Novel DoS Attack Detection Based on Trust Mode Authentication for IoT

被引:5
作者
Yuvaraj, D. [1 ]
Priya, S. Shanmuga [2 ]
Braveen, M. [3 ]
Krishnan, S. Navaneetha [4 ]
Nachiyappan, S. [3 ]
Mehbodniya, Abolfazl [5 ]
Ahamed, A. Mohamed Uvaze [6 ]
Sivaram, M. [7 ]
机构
[1] Cihan Univ, Dept Comp Sci & Engn, Duhok, Kurdistan Regio, Iraq
[2] MIET Engn Coll, Dept Comp Sci & Engn, Trichy, Tamil Nadu, India
[3] Vellore Inst Technol, Sch Comp Sci & Engn, Chennai, Tamil Nadu, India
[4] SACS MAVMM Engn Coll, Dept Elect & Commun Engn, Madurai, Tamil Nadu, India
[5] Kuwait Coll Sci & Technol KCST, Dept Elect & Commun Engn, Kuwait, Kuwait
[6] Qala Univ Coll, Dept Informat Technol, Erbil, Kurdistan Regio, Iraq
[7] Labanese French Univ, Res Ctr, Erbil, Iraq
关键词
Wireless sensor networks; dimensionality reduction based hilbert-huang transformation; authentication trust model; kolmogorov_smirnov; reliability; stability; SECURITY;
D O I
10.32604/iasc.2022.022151
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Wireless sensor networks are extensively utilized as a communication mechanism in the field of the Internet of Things (IoT). Along with these services, numerous IoT based applications need stabilized transmission or delivery over unbalanced wireless connections. To ensure the stability of data packets delivery, prevailing works exploit diverse geographical routing with multi-hop forwarders in WSNs. Furthermore, critical Denial of Service (DoS) attacks frequently has an impact on these techniques, where an enormous amount of invalid data starts replicating and transmitted to receivers to prevent Wireless Sensor Networks (WSN) communication. In this investigation, a novel adaptive endorsement method is designed by combining dimensionality reduction based Hilbert-Huang Transformation (DR-HHT) and authentication trust mode (ATM). DR-HHT and ATM defend against the severity of DoS attacks, by fulfilling trust, reliability, stability requirements. ATM also examines the state information (SI) of nodes in wireless links; this SI leverages the performance of ATM to enhance data delivery effectually. Dissimilar to existing routing protocols, DR-HHT and ATM guarantee data integrity by building Kolmogorov_Smirnov based authentication algorithms. Concerning the correlation coefficient, this model isolates DoS attacks and diminishes computational cost. This strategy also eliminates duplicate data transmission and redundant information, offering an effectual trust-based evaluation model from adaptive authentication. Extensive simulation demonstrates that the anticipated model shows a better trade-off than the prevailing techniques and the simulation is carried out in a MATLAB environment.
引用
收藏
页码:1505 / 1522
页数:18
相关论文
共 30 条
[1]   Routing techniques in wireless sensor networks: A survey [J].
Al-Karaki, JN ;
Kamal, AE .
IEEE WIRELESS COMMUNICATIONS, 2004, 11 (06) :6-28
[2]   The Internet of Things: A survey [J].
Atzori, Luigi ;
Iera, Antonio ;
Morabito, Giacomo .
COMPUTER NETWORKS, 2010, 54 (15) :2787-2805
[3]  
Ayoobkhan M. U. A., 2021, RES ADVANCEMENTS SMA, P330, DOI [10.4018/978-1-7998-3970-5.ch016, DOI 10.4018/978-1-7998-3970-5.CH016]
[4]   Understanding Internet DDoS Mitigation from Academic and Industrial Perspectives [J].
Cao, Yuan ;
Gao, Yuan ;
Tan, Rongjun ;
Han, Qingbang ;
Liu, Zhuotao .
IEEE ACCESS, 2018, 6 :66641-66648
[5]  
Cheng L, 2015, 2015 12TH ANNUAL IEEE INTERNATIONAL CONFERENCE ON SENSING, COMMUNICATION, AND NETWORKING (SECON), P46, DOI 10.1109/SAHCN.2015.7338290
[6]   QoS Aware Geographic Opportunistic Routing in Wireless Sensor Networks [J].
Cheng, Long ;
Niu, Jianwei ;
Cao, Jiannong ;
Das, Sajal K. ;
Gu, Yu .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2014, 25 (07) :1864-1875
[7]   Cloud security defence to protect cloud computing against HTTP-DoS and XML-DoS attacks [J].
Chonka, Ashley ;
Xiang, Yang ;
Zhou, Wanlei ;
Bonti, Alessio .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2011, 34 (04) :1097-1107
[8]  
Li S., 2010, INT J WIREL MOBILE N, V2, P110
[9]   Opportunistic Routing Algorithm for Relay Node Selection in Wireless Sensor Networks [J].
Luo, Juan ;
Hu, Jinyu ;
Wu, Di ;
Li, Renfa .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2015, 11 (01) :112-121
[10]   SGOR: Secure and scalable geographic opportunistic routing with received signal strength in WSNs [J].
Lyu, Chen ;
Gu, Dawu ;
Zhang, Xiaomei ;
Sun, Shifeng ;
Zhang, Yuanyuan ;
Pande, Amit .
COMPUTER COMMUNICATIONS, 2015, 59 :37-51