Wireless Sensor Networks (WSNs) have gained widespread interest as a result of developments in IT technology and the electronics industry. This ground-breaking sensing technology consists of multiple sensor nodes or motes that are placed in an atmosphere to detect constantly changing physical phenomena. These compact sensor nodes gather and interpret data via radio waves. The tiny size of these sensors is advantageous since they may be readily incorporated into any system or system. This capability has prompted the adoption of WSNs, particularly for form monitoring and tracking; most notably, monitoring apps. However, this small scale of sensor nodes limits the capacity of resources. Usually, the WSNs are installed in environments of unsafe or difficult human interference. Critical decisions in emergency applications can require sensible knowledge. It is necessary to check the network security. To extend the network security using Homomorphic Encryption effectively, the available resources must be expanded to a full view. This refers to the development of energy-efficient routing protocol strategies to ensure low energy consumption of common routing protocols and improve the availability and security of WSNs. Homomorphic encryption is effective in improving the security of wireless sensor networks.
Dhar M, Singh R. A review of security issues and denial of service attacks in wireless sensor networks. International Journal of Computer Science and Information Technology Research.
2.
Kumar G. Understanding denial of service (dos) attacks using osi reference model. Vol. Oct;1(5):10-17, International Journal of Education and Science Research.
3.
Sreevidya B, Supriya M. Malicious Nodes Detection and Avoidance Using Trust-based Routing in Critical Data Handling Wireless Sensor Network Applications. Vol. 14, Journal of Internet Services and Information Security. p. 226–44.
4.
Wood AD, Stankovic JA. A taxonomy for denial-of-service attacks in wireless sensor networks. Handbook of sensor networks: compact wireless and wired sensing systems.
5.
Pragadeswaran S, Kamalanathan MM. Disguised Characteristic Randomness from Routing Data in Mesh. Vol. 6, International Journal of Engineering Research and Technology. p. 1–4.
6.
Rajesh D, Kiruba DG, Ramesh D. Energy Proficient Secure Clustered Protocol in Mobile Wireless Sensor Network Utilizing Blue Brain Technology. Vol. 13, Indian Journal of Information Sources and Services. p. 30–8.
7.
Mirkovic J, Reiher P. A taxonomy of DDoS attack and DDoS defense mechanisms. Vol. 1;34(2):39-53, ACM SIGCOMM Computer Communication Review.
8.
Asosheh A, Ramezani N. A comprehensive taxonomy of DDOS attacks and defense mechanism applying in a smart classification. Vol. 1;7(4):281-290, WSEAS Transactions on Computers.
9.
Doddapaneni K, Ghosh A. Analysis of Denial-of-Service attacks on Wireless Sensor Networks using simulation. In: IT Security for the Next Generation-European Cup 2011.
10.
Sreevidya B, Supriya M. Trust based Routing – A Novel Approach for Data Security in WSN based Data Critical Applications. Vol. 15, Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA. p. 27–41.
11.
Lichun P, Chenhui L, Runfeng H, Yanjun Z, Hongyan O. Computer simulation of denial of service attack in military information network using opnet. In: In3rd International Conference on Multimedia Technology (ICMT-13.
12.
Mukhopadhyay I, Polle S, Naskar P. Analysis of denial-of-service attacks on wireless sensor networks using simulation. Vol. 16, IOSR Journal of Computer Engineering (IOSR-JCE.
13.
Kimura T, Premachandra C. Optimal Relay Node Selection in Two-Hop Routing for Intermittently Connected MANETs. Vol. Mar;7(1):23-38, Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications.
14.
Tripathy S, Nandi S. Defense against outside attacks in wireless sensor networks. Vol. 5;31(4):818-826, Computer Communications.
15.
Son JH, Luo H, Seo SW. Denial of service attack-resistant flooding authentication in wireless sensor networks. Vol. 16;33(13):1531-1542, Computer Communications.
16.
D GK, J B, D R. A Proficient Obtrusion Recognition Clustered Mechanism for Malicious Sensor Nodes in a Mobile Wireless Sensor Network. Vol. 13, Indian Journal of Information Sources and Services. p. 53–63.
17.
Kumar VD, Navaneethan C. Protection against denial of service (dos) attacks in wireless sensor networks. Vol. 2, International Journal of Advanced Research in Computer Science & Technology. p. 439–43.
18.
Chen LC, Longstaff TA, Carley KM. Characterization of defense mechanisms against distributed denial of service attacks. Vol. 1;23(8):665-678, Computers & Security.
19.
Eian M, Mjølsnes SF. The modeling and comparison of wireless network denial of service attacks. In: Proceedings of the 3rd ACM SOSP workshop on networking, systems, and applications on mobile handhelds 2011 Oct 23;1-6.
20.
Gopinath S, Gurumoorthy KB, Narayanan SL, Kasiselvanathan M. Cluster based optimal energy efficient routing protocol for wireless sensor networks. Vol. 4;11(2):1921-1932, Revista Geintec-Gestao Inovacao E Tecnologias.
21.
Dini G, Tiloca M. ASF: an attack simulation framework for wireless sensor networks. In: IEEE 8th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob.
22.
Zhang YY, Li XZ, Liu YA. The detection and defence of DoS attack for wireless sensor network. Vol. 19, The journal of china universities of posts and telecommunications. p. 52–6.
23.
Ksiezopolski B. QoP-ML: Quality of Protection modelling language for cryptographic protocols. Vol. 1;31(4):569-596, Computers & Security.
24.
Pragadeswaran S. Wireless sensor networks security issues, security needs and different types of attacks based on layers: a survey. Vol. 5, International Journal of Advanced Engineering Sciences and Technology (IJAESIT. p. 1–23.
25.
Isha AM, Raj G. Dos attacks on tcp/ip layers in wsn. Vol. 1, International Journal of Computer Networks and Communications Security. p. 40–5.
26.
27.
Huang Q, Kobayashi H, Liu B. Modeling of distributed denial of service attacks in wireless networks. In: IEEE pacific rim conference on communications computers and signal processing (PACRIM 2003.
28.
Bhatnagar R, Shankar U. The proposal of hybrid intrusion detection for defence of sync flood attack in wireless sensor network. Vol. 1;3(2):31-38, International Journal of Computer Science and Engineering Survey.
29.
Pragadeswaran S, Gopinath S, Keerthivasan S, Premkumar R, Vinoth M. Security Analysis in Wireless Sensor Networks: Challenges, and Security Issues. Vol. 9, International Journal for Research in Applied Science & Engineering Technology (IGRASET. p. 683–9.
Citation
Copyright
This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
The statements, opinions and data contained in the journal are solely those of the individual authors and contributors and not of the publisher and the editor(s). We stay neutral with regard to jurisdictional claims in published maps and institutional affiliations.