Localized DoS Attack Detection Architecture for Reliable Data Transmission Over Wireless Sensor Network

被引:10
作者
Anand, C. [1 ]
Gnanamurthy, R. K. [2 ]
机构
[1] KSR Coll Engn, Dept CSE, Tiruchengode, Tamil Nadu, India
[2] SKP Engn Coll, Tiruvannamalai, Tamil Nadu, India
关键词
Security; DoS attack; Selective forwarding; Hello flood; Intrusion detection system; Wireless sensor network; SECURITY;
D O I
10.1007/s11277-016-3231-y
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Due to the scattered nature of WSNs, resource constraints, the radio link for multi-hop communications and their remote area deployment, WSNs are exposed to several security attacks that can affect overall network performance. Therefore, security is the primary concern for improving the network performance, by detecting internal attacks to ensure the functionality of WSNs. For example, using a compromised node like an adversary could perform any attack pretending as a normal node of the network to acquire all the information is known as internal attack. Denial of Service (DoS) attacks are a set of attacks initiated by individual node or group of nodes by exploiting the transmission to deny other nodes from legitimate access to resources such as bandwidth, computing power and operating system. Some of the DoS attacks like selective forwarding and hello flood attacks are the most common attacks in WSN, which increases the resource scarcity among all the nodes in the network. In the proposed mechanism, an approach has been developed to resolve the issue of DoS attacks by implementing terminologies such as Intruder Detection System, authenticating nodes with a key mechanism and retracing routing path as an evasive action from the path involved with the victim node in the form of an internal attacker in the network. The primary focus of this proposed work is to contribute secure and reliable data transmission over source and destination by resolving DoS attack.
引用
收藏
页码:847 / 859
页数:13
相关论文
共 50 条
  • [31] SECURITY AND EFFICIENT DATA DISSEMINATION OVER WIRELESS SENSOR NETWORK WITH RAPTOR CODES
    Liao, Jian-Xin
    Zhang, Lei
    Wang, Jing-Yu
    Liao, Min-Yan
    Qi, Qi
    Xu, Tong
    PROCEEDINGS OF 2013 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS (ICMLC), VOLS 1-4, 2013, : 1596 - 1600
  • [32] Detection and Prevention Mechanism for Blackhole Attack in Wireless Sensor Network
    Wazid, Mohammad
    Katal, Avita
    Sachan, Roshan Singh
    Goudar, R. H.
    Singh, D. P.
    2013 INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND SIGNAL PROCESSING (ICCSP), 2013, : 576 - 581
  • [33] Sybil Attack Detection Based on RSSI for Wireless Sensor Network
    Wang, Jiangtao
    Yang, Geng
    Sun, Yuan
    Chen, Shengshou
    2007 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-15, 2007, : 2684 - 2687
  • [34] The Relay Scheme over MAC for Data Transmission Performance in Railway Wireless Sensor Network
    Lim, Sun-Hwa
    Kim, Hannah
    Kim, Young-il
    Ryu, Won
    2014 16TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT), 2014, : 1008 - 1011
  • [35] TinyAFD: Attack and Fault Detection Framework for Wireless Sensor Networks
    Rughinis, Razvan
    Gheorghe, Laura
    CONTROL ENGINEERING AND APPLIED INFORMATICS, 2013, 15 (01): : 33 - 44
  • [36] Reliable Energy Efficient Trust based data transmission for Dynamic Wireless Sensor Networks
    Narendrakumar, A.
    2017 INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING, INSTRUMENTATION AND CONTROL TECHNOLOGIES (ICICICT), 2017, : 190 - 194
  • [37] Efficient and Secure Data Transmission and Sinkhole Detection in a Multi-Clustering Wireless Sensor Network Based on Homomorphic Encryption and Watermarking
    Babaeer, Huda A.
    Al-Ahmadi, Saad A.
    IEEE ACCESS, 2020, 8 (92098-92109) : 92098 - 92109
  • [38] A Data-driven Architecture for Remote Control of Sensors over a Wireless Sensor Network and the Internet
    Chang, Yuan-Jen
    Chen, Chin-Hsing
    Huang, Wen-Tzeng
    Chen, You-Yin
    Kuo, Chih-Yuan
    2009 10TH INTERNATIONAL SYMPOSIUM ON PERVASIVE SYSTEMS, ALGORITHMS, AND NETWORKS (ISPAN 2009), 2009, : 344 - +
  • [39] Improved Deep Convolutional Neural Network Based Malicious Node Detection and Energy-Efficient Data Transmission in Wireless Sensor Networks
    Kumar, Mohit
    Mukherjee, Priya
    Kavita
    Verma, Sahil
    Rawat, Danda B.
    IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2022, 9 (05): : 3272 - 3281
  • [40] Sinkhole attack detection and avoidance mechanism for RPL in wireless sensor networks
    Jamil A.
    Ali M.Q.
    Abd Alkhalec M.E.
    Annals of Emerging Technologies in Computing, 2021, 5 (Special issue 5) : 94 - 101