Skip to main content
Top
Published in: Cluster Computing 6/2019

19-03-2018

Detection of denial of service attacks by domination graph application in wireless sensor networks

Authors: S. Balaji, T. Sasilatha

Published in: Cluster Computing | Special Issue 6/2019

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

In many web services systems, need extended confirmation of confidential information including access control policies, which are cryptographically certified for secure data exchanges in wireless sensor networks. The domination set in graph theory enriches many applications in the field of networks. One of the application with the novel procedure named school bus routing approach is proposed, which can coordinate the characteristics of the system, with the goal of detection of denial of service attacks. This strategy is employed that is most powerful adequate to schedule the sensor nodes in such a route, to the point that it monitors the network traffic for identification of source of attack and for the denial of service provision to the users. The throughput, packet loss ratio and packet delivery results were simulated and analyzed in the network based on the implementation of proposed routing approach. Our approach is more resilient for incorporation environment.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Cardei, M., Du, D.: Improving wireless sensor network lifetime through power aware organization. Wirel. Netw. 11, 333–340 (2005)CrossRef Cardei, M., Du, D.: Improving wireless sensor network lifetime through power aware organization. Wirel. Netw. 11, 333–340 (2005)CrossRef
2.
go back to reference Huang, Y., Lee, W.: A cooperative intrusion detection system for ad hoc networks. In: SASN’03: Proceedings of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks, Fairfax, VA, pp. 135–147 (2003) Huang, Y., Lee, W.: A cooperative intrusion detection system for ad hoc networks. In: SASN’03: Proceedings of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks, Fairfax, VA, pp. 135–147 (2003)
3.
go back to reference Khan, A.R.: Energy efficient protocol design issues in wireless sensor networks. J. Inf. Commun. Technol. 4(1), 12–18 (2010)MathSciNet Khan, A.R.: Energy efficient protocol design issues in wireless sensor networks. J. Inf. Commun. Technol. 4(1), 12–18 (2010)MathSciNet
4.
go back to reference Bredin, J.L., Demaine, E.D.: Deploying sensor networks with guaranteed capacity and fault tolerance. In: Proceedings of the 6th ACM International Symposium on Mobile Ad Hoc Networking and Computing, pp. 309–319 (2005) Bredin, J.L., Demaine, E.D.: Deploying sensor networks with guaranteed capacity and fault tolerance. In: Proceedings of the 6th ACM International Symposium on Mobile Ad Hoc Networking and Computing, pp. 309–319 (2005)
5.
go back to reference Frank, C.: Facility location. In: Algorithms for Sensor and Ad Hoc Networks, pp. 131–159. Springer, Berlin (2007) Frank, C.: Facility location. In: Algorithms for Sensor and Ad Hoc Networks, pp. 131–159. Springer, Berlin (2007)
6.
go back to reference Tan, G., Jarvis, S.A., Kermarrec, A.-M.: Connectivity guaranteed and obstacle-adaptive deployment schemes for mobile sensor networks. IEEE Sens. J. 14(3), 1–14 (2009) Tan, G., Jarvis, S.A., Kermarrec, A.-M.: Connectivity guaranteed and obstacle-adaptive deployment schemes for mobile sensor networks. IEEE Sens. J. 14(3), 1–14 (2009)
7.
go back to reference Bai, X., Yun, Z., Xuan, D., Lai, T.H., Jia, W.: Optimal patterns for four-connectivity and full coverage in wireless sensor networks. IEEE Trans. Mob. Comput. 9(3), 435–448 (2010)CrossRef Bai, X., Yun, Z., Xuan, D., Lai, T.H., Jia, W.: Optimal patterns for four-connectivity and full coverage in wireless sensor networks. IEEE Trans. Mob. Comput. 9(3), 435–448 (2010)CrossRef
8.
go back to reference Chang, J.H., Tassiulas, L.: Maximum lifetime routing in wireless sensor networks. IEEE/ACM Trans. Netw. 12, 609–619 (2004)CrossRef Chang, J.H., Tassiulas, L.: Maximum lifetime routing in wireless sensor networks. IEEE/ACM Trans. Netw. 12, 609–619 (2004)CrossRef
9.
go back to reference Gope, P., Lee, J., Quek, T.Q.S.: Resilience of DoS attacks in designing anonymous user authentication protocol for wireless sensor networks. IEEE Sens. J. 17(2), 498–503 (2017)CrossRef Gope, P., Lee, J., Quek, T.Q.S.: Resilience of DoS attacks in designing anonymous user authentication protocol for wireless sensor networks. IEEE Sens. J. 17(2), 498–503 (2017)CrossRef
10.
go back to reference Gogu, N.D., Dilo, A., Meratnia, N.: Optimization problems in wireless sensor networks. In: IEEE Xplore, Complex, Intelligent and Software Intensive Systems, Seoul, pp. 302–309 (2011) Gogu, N.D., Dilo, A., Meratnia, N.: Optimization problems in wireless sensor networks. In: IEEE Xplore, Complex, Intelligent and Software Intensive Systems, Seoul, pp. 302–309 (2011)
11.
go back to reference Yildiz, H.U., Tavli, B., Kahjogh, B.O., Dogdu, E.: The impact of incapacitation of multiple critical sensor nodes on wireless sensor network lifetime. IEEE Wirel. Commun. Lett. 6(3), 306–309 (2017)CrossRef Yildiz, H.U., Tavli, B., Kahjogh, B.O., Dogdu, E.: The impact of incapacitation of multiple critical sensor nodes on wireless sensor network lifetime. IEEE Wirel. Commun. Lett. 6(3), 306–309 (2017)CrossRef
12.
go back to reference Wu, K., Gao, Y., Li, F., Xiao, Y.: Lightweight deployment-aware scheduling for wireless sensor networks. Mob. Netw. Appl. 10(6), 837–852 (2005).CrossRef Wu, K., Gao, Y., Li, F., Xiao, Y.: Lightweight deployment-aware scheduling for wireless sensor networks. Mob. Netw. Appl. 10(6), 837–852 (2005).CrossRef
13.
go back to reference Li, Y., Quevedo, D.E., Dey, S., Shi, L.: SINR-based DoS attack on remote state estimation: a game-theoretic approach. IEEE Trans. Control Netw. Syst. 4(3), 632–642 (2017)MathSciNetCrossRef Li, Y., Quevedo, D.E., Dey, S., Shi, L.: SINR-based DoS attack on remote state estimation: a game-theoretic approach. IEEE Trans. Control Netw. Syst. 4(3), 632–642 (2017)MathSciNetCrossRef
14.
go back to reference Mahlous, A.R., Tounsi, M.: Operation research based techniques in wireless sensors networks. Commun. Netw. 9, 54–70 (2017)CrossRef Mahlous, A.R., Tounsi, M.: Operation research based techniques in wireless sensors networks. Commun. Netw. 9, 54–70 (2017)CrossRef
15.
go back to reference Illiano, V.P., Lupu, E.C.: Detecting malicious data injections in event detection wireless sensor networks. IEEE Trans. Netw. Serv. Manag. 12(3), 495–510 (2015)CrossRef Illiano, V.P., Lupu, E.C.: Detecting malicious data injections in event detection wireless sensor networks. IEEE Trans. Netw. Serv. Manag. 12(3), 495–510 (2015)CrossRef
Metadata
Title
Detection of denial of service attacks by domination graph application in wireless sensor networks
Authors
S. Balaji
T. Sasilatha
Publication date
19-03-2018
Publisher
Springer US
Published in
Cluster Computing / Issue Special Issue 6/2019
Print ISSN: 1386-7857
Electronic ISSN: 1573-7543
DOI
https://doi.org/10.1007/s10586-018-2504-5

Other articles of this Special Issue 6/2019

Cluster Computing 6/2019 Go to the issue

Premium Partner