Open Access
Subscription Access
Impact of HELLO flood attack on Hierarchical Routing Protocols in WSN
Wireless Sensor networks encompasses large number of micro sized sensors which are highly constrained in power thus, clustering is done in sensor networks in order to decrease delay, save power and increase throughput of the network. Such sensor networks make use of hierarchical routing protocols like LEACH, etc which suffers from serious security threats for HELLO flood attack. This paper studies this attack and analyses the influence of it on hierarchical protocols. The empirical simulation results in Matlab shows high performance metric- percentage packet delivery ratio.
Keywords
Wireless Sensor Networks, Laptop-Class Attacker, Packet Delivery Ratio ( PDR).
User
Font Size
Information
- I.F. Akyildiz, W. Su, Y. Sankarasubramaniam, E. Cayirci, Wireless sensor networks: a survey, Computer Networks 38 (4) (2002) 393–422.
- Pathan, A.S.K.; Hyung-Woo Lee; Choong Seon Hong; , "Security in wireless sensor networks: issues and challenges," Advanced Communication Technology, 2006. ICACT 2006. The 8th International Conference , vol.2, no., pp.6 pp.-1048, 20-22 Feb. 2006
- Chee-Yee Chong; Kumar, S.P.; , "Sensor networks: evolution, opportunities, and challenges," Proceedings of the IEEE , vol.91, no.8, pp. 1247- 1256, Aug. 2003
- C. Karlof and D. Wagner, “Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures”, Ad Hoc Networks, vol. 1, 2003, pp. 293-315.
- Wendi RabinerHeinzelman, AnanthaChandrakasan, and HariBalakrishnan, “Energyefficient communication protocols for wireless microsensornetworks,” in Proceedings of the Hawaii International Conference on Systems Sciences, Jan. 2000
- Dr. Moh. Osama K., “HELLO Flood Counter Measure for Wireless Sensor Network,” International Journal of Computer Science and Security, vol. 2 issue 3, 2007, pp-57-64.
- Suraj Sharma and S. K. Sena, “A Survey on Secure Heirarchical Routing Protocols in Wireless Sensor Networks,” ICCCS’11, February 2011
- Patil, M.; Biradar, R.C., "A survey on routing protocols in Wireless Sensor Networks," Networks (ICON), 2012 18th IEEE International Conference on , vol., no., pp.86,91, 12-14 Dec. 2012
- Yong Wang; Attebury, G.; Ramamurthy, B., "A survey of security issues in wireless sensor networks," Communications Surveys & Tutorials, IEEE , vol.8, no.2, pp.2,23, Second Quarter 2006
- Virendra Pal Aishwarya S. Sweta Jain, “Signal Strength based HELLO Flood Attack Detection and Prevention in Wireless Sensor Networks,” International Journal of Computer Applications (0975 – 8887) Volume 62– No.15, January 2013
- Aslam, M.; Javaid, N.; Rahim, A.; Nazir, U.; Bibi, A.; Khan, Z. A., "Survey of Extended LEACH-Based Clustering Routing Protocols for Wireless Sensor Networks," High Performance Computing and Communication & 2012 IEEE 9th International Conference on Embedded Software and Systems (HPCC-ICESS), 2012 IEEE 14th International Conference on , vol., no., pp.1232,1238, 25-27 June 2012
- Milan Simek, Patrik Moravek and Jorge sa Silva, Wireless Sensor Networking in Matlab: Step-by-Step, January 2010
- Magotra S; Kumar K, “Detection of HELLO flood attack on LEACH protocol”, 2014 IEEE International Advance Computing Conference (IACC), 2014
Abstract Views: 197
PDF Views: 0