Mobile Agent Based Enhanced Security for Wireless Sensor Networks

Mobile Agent Based Enhanced Security for Wireless Sensor Networks

D. Sheela (Department of Computer Science, PES Institute of Technology South Campus, Bangalore, India,) and G. Mahadevan (Department of Computer Science and Engineering, Annai College of Engineering and Technology, Kumbakonam, India)
DOI: 10.4018/ijbdcn.2014040102
OnDemand PDF Download:
No Current Special Offers


Wireless sensor networks (WSNs) have attracted a lot of researchers due to their high potential in critical applications. WSNs are currently being employed in a variety of applications ranging from medical to military, and from home to industry. WSNs have unique constraints as compared to traditional networks making the implementation of existing security measures not practicable. These constraints are the result of limitations regarding the sensor nodes' memory, energy and transmission and processing power. So, traditional security mechanisms with large overhead of computation and communication are infeasible in WSNs. Thus, design and implementation of secure WSNs is challenging task. Recently mobile agents have been proved as an enabled technology for programming WSN. This research work fundamentally focuses on producing a combined security solution which uses mobile agents. The proposed security solution using mobile agents is to provide basic security services and to defend against seven attacks such as Denial of Service attack, Hello flooding attack, Traffic analysis, Cloning attack, Sink hole attack, Black hole attack and Selective forwarding attack with the energy overhead of addressing a single attack.
Article Preview

3. Survey On Security Attacks Of Wsn

Attacks are mainly categorized into two types: outside and inside attacks. In an outside attack, an outsider adversary or attacker is not a participant of the network, while an inside attack consists of attacking nodes by running malicious code in them (Christin et al., 2010). Few common attacks on WSN are listed below.

Complete Article List

Search this Journal:
Open Access Articles: Forthcoming
Volume 18: 2 Issues (2022): Forthcoming, Available for Pre-Order
Volume 17: 2 Issues (2021): 1 Released, 1 Forthcoming
Volume 16: 2 Issues (2020)
Volume 15: 2 Issues (2019)
Volume 14: 2 Issues (2018)
Volume 13: 2 Issues (2017)
Volume 12: 2 Issues (2016)
Volume 11: 2 Issues (2015)
Volume 10: 4 Issues (2014)
Volume 9: 4 Issues (2013)
Volume 8: 4 Issues (2012)
Volume 7: 4 Issues (2011)
Volume 6: 4 Issues (2010)
Volume 5: 4 Issues (2009)
Volume 4: 4 Issues (2008)
Volume 3: 4 Issues (2007)
Volume 2: 4 Issues (2006)
Volume 1: 4 Issues (2005)
View Complete Journal Contents Listing