期刊名称:International Journal of Computer Science and Information Technologies
电子版ISSN:0975-9646
出版年度:2014
卷号:5
期号:2
页码:1540-1544
出版社:TechScience Publications
摘要:In this paper, we discuss some of the threats to wireless ad hoc networks. In wireless ad-hoc networks all communication occurs through a wireless medium. Therefore it probes for a number of security problems. The applications of WSN are rapidly increasing diversely. The routing layer is vulnerable to a kind of DoS attack termed as Resource destroying attacks. Power draining attacks have not been rigorously defined, evaluated, or mitigated at the routing layer so far. These resource destroying attacks are resource consumption attacks which permanently disable networks by draining node’s battery power. Resource destroying attacks differ from other DoS attacks by a fact that it do not disrupt immediate availability, but works over time to disable a network. These attacks are not specific to any particular protocol, but depend on the properties of many classes of routing protocols. T he s e r e s o ur c e deple ting attacks are difficult to detect as they obey protocol complaint messages and do not alter discovered network paths. We use the signal strength of radio signals in calculating the distance travelled by the packet towards the destination using which power consumption is limited to only the specific nodes that need to participate. Secret key bits are also used to ensure that the appropriate destination is identified.
关键词:Denial of service; secure routing; ad-hoc;networks; sensor networks; wireless networks; resource;destroying attacks; signal strength; secret key