Scalable and Energy Efficient Cluster Based Anomaly Detection Against Denial of Service Attacks in Wireless Sensor Networks

被引:7
作者
Premkumar, M. [1 ]
Ashokkumar, S. R. [2 ]
Jeevanantham, V. [3 ]
Mohanbabu, G. [1 ]
AnuPallavi, S. [4 ]
机构
[1] SSM Inst Engn & Technol, Dept ECE, Dindigul, India
[2] Sri Eshwar Coll Engn, Dept CCE, Coimbatore, India
[3] Vel Tech Rangarajan Dr Sagunthala R&D Inst Sci & T, Dept CSE, Chennai, India
[4] VSB Coll Engn & Tech Campus, Dept ECE, Coimbatore, India
关键词
Cluster based routing; Wireless sensor network; Support vector machine; DoS attacks; Anomaly detection;
D O I
10.1007/s11277-023-10252-3
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Recently, with the meteoric evolution in the wireless communication technologies, countless real world applications which will reshape the way of seeking in robotic exploration, commercial, military, battle-field surveillance, border control and health-related areas. Due to its open nature, the network is easily prone to DoS attacks and can have significant influence on the behavior of Wireless Sensor Networks (WSN). Because of node energy capability the node verification using crypto analysis is a difficult one. In this paper, use of spatial information is used to detect and localize the multiple adversaries in both same and different node identity. This paper describes the scalable and energy efficient cluster based anomaly detection (SEECAD) mechanism to identify DoS attacks without the key management schemes to increase the lifetime of the network. Detection rate, false positive rate, packet delivery ratio, overhead, energy consumption and average delay of packets are various types of network parameters by which the performance can be measured. The result shows that the hit rate is achieved and high reliability in detecting and localizing multiple adversaries than previous systems is also achieved.
引用
收藏
页码:2669 / 2691
页数:23
相关论文
共 20 条
[1]  
Akyildiz I.F., 2010, Wireless Sensor Networks, DOI 10.1002/9780470515181
[2]   New Two-Level μTESLA Protocol for IoT Environments [J].
Al Dhaheri, Alia ;
Yeun, Chan Yeob ;
Damiani, Ernesto .
2019 IEEE WORLD CONGRESS ON SERVICES (IEEE SERVICES 2019), 2019, :84-91
[3]   Multilayer Perceptron: an Intelligent Model for Classification and Intrusion Detection [J].
Amato, Flora ;
Mazzocca, Nicola ;
Vivenzio, Emilio ;
Moscato, Francesco .
2017 31ST IEEE INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS (IEEE WAINA 2017), 2017, :686-691
[4]   Emotion identification by dynamic entropy and ensemble learning from electroencephalogram signals [J].
Ashokkumar, S. R. ;
Anupallavi, S. ;
MohanBabu, G. ;
Premkumar, M. ;
Jeevanantham, V .
INTERNATIONAL JOURNAL OF IMAGING SYSTEMS AND TECHNOLOGY, 2022, 32 (01) :402-413
[5]   Implementation of deep neural networks for classifying electroencephalogram signal using fractional S-transform for epileptic seizure detection [J].
Ashokkumar, S. R. ;
Anupallavi, S. ;
Premkumar, M. ;
Jeevanantham, V. .
INTERNATIONAL JOURNAL OF IMAGING SYSTEMS AND TECHNOLOGY, 2021, 31 (02) :895-908
[6]   Efficient DDoS flood attack detection using dynamic thresholding on flow-based network traffic [J].
David, Jisa ;
Thomas, Ciza .
COMPUTERS & SECURITY, 2019, 82 :284-295
[7]   Deep learning for cyber security intrusion detection: Approaches, datasets, and comparative study [J].
Ferrag, Mohamed Amine ;
Maglaras, Leandros ;
Moschoyiannis, Sotiris ;
Janicke, Helge .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 50
[8]  
Gupta BB., 2020, HDB RES INTRUSION DE, P186
[9]   IbPaKdE: Identity-based pairing free authenticated key and data exchange protocol for wireless sensor networks [J].
Lakshmanarao, K. ;
Maringanti, Hima Bindu .
International Journal of Computational Intelligence Studies, 2020, 9 (04) :320-335
[10]  
Menezes A., 2018, Handbook of applied cryptography, DOI 10.1201/9780429466335