Scalable and Energy Efficient Cluster Based Anomaly Detection Against Denial of Service Attacks in Wireless Sensor Networks

被引:7
作者
Premkumar, M. [1 ]
Ashokkumar, S. R. [2 ]
Jeevanantham, V. [3 ]
Mohanbabu, G. [1 ]
AnuPallavi, S. [4 ]
机构
[1] SSM Inst Engn & Technol, Dept ECE, Dindigul, India
[2] Sri Eshwar Coll Engn, Dept CCE, Coimbatore, India
[3] Vel Tech Rangarajan Dr Sagunthala R&D Inst Sci & T, Dept CSE, Chennai, India
[4] VSB Coll Engn & Tech Campus, Dept ECE, Coimbatore, India
关键词
Cluster based routing; Wireless sensor network; Support vector machine; DoS attacks; Anomaly detection;
D O I
10.1007/s11277-023-10252-3
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Recently, with the meteoric evolution in the wireless communication technologies, countless real world applications which will reshape the way of seeking in robotic exploration, commercial, military, battle-field surveillance, border control and health-related areas. Due to its open nature, the network is easily prone to DoS attacks and can have significant influence on the behavior of Wireless Sensor Networks (WSN). Because of node energy capability the node verification using crypto analysis is a difficult one. In this paper, use of spatial information is used to detect and localize the multiple adversaries in both same and different node identity. This paper describes the scalable and energy efficient cluster based anomaly detection (SEECAD) mechanism to identify DoS attacks without the key management schemes to increase the lifetime of the network. Detection rate, false positive rate, packet delivery ratio, overhead, energy consumption and average delay of packets are various types of network parameters by which the performance can be measured. The result shows that the hit rate is achieved and high reliability in detecting and localizing multiple adversaries than previous systems is also achieved.
引用
收藏
页码:2669 / 2691
页数:23
相关论文
共 20 条
  • [1] Akyildiz I.F., 2010, Wireless sensor networks, DOI DOI 10.1002/9780470515181
  • [2] New Two-Level μTESLA Protocol for IoT Environments
    Al Dhaheri, Alia
    Yeun, Chan Yeob
    Damiani, Ernesto
    [J]. 2019 IEEE WORLD CONGRESS ON SERVICES (IEEE SERVICES 2019), 2019, : 84 - 91
  • [3] Multilayer Perceptron: an Intelligent Model for Classification and Intrusion Detection
    Amato, Flora
    Mazzocca, Nicola
    Vivenzio, Emilio
    Moscato, Francesco
    [J]. 2017 31ST IEEE INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS (IEEE WAINA 2017), 2017, : 686 - 691
  • [4] Emotion identification by dynamic entropy and ensemble learning from electroencephalogram signals
    Ashokkumar, S. R.
    Anupallavi, S.
    MohanBabu, G.
    Premkumar, M.
    Jeevanantham, V
    [J]. INTERNATIONAL JOURNAL OF IMAGING SYSTEMS AND TECHNOLOGY, 2022, 32 (01) : 402 - 413
  • [5] Implementation of deep neural networks for classifying electroencephalogram signal using fractional S-transform for epileptic seizure detection
    Ashokkumar, S. R.
    Anupallavi, S.
    Premkumar, M.
    Jeevanantham, V.
    [J]. INTERNATIONAL JOURNAL OF IMAGING SYSTEMS AND TECHNOLOGY, 2021, 31 (02) : 895 - 908
  • [6] Efficient DDoS flood attack detection using dynamic thresholding on flow-based network traffic
    David, Jisa
    Thomas, Ciza
    [J]. COMPUTERS & SECURITY, 2019, 82 : 284 - 295
  • [7] Deep learning for cyber security intrusion detection: Approaches, datasets, and comparative study
    Ferrag, Mohamed Amine
    Maglaras, Leandros
    Moschoyiannis, Sotiris
    Janicke, Helge
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 50
  • [8] Gupta BB., 2020, HDB RES INTRUSION DE, P186
  • [9] IbPaKdE: Identity-based pairing free authenticated key and data exchange protocol for wireless sensor networks
    Lakshmanarao, K.
    Maringanti, Hima Bindu
    [J]. International Journal of Computational Intelligence Studies, 2020, 9 (04) : 320 - 335
  • [10] Menezes A.J., 2018, Handbook of Applied Cryptography, DOI DOI 10.1201/9780429466335