DLDM: Deep learning-based defense mechanism for denial of service attacks in wireless sensor networks

被引:61
作者
Premkumar, M. [1 ]
Sundararajan, T. V. P. [2 ]
机构
[1] SSM Inst Engn & Technol, Dept ECE, Dindigul, India
[2] Sri Shakthi Inst Engn & Technol, Dept ECE, Coimbatore, Tamil Nadu, India
关键词
Attack detection; Cluster-based key management; Countermeasures; Deep learning; Wireless sensor networks; DDOS ATTACKS; MITIGATION;
D O I
10.1016/j.micpro.2020.103278
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Wireless Sensor Networks (WSNs) include small battery-based self-governing devices that are deployed in a distributed manner to supervise the environmental or physical circumstances. The routers and gateways are connected to the deployed nodes to support many real-time applications. Due to open access, the security issue arises in WSN. In this circumstance, the external users can be verified by securing authentication is necessary one. In real-time applications, to achieve secured communication they have made many lightweight authentication mechanisms. But WSNs are highly susceptible to DoS attacks as it lacks the synchronization between nodes during data routing. In this paper, a new lightweight DoS detection scheme Deep Learning-based Defense Mechanism (DLDM) has proposed to detect and isolate the attacks in Data Forwarding Phase (DFP). This paper describes the new algorithm for the successful detection of DoS attacks, such as exhaustion, jamming, homing, and flooding. We conduct extensive simulation experiments that can accurately isolate the adversaries and it is more resilient to DoS attacks. Our proposed simulation result shows that it can achieve a high detection rate, throughput, packet delivery ratio, and accuracy. This also reduces the energy consumption and the false alarm rate.
引用
收藏
页数:10
相关论文
共 41 条
[1]   DDoS attacks in WSNs: detection and countermeasures [J].
Abidoye, Ademola P. ;
Obagbuwa, Ibidun C. .
IET WIRELESS SENSOR SYSTEMS, 2018, 8 (02) :52-59
[2]   Security in Software Defined Networks: A Survey [J].
Ahmad, Ijaz ;
Namal, Suneth ;
Ylianttila, Mika ;
Gurtov, Andrei .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2015, 17 (04) :2317-2346
[3]   WSN-DS: A Dataset for Intrusion Detection Systems in Wireless Sensor Networks [J].
Almomani, Iman ;
Al-Kasasbeh, Bassam ;
AL-Akhras, Mousa .
JOURNAL OF SENSORS, 2016, 2016
[4]  
[Anonymous], 2016, ARXIV161107400
[5]   Extreme learning adaptive neuro-fuzzy inference system model for classifying the epilepsy using Q-Tuned wavelet transform [J].
Ashokkumar, S. R. ;
MohanBabu, G. .
JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2020, 39 (01) :233-248
[6]   D-FACE: An anomaly based distributed approach for early detection of DDoS attacks and flash events [J].
Behal, Sunny ;
Kumar, Krishan ;
Sachdeva, Monika .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2018, 111 :49-63
[7]   An anomaly based distributed detection system for DDoS attacks in Tier-2 ISP networks [J].
Bhandari, Abhinav ;
Kumar, Krishan ;
Sangal, A. L. ;
Behal, Sunny .
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2021, 12 (01) :1387-1406
[8]   Distributed denial of service (DDoS) attack mitigation in software defined network (SDN)-based cloud computing environment [J].
Bhushan, Kriti ;
Gupta, B. B. .
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2019, 10 (05) :1985-1997
[9]   Self-organization in mobile ad hoc networks:: The approach of terminodes [J].
Blazevic, L ;
Buttyán, L ;
Capkun, S ;
Giordano, S ;
Hubaux, JP ;
Le Boudec, JY .
IEEE COMMUNICATIONS MAGAZINE, 2001, 39 (06) :166-174
[10]   A Survey of Intrusion Detection Systems in Wireless Sensor Networks [J].
Butun, Ismail ;
Morgera, Salvatore D. ;
Sankar, Ravi .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2014, 16 (01) :266-282