Localized DoS Attack Detection Architecture for Reliable Data Transmission Over Wireless Sensor Network

被引:9
|
作者
Anand, C. [1 ]
Gnanamurthy, R. K. [2 ]
机构
[1] KSR Coll Engn, Dept CSE, Tiruchengode, Tamil Nadu, India
[2] SKP Engn Coll, Tiruvannamalai, Tamil Nadu, India
关键词
Security; DoS attack; Selective forwarding; Hello flood; Intrusion detection system; Wireless sensor network; SECURITY;
D O I
10.1007/s11277-016-3231-y
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Due to the scattered nature of WSNs, resource constraints, the radio link for multi-hop communications and their remote area deployment, WSNs are exposed to several security attacks that can affect overall network performance. Therefore, security is the primary concern for improving the network performance, by detecting internal attacks to ensure the functionality of WSNs. For example, using a compromised node like an adversary could perform any attack pretending as a normal node of the network to acquire all the information is known as internal attack. Denial of Service (DoS) attacks are a set of attacks initiated by individual node or group of nodes by exploiting the transmission to deny other nodes from legitimate access to resources such as bandwidth, computing power and operating system. Some of the DoS attacks like selective forwarding and hello flood attacks are the most common attacks in WSN, which increases the resource scarcity among all the nodes in the network. In the proposed mechanism, an approach has been developed to resolve the issue of DoS attacks by implementing terminologies such as Intruder Detection System, authenticating nodes with a key mechanism and retracing routing path as an evasive action from the path involved with the victim node in the form of an internal attacker in the network. The primary focus of this proposed work is to contribute secure and reliable data transmission over source and destination by resolving DoS attack.
引用
收藏
页码:847 / 859
页数:13
相关论文
共 50 条
  • [21] A Reliable and Intelligent Protocol for Distributed Data Mining Architecture in Sporadic Wireless Sensor Network
    Wagan, Asif Ali
    Jung, Low Tang
    2015 INTERNATIONAL SYMPOSIUM ON MATHEMATICAL SCIENCES AND COMPUTING RESEARCH (ISMSC), 2015, : 202 - 207
  • [22] A Low Cost Reliable Data Transmission Protocol over Multipath in Wireless Sensor Networks
    Gou, Haosong
    Yoo, Younghwan
    2012 IEEE 26TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA), 2012, : 810 - 816
  • [23] Energy Concerned Clustering Mechanism to Ensure Reliable Data Transmission in Wireless Sensor Network
    Manasa P.
    Shaila K.
    Venugopal K.R.
    SN Computer Science, 2021, 2 (4)
  • [24] Data Transmission Reduction in Wireless Sensor Network for Spatial Event Detection
    Lewandowski, Marcin
    Placzek, Bartlomiej
    SENSORS, 2021, 21 (21)
  • [25] WARIM: Wireless sensor network Architecture for a Reliable Intersection Monitoring
    Komguem, Rodrigue Domga
    Stanica, Razvan
    Tchuente, Maurice
    Valois, Fabice
    2014 IEEE 17TH INTERNATIONAL CONFERENCE ON INTELLIGENT TRANSPORTATION SYSTEMS (ITSC), 2014, : 1226 - 1231
  • [26] A Reliable Protocol For Multimedia Transmission Over Wireless Sensor Networks
    Xuan-Thuan Nguyen
    Hong-Thu Nguyen
    Cong-Kha Pham
    2015 11TH CONFERENCE ON PH.D. RESEARCH IN MICROELECTRONICS AND ELECTRONICS (PRIME), 2015, : 302 - 305
  • [27] DoS attack detection using online learning techniques in wireless sensor networks
    Lai, Trinh Thuc
    Tran, Tuan Phong
    Cho, Jaehyuk
    Yoo, Myungsik
    ALEXANDRIA ENGINEERING JOURNAL, 2023, 85 : 307 - 319
  • [28] False Data Injection Attack on Distributed State Estimation over a Wireless Sensor Network
    Lei Li
    Yang Wen
    Yang Chao
    Shi Hongbo
    Yan Huaicheng
    PROCEEDINGS OF THE 35TH CHINESE CONTROL CONFERENCE 2016, 2016, : 8108 - 8113
  • [29] Detection and Defence of Sinkhole Attack in Wireless Sensor Network
    Jin Qi
    Tang Hong
    Kuang Xiaohui
    Liu Qiang
    PROCEEDINGS OF 2012 IEEE 14TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, 2012, : 809 - 813
  • [30] Detection and mitigation of sinkhole attack in wireless sensor network
    2016, Institute of Electrical and Electronics Engineers Inc., United States