Abstract
Wireless Sensor Networks (WSN) have great benefits of reduced costs, lesser scalability factor, and can be employed upon complex and dangerous locations for the purpose of control/automation of tasks and for sensing, processing, sharing/forwarding data. Denials of service (DoS) attacks hinder the regular functioning of such networks leading to compromise of the objectives of them. In this paper a hierarchical clustering approach is proposed to detect the compromise of nodes in WSN due to DoS attacks. This approach outweighs other approaches in the aspect of elimination of outliers and faster response time in detecting the attacks.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Lai, G.H., Chen, C.-M.: Detecting denial of service attacks in sensor networks. J. Comput. 18(4) (2008)
Jain, A.K., Dubes, R.C.: Algorithms for Clustering Data. Prentice Hall, Englewood Cliffs, New Jersey (1988)
Heizelman, W.R.: Energy efficient communication protocol for wireless microsensor networks. In: Proceedings of IEEE Hawaii international Conference in System Sciences (2000)
Wood, A.D., Stanklovic, J.A.: Denial of service in sensor networks. IEEE/Computer 49–56 (2002)
Dhara, B., Devesh, J.: Denial of service attacks in wireless sensor networks. In: International Conference on Current trends in Technology (2010)
Guha, S., Rastogi, R., Shims, K.: CURE: an efficient clustering algorithm for large databases. Inf. Syst. 26(1), 35–58 (2001)
Guechari, M., Mokdad, L., Tan, S.: Dynamic solution for detecting denial of service attacks in wireless sensor networks. In: Proceedings of IEEE ICC 2012—Ad-hoc and Sensor Networking Symposium, pp. 173–177 (2012)
Olson, C.F.: Parallel algorithms for hierarchical clustering. Technical report, University of California at Berkeley (1993)
Springer: https://link.springer.com/chapter/10.1007/978-1-4939-2468-4-1
Raymond, D.R., Midkiff, S.F.: Denial-of-service in wireless sensor networks: attacks and defenses. IEEE CS Pervasive Comput. 74–79 (2008)
Amis, A., Prakash, R., Vuong, T., Hymnh, D.: Max-min D-cluster formation in wireless Ad-Hoc networks
https://web.stanford.edu/class/cs345a/slides/12-clustering.pdf
Meng, T., Volkan, R.: Distributed network protocols for wireless communication. In: Proceedings of IEEE ISCAS (1998)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Nagamuthu Krishnan, S.S. (2019). Denial of Service (DoS) Detection in Wireless Sensor Networks Applying Geometrically Varying Clusters. In: Smys, S., Bestak, R., Chen, JZ., Kotuliak, I. (eds) International Conference on Computer Networks and Communication Technologies. Lecture Notes on Data Engineering and Communications Technologies, vol 15. Springer, Singapore. https://doi.org/10.1007/978-981-10-8681-6_93
Download citation
DOI: https://doi.org/10.1007/978-981-10-8681-6_93
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-8680-9
Online ISBN: 978-981-10-8681-6
eBook Packages: EngineeringEngineering (R0)