DoS Attack Detection Mechanism in Wireless Sensor Networks
DOI:
https://doi.org/10.56294/saludcyt2022244Keywords:
DOS, Trust Mechanism, Threshold Value, WSNAbstract
Wireless sensor networks (WSNs) are not like traditional networks in terms of their characteristics. Unlike WSN, in classic networks, networking mechanisms have decision-making power with reference to the management of an incoming packet only based on its internet protocol (IP) destination address. Assailant nodes can activate a denial of service (DoS) attack after entering the network. This research work focuses on tracing these collusive nodes by applying a trust-based scheme. The trust-based scheme includes measuring the degree of trust among all nodes. Nodes with minimum trust are designated as malicious nodes. Trust is measured based on the overall packets transferred during the time slot allotted. The node forwarding maximal packets and exploiting minimal assists will be tagged as malicious. The nascent architecture was deployed in NS2, and the outcomes were analysed based on particular performance metrics. To calculate trust, the overall packets forwarded by nodes in the allotted slot were considered. The node that transmits the largest number of packets and uses negligible assets was declared a vindictive node. This task implementation presents the approach in the NS2 software and analyses the results based on certain metrics
References
1. Chen H, Meng C, Shan Z, Fu Z, Bhargava BK. A Novel Low-Rate Denial of Service Attack Detection Approach in ZigBee Wireless Sensor Network by Combining Hilbert-Huang Transformation and Trust Evaluation. IEEE Access. 2019; 7:32853-66.
2. Kaur R, Sandhu JK. A Study on Security Attacks in Wireless Sensor Network. In: Proceedings of the 2021 International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE); 2021. p. 850-5.
3. Jilani SA, Koner C, Nandi S. Security in Wireless Sensor Networks: Attacks and Evasion. In: Proceedings of the 2020 National Conference on Emerging Trends on Sustainable Technology and Engineering Applications (NCETSTEA); 2020. p. 1-5.
4. Moorthy RH, Bangera V, Amrin Z, Avinash NJ, Rao NSK. WSN in Defence Field: A Security Overview. In: Proceedings of the 2020 Fourth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC); 2020. p. 258-64.
5. Gunduz S, Arslan B, Demirci M. A Review of Machine Learning Solutions to Denial-of-Services Attacks in Wireless Sensor Networks. In: Proceedings of the 2015 IEEE 14th International Conference on Machine Learning and Applications (ICMLA); 2015.
6. Mansouri D, Mokddad L, Ben-othman J, Ioualalen M. Preventing Denial of Service attacks in Wireless Sensor Networks. In: Proceedings of the 2015 IEEE International Conference on Communications (ICC); 2015.
7. Yang Z. Attack and Defense Game Strategy of Wireless Sensor Networks under Multiple Attacks. In: Proceedings of the 2019 Chinese Control Conference (CCC); 2019. p. 6349-56.
8. R D, Chinnaiyan R. Reliable Constrained Application Protocol to Sense and Avoid attacks in WSN for IoT Devices. In: Proceedings of the 2019 International Conference on Communication and Electronics Systems (ICCES); 2019. p. 1898-1901.
9. Pruthi V, Mittal K, Sharma N, Kaushik I. Network Layers Threats & its Countermeasures in WSNs. In: Proceedings of the 2019 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS); 2019. p. 156-63.
10. Bharti D, Nainta N, Monga H. Performance Analysis of Wireless Sensor Networks Under Adverse Scenario of Attack. In: Proceedings of the 2019 6th International Conference on Signal Processing and Integrated Networks (SPIN); 2019. p. 826-8.
11. Le T-T-H, Park T, Cho D, Kim H. An Effective Classification for DoS Attacks in Wireless Sensor Networks. 2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN); 2018. p. 689-692.
12. Lyu C, Zhang X, Liu Z, Chi C-H. Selective Authentication Based Geographic Opportunistic Routing in Wireless Sensor Networks for Internet of Things Against DoS Attacks. IEEE Access. 2019;7:31068-31082.
13. Rani P, Gupta NK. Composite Trust for Secure Routing Strategy through Energy based Clustering in WSN. 2021 International Conference on Advances in Electrical, Computing, Communication and Sustainable Technologies (ICAECT); 2021. p. 1-6.
14. Quincozes SE, Kazienko JF. Machine Learning Methods Assessment for Denial of Service Detection in Wireless Sensor Networks. 2020 IEEE 6th World Forum on Internet of Things (WF-IoT); 2020. p. 1-6.
15. Al-Akhras M, Al-Issa AI, Alsahli MS, Alawairdhi M. POSTER: Feature Selection to Optimize DoS Detection in Wireless Sensor Networks. 2020 First International Conference of Smart Systems and Emerging Technologies (SMARTTECH); 2020. p. 263-265.
16. Al-issa AI, Al-Akhras M, ALsahli MS, Alawairdhi M. Using Machine Learning to Detect DoS Attacks in Wireless Sensor Networks. 2019 IEEE Jordan International Joint Conference on Electrical Engineering and Information Technology (JEEIT); 2019. p. 107-112.
17. Premkumar M, Sundararajan TVP. DLDM: Deep learning-based defense mechanism for denial of service attacks in wireless sensor networks. Microprocessors and Microsystems. 2020;79:565-573.
18. Jinhui X, Yang T, Yao H. Intrusion Detection System for Hybrid DoS Attacks using Energy Trust in Wireless Sensor Networks. Procedia Computer Science. 2018;130:721-729.
19. Yang C, Liu F, Shen S, Qi J. An Energy-aware Approach with Spectrum Detection in Wireless Sensor Networks. 2021 IEEE 19th International Conference on Embedded and Ubiquitous Computing (EUC); 2021. p. 1-7.
20. Kurniawan MT, Yazid S. Mitigation and Detection Strategy of DoS Attack on Wireless Sensor Network Using Blocking Approach and Intrusion Detection System. 2020 International Conference on Electrical, Communication, and Computer Engineering (ICECCE); 2020. p. 1-5.
Published
Issue
Section
License
Copyright (c) 2022 Himani Sharma , Basheer Shajahan , Rajesh Elangovan , Manikandan Thirumalaisamy (Author)
This work is licensed under a Creative Commons Attribution 4.0 International License.
The article is distributed under the Creative Commons Attribution 4.0 License. Unless otherwise stated, associated published material is distributed under the same licence.