Skip to main content
Erschienen in: Soft Computing 14/2020

06.12.2019 | Methodologies and Application

Enhancement of security using optimized DoS (denial-of-service) detection algorithm for wireless sensor network

verfasst von: E. Suryaprabha, N. M. Saravana Kumar

Erschienen in: Soft Computing | Ausgabe 14/2020

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Wireless sensor networks involved every part of application in today’s life. This can detect the various type of information from environment and communicated to users in real time. Information is stored by using cloud technology and that can be accessed by the users. The information is prone to attacks as they are part of cooperative communication. Building algorithms at node level is not secured as they transfer data in open traffic. This has provided scope for this study to concentrate on algorithms that are available for denial-of-service attacks as they put down the network performance to a less minimum. The paper henceforth proposes optimized energy-based constraint DoS (denial-of-service) detection algorithm, i.e., OBES algorithm for handling denial-of-service attacks that learns the network traffic and manages the intruders. This has been compared with denial-of-service attack detection with energy constraint in WSN. The implementation has been done in NS2. The performance has been presented in terms of nodes, interval and lifetime. From results, it can be observed that the proposed OBES algorithm is efficient as it achieves more available energy, less delay, less packet loss and more lifetime for the network. From results, it can be observed that OBES algorithm performs well compared to denial-of-service attack detection with energy constraint algorithm.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literatur
Zurück zum Zitat Aamir M, Zaidi SMA (2019) DDoS attack detection with feature engineering and machine learning: the framework and performance evaluation. Int J Inf Secur 18(6):1–25CrossRef Aamir M, Zaidi SMA (2019) DDoS attack detection with feature engineering and machine learning: the framework and performance evaluation. Int J Inf Secur 18(6):1–25CrossRef
Zurück zum Zitat Balaji S, Sasilatha T (2018) Detection of denial of service attacks by domination graph application in wireless sensor networks. Clust Comput 6:1–6 Balaji S, Sasilatha T (2018) Detection of denial of service attacks by domination graph application in wireless sensor networks. Clust Comput 6:1–6
Zurück zum Zitat Bashaa MH, Al-Alak SM, Idrees AK (2019) Secret key generation in wireless sensor network using public key encryption. In: Proceedings of the international conference on information and communication technology, pp 106–112 Bashaa MH, Al-Alak SM, Idrees AK (2019) Secret key generation in wireless sensor network using public key encryption. In: Proceedings of the international conference on information and communication technology, pp 106–112
Zurück zum Zitat Chang S-Y, Kumar SL, Hu Y-C, Park Y (2019) Power-positive networking: wireless-charging-based networking to protect energy against battery DoS attacks. ACM Trans Sensor Netw 15(3):27CrossRef Chang S-Y, Kumar SL, Hu Y-C, Park Y (2019) Power-positive networking: wireless-charging-based networking to protect energy against battery DoS attacks. ACM Trans Sensor Netw 15(3):27CrossRef
Zurück zum Zitat Chen H et al (2019) A novel low-rate denial of service attack detection approach in zigbee wireless sensor network by combining Hilbert–Huang transformation and trust evaluation. IEEE Access 7:32853–32866CrossRef Chen H et al (2019) A novel low-rate denial of service attack detection approach in zigbee wireless sensor network by combining Hilbert–Huang transformation and trust evaluation. IEEE Access 7:32853–32866CrossRef
Zurück zum Zitat Cheng J, Li J, Tang X, Sheng VS, Zhang C, Li M (2019) A novel DDoS attack detection method using optimized generalized multiple kernel learning. arXiv:1906.08204 Cheng J, Li J, Tang X, Sheng VS, Zhang C, Li M (2019) A novel DDoS attack detection method using optimized generalized multiple kernel learning. arXiv:​1906.​08204
Zurück zum Zitat Daud M, Rasiah R, George M, Asirvatham D, Rahman AFA, Halim AA (2018) Denial of service: (DoS) impact on sensors. In: 2018 4th international conference on information management (ICIM), Oxford, 2018, pp 270–274 Daud M, Rasiah R, George M, Asirvatham D, Rahman AFA, Halim AA (2018) Denial of service: (DoS) impact on sensors. In: 2018 4th international conference on information management (ICIM), Oxford, 2018, pp 270–274
Zurück zum Zitat Debayan D, Golder A, Danial J, Ghosh S, Raychowdhury A, Sen S (2019) X-DeepSCA: cross-device deep learning side channel attack. In: Proceedings of the 56th annual design automation conference, pp 1–6 Debayan D, Golder A, Danial J, Ghosh S, Raychowdhury A, Sen S (2019) X-DeepSCA: cross-device deep learning side channel attack. In: Proceedings of the 56th annual design automation conference, pp 1–6
Zurück zum Zitat Dwivedi AD, Malina L, Dzurenda P, Srivastava G (2019) Optimized blockchain model for internet of things based healthcare applications. arXiv:1906.06517 Dwivedi AD, Malina L, Dzurenda P, Srivastava G (2019) Optimized blockchain model for internet of things based healthcare applications. arXiv:​1906.​06517
Zurück zum Zitat Girish SV, Prakash R, Swetha SNH, Pareek G, Kumar TS (2016) A network model of GUI-based implementation of sensor node for indoor air quality monitoring. In: Advances in intelligent systems and computing published—Springer, 2016—from the proceedings of international conference ICSCS 2015, vol 397, pp 209–217,. ISBN: 978-81-322-2669-7 (Print) 978-81-322-2671-0 (Online) Girish SV, Prakash R, Swetha SNH, Pareek G, Kumar TS (2016) A network model of GUI-based implementation of sensor node for indoor air quality monitoring. In: Advances in intelligent systems and computing published—Springer, 2016—from the proceedings of international conference ICSCS 2015, vol 397, pp 209–217,. ISBN: 978-81-322-2669-7 (Print) 978-81-322-2671-0 (Online)
Zurück zum Zitat Krishnan SSN (2019) Denial of service (DoS) detection in wireless sensor networks applying geometrically varying clusters. In: International conference on computer networks and communication technologies. Springer, Singapore Krishnan SSN (2019) Denial of service (DoS) detection in wireless sensor networks applying geometrically varying clusters. In: International conference on computer networks and communication technologies. Springer, Singapore
Zurück zum Zitat Ma W, Wu Y, Gong M, Qin C, Wang S (2017) Local probabilistic matrix factorization for personal recommendation. In: 2017 13th international conference on computational intelligence and security (CIS). Hong Kong, pp 97–101 Ma W, Wu Y, Gong M, Qin C, Wang S (2017) Local probabilistic matrix factorization for personal recommendation. In: 2017 13th international conference on computational intelligence and security (CIS). Hong Kong, pp 97–101
Zurück zum Zitat Moser D, Lenders V, Capkun S (2019) Digital radio signal cancellation attacks: an experimental evaluation. In: Proceedings of the 12th conference on security and privacy in wireless and mobile networks, pp 23–33 Moser D, Lenders V, Capkun S (2019) Digital radio signal cancellation attacks: an experimental evaluation. In: Proceedings of the 12th conference on security and privacy in wireless and mobile networks, pp 23–33
Zurück zum Zitat Osanaiye OA, Alfa AS, Hancke GP (2018) Denial of service defence for resource availability in wireless sensor networks. IEEE Access 6:6975–7004CrossRef Osanaiye OA, Alfa AS, Hancke GP (2018) Denial of service defence for resource availability in wireless sensor networks. IEEE Access 6:6975–7004CrossRef
Zurück zum Zitat Pareek S, Sharma PK (2018) Denial of service attack detection by enhanced dendritic cell algorithm. In: 2018 3rd international conference and workshops on recent advances and innovations in engineering (ICRAIE). IEEE Pareek S, Sharma PK (2018) Denial of service attack detection by enhanced dendritic cell algorithm. In: 2018 3rd international conference and workshops on recent advances and innovations in engineering (ICRAIE). IEEE
Zurück zum Zitat Pereira de Almeida M et al (2018) New DoS defense method based on strong designated verifier signatures. Sensors 18(9):2813CrossRef Pereira de Almeida M et al (2018) New DoS defense method based on strong designated verifier signatures. Sensors 18(9):2813CrossRef
Zurück zum Zitat Pourazarm S, Cassandras CG (2017) Energy-based lifetime maximization and security of wireless-sensor networks with general nonideal battery models. IEEE Trans Control Netw Syst 4(2):323–335MathSciNetCrossRef Pourazarm S, Cassandras CG (2017) Energy-based lifetime maximization and security of wireless-sensor networks with general nonideal battery models. IEEE Trans Control Netw Syst 4(2):323–335MathSciNetCrossRef
Zurück zum Zitat Pu C, Song T (2018) Hatchetman attack: a denial of service attack against routing in low power and lossy networks. In: 2018 5th IEEE international conference on cyber security and cloud computing (CSCloud)/2018 4th IEEE international conference on edge computing and scalable cloud (EdgeCom). IEEE Pu C, Song T (2018) Hatchetman attack: a denial of service attack against routing in low power and lossy networks. In: 2018 5th IEEE international conference on cyber security and cloud computing (CSCloud)/2018 4th IEEE international conference on edge computing and scalable cloud (EdgeCom). IEEE
Zurück zum Zitat Qin J, Li M, Shi L, Yu X (2018) Optimal denial-of-service attack scheduling with energy constraint over packet-dropping networks. IEEE Trans Autom Control 63(6):1648–1663MathSciNetCrossRef Qin J, Li M, Shi L, Yu X (2018) Optimal denial-of-service attack scheduling with energy constraint over packet-dropping networks. IEEE Trans Autom Control 63(6):1648–1663MathSciNetCrossRef
Zurück zum Zitat Sarwar MA, Hussain M, Anwar MU, Ahmad M (2019) FlowJustifier: an optimized trust-based request prioritization approach for mitigation of SDN controller DDoS attacks in the IoT paradigm. In: Proceedings of the 3rd international conference on future networks and distributed systems. ACM, p 43 Sarwar MA, Hussain M, Anwar MU, Ahmad M (2019) FlowJustifier: an optimized trust-based request prioritization approach for mitigation of SDN controller DDoS attacks in the IoT paradigm. In: Proceedings of the 3rd international conference on future networks and distributed systems. ACM, p 43
Zurück zum Zitat Sicari S et al (2018) REATO: REActing TO denial of service attacks in the internet of things. Comput Netw 137:37–48CrossRef Sicari S et al (2018) REATO: REActing TO denial of service attacks in the internet of things. Comput Netw 137:37–48CrossRef
Zurück zum Zitat Wen W, Wen X, Yuan L, Xu H (2018) Range-free localization using expected hop progress in anisotropic wireless sensor networks. EURASIP J Wirel Commun Networking 2018:299CrossRef Wen W, Wen X, Yuan L, Xu H (2018) Range-free localization using expected hop progress in anisotropic wireless sensor networks. EURASIP J Wirel Commun Networking 2018:299CrossRef
Metadaten
Titel
Enhancement of security using optimized DoS (denial-of-service) detection algorithm for wireless sensor network
verfasst von
E. Suryaprabha
N. M. Saravana Kumar
Publikationsdatum
06.12.2019
Verlag
Springer Berlin Heidelberg
Erschienen in
Soft Computing / Ausgabe 14/2020
Print ISSN: 1432-7643
Elektronische ISSN: 1433-7479
DOI
https://doi.org/10.1007/s00500-019-04573-4

Weitere Artikel der Ausgabe 14/2020

Soft Computing 14/2020 Zur Ausgabe