Localized DoS Attack Detection Architecture for Reliable Data Transmission Over Wireless Sensor Network

被引:10
作者
Anand, C. [1 ]
Gnanamurthy, R. K. [2 ]
机构
[1] KSR Coll Engn, Dept CSE, Tiruchengode, Tamil Nadu, India
[2] SKP Engn Coll, Tiruvannamalai, Tamil Nadu, India
关键词
Security; DoS attack; Selective forwarding; Hello flood; Intrusion detection system; Wireless sensor network; SECURITY;
D O I
10.1007/s11277-016-3231-y
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Due to the scattered nature of WSNs, resource constraints, the radio link for multi-hop communications and their remote area deployment, WSNs are exposed to several security attacks that can affect overall network performance. Therefore, security is the primary concern for improving the network performance, by detecting internal attacks to ensure the functionality of WSNs. For example, using a compromised node like an adversary could perform any attack pretending as a normal node of the network to acquire all the information is known as internal attack. Denial of Service (DoS) attacks are a set of attacks initiated by individual node or group of nodes by exploiting the transmission to deny other nodes from legitimate access to resources such as bandwidth, computing power and operating system. Some of the DoS attacks like selective forwarding and hello flood attacks are the most common attacks in WSN, which increases the resource scarcity among all the nodes in the network. In the proposed mechanism, an approach has been developed to resolve the issue of DoS attacks by implementing terminologies such as Intruder Detection System, authenticating nodes with a key mechanism and retracing routing path as an evasive action from the path involved with the victim node in the form of an internal attacker in the network. The primary focus of this proposed work is to contribute secure and reliable data transmission over source and destination by resolving DoS attack.
引用
收藏
页码:847 / 859
页数:13
相关论文
共 50 条
[41]   Node Capture Attack in Wireless Sensor Network: A Survey [J].
Bharathi, M. Vivekananda ;
Tanguturi, Rama Chaithanya ;
Jayakumar, C. ;
Selvamani, K. .
2012 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH (ICCIC), 2012, :340-342
[42]   A Lightweight Detection Mechanism against Sybil Attack in Wireless Sensor Network [J].
Shi, Wei ;
Liu, Sanyang ;
Zhang, Zhaohui .
KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2015, 9 (09) :3738-3750
[43]   Detection of Wormhole Attack and Secure Path Selection in Wireless Sensor Network [J].
N. Tamilarasi ;
S. G. Santhi .
Wireless Personal Communications, 2020, 114 :329-345
[44]   Detection of Wormhole Attack and Secure Path Selection in Wireless Sensor Network [J].
Tamilarasi, N. ;
Santhi, S. G. .
WIRELESS PERSONAL COMMUNICATIONS, 2020, 114 (01) :329-345
[45]   Delay aware energy efficient reliable routing for data transmission in heterogeneous mobile sink wireless sensor network [J].
Maurya, Sonam ;
Jain, Vinod Kumar ;
Chowdhury, Debanjan Roy .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2019, 144 :118-137
[46]   High Reliable In-Network Data Verification in Wireless Sensor Networks [J].
Dong-Wook Lee ;
Jai-Hoon Kim .
Wireless Personal Communications, 2010, 54 :501-519
[47]   High Reliable In-Network Data Verification in Wireless Sensor Networks [J].
Lee, Dong-Wook ;
Kim, Jai-Hoon .
WIRELESS PERSONAL COMMUNICATIONS, 2010, 54 (03) :501-519
[48]   Distributed DoS Attack Detection in SDN: Tradeoffs in Resource Constrained Wireless Networks [J].
Nunez Segura, Gustavo A. ;
Chorti, Arsenia ;
Margi, Cintia Borges .
2021 IEEE STATISTICAL SIGNAL PROCESSING WORKSHOP (SSP), 2021, :131-135
[49]   Detection of Masked Replication Attack in Wireless Sensor Networks [J].
Khan, Wazir Zada ;
Aalsalem, Mohammed Y. ;
Saad, Mohamad Naufal Mohamad .
PROCEEDINGS OF THE 2013 8TH IBERIAN CONFERENCE ON INFORMATION SYSTEMS AND TECHNOLOGIES (CISTI 2013), 2013,
[50]   Authenticated Data Transmission Technique for Clustered Wireless Sensor Network [J].
Tripathy, Asis Kumar ;
Chinara, Suchismita .
2014 9TH INTERNATIONAL CONFERENCE ON INDUSTRIAL AND INFORMATION SYSTEMS (ICIIS), 2014, :744-+