ugc approved journal list IJRTI Research Journal
International Journal for Research Trends and Innovation
An International Open Access Journal
Impact Factor: 4.87

Call For Paper

Issue: May 2019

Volume 4 | Issue 5

Impact Factor: 4.87

Submit Paper Online

Click Here For more Details

For Authors

Forms / Download

Editorial Board

Subscribe IJRTI

Facts & Figure

Impact Factor : 4.87

Issue per Year : 12

Volume Published : 4

Issue Published : 36

Article Submitted : 1542

Article Published : 923

Total Authors : 2498

Total Reviewer : 521

Total Pages : 147

Total Countries : 14

Visitor Counter

Indexing Partner

Published Paper Details
Authors Name: G. Mahalakshmi , Dr.P.Subathra
Unique Id: IJRTI1805026
Published In: Volume 3 Issue 5, May-2018
Abstract: Maintenance of security is an imperative element in Wireless sensor Networks. Wireless sensor Networks contain the gathering of dispersed portable hubs with the ability of detecting the natural conditions. At the point when the extent of the WSN expands, then the activity over the sensor organize additionally increments.It will cause the network congestion and also the packet loss in the network. This category of network congestion and packet loss will occur in the sensor network due to the launching of various attacks in the wireless sensor networks. The most important attack in wireless sensor network is the Denial of Sleep (DoSL) Attack. This attack belongs to the category of the Denial of Service Attack (DoS). The motive of Denial of Sleep (DoSL) attack is to drain the energy level of the sensor network by making the sensor nodes always in processing mode and does not allow them to enter into the sleeping mode. This will also reduce the lifetime of the network from years to months. In this paper, an algorithm called Sleep attack Detection Algorithm (SLDA) is proposed to detect and prevent the Denial of attack in the WSNs. This proposed SLDA algorithm is dynamic and accurate in detecting the Sleep attack that uses Mobile agent, trust value, random key pre-distribution & random password generation. We are using a password which is generated randomly and trust value to distinguish and then for the confirmation of a normal node and an attacker node. Moreover, this algorithm helps in the transmission of data in a more secured way by avoiding the Denial of sleep attacks and also reduces the power consumption. We have simulated the proposed algorithm in NS2. We have verified the detection performance of SLDA and also checked the throughput and packet delivery ratio in wireless sensor network.
Keywords: Wireless Sensor Networks, Mobile Agent, Denial of attack Detection Algorithm, Intrusion Detection.
Cite Article: "DENIAL OF SLEEP ATTACK DETECTION USING MOBILE AGENT IN WIRELESS SENSOR NETWORKS", International Journal of Science & Engineering Development Research (, ISSN:2455-2631, Vol.3, Issue 5, page no.139 - 149, May-2018, Available :
Downloads: 000823
Publication Details: Published Paper ID: IJRTI1805026
Registration ID:180181
Published In: Volume 3 Issue 5, May-2018
DOI (Digital Object Identifier):
ISSN Number: 2456 - 3315
Share Article:

Click Here to Download This Article

Article Preview

Major Indexing from
Google Scholar ResearcherID Thomson Reuters Mendeley : reference manager : cornell university library Research Gate CiteSeerX DOAJ : Directory of Open Access Journals
DRJI Index Copernicus International Scribd DocStoc

ISSN Details

DOI (A digital object identifier)

Providing A digital object identifier by DOI
How to GET DOI and Hard Copy Related


Conference Proposal

Latest News / Updates

Open Access License Policy

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License

Creative Commons License This material is Open Knowledge This material is Open Data This material is Open Content

Important Details

Social Media

Untitled Document