Localized DoS Attack Detection Architecture for Reliable Data Transmission Over Wireless Sensor Network

被引:9
|
作者
Anand, C. [1 ]
Gnanamurthy, R. K. [2 ]
机构
[1] KSR Coll Engn, Dept CSE, Tiruchengode, Tamil Nadu, India
[2] SKP Engn Coll, Tiruvannamalai, Tamil Nadu, India
关键词
Security; DoS attack; Selective forwarding; Hello flood; Intrusion detection system; Wireless sensor network; SECURITY;
D O I
10.1007/s11277-016-3231-y
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Due to the scattered nature of WSNs, resource constraints, the radio link for multi-hop communications and their remote area deployment, WSNs are exposed to several security attacks that can affect overall network performance. Therefore, security is the primary concern for improving the network performance, by detecting internal attacks to ensure the functionality of WSNs. For example, using a compromised node like an adversary could perform any attack pretending as a normal node of the network to acquire all the information is known as internal attack. Denial of Service (DoS) attacks are a set of attacks initiated by individual node or group of nodes by exploiting the transmission to deny other nodes from legitimate access to resources such as bandwidth, computing power and operating system. Some of the DoS attacks like selective forwarding and hello flood attacks are the most common attacks in WSN, which increases the resource scarcity among all the nodes in the network. In the proposed mechanism, an approach has been developed to resolve the issue of DoS attacks by implementing terminologies such as Intruder Detection System, authenticating nodes with a key mechanism and retracing routing path as an evasive action from the path involved with the victim node in the form of an internal attacker in the network. The primary focus of this proposed work is to contribute secure and reliable data transmission over source and destination by resolving DoS attack.
引用
收藏
页码:847 / 859
页数:13
相关论文
共 50 条
  • [21] ADSMS: ANOMALY DETECTION SCHEME FOR MITIGATING SINK HOLE ATTACK IN WIRELESS SENSOR NETWORK
    Yasin, N. Mohammaed
    Balaji, N.
    Sambasivam, G.
    Basha, M. S. Saleem
    Sujatha, P.
    2017 INTERNATIONAL CONFERENCE ON TECHNICAL ADVANCEMENTS IN COMPUTERS AND COMMUNICATIONS (ICTACC), 2017, : 154 - 159
  • [22] On securing Wireless Sensor Network-Novel authentication scheme against DOS attacks
    Raja, K. Nirmal
    Beno, M. Marsaline
    JOURNAL OF MEDICAL SYSTEMS, 2014, 38 (10)
  • [23] On securing Wireless Sensor Network-Novel authentication scheme against DOS attacks
    K. Nirmal Raja
    M. Marsaline Beno
    Journal of Medical Systems, 2014, 38
  • [24] Detection and Defence of Sinkhole Attack in Wireless Sensor Network
    Jin Qi
    Tang Hong
    Kuang Xiaohui
    Liu Qiang
    PROCEEDINGS OF 2012 IEEE 14TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, 2012, : 809 - 813
  • [25] Detection and Mitigation of Sinkhole Attack in wireless sensor network
    Kaur, Manpreet
    Singh, Amarvir
    2016 INTERNATIONAL CONFERENCE ON MICRO-ELECTRONICS AND TELECOMMUNICATION ENGINEERING (ICMETE), 2016, : 217 - 221
  • [26] A Reliable Routing Method for Transmission Monitoring Wireless Sensor Network
    Zhang, Zehao
    Peng, Lin
    Wang, He
    Sun, Jin
    Chang, Tao
    Zhuo, Ling
    2017 IEEE CONFERENCE ON ENERGY INTERNET AND ENERGY SYSTEM INTEGRATION (EI2), 2017,
  • [27] iWAD: An Improved Wormhole Attack Detection System for Wireless Sensor Network
    Dani, Virendra
    Bhonde, Radha
    Mandloi, Ayesha
    INTELLIGENT SYSTEMS DESIGN AND APPLICATIONS, ISDA 2021, 2022, 418 : 1002 - 1012
  • [28] Secure and Energy Efficient Based Healthcare Data Transmission Wireless Sensor Network
    Sivaranjani, R.
    Kumar, A. V. Senthil
    PROCEEDING OF THE INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS, BIG DATA AND IOT (ICCBI-2018), 2020, 31 : 327 - 333
  • [29] Reliable and Prioritized Data Transmission Protocol for Wireless Sensor Networks
    Sarode, Sambhaji
    Bakal, Jagdish
    Malik, L. G.
    PROCEEDINGS OF THE INTERNATIONAL CONGRESS ON INFORMATION AND COMMUNICATION TECHNOLOGY, ICICT 2015, VOL 2, 2016, 439 : 535 - 544
  • [30] DoS attack prevention technique in Wireless Sensor Networks
    Patil, Shital
    Chaudhari, Sangita
    PROCEEDINGS OF INTERNATIONAL CONFERENCE ON COMMUNICATION, COMPUTING AND VIRTUALIZATION (ICCCV) 2016, 2016, 79 : 715 - 721