authentication. It then discusses DoS attacks specifically, noting they aim to degrade efficient use of network resources. The document proposes that DoS attacks can occur at different layers of the OSI model. It provides examples of physical layer attacks like jamming and describes how frequency hopping can help counter jamming. In closing, it notes DoS attacks threaten the availability security goal for wireless sensor networks.
Analysis of security threats in wireless sensor networkijwmn
Wireless Sensor Network(WSN) is an emerging technology and explored field of researchers worldwide
in the past few years, so does the need for effective security mechanisms. The sensing technology
combined with processing power and wireless communication makes it lucrative for being exploited in
abundance in future. The inclusion of wireless communication technology also incurs various types of
security threats due to unattended installation of sensor nodes as sensor networks may interact with
sensitive data and /or operate in hostile unattended environments. These security concerns be addressed
from the beginning of the system design. The intent of this paper is to investigate the security related
issues in wireless sensor networks. In this paper we have explored general security threats in wireless
sensor network with extensive study.
This document summarizes the analysis of wireless sensor networks, including security issues, attacks, and challenges. It discusses the characteristics of wireless sensor networks and their architecture. It outlines various security goals for wireless sensor networks, including confidentiality, integrity, authentication, and availability. It then describes different types of attacks against wireless sensor networks at the physical, link, network, and transport layers. These include jamming, tampering, exhaustion, collision, and flooding attacks. Finally, it discusses key challenges for wireless sensor networks, such as limited resources, heterogeneous platforms, dynamic network topologies, and handling mixed traffic from different applications.
Analysis of wireless sensor networks security, attacks and challengeseSAT Publishing House
This document summarizes the analysis of wireless sensor networks, including security issues, attacks, and challenges. It discusses the characteristics of wireless sensor networks and their architecture. It outlines various security goals for wireless sensor networks, including confidentiality, integrity, authentication, and availability. It then describes different types of attacks against wireless sensor networks at the physical, link, network, and transport layers. These include jamming, tampering, exhaustion, collision, and flooding attacks. Finally, it discusses key challenges for wireless sensor networks, such as limited resources, heterogeneous platforms, dynamic network topologies, and handling mixed traffic from different applications.
A NOVEL TWO-STAGE ALGORITHM PROTECTING INTERNAL ATTACK FROM WSNSIJCNC
Wireless sensor networks (WSNs) consists of small nodes with constrain capabilities. It enables numerous
applications with distributed network infrastructure. With its nature and application scenario, security of
WSN had drawn a great attention. In malicious environments for a functional WSN, security mechanisms
are essential. Malicious or internal attacker has gained attention as the most challenging attacks to
WSNs. Many works have been done to secure WSN from internal attacks but most of them relay on either
training data set or predefined thresholds. It is a great challenge to find or gain knowledge about the
Malicious. In this paper, we develop the algorithm in two stages. Initially, Abnormal Behaviour
Identification Mechanism (ABIM) which uses cosine similarity. Finally, Dempster-Shafer theory (DST)is
used. Which combine multiple evidences to identify the malicious or internal attacks in a WSN. In this
method we do not need any predefined threshold or tanning data set of the nodes.
The document discusses security challenges in wireless sensor networks (WSNs) and proposes an advanced end-to-end data security method. It notes that existing hop-by-hop security designs are insufficient as they are vulnerable to attacks from compromised nodes. The proposed location aware end-end data security (LEDS) approach aims to provide end-to-end security to address this issue. It discusses how compromised nodes can currently intercept data or inject false reports, threatening the confidentiality, authenticity and availability of data in WSNs. The document reviews related work on data security in WSNs and argues that an end-to-end rather than hop-by-hop approach is needed to better protect against insider attacks.
Secure and Efficient DiDrip Protocol for Improving Performance of WSNsINFOGAIN PUBLICATION
1. The document proposes a new distributed data discovery and dissemination protocol called DiDrip for wireless sensor networks (WSNs) that aims to improve security and performance over existing protocols.
2. Existing protocols primarily use a centralized approach where a single node distributes data, which is not suitable for multiple owners and users, and they do not focus on security.
3. DiDrip allows for a distributed approach where multiple owners can authorize different users simultaneously to access sensor data with different priorities, while improving security.
HIERARCHICAL DESIGN BASED INTRUSION DETECTION SYSTEM FOR WIRELESS AD HOC SENS...IJNSA Journal
In recent years, wireless ad hoc sensor network becomes popular both in civil and military jobs. However, security is one of the significant challenges for sensor network because of their deployment in open and unprotected environment. As cryptographic mechanism is not enough to protect sensor network from external attacks, intrusion detection system needs to be introduced. Though intrusion prevention mechanism is one of the major and efficient methods against attacks, but there might be some attacks for which prevention method is not known. Besides preventing the system from some known attacks, intrusion detection system gather necessary information related to attack technique and help in the development of intrusion prevention system. In addition to reviewing the present attacks available in wireless sensor network this paper examines the current efforts to intrusion detection
system against wireless sensor network. In this paper we propose a hierarchical architectural design based intrusion detection system that fits the current demands and restrictions of wireless ad hoc sensor network. In this proposed intrusion detection system architecture we followed clustering mechanism to build a four level hierarchical network which enhances network scalability to large geographical area and use both anomaly and misuse detection techniques for intrusion detection. We introduce policy based detection mechanism as well as intrusion response together with GSM cell concept for intrusion detection architecture.
The document outlines the key topics in wireless sensor network (WSN) security. It begins with an introduction to WSN specifications, constraints, security requirements and threats. It then discusses various denial of service attacks against WSN availability, as well as threats against data secrecy. Potential countermeasures are also reviewed, along with defenses against different privacy attacks. Finally, important WSN security protocols are mentioned. The overall document provides an overview of important WSN security concepts and challenges due to the unique constraints of sensor networks.
This document summarizes research on enhancing the DSR routing protocol to prevent distributed denial of service (DDoS) attacks in mobile ad hoc networks (MANETs). It discusses how DDoS attacks work, the challenges they present for MANETs due to their dynamic nature, and existing research on DDoS attack detection and prevention. The document reviews literature on analyzing DDoS attack behaviors and properties, characterizing attack traffic patterns, and using statistical analysis and neural networks to identify attacks. The goal of the research is to develop an enhanced DSR protocol that can detect and mitigate DDoS attacks in MANETs more effectively than previous approaches.
A comparative study of physical attacks on wireless sensor networkseSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
1) The document discusses security attacks in wireless sensor networks (WSNs). It provides an overview of the types of WSNs and their components.
2) It describes the main security challenges in WSNs like remote locations, lack of central control, and resource constraints.
3) The document outlines different security attacks in WSNs including denial of service attacks, traffic analysis, wormhole attacks, and jamming.
4) Defensive measures to secure WSNs like key establishment and intrusion detection are also discussed.
A HIERARCHICAL INTRUSION DETECTION ARCHITECTURE FOR WIRELESS SENSOR NETWORKSIJNSA Journal
Networks protection against different types of attacks is one of most important posed issue into the network and information security application domains. This problem on Wireless Sensor Networks (WSNs), in attention to their special properties, has more importance. Now, there are some of proposed architectures and guide lines to protect Wireless Sensor Networks (WSNs) against different types of intrusions; but any one of them do not has a comprehensive view to this problem and they are usually designed and implemented in single-purpose; but, the proposed design in this paper tries to has been a comprehensive view to this issue by presenting a complete and comprehensive Intrusion Detection Architecture (IDA). The main contribution of this architecture is its hierarchical structure; i.e., it is designed and applicable, in one or two levels, consistent to the application domain and its required security level. Focus of this paper is on the clustering WSNs, designing and deploying Cluster-based Intrusion Detection System (CIDS) on cluster-heads and Wireless Sensor Network wide level Intrusion Detection System (WSNIDS) on the central server. Suppositions of the WSN and Intrusion Detection Architecture (IDA) are: static and heterogeneous network, hierarchical and clustering structure, clusters' overlapping and using hierarchical routing protocol such as LEACH, but along with minor changes. Finally, the proposed idea has been verified by designing a questionnaire, representing it to some (about 50 people) experts and then, analyzing and evaluating its acquired results.
A SURVEY ON SECURITY IN WIRELESS SENSOR NETWORKSIJNSA Journal
The emergence of wireless sensor networks (WSNs) can be considered one of the most important
revolutions in the field of information and communications technology (ICT). Recently, there has been a
dramatic increase in the use of WSN applications such as surveillance systems, battleground applications,
object tracking, habitat monitoring, forest fire detection and patient monitoring. Due to limitations of
sensor nodes in terms of energy, storage and computational ability, many security issues have arisen in
such applications. As a result, many solutions and approaches have been proposed for different attacks and
vulnerabilities to achieve security requirements. This paper surveys different security approaches for
WSNs, examining various types of attacks and corresponding techniques for tackling these. The strengths
and weaknesses for each technique are also discussed at the conclusion of this paper.
A Simple Agent Based Model for Detecting Abnormal Event Patterns in a Distrib...CSCJournals
This document proposes an agent-based model for detecting abnormal event patterns in a distributed wireless sensor network. The model uses rule-based classification and naive Bayesian classification to identify abnormal sensor nodes. It is embedded between cluster heads and the base station in a two-tier hierarchical network architecture. In experiments, the model successfully detected various common attacks and calculated the percentage of abnormal events detected with low false positive rates.
Securing WSN communication using Enhanced Adaptive Acknowledgement ProtocolIJMTST Journal
This document summarizes an enhanced adaptive acknowledgement protocol for securing wireless sensor network communication. It begins by describing security challenges in WSNs like the wireless medium, hostile environments, and resource constraints. It then discusses common security attacks like black hole and grey hole attacks. Existing acknowledgement schemes like Watchdog, TWOACK, and AACK are explained along with their limitations in detecting such attacks. The document proposes an Enhanced Adaptive Acknowledgement (EAACK) scheme that uses ACK, Secure ACK, and Misbehavior Report Authentication to better detect attacks while reducing overhead. EAACK aims to securely detect black hole, grey hole, and false misbehavior reporting in wireless sensor networks.
Distributed Intrusion Detection System for Wireless Sensor NetworksIOSR Journals
This document discusses distributed intrusion detection systems for wireless sensor networks. It begins by providing background on wireless sensor networks and the security issues they face, such as denial of service attacks, routing attacks, and Sybil attacks. Traditional intrusion detection systems cannot be directly applied to wireless sensor networks due to their resource constraints. The document then examines the need for intrusion detection systems in wireless sensor networks to provide a second line of defense against attacks. It outlines features an intrusion detection system should have to be suitable for wireless sensor networks, such as being distributed, minimizing resource usage, and not trusting any single node. Finally, it categorizes different types of intrusion detection system architectures for wireless sensor networks, including stand-alone, distributed
International Journal of Engineering Research and Development (IJERD)IJERD Editor
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
A review of security attacks and intrusion detection schemes in wireless sens...ijwmn
Wireless sensor networks are currently the greatest innovation in the field of telecommunications. WSNs
have a wide range of potential applications, including security and surveillance, control, actuation and
maintenance of complex systems and fine-grain monitoring of indoor and outdoor environments. However
security is one of the major aspects of Wireless sensor networks due to the resource limitations of sensor
nodes. Those networks are facing several threats that affect their functioning and their life. In this paper we
present security attacks in wireless sensor networks, and we focus on comparison and analysis of recent
Intrusion Detection schemes in WSNs.
Overview on security and privacy issues in wireless sensor networks-2014Tarek Gaber
Lecture Outlines
Why Security is Important for WSN
WSNs have many applications e.g.:
military, homeland security
assessing disaster zones
Others.
This means that such sensor networks have mission-critical tasks.
Security is crucial for such WSNs deployed in these hostile environments.
Why Security is Important for WSN
Moreover, wireless communication employed by WSN facilitates
eavesdropping and
packet injection by an adversary.
These mentioned factors require security for WSN during the design stage to ensure operation safety, secrecy of sensitive data, and privacy for people in sensor environments.
Algorithms to achieve security services
Symmetric Encryption
Asymmetric Encryption
Hash Function/Algorithm
Digital Signature
Why Security is Complex in WSN
Because of WSNs Characteristics:
Anti-jamming and physical temper proofing are impossible
greater design complexity and energy consumption
Denial-of-service (DoS) attack is difficult
Sensor node constraints
Sensor nodes are susceptible to physical capture
Deploying in hostile environment.
eavesdropping and injecting malicious message are easy
Using wireless communication
Why Security is Complex in WSN
Because of WSNs Characteristics:
maximization of security level is challenging
Resource consumption
asymmetric cryptography is often too expensive
Node constraints
centralized security solutions are big issue
no central control and constraints, e.g. small memory capacity.
Cost Issues
Overall cost of WSN should be as low as possible.
Typical Attacks to WSN
Physical Attacks
Environmental
Permanently destroy the node, e.g., crashing or stealing a node.
Attacks at the Physical Layer
Jamming: transmission of a radio signal to interfere with WSN radio frequencies.
Constant jamming: No message are able to be sent or received.
Intermittent jamming: Nodes are able to exchange messages periodically
Jamming Attack Countermeasure
Physical Attacks
Node Capture Attacks
routing functionalities
Countermeasure
tamper-proof features
Expensive solution
Self-Protection
disable device when attack detected
Attacks on Routing
Sinkhole attack
attacker tries to attract the traffic from a particular region through it
Solution:
Watchdog Nodes can start to trace the source of false routing information
Attacks on Routing
Sybil attack (Identity Spoofing)
attacker claims to have multiple identities or locations
provide wrong information for routing to launch false routing attacks
Solutions:
Misbehavior Detection.
Identity Protection
Privacy Attacks
Attempts to obtain sensitive information collected and communicated in WSNs
Eavesdropping
made easy by broadcast nature of wireless networks
Traffic analysis
used to identify sensor nodes of interest (data of interest),
WSN Privacy Issues Cont.
WSN Privacy Issues Attack
Trust and reputation in WSN
WSN Traditional Security Techniques
Cryptographic primitive
This document proposes a hybrid intrusion detection system (HIDS) for wireless sensor networks. The HIDS combines cluster-based and rule-based intrusion detection techniques. It is designed to address the limited resources of sensor networks while achieving high detection rates and low false positives. The system works by using cluster heads to detect intrusions based on both anomaly detection and comparing activities to known attack behaviors. A simulation evaluated the HIDS and found it performed intrusion detection efficiently while being energy efficient and having a high detection rate.
A Study on Mechanical Properties of Vinylester Based BioComposite Material wi...IJERA Editor
In composites a conglomeration produces material properties which are unavailable from individual constituent
materials. The use of petroleum based products as constituents in polymer matrix composite has raised concerns
regarding environmental issue and non-renewability of the resource. Therefore in this work an attempt has been
made to develop a biocomposite material using untreated dupion silk fiber as reinforcement material and vinyl
ester as matrix material with Potato Starch used as filler material by hand layup technique.
The biocomposites were prepared in varying percentage of filler addition (0%, 10%, 20%, and 30%) and
different mechanical tests (tensile, flexure and hardness) were conducted on the samples prepared to the ASTM
standards.
From the results of the experiments conducted on the specimen it can be concluded that the performance of 10%
Starch filler content Biocomposite is satisfactory in all aspects compared to 0%, 20%, and 30% Starch filler
content Biocomposites.
A Mathematical Model to Solve Nonlinear Initial and Boundary Value Problems b...IJERA Editor
In this paper, a novel method called Laplace-differential transform method (LDTM) is used to obtain an
approximate analytical solution for strong nonlinear initial and boundary value problems associated in
engineering phenomena. It is determined that the method works very well for the wide range of parameters and
an excellent agreement is demonstrated and discussed between the approximate solution and the exact one in
three examples. The most significant features of this method are its capability of handling non-linear boundary
value problems.
Hack Recognition In Wireless Sensor NetworkIJERA Editor
A wireless sensor network can get separated into multiple connected components due to the failure of some of its nodes, which is called a ―cut‖. In this article we consider the problem of detecting cuts by the remaining nodes of a wireless sensor network. We propose an algorithm that allows like every node to detect when the connectivity to a specially designated node has been lost, and one or more nodes (that are connected to the special node after the cut) to detect the occurrence of the cut. The algorithm is distributed and asynchronous: every node needs to communicate with only those nodes that are within its communication range. The algorithm is based on the iterative computation of a fictitious ―electrical potential‖ of the nodes. The convergence rate of the underlying iterative scheme is independent of the size and structure of the network.
The microscopic effect of the exchange interaction parameter for the 2-Dimensional ising model with nearest neighbor interaction has been studied. By supposing simple temperature dependent relationship for the exchange parameter, graphs were straightforwardly obtained that show the reentrant closed looped phase diagrams symptomatic of some colloids and complex fluids and some binary liquids mixtures in particular. By parameter modifications, other phase diagrams were also obtained. Amongst which are the u-shapes and other exotic shapes of phase diagrams. Our results show that the exchange interaction parameter greatly influence the size of the ordered phase. Hence the larger the value of the constant, the larger the size of the ordered phase. This means that the higher values of the exchange parameter brings about phase transitions that straddle a wider range of polarizations and temperatures.
Structure Analysis of a Turbocharger Compressor Wheel Using FEAIJERA Editor
When people talk about race cars or high-performance sports cars, the topic of turbochargers usually comes up. Turbochargers also appear on large diesel engines. A turbo can significantly boost an engine's horsepower without significantly increasing its weight, which is the huge benefit that makes turbos so popular. Turbochargers are a type of forced induction system. They compress the air flowing into the engine. The advantage of compressing the air is that it lets the engine squeeze more air into a cylinder, and more air means that more fuel can be added. Therefore, you get more power from each explosion in each cylinder. Here in this project we are designing the compressor wheel by using Pro-E and doing analysis by using FEA package. The main aim of the project is to increase the performance of the compressor wheel for this we are changing the material and also we are changing the existing design. By comparing the results we will get the best model from this data we suggests the design modifications to the company to improve the performance of the compressor wheel.
10-Gb/S Transmission of Wdm Pon for Man with 50km Reach Based On FtthIJERA Editor
The wavelength-division-multiplexed passive optical network (WDM-PON) is considered to be the next evolutionary solution for a simplified and future-proofed access system that can accommodate exponential traffic growth and bandwidth-hungry new applications. WDM-PON mitigates the complicated time-sharing and power budget issues in time division- multiplexed PON (TDM-PON) by providing virtual point-to-point optical connectivity to multiple end users through a dedicated pair of wavelengths. The objective of this paper is proposed a scheme for metropolitan area networks comprising optical components based on arrayed waveguide grating multiplexers, demultiplexers .The Arrayed waveguide gratings based multiplexers and demultiplexers for WDM applications prove to be capable of precise multiplexing and demultiplexing of a large number of channels with relatively low losses.
The document discusses security challenges in wireless sensor networks (WSNs) and proposes an advanced end-to-end data security method. It notes that existing hop-by-hop security designs are insufficient as they are vulnerable to attacks from compromised nodes. The proposed location aware end-end data security (LEDS) approach aims to provide end-to-end security to address this issue. It discusses how compromised nodes can currently intercept data or inject false reports, threatening the confidentiality, authenticity and availability of data in WSNs. The document reviews related work on data security in WSNs and argues that an end-to-end rather than hop-by-hop approach is needed to better protect against insider attacks.
Secure and Efficient DiDrip Protocol for Improving Performance of WSNsINFOGAIN PUBLICATION
1. The document proposes a new distributed data discovery and dissemination protocol called DiDrip for wireless sensor networks (WSNs) that aims to improve security and performance over existing protocols.
2. Existing protocols primarily use a centralized approach where a single node distributes data, which is not suitable for multiple owners and users, and they do not focus on security.
3. DiDrip allows for a distributed approach where multiple owners can authorize different users simultaneously to access sensor data with different priorities, while improving security.
HIERARCHICAL DESIGN BASED INTRUSION DETECTION SYSTEM FOR WIRELESS AD HOC SENS...IJNSA Journal
In recent years, wireless ad hoc sensor network becomes popular both in civil and military jobs. However, security is one of the significant challenges for sensor network because of their deployment in open and unprotected environment. As cryptographic mechanism is not enough to protect sensor network from external attacks, intrusion detection system needs to be introduced. Though intrusion prevention mechanism is one of the major and efficient methods against attacks, but there might be some attacks for which prevention method is not known. Besides preventing the system from some known attacks, intrusion detection system gather necessary information related to attack technique and help in the development of intrusion prevention system. In addition to reviewing the present attacks available in wireless sensor network this paper examines the current efforts to intrusion detection
system against wireless sensor network. In this paper we propose a hierarchical architectural design based intrusion detection system that fits the current demands and restrictions of wireless ad hoc sensor network. In this proposed intrusion detection system architecture we followed clustering mechanism to build a four level hierarchical network which enhances network scalability to large geographical area and use both anomaly and misuse detection techniques for intrusion detection. We introduce policy based detection mechanism as well as intrusion response together with GSM cell concept for intrusion detection architecture.
The document outlines the key topics in wireless sensor network (WSN) security. It begins with an introduction to WSN specifications, constraints, security requirements and threats. It then discusses various denial of service attacks against WSN availability, as well as threats against data secrecy. Potential countermeasures are also reviewed, along with defenses against different privacy attacks. Finally, important WSN security protocols are mentioned. The overall document provides an overview of important WSN security concepts and challenges due to the unique constraints of sensor networks.
This document summarizes research on enhancing the DSR routing protocol to prevent distributed denial of service (DDoS) attacks in mobile ad hoc networks (MANETs). It discusses how DDoS attacks work, the challenges they present for MANETs due to their dynamic nature, and existing research on DDoS attack detection and prevention. The document reviews literature on analyzing DDoS attack behaviors and properties, characterizing attack traffic patterns, and using statistical analysis and neural networks to identify attacks. The goal of the research is to develop an enhanced DSR protocol that can detect and mitigate DDoS attacks in MANETs more effectively than previous approaches.
A comparative study of physical attacks on wireless sensor networkseSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
1) The document discusses security attacks in wireless sensor networks (WSNs). It provides an overview of the types of WSNs and their components.
2) It describes the main security challenges in WSNs like remote locations, lack of central control, and resource constraints.
3) The document outlines different security attacks in WSNs including denial of service attacks, traffic analysis, wormhole attacks, and jamming.
4) Defensive measures to secure WSNs like key establishment and intrusion detection are also discussed.
A HIERARCHICAL INTRUSION DETECTION ARCHITECTURE FOR WIRELESS SENSOR NETWORKSIJNSA Journal
Networks protection against different types of attacks is one of most important posed issue into the network and information security application domains. This problem on Wireless Sensor Networks (WSNs), in attention to their special properties, has more importance. Now, there are some of proposed architectures and guide lines to protect Wireless Sensor Networks (WSNs) against different types of intrusions; but any one of them do not has a comprehensive view to this problem and they are usually designed and implemented in single-purpose; but, the proposed design in this paper tries to has been a comprehensive view to this issue by presenting a complete and comprehensive Intrusion Detection Architecture (IDA). The main contribution of this architecture is its hierarchical structure; i.e., it is designed and applicable, in one or two levels, consistent to the application domain and its required security level. Focus of this paper is on the clustering WSNs, designing and deploying Cluster-based Intrusion Detection System (CIDS) on cluster-heads and Wireless Sensor Network wide level Intrusion Detection System (WSNIDS) on the central server. Suppositions of the WSN and Intrusion Detection Architecture (IDA) are: static and heterogeneous network, hierarchical and clustering structure, clusters' overlapping and using hierarchical routing protocol such as LEACH, but along with minor changes. Finally, the proposed idea has been verified by designing a questionnaire, representing it to some (about 50 people) experts and then, analyzing and evaluating its acquired results.
A SURVEY ON SECURITY IN WIRELESS SENSOR NETWORKSIJNSA Journal
The emergence of wireless sensor networks (WSNs) can be considered one of the most important
revolutions in the field of information and communications technology (ICT). Recently, there has been a
dramatic increase in the use of WSN applications such as surveillance systems, battleground applications,
object tracking, habitat monitoring, forest fire detection and patient monitoring. Due to limitations of
sensor nodes in terms of energy, storage and computational ability, many security issues have arisen in
such applications. As a result, many solutions and approaches have been proposed for different attacks and
vulnerabilities to achieve security requirements. This paper surveys different security approaches for
WSNs, examining various types of attacks and corresponding techniques for tackling these. The strengths
and weaknesses for each technique are also discussed at the conclusion of this paper.
A Simple Agent Based Model for Detecting Abnormal Event Patterns in a Distrib...CSCJournals
This document proposes an agent-based model for detecting abnormal event patterns in a distributed wireless sensor network. The model uses rule-based classification and naive Bayesian classification to identify abnormal sensor nodes. It is embedded between cluster heads and the base station in a two-tier hierarchical network architecture. In experiments, the model successfully detected various common attacks and calculated the percentage of abnormal events detected with low false positive rates.
Securing WSN communication using Enhanced Adaptive Acknowledgement ProtocolIJMTST Journal
This document summarizes an enhanced adaptive acknowledgement protocol for securing wireless sensor network communication. It begins by describing security challenges in WSNs like the wireless medium, hostile environments, and resource constraints. It then discusses common security attacks like black hole and grey hole attacks. Existing acknowledgement schemes like Watchdog, TWOACK, and AACK are explained along with their limitations in detecting such attacks. The document proposes an Enhanced Adaptive Acknowledgement (EAACK) scheme that uses ACK, Secure ACK, and Misbehavior Report Authentication to better detect attacks while reducing overhead. EAACK aims to securely detect black hole, grey hole, and false misbehavior reporting in wireless sensor networks.
Distributed Intrusion Detection System for Wireless Sensor NetworksIOSR Journals
This document discusses distributed intrusion detection systems for wireless sensor networks. It begins by providing background on wireless sensor networks and the security issues they face, such as denial of service attacks, routing attacks, and Sybil attacks. Traditional intrusion detection systems cannot be directly applied to wireless sensor networks due to their resource constraints. The document then examines the need for intrusion detection systems in wireless sensor networks to provide a second line of defense against attacks. It outlines features an intrusion detection system should have to be suitable for wireless sensor networks, such as being distributed, minimizing resource usage, and not trusting any single node. Finally, it categorizes different types of intrusion detection system architectures for wireless sensor networks, including stand-alone, distributed
International Journal of Engineering Research and Development (IJERD)IJERD Editor
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
A review of security attacks and intrusion detection schemes in wireless sens...ijwmn
Wireless sensor networks are currently the greatest innovation in the field of telecommunications. WSNs
have a wide range of potential applications, including security and surveillance, control, actuation and
maintenance of complex systems and fine-grain monitoring of indoor and outdoor environments. However
security is one of the major aspects of Wireless sensor networks due to the resource limitations of sensor
nodes. Those networks are facing several threats that affect their functioning and their life. In this paper we
present security attacks in wireless sensor networks, and we focus on comparison and analysis of recent
Intrusion Detection schemes in WSNs.
Overview on security and privacy issues in wireless sensor networks-2014Tarek Gaber
Lecture Outlines
Why Security is Important for WSN
WSNs have many applications e.g.:
military, homeland security
assessing disaster zones
Others.
This means that such sensor networks have mission-critical tasks.
Security is crucial for such WSNs deployed in these hostile environments.
Why Security is Important for WSN
Moreover, wireless communication employed by WSN facilitates
eavesdropping and
packet injection by an adversary.
These mentioned factors require security for WSN during the design stage to ensure operation safety, secrecy of sensitive data, and privacy for people in sensor environments.
Algorithms to achieve security services
Symmetric Encryption
Asymmetric Encryption
Hash Function/Algorithm
Digital Signature
Why Security is Complex in WSN
Because of WSNs Characteristics:
Anti-jamming and physical temper proofing are impossible
greater design complexity and energy consumption
Denial-of-service (DoS) attack is difficult
Sensor node constraints
Sensor nodes are susceptible to physical capture
Deploying in hostile environment.
eavesdropping and injecting malicious message are easy
Using wireless communication
Why Security is Complex in WSN
Because of WSNs Characteristics:
maximization of security level is challenging
Resource consumption
asymmetric cryptography is often too expensive
Node constraints
centralized security solutions are big issue
no central control and constraints, e.g. small memory capacity.
Cost Issues
Overall cost of WSN should be as low as possible.
Typical Attacks to WSN
Physical Attacks
Environmental
Permanently destroy the node, e.g., crashing or stealing a node.
Attacks at the Physical Layer
Jamming: transmission of a radio signal to interfere with WSN radio frequencies.
Constant jamming: No message are able to be sent or received.
Intermittent jamming: Nodes are able to exchange messages periodically
Jamming Attack Countermeasure
Physical Attacks
Node Capture Attacks
routing functionalities
Countermeasure
tamper-proof features
Expensive solution
Self-Protection
disable device when attack detected
Attacks on Routing
Sinkhole attack
attacker tries to attract the traffic from a particular region through it
Solution:
Watchdog Nodes can start to trace the source of false routing information
Attacks on Routing
Sybil attack (Identity Spoofing)
attacker claims to have multiple identities or locations
provide wrong information for routing to launch false routing attacks
Solutions:
Misbehavior Detection.
Identity Protection
Privacy Attacks
Attempts to obtain sensitive information collected and communicated in WSNs
Eavesdropping
made easy by broadcast nature of wireless networks
Traffic analysis
used to identify sensor nodes of interest (data of interest),
WSN Privacy Issues Cont.
WSN Privacy Issues Attack
Trust and reputation in WSN
WSN Traditional Security Techniques
Cryptographic primitive
This document proposes a hybrid intrusion detection system (HIDS) for wireless sensor networks. The HIDS combines cluster-based and rule-based intrusion detection techniques. It is designed to address the limited resources of sensor networks while achieving high detection rates and low false positives. The system works by using cluster heads to detect intrusions based on both anomaly detection and comparing activities to known attack behaviors. A simulation evaluated the HIDS and found it performed intrusion detection efficiently while being energy efficient and having a high detection rate.
A Study on Mechanical Properties of Vinylester Based BioComposite Material wi...IJERA Editor
In composites a conglomeration produces material properties which are unavailable from individual constituent
materials. The use of petroleum based products as constituents in polymer matrix composite has raised concerns
regarding environmental issue and non-renewability of the resource. Therefore in this work an attempt has been
made to develop a biocomposite material using untreated dupion silk fiber as reinforcement material and vinyl
ester as matrix material with Potato Starch used as filler material by hand layup technique.
The biocomposites were prepared in varying percentage of filler addition (0%, 10%, 20%, and 30%) and
different mechanical tests (tensile, flexure and hardness) were conducted on the samples prepared to the ASTM
standards.
From the results of the experiments conducted on the specimen it can be concluded that the performance of 10%
Starch filler content Biocomposite is satisfactory in all aspects compared to 0%, 20%, and 30% Starch filler
content Biocomposites.
A Mathematical Model to Solve Nonlinear Initial and Boundary Value Problems b...IJERA Editor
In this paper, a novel method called Laplace-differential transform method (LDTM) is used to obtain an
approximate analytical solution for strong nonlinear initial and boundary value problems associated in
engineering phenomena. It is determined that the method works very well for the wide range of parameters and
an excellent agreement is demonstrated and discussed between the approximate solution and the exact one in
three examples. The most significant features of this method are its capability of handling non-linear boundary
value problems.
Hack Recognition In Wireless Sensor NetworkIJERA Editor
A wireless sensor network can get separated into multiple connected components due to the failure of some of its nodes, which is called a ―cut‖. In this article we consider the problem of detecting cuts by the remaining nodes of a wireless sensor network. We propose an algorithm that allows like every node to detect when the connectivity to a specially designated node has been lost, and one or more nodes (that are connected to the special node after the cut) to detect the occurrence of the cut. The algorithm is distributed and asynchronous: every node needs to communicate with only those nodes that are within its communication range. The algorithm is based on the iterative computation of a fictitious ―electrical potential‖ of the nodes. The convergence rate of the underlying iterative scheme is independent of the size and structure of the network.
The microscopic effect of the exchange interaction parameter for the 2-Dimensional ising model with nearest neighbor interaction has been studied. By supposing simple temperature dependent relationship for the exchange parameter, graphs were straightforwardly obtained that show the reentrant closed looped phase diagrams symptomatic of some colloids and complex fluids and some binary liquids mixtures in particular. By parameter modifications, other phase diagrams were also obtained. Amongst which are the u-shapes and other exotic shapes of phase diagrams. Our results show that the exchange interaction parameter greatly influence the size of the ordered phase. Hence the larger the value of the constant, the larger the size of the ordered phase. This means that the higher values of the exchange parameter brings about phase transitions that straddle a wider range of polarizations and temperatures.
Structure Analysis of a Turbocharger Compressor Wheel Using FEAIJERA Editor
When people talk about race cars or high-performance sports cars, the topic of turbochargers usually comes up. Turbochargers also appear on large diesel engines. A turbo can significantly boost an engine's horsepower without significantly increasing its weight, which is the huge benefit that makes turbos so popular. Turbochargers are a type of forced induction system. They compress the air flowing into the engine. The advantage of compressing the air is that it lets the engine squeeze more air into a cylinder, and more air means that more fuel can be added. Therefore, you get more power from each explosion in each cylinder. Here in this project we are designing the compressor wheel by using Pro-E and doing analysis by using FEA package. The main aim of the project is to increase the performance of the compressor wheel for this we are changing the material and also we are changing the existing design. By comparing the results we will get the best model from this data we suggests the design modifications to the company to improve the performance of the compressor wheel.
10-Gb/S Transmission of Wdm Pon for Man with 50km Reach Based On FtthIJERA Editor
The wavelength-division-multiplexed passive optical network (WDM-PON) is considered to be the next evolutionary solution for a simplified and future-proofed access system that can accommodate exponential traffic growth and bandwidth-hungry new applications. WDM-PON mitigates the complicated time-sharing and power budget issues in time division- multiplexed PON (TDM-PON) by providing virtual point-to-point optical connectivity to multiple end users through a dedicated pair of wavelengths. The objective of this paper is proposed a scheme for metropolitan area networks comprising optical components based on arrayed waveguide grating multiplexers, demultiplexers .The Arrayed waveguide gratings based multiplexers and demultiplexers for WDM applications prove to be capable of precise multiplexing and demultiplexing of a large number of channels with relatively low losses.
Optimum Crop Productivity in Rain Fed Area of Thana Boula Khan, Sindh, by App...IJERA Editor
This document summarizes a study on using wind energy to power irrigation pumps and increase crop productivity in the rain-fed area of Thana Boula Khan, Sindh, Pakistan. The study introduced locally manufactured windmill units to pump groundwater for irrigation. Analysis found that wind speeds of 2.5 m/s or higher, sufficient for pumping, occurred 92% of the time. One installed windmill pumped an average of 9.38 liters/minute, extracting a total of 95.5 cubic meters of water in the Kharif season to irrigate 0.096 hectares. However, more efficient irrigation methods like drip or sprinkler could further increase agricultural productivity when used with windmill irrigation.
Re-Engineering Learning Objects for Re-PurposingIJERA Editor
Existing Learning Object (LO) definitions and their interpretations seem to project a view of LO with somewhat less flexible in the scope of LO reusability.In solving this problem the researchers try to interpret those definitions with an added property i.e. „LO repurposing‟. LO repurposing refers to the ability of reusing the LO in different perspectives and contexts. Adding new property needs a suitable Software Engineering methodology to be applied to properly inject the required strategies toward the development of the best and quality solutions. Our investigation in finding a solution for this problem is by shaping the LOssimilar to software objects that can not only be reused, but also repurposed in various learning contexts. In our paper, we propose to apply an object-oriented framework to develop the class-based LO model with an evolving nature of LOs. The class-based LO model allows LOs derivable to the degree ofsufficient level of repurposing for any learning context.
This document summarizes a study that used three data mining techniques - Decision Tree, Random Forest, and Naive Bayesian Classifier - to predict the direction of movement of the Tehran Stock Exchange index. Ten microeconomic and three macroeconomic variables were used as inputs to models built with each technique. The Decision Tree model was found to have the best performance at 80.08% accuracy, followed by Random Forest at 78.81% and Naive Bayesian Classifier at 73.84% based on testing the models on 20% of the data not used for training. The study aimed to develop predictive models for the emerging Tehran stock market using classification techniques from data mining.
An Overview of Workflow Management on Mobile Agent TechnologyIJERA Editor
This document discusses mobile agent technology for workflow management. It provides an overview of current research on using mobile agents to automate business processes across distributed systems. The document summarizes several related works on topics like inter-organizational workflows, mobile agent communication, coordination techniques, and workflow partitioning and scheduling algorithms. It aims to improve methods for designing and implementing prototype models for mobile agent-based workflow management systems.
On Semi-Invariant Submanifolds of a Nearly Hyperbolic Kenmotsu Manifold with ...IJERA Editor
We consider a nearly hyperbolic Kenmotsu manifold admitting a semi-symmetric metric connection and study semi-invariant submanifolds of a nearly hyperbolic Kenmotsu manifold with semi-symmetric metric connection. We also find the integrability conditions of some distributions on nearly hyperbolic Kenmotsu manifold andstudy parallel distributions on nearly hyperbolic Kenmotsu manifold.
Permeability Evaluation in Pilaspi (M. Eocene - U. Eocene) FormationIJERA Editor
Studying the permeability in a particular formation will be our address in this paper, through collection of a set of data in relates to the past real core analyses by the oil operators and correlating them to our lab works on the samples of the same formation from Pilaspi formation (M.EOCENE - U.EOCENE) outcrop on Haibat Sultan Mountain near Taq Taq oil Field. Lab works were done in Koya University using most of reservoir lab equipments for getting and determining the most important properties like porosity and permeability on plug samples of that formation. The key study in this paper is oil well TT-02 in Taq Taq oil field. In this paper we will try to nominate and recognize the more active porosity type through measuring air and liquid permeability in our reservoir lab and show the effects of increasing flowing pressure on the permeability using saturated and dry core plug. Water and air were used as flowing fluids and two methods were used to measure the permeability; steady-state method, measures the permeability of a saturated Core plug under constant flow rate conditions and air permeability with (N2) for dry core plug.
A Review: Compensation of Mismatches in Time Interleaved Analog to Digital Co...IJERA Editor
The execution of today's correspondence frameworks is exceedingly subject to the utilized Analog-to-Digital converters (ADCs), and with a specific end goal to give more flexibility and exactness to the developing correspondence innovations, superior-ADCs are needed. In this respect, the time-interleaved operation of an exhibit of ADCs (TI-ADC) might be a sensible result. A TI-ADC can build its throughput by utilizing M channel ADCs or sub converters in parallel and examining the data motion in a period-interleaved way. In any case, the execution of a TI-ADC gravely suffers from the bungles around the channel ADCs. In this paper we survey the advancement in the configuration of low-intricacy advanced remedy structures and calculations for time-interleaved ADCs in the course of the most recent five years. We devise a discrete-time model, state the outline issue, and finally infer the calculations and structures. Specifically, we examine proficient calculations to outline time-differing remedy filters and additionally iterative structures using polynomial based filters. Thusly, the remuneration structure may be utilized to repay time-differing recurrence reaction befuddles in time-interleaved ADCs, and in addition to remake uniform examples from nonuniformly tested indicators. We examine the recompense structure, research its execution, and exhibit requisition zones of the structure through various illustrations. At long last, we give a standpoint to future examination questions.
This document proposes an efficient higher order and high speed carry select adder (CSLA) using a Kogge-Stone parallel prefix adder and common Boolean logic. It aims to reduce the delay and area of CSLAs by replacing ripple carry adders with faster Kogge-Stone adders. Simulation results show the proposed CSLA achieves a 3-46% reduction in delay and 5-21% reduction in area compared to regular and modified CSLAs for word sizes ranging from 16 to 128 bits.
This document presents an approach towards developing an electronics device and a software application to maintain the correct body posture which is a mobile solution to keep our back strong and healthy. It presents the designing and functioning of equipment and software.
Enhancing Data Integrity in Multi Cloud StorageIJERA Editor
Cloud computing is a way to increase the capacity or add capabilities dynamically without investing in new infrastructure, training new personnel, or licensing new software. Cloud is surrounded by many security issues like securing data and examining the utilization of cloud by the cloud computing vendors. Security is one of the major issues which reduce the growth of cloud computing. A large number of clients or data owners store their data on servers in the cloud and it is provided back to them whenever needed. The data provided should not be jeopardized. Data integrity should be taken into account so that the data is correct, consistent and accessible. For ensuring the integrity in cloud computing environment, cloud storage providers should be trusted. Dealing with single cloud providers is predicted to become less secure with customers due to risks of service availability, failure and the possibility of malicious insiders in the single cloud. This paper deals with multi cloud environments to resolve these issues. The integrity of the data in multi cloud storage has been provided with the help of trusted third party using cryptographic algorithm.
Improving the Role of Universities in Conserving the Architectural HeritageIJERA Editor
Universities are known by their significant role in forming the cognitive and educational minds. This paper focused on improving the role of the universities in conserving the architectural heritage through developing an effectivefertile research system that plays a major role in building the necessary programs planned for the architectural heritage conservation. In this paper, a methodology was proposed including archeological survey a documentation of the registered and unregistered historical buildings and archeological sites planned by the local universities in order to come up yet with a reliable source for the status of those historical buildings and sites and improve the universities role in conserving the architectural heritage especially on the research and documentation part of the conservation process.
Stability and stabilization of discrete-time systems with time-delay via Lyap...IJERA Editor
The stability and stabilization problems for discrete systems with time-delay are discussed .The stability and
stabilization criterion are expressed in the form of linear matrix inequalities (LMI). An effective method
allowing us transforming a bilinear matrix Inequality (BMI) to a linear matrix Inequality (LMI) is developed.
Based on these conditions, a state feedback controller with gain is designed. An illustrative numerical example
is provided to show the effectiveness of the proposed method and the reliability of the results.
The document summarizes a study on the surface water quality assessment of the Jirania Brick Cluster region in Tripura, India. There are approximately 45 brick industries located in the cluster. Water samples were collected from 9 locations and analyzed for various quality parameters. The results found higher than normal turbidity, total dissolved solids, and biochemical oxygen demand at some locations, indicating the presence of pollution. The study aims to estimate the total pollution load from the brick industries on the surface water sources to understand the environmental impact. It was concluded that further analysis of additional water quality parameters is needed to fully assess the scale of pollution caused by the brick industries in the area.
Efficient video compression using EZWTIJERA Editor
In this article, wavelet based lossy video compression algorithm is presented. The motion estimation and compensation, being an important part in the compression, is based on segment movements. The proposed work is based on wavelet transform algorithm Embedded Zeroed WaveletTransform (EZWT). Based on the results of peak signal to noise ratio (PSNR), mean squared error (MSE), different videos are analyzed. Maintaining the PSNR to acceptable limits the proposed EZWT algorithm achieves very good compression ratios making the technique more efficient than the 2-Discrete Cosine Transform (DCT) in the H.264/AVC codec. The method is being suitable for low bit rate video showing highest compression ratio and very good PSNR of more than 30dB.
Wireless Sensor Networks: An Overview on Security Issues and ChallengesBRNSSPublicationHubI
This document summarizes security issues and challenges in wireless sensor networks (WSNs). WSNs are vulnerable to various security threats due to their wireless nature and constrained resources. The document outlines key requirements for WSN security like confidentiality, integrity, authentication, and availability. It discusses obstacles to security in WSNs like limited resources, unreliable communication, and unattended operation. Common attacks on WSNs are categorized as insider vs outsider, passive vs active, and mote-class vs laptop-class. The document provides a brief overview of security issues and threats at different layers of a WSN.
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Networkpijans
Sensor nodes, when deployed to form Wireless sensor network operating under control of central authority
i.e. Base station are capable of exhibiting interesting applications due to their ability to be deployed
ubiquitously in hostile & pervasive environments. But due to same reason security is becoming a major
concern for these networks. Wireless sensor networks are vulnerable against various types of external and
internal attacks being limited by computation resources, smaller memory capacity, limited battery life,
processing power & lack of tamper resistant packaging. This survey paper is an attempt to analyze threats
to Wireless sensor networks and to report various research efforts in studying variety of routing attacks
which target the network layer. Particularly devastating attack is Wormhole attack- a Denial of Service
attack, where attackers create a low-latency link between two points in the network. With focus on survey of
existing methods of detecting Wormhole attacks, researchers are in process to identify and demarcate the
key research challenges for detection of Wormhole attacks in network layer.
This document discusses security issues related to wireless sensor networks. It begins with an introduction to wireless sensor networks and an overview of security challenges due to limited sensor node capabilities. It then summarizes common attacks on different layers of wireless sensor networks and discusses security objectives. The document outlines key areas of research on sensor network security including key management, secure time synchronization, and secure routing. It provides details on different key management schemes, time synchronization protocols, and discusses vulnerabilities of existing synchronization schemes to various attacks.
A Protocol/Scheme to mitigate DDos attacks using AODV Protocolijsrd.com
MANET(Mobile Adhoc Network) is an emerging technology and have great strength to be applied in battlefields and commercial applications such as traffic surveillance, MANET is infrastructure less without any centralized controller. Each node contains routing capability. Each device in a MANET is independent and can move in any direction. One of the major challenges wireless mobile ad-hoc networks face today is security, because no central controller exists. MANETs are a kind of wireless ad hoc networks that usually has a routable networking environment on top of a link layer ad hoc network. There are many security attacks in MANET and DDoS (Distributed denial of service) is one of them. Our main objective is seeing the effect of DDoS in routing, Packet Drop Rate, End to End Delay, no. of Collisions due to attack on network. And with these parameters and many more also we build secure IDS to detect this kind of attack and block it. In this thesis main objective is to study and implement the security against the DDOS attack. DDoS (Distributed Denial of Service) attacks in the networks are required to be prevented, as early as possible before reaching the victim node. DDos attack causes depletion of the network resources such as network bandwidth, disk space, CPU time, data structures, and network connections. Dealing with DDoS attacks is difficult due to their properties such as dynamic attack rates, big scale of botnets. DDos attack become more difficult to handle if it occurs in wireless network because of the properties of ad hoc network such as dynamic topologies, low battery life, Unicast routing Multicast routing , Frequency of updates or network overhead , scalability , mobile agent based routing ,power aware routing etc. Thus it is better to prevent the distributed denial of service attack rather than allowing it to occur and then taking the necessary steps to handle it. The following quantitative metrics Packet Delivery Ratio (PDR), Number of Collisions are to be used to evaluate the performance of DDoS attacks and their prevention techniques under different combinations in the fixed mobile ad hoc network. In our simulation, the effect of DDoS attacks under different number of attackers is studied.
Improving reliability & performance of wsn via routing errorsijctet
The document proposes a scheme called Link Scanner (LS) for detecting faulty links in wireless sensor networks. LS operates passively by collecting hop count data from probe flooding processes. It analyzes mismatches between expected and received hop counts to infer which links may be faulty. Having a blacklist of potential faulty links allows further analysis and recovery, including adjusting routing strategies, identifying root causes of observed network issues, and providing spare link options. The scheme aims to not only detect currently faulty links but also evaluate unused links, to help guide rerouting for better performance. It was tested on a 60-node sensor network and in simulation and found to accurately detect faulty links with low overhead.
Recently, WSNs have drawn a lot of attention due to their broad applications in both military and civilian domains. Data security is essential for success of WSN applications, exclusively for those mission-critical applications working in unattended and even hostile environments which may be exposed to several attacks. This inspired the research on Data security for WSNs. Attacks due to node compromise include Denial of service (DoS) attacks such as selective forwarding attacks and report disruption attacks. Nearby many techniques have been proposed in the literature for data security. Hop-hop security works well when assuming a uniform wireless communication pattern and this security designs provides only hop-hop security. Node to sink communication is the dominant communication pattern in WSNs and hop-hop security design is not sufficient as it is exposed to several attacks due to node compromise. Location aware end-end data security (LEDS) provides end-end security
A review of privacy preserving techniques in wireless sensor networkAlexander Decker
This document reviews privacy preserving techniques in wireless sensor networks. It discusses the need for privacy in wireless sensor network applications due to various privacy attacks. It summarizes location privacy, data privacy, and network privacy techniques that have been developed to address challenges in preserving privacy for wireless sensor networks. The document also outlines unique challenges for privacy preservation in wireless sensor networks, such as an uncontrollable environment and resource constraints of sensor nodes.
A review of privacy preserving techniques in wireless sensor networkAlexander Decker
This document reviews privacy preserving techniques in wireless sensor networks. It discusses the need for privacy in wireless sensor network applications due to various privacy attacks. It summarizes location privacy, data privacy, and network privacy techniques that have been developed to address challenges in preserving privacy for wireless sensor networks. The document also outlines unique challenges for privacy preservation in wireless sensor networks, such as an uncontrollable environment and resource constraints of sensor nodes.
SECURITY IN WIRELESS SENSOR NETWORKS: COMPARATIVE STUDYijcsit
This document discusses security in wireless sensor networks. It begins with an introduction to wireless sensor networks and discusses some of their applications. It then describes common security threats and attacks against wireless sensor networks, categorizing them as active/passive and internal/external. Key security requirements for wireless sensor networks are also outlined, including confidentiality, integrity, availability, and data freshness. Finally, the document reviews various security mechanisms that have been proposed to defend against different attacks in wireless sensor networks, such as cryptography, trust management, and data partitioning.
The security in wireless sensor networks (WSNS) is a very important issue. These networks may be exposed
it different attacks. With this in mind, researchers propose in this area variety of security techniques for
this purpose, and this article describes security in wireless sensor networks. Discussed threats and attacks
of wireless sensor networks. The article also aims to provide the basic information related to determining
essential requirements for the protection WSNs. Lastly, we mention some security mechanisms against
these threats and attacks in Wireless Sensor Network.
IRJET- Identification of Vampire Assault in Wireless Sensor NetworksIRJET Journal
The document discusses the vampire attack in wireless sensor networks. The vampire attack is a type of denial of service attack that slowly drains the battery power of sensor nodes over a long period of time. This is done by transmitting small messages that require little data but consume significant energy. As a result, the entire network's availability can be disabled without immediately disrupting operations. The paper proposes a method to detect and prevent vampire attacks by establishing thresholds for normal message broadcasting and labeling nodes as suspicious if they exceed the thresholds. These suspicious nodes are then isolated from communication to improve the network's security and performance.
SURVEY OF TRUST MODELS IN DIFFERENT NETWORK DOMAINSijasuc
This paper introduces the security and trust concepts in wireless sensor networks and explains the
difference between them, stating that even though both terms are used interchangeably when defining a
secure system, they are not the same. The difference between reputation and trust is also explained,
highlighting that reputation partially affects trust. A survey of trust and reputation systems in various
domains is conducted, with more details given to models in ad-hoc and sensor networks as they are closely
related to each other and to our research interests. The methodologies used to model trust and their
references are presented. The factors affecting trust updating are summarised and some examples of the
systems in which these factors have been implemented are given. The survey states that, even though
researchers have started to explore the issue of trust in wireless sensor networks, they are still examining
the trust associated with routing messages between nodes (binary events). However, wireless sensor
networks are mainly deployed to monitor events and report data, both continuous and discrete. This leads
to the development of new trust models addressing the continuous data issue and also to combine the data
trust and the communication trust to infer the total trust.
Secure and Efficient Hierarchical Data Aggregation in Wireless Sensor NetworksIJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
International Journal of Modern Engineering Research (IJMER) covers all the fields of engineering and science: Electrical Engineering, Mechanical Engineering, Civil Engineering, Chemical Engineering, Computer Engineering, Agricultural Engineering, Aerospace Engineering, Thermodynamics, Structural Engineering, Control Engineering, Robotics, Mechatronics, Fluid Mechanics, Nanotechnology, Simulators, Web-based Learning, Remote Laboratories, Engineering Design Methods, Education Research, Students' Satisfaction and Motivation, Global Projects, and Assessment…. And many more.
Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...IRJET Journal
The document discusses security attacks on wireless sensor networks, describing various types of attacks like jamming, impersonation, replay attacks, and denial of service attacks that can occur at different layers of the network. It analyzes key security objectives for wireless sensor networks like availability, authentication, integrity, and confidentiality. The document also outlines the architecture of wireless sensor networks, including the five layers of the OSI model and three cross-layer planes, and components of sensor nodes.
Issues and Challenges in Distributed Sensor Networks- A ReviewIOSR Journals
1) The document discusses various design issues and challenges in distributed sensor networks, including limited resources of sensor nodes, scalability, frequent topology changes, and data aggregation.
2) Data aggregation aims to reduce redundant data by having sensor nodes combine and summarize correlated sensor readings. This helps reduce transmission costs and bandwidth usage.
3) Time synchronization is also an important challenge as many sensor network applications require correlating sensor readings with physical times, but achieving precise synchronization is difficult given the networks' constraints.
This document discusses issues and challenges in distributed sensor networks. It begins with an introduction to distributed sensor networks and their applications. It then discusses several design challenges for sensor networks, including limited resources, scalability, frequent topology changes, and energy efficiency. It also discusses specific challenges like data aggregation, time synchronization, localization, node deployment, network dynamics, and fault tolerance. Finally, it discusses security issues and challenges in distributed sensor networks, including requirements like availability, authentication, confidentiality, integrity, and data freshness. It also discusses types of security attacks on sensor networks.
A review of privacy preserving techniques in wireless sensor networkAlexander Decker
This document reviews various techniques for preserving privacy in wireless sensor networks. It discusses the challenges of privacy preservation in WSNs due to their unique characteristics like resource constraints and topological constraints. It then summarizes several key techniques explored in research for preserving data privacy, source location privacy, sink location privacy and network privacy. These techniques include clustering-based approaches, random walk-based approaches and mixing-based approaches. The document concludes that while progress has been made, more research is still needed in areas like peer-to-peer network privacy preservation.
A review of privacy preserving techniques in wireless sensor networkAlexander Decker
1. This document reviews privacy preserving techniques in wireless sensor networks. It discusses challenges to privacy in WSNs including data privacy, location privacy, and network privacy.
2. Wireless sensor networks face unique challenges to privacy preservation due to their constrained environment, limited sensor resources, and multi-hop network topology. This makes existing privacy techniques difficult to apply directly to WSNs.
3. The document surveys several techniques that have been proposed for preserving different types of privacy in WSNs, including location privacy, data privacy during aggregation, and preventing traffic analysis attacks on network privacy. More research is still needed to address open problems in privacy for WSNs.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
IRJET- Detection and Localization of IDS Spoofing Attack in Wireless Sensor N...IRJET Journal
This document proposes using intrusion detection systems and k-means clustering to detect and localize spoofing attacks in wireless sensor networks used in vehicular networks (VANETs). VANETs have characteristics like highly dynamic topology and frequent link changes that make performance monitoring difficult. The proposed approach uses cluster heads acting as IDS to monitor packet transmissions within clusters and detect misbehaving nodes. When an attacker is detected, an alarm is passed to the source node to eliminate the attacker. Simulation results show the method can efficiently and robustly detect and locate spoofing attackers in VANET wireless sensor networks.
Similar to Denial of Service (DoS) Attacks at Network Layer in WSN (20)
Literature Review Basics and Understanding Reference Management.pptxDr Ramhari Poudyal
Three-day training on academic research focuses on analytical tools at United Technical College, supported by the University Grant Commission, Nepal. 24-26 May 2024
Using recycled concrete aggregates (RCA) for pavements is crucial to achieving sustainability. Implementing RCA for new pavement can minimize carbon footprint, conserve natural resources, reduce harmful emissions, and lower life cycle costs. Compared to natural aggregate (NA), RCA pavement has fewer comprehensive studies and sustainability assessments.
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...IJECEIAES
Climate change's impact on the planet forced the United Nations and governments to promote green energies and electric transportation. The deployments of photovoltaic (PV) and electric vehicle (EV) systems gained stronger momentum due to their numerous advantages over fossil fuel types. The advantages go beyond sustainability to reach financial support and stability. The work in this paper introduces the hybrid system between PV and EV to support industrial and commercial plants. This paper covers the theoretical framework of the proposed hybrid system including the required equation to complete the cost analysis when PV and EV are present. In addition, the proposed design diagram which sets the priorities and requirements of the system is presented. The proposed approach allows setup to advance their power stability, especially during power outages. The presented information supports researchers and plant owners to complete the necessary analysis while promoting the deployment of clean energy. The result of a case study that represents a dairy milk farmer supports the theoretical works and highlights its advanced benefits to existing plants. The short return on investment of the proposed approach supports the paper's novelty approach for the sustainable electrical system. In addition, the proposed system allows for an isolated power setup without the need for a transmission line which enhances the safety of the electrical network
A review on techniques and modelling methodologies used for checking electrom...nooriasukmaningtyas
The proper function of the integrated circuit (IC) in an inhibiting electromagnetic environment has always been a serious concern throughout the decades of revolution in the world of electronics, from disjunct devices to today’s integrated circuit technology, where billions of transistors are combined on a single chip. The automotive industry and smart vehicles in particular, are confronting design issues such as being prone to electromagnetic interference (EMI). Electronic control devices calculate incorrect outputs because of EMI and sensors give misleading values which can prove fatal in case of automotives. In this paper, the authors have non exhaustively tried to review research work concerned with the investigation of EMI in ICs and prediction of this EMI using various modelling methodologies and measurement setups.
International Conference on NLP, Artificial Intelligence, Machine Learning an...gerogepatton
International Conference on NLP, Artificial Intelligence, Machine Learning and Applications (NLAIM 2024) offers a premier global platform for exchanging insights and findings in the theory, methodology, and applications of NLP, Artificial Intelligence, Machine Learning, and their applications. The conference seeks substantial contributions across all key domains of NLP, Artificial Intelligence, Machine Learning, and their practical applications, aiming to foster both theoretical advancements and real-world implementations. With a focus on facilitating collaboration between researchers and practitioners from academia and industry, the conference serves as a nexus for sharing the latest developments in the field.
Understanding Inductive Bias in Machine LearningSUTEJAS
This presentation explores the concept of inductive bias in machine learning. It explains how algorithms come with built-in assumptions and preferences that guide the learning process. You'll learn about the different types of inductive bias and how they can impact the performance and generalizability of machine learning models.
The presentation also covers the positive and negative aspects of inductive bias, along with strategies for mitigating potential drawbacks. We'll explore examples of how bias manifests in algorithms like neural networks and decision trees.
By understanding inductive bias, you can gain valuable insights into how machine learning models work and make informed decisions when building and deploying them.
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTjpsjournal1
The rivalry between prominent international actors for dominance over Central Asia's hydrocarbon
reserves and the ancient silk trade route, along with China's diplomatic endeavours in the area, has been
referred to as the "New Great Game." This research centres on the power struggle, considering
geopolitical, geostrategic, and geoeconomic variables. Topics including trade, political hegemony, oil
politics, and conventional and nontraditional security are all explored and explained by the researcher.
Using Mackinder's Heartland, Spykman Rimland, and Hegemonic Stability theories, examines China's role
in Central Asia. This study adheres to the empirical epistemological method and has taken care of
objectivity. This study analyze primary and secondary research documents critically to elaborate role of
china’s geo economic outreach in central Asian countries and its future prospect. China is thriving in trade,
pipeline politics, and winning states, according to this study, thanks to important instruments like the
Shanghai Cooperation Organisation and the Belt and Road Economic Initiative. According to this study,
China is seeing significant success in commerce, pipeline politics, and gaining influence on other
governments. This success may be attributed to the effective utilisation of key tools such as the Shanghai
Cooperation Organisation and the Belt and Road Economic Initiative.
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
Denial of Service (DoS) Attacks at Network Layer in WSN
1. Sunil Ghildiyal et al. Int. Journal of Engineering Research and Applications www.ijera.com
ISSN: 2248-9622, Vol. 5, Issue 11, (Part - 1) November 2015, pp.86-89
www.ijera.com 86 | P a g e
Denial of Service (DoS) Attacks at Network Layer in WSN
Sunil Ghildiyal, Bhupender Singh Rautela, Anupam Semwal
Uttaranchal University Dehradun Uttarakhand
Graphic Era University Dehradun Uttarakhand
Drona College of Mgmt & Tech. Ed. Dehradun Uttarakhand
ABSTRACT
Recent advancements in technology, tiny size, cost effectiveness have made sensors as a crucial part of real
world sensitive applications. These sensor nodes are scattered over an area to monitor the situations like fire,
flood and record the data and to forward meaningful data to the center head node for observation, resulting an
advance prompt to control the situation. In last decade, WSN have grown significantly in variety of areas and
applications, resulted the high, consistent security mechanism. Also, there is variety of attacks on WSN at their
different layers of architecture. Though sensor nodes are not capable enough in terms of power, processing etc.
but applications based on these sensors demand on-time collection of information or data and then to send same
on reliable, secure delivery medium. Small sensors with limited hardware, processing cannot afford traditional
security mechanisms to face or sustain the attacks. There is variety of attacks at different layers of WSN
architecture to affect sensor‟s roles like signaling, framing, transmission etc. Many Denial of Service (DoS)
attacks are identified at each layer of WSN which are purposeful, planned attacks to hamper the availability of
service, restricting the sensor node‟s utility for problem solution. In this paper we will focus on the WSN
architecture, characteristics, constraints and various types of DoS attacks primarily on physical and data link
layer and particularly at network layer in details with some suggestions against attacks.
KEYWORDS: Wireless, Sensor, Power, Denial of Service DoS, Attack, Vulnerabilities.
I. INTRODUCTION
As a result of recent developments in wireless
technology polishing, wireless networks are now
believed as a reliable architecture medium to deliver
communication with major security parameters
confidentiality, integrity and availability and non-
repudiation. Wireless Sensor Networks consist of less
power, less processing capability, small size sensor
nodes[1]. Hence, It becomes very tough to raise the
capability level of such tiny sensors due to their
various constraints. Constraints, associated with
sensors are to be considered seriously while
designing a secure real world problem solution using
WSN.
Actually, sensor nodes use RF for messaging,
communication and hence use broadcast basically.
Since medium is open, it is tedious to protect the
broadcast from easy eavesdropping, as injecting can
be done very easily over wireless broadcasting. Also,
sensor nodes are scattered over a geographical area in
physically insecure pattern can be stolen easily, can
be tempered physically or replayed or reprogrammed
after capturing. Insecure, open deployment of sensor
nodes make them to be easily detected for damage
purpose[2]. These limited power capacity nodes
make WSNs. very weak and paralyzed architecture in
front of any intended attack like flooding or replaying
etc. One of initial measure against these threats may
be authorization access checklist available with them
to detect unauthorized or malicious users.
II. WSN CHARACTERISTICS
For last about two decades, WSNs. have received a
lot of interest by the researchers, industry. This is
cause of those to be less cost solutions to many real
world problem solving applications. Other favoring
factors are easy to use, low energy consuming nodes,
portability, unattended operation even in no men land
with an ability to withstand bad geographical,
environmental situations, having dynamic network
topology as per situation, faster recovery methods or
alternates with sensor node stopping and failures,
Mobility of nodes, Heterogeneity of nodes and at all
highly scalable in terms of topology and deployment.
III. WSN CONSTRAINTS
Resource: Sensors are equipped with less
capable processors and very low RF linking
bandwidth. Of course, It is due to tiny size and low
battery. Hence, computational capabilities are also
affected by battery and processors.
Memory: A sensor node consists of a flash
memory and flash RAM. But loading of operating
system and other system applications consume much
space, leading less space for other tasks and storage.
In sensors, flash memory is used for storing
downloaded application code.
Message Size: As compared to any traditional
network, message size of WSN is quite small which
results in no concept of segmentation in WSN
applications usually.
RESEARCH ARTICLE OPEN ACCESS
2. Sunil Ghildiyal et al. Int. Journal of Engineering Research and Applications www.ijera.com
ISSN: 2248-9622, Vol. 5, Issue 11, (Part - 1) November 2015, pp.86-89
www.ijera.com 87 | P a g e
Absence of Global Addressing: As the number
of sensors is very large, hundreds or thousands in an
application, it is not possible to identify each node
with unique addressing at global level.
Location Management: As nodes are small and
scattered in an open area, dislocation of nodes by
environmental conditions like earthquake or
avalanche, mobility of nodes may result in locating
the nodes. It affects data to be collected by the nodes
after they have been deployed at specific place or
have been constant static at same place for a time
period.
Data Redundancy: There is very high chance of
data redundancy as many nodes may capture the
same data of same phenomenon.
Data Availability: It means whether sensor node
has the capability to use the resources of network and
whether the network is available with the messages to
communicate. In WSN, failure of base station or
cluster head‟s availability will also lead to threaten
the entire sensor network. Hence it is important to
maintain a proper operational network.
Self-Organization: A wireless sensor network is
a typically an ad hoc network, where every sensor
node is to be independent and flexible enough for
self-organization and self-healing under different
conditions. WSNs. form random infrastructure as per
situation and need network management in a sensor
network by nodes themselves.
IV. WSN SECURITY REQUIREMENTS
Ultimate goal of security architecture is to
prevent the information from various attacks.
Security measures make sure that the services would
be available even in presence of DoS attacks or any
other vulnerability. It will make sure that only
authorized node can be a part of communication of
information. As result of it, a malicious node cannot
masquerade as trusted node. When authorized users
or nodes are exchanging the information,
confidentiality must be maintained with data
integrity. Data freshness and non-repudiation is also
to be considered as main parameters of security
measures, whether already applied or to be. WSN
nodes are very small and light weight and generally
deployed randomly, operated in unattended
environment subsequently. Hence the security
requirements include self-organization of node which
further defines self-configuration, self-management
(autonomous) and self-healing (fault tolerant).
V. THREAT MODEL
In WSN, threats are from outside the network
and within the network. If attacks are from the nodes
of the native network then it is much harmful. Also, it
is quite difficult to find out the malicious or
compromising node within the native network.
Another classification of the attacks may be passive
and active where passive attacks don‟t modify or
alter the data as active attacks do. If the opponent
attack by using similar capacity nodes for network
penetration it is called mote class attack but when
powerful devices like laptop are used to penetrate the
network then such attack is called laptop attack.
VI. WSN ATTACKS
Attacks on WSN can be divided into two
categories: invasive and non-invasive. Non-invasive
attacks generally target to timings, power and
frequency of channel, trying to destroy the signaling
system. Whereas invasive type attacks aim to hamper
the availability of service, information transition,
routing etc. DoS attack aims the system to be
inaccessible. However during the transit of
information, more common attacks are encountered.
Attacks affect the routing schemes, routing tables and
routing algorithms mostly in general.
VII. DOS AND DOS ATTACKS
There are varieties of DoS conditions, which
may temper the nodes and network operations
subsequently. These attacks may hinder the routines
of the network, may lead to the resource exhaustion,
any software bug, or any difficulty while working
with any application or infrastructure. Such obstacles
in network functionality are called Denial of Service
(DoS) due to its direct affect on availability or fully
functionality of service. But when these are because
of planned intention of the opponent, these are called
DoS attacks.
Dos attacks are intended attack of opponent to
destroy the entire network components or operations.
DoS attack may limit the network operations more
than expected. DoS attack may occur at every layer
of OSI layers of WSN [3]. DoS attacks penetrate the
efficiency of aimed networks by affecting its
associated protocols. DoS attacks may consume or
exhaust the resources, alter the infrastructure
configuration and can demolish the network
components either partial or full.
Wood and Stankovic presented layer wise
categorization of DoS attacks first. [4], which was
further enhanced by Raymond and Midkiff with some
addendums [5]. In this paper, we will discuss about
the DoS attacks at different layers of WSN
infrastructure in general and then we will conclude
with DoS attacks at network layer. .
VIII. DOS ATTACK AT PHYSICAL
LAYER
Jamming is one of attack at physical layer, in
which radio frequencies used by the network nodes
are interfered, adversary can either disrupt entire
network which depends on the power of jamming
nodes. Jamming is of various types Constant,
3. Sunil Ghildiyal et al. Int. Journal of Engineering Research and Applications www.ijera.com
ISSN: 2248-9622, Vol. 5, Issue 11, (Part - 1) November 2015, pp.86-89
www.ijera.com 88 | P a g e
Deceptive, Random and Reactive [6]. Jamming may
be consistent or intermittent.
Another attack at physical layer is tempering, in
which attacker may physically temper the nodes and
can compromise with them. Temper-proof physical
packaging is one alternate of this attack but costs a
lot[7].
IX. DOS ATTACK AT LINK LAYER
Exhaustion (Continuous Channel Access is one
of major attack where attacker may disrupt the
channel by frequently requesting and transmission
over it. It results in starvation for channel access for
other nodes.
Collision occurs when two nodes intend for same
frequency channel transmission simultaneously.
Attackers may need to induce a collision instance in
one octet of transmission to disturb entire packet
transmission.
Unfairness is also one of attack at data link layer
which is referred as repeated collision based attack or
an abusive use of cooperative MAC layer priority
mechanisms.
X. DOS ATTACK AT NETWORK
LAYER
X.A. False Routing or Spoofed, Replayed Routing
Information
Main focus of such kind of attack is on routing
protocols, specifically on routing. Sensor nodes
exchange routing information at pre determined time
intervals or as per algorithm policy of routing. A
malicious node can change routing information,
resulting to alter the routing of entire WSN
infrastructure or its any partition. This is possible
through altering or changing the routing information,
by narrowing or extending the routing information in
the table or by fake error messages generation. One
of best strategy against such attack is to implement
MAC code with the message. In addition to it, time
stamps can also be added to prevent against replaying
the routing.
X.B. Selective Forwarding
Fundamental principle of sensor network is
„Multi-hop”. It is to ensure that each sensor nodes
will forward the entire message to next node in line
what they received. In selective forwarding, nodes
selectively drop few messages instead of forwarding
everything. Attacking nodes deny routing few
certain messages and drop them. This attack is
effective specially if combined with an attack trying
to collect most of the traffic via node. Sensor
networks assume that nodes faithfully forward
messages what they have received. But some
compromised node might refuse to forward packets
selectively. As result of it neighbor nodes may opt for
alternate route [8].
If all the packets are denied for forwarding by
anode after receiving, is called black hole attack. In
selective forwarding few messages are dropped and
few are forwarded further to the next node. One of
the defense mechanism against this attack is multiple
paths to send the data.
X.C. Sinkhole Attacks
In this attack attackers seem to be more attractive
to its nearby nodes by forging the routing
information. Main aim of such attack is to tempt all
the neighbor nodes. A sinkhole attack tries to lure
mostly all the network traffic toward the
compromised node, creating a metaphorical sinkhole
with the adversary at the center. Geo-routing
protocols are one of the routing protocol classes
which are resistant to sinkhole attack, because that
topology is based on localized information only and
all traffic is naturally routed through the physical
location of the sink node [9].
X.D. Sybil Attack
In this attacker attacks a single node in the
network with a malevolent code masked with
multiple identities or a node duplicates itself and
presented in the multiple locations. Then this node
acts a polymorphic behavior, misleading to others
with multiple identities. Such identities may decrease
topology maintenance, disparity in storage and
routing or targeting fault tolerant systems. This
attack includes a major concern for Geographical
Routing Algorithms which needs the location of a
node to route the message efficiently. Various
authentication and encryption mechanism can prevent
an outsider to launch a Sybil attack on the sensor
network [10].
X.E. Wormhole
Wormhole is referred as low latency link
between two portions of a WSN network over which
an attacker replays network messages [11]. An
adversary can tunnel messages received in one
network partition over a low latency link and replay
them in another partition. In such attack, an
adversary convinces the nodes which are multi hop
away that they are closer to the base station.. The
wormhole attack generally involve two far away
malevolent codes conspire to minimize their
remoteness by replaying packets next to an out-of-
reach channel, is only available to attacker.
X.F. Hello Flood
Many protocols require hello packets to
announce their neighbors about their state and
presence or absence. This attack exploits Hello
packets. Malicious nodes sometime can cause of
immense traffic of useless messages. It is known as
flooding. Malicious nodes, sometime replay some