Localized DoS Attack Detection Architecture for Reliable Data Transmission Over Wireless Sensor Network

被引:10
作者
Anand, C. [1 ]
Gnanamurthy, R. K. [2 ]
机构
[1] KSR Coll Engn, Dept CSE, Tiruchengode, Tamil Nadu, India
[2] SKP Engn Coll, Tiruvannamalai, Tamil Nadu, India
关键词
Security; DoS attack; Selective forwarding; Hello flood; Intrusion detection system; Wireless sensor network; SECURITY;
D O I
10.1007/s11277-016-3231-y
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Due to the scattered nature of WSNs, resource constraints, the radio link for multi-hop communications and their remote area deployment, WSNs are exposed to several security attacks that can affect overall network performance. Therefore, security is the primary concern for improving the network performance, by detecting internal attacks to ensure the functionality of WSNs. For example, using a compromised node like an adversary could perform any attack pretending as a normal node of the network to acquire all the information is known as internal attack. Denial of Service (DoS) attacks are a set of attacks initiated by individual node or group of nodes by exploiting the transmission to deny other nodes from legitimate access to resources such as bandwidth, computing power and operating system. Some of the DoS attacks like selective forwarding and hello flood attacks are the most common attacks in WSN, which increases the resource scarcity among all the nodes in the network. In the proposed mechanism, an approach has been developed to resolve the issue of DoS attacks by implementing terminologies such as Intruder Detection System, authenticating nodes with a key mechanism and retracing routing path as an evasive action from the path involved with the victim node in the form of an internal attacker in the network. The primary focus of this proposed work is to contribute secure and reliable data transmission over source and destination by resolving DoS attack.
引用
收藏
页码:847 / 859
页数:13
相关论文
共 24 条
[1]   Wireless sensor networks: a survey [J].
Akyildiz, IF ;
Su, W ;
Sankarasubramaniam, Y ;
Cayirci, E .
COMPUTER NETWORKS, 2002, 38 (04) :393-422
[2]  
[Anonymous], AD HOC NETWORKS, DOI DOI 10.1016/S1570-8705(03)00008-8
[3]   Wireless security is different [J].
Arbaugh, WA .
COMPUTER, 2003, 36 (08) :99-101
[4]  
Bo Yu, 2006, Proceedings. 20th International Parallel and Distributed Processing Symposium (IEEE Cat. No.06TH8860)
[5]   Detection of selective forwarding attacks in heterogeneous sensor networks [J].
Brown, Jeremy ;
Du, Xiaojiang .
2008 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, PROCEEDINGS, VOLS 1-13, 2008, :1583-1587
[6]  
Bysani L.K., 2011, 2011 INT C DEV COMM, P1, DOI 10.1109/ICDECOM.2011.5738547
[7]   Safety Risk System of High or Large Formwork Support System and Its Assessment at Construction Stage [J].
Li Guibing ;
Guo Yugang ;
Wang Laili .
2010 INTERNATIONAL CONFERENCE ON MANAGEMENT SCIENCE AND SAFETY ENGINEERING (MSSE 2010), VOLS I AND II, 2010, :554-557
[8]  
Hamid MA, 2006, 8TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY, VOLS 1-3, pU314
[9]  
Hanapi Zurina Mohd, 2009, American Journal of Engineering and Applied Sciences, V2, P494, DOI 10.3844/ajeassp.2009.494.500
[10]  
Huang X, 2012, LECT NOTES ENG COMP, P374