A Probabilistic Packet Filtering-Based Approach for Distributed Denial of Service Attack in Wireless Sensor Network

Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 309)


Wireless sensor networks (WSNs) are widely used networks that have lured attention of varied research fields due to their numerous ranges of applications. They have limited energy and power consumption, memory, communication, and computation capabilities. They are also distributed and randomly deployed. Due to the above-listed features, they are prone to various security threats and attacks. Distributed denial of service (DDoS) attack is one among them. These attacks aim at flooding the victim with abundant packets so as to exhaust its resources and cripple its capacity to receive desired packets and give its response accordingly. The network becomes congested and the victim becomes either unresponsive leading to denial of service or its response gets delayed. In this paper, we propose a mitigation mechanism that will curb the attempts of the attackers aiming to flood the WSN so as to cause denial of service with multitude of packets within a time span.


Wireless sensor network Distributed denial of service Flooding Probabilistic packet filtering system Mitigation 


  1. 1.
    Pandey, A., Tripathi, R.C.: A survey on wireless sensor networks security. Int. J. Comput. Appl. 3(2), 975–8887 (2010)Google Scholar
  2. 2.
    Mopari, I.B., Pukale, S.G., Dhore, M.L.: Detection and defense against DDoS attack with IP spoofing. In: International Conference on Computing, Communication and Networking, IEEE, 2008Google Scholar
  3. 3.
    Velauthapillai, T., Harwood, A., Karunasekera, S.: Global detection of flooding-based DDoS attacks using a cooperative overlay network. In: Fourth International Conference on Network and System Security, IEEE, 2010Google Scholar
  4. 4.
    Zhang, Y., Wan, Z., Wu, M.: An active DDoS defense model based on packet marking. In: Second International Workshop on Computer Science and Engineering, IEEE, 2009Google Scholar
  5. 5.
    Zhou, Z., Qian, Z., Tian, X., Xie, D.: Fast traceback against large-scale DDoS attack in high-speed internet. In: IEEE, 2009Google Scholar
  6. 6.
    Liang, F., Zhao, X., Yau, D.: Real time IP traceback with adaptive probabilistic packet marking. J. Softw. 14(5), 1005–1010 (2003)MATHGoogle Scholar
  7. 7.
    Liu, H.I., Chang, K.C.: Defending systems against tilt DDoS attacks. In: The 6th International Conference on Telecommunication Systems, Services and Applications, IEEE, 2011Google Scholar
  8. 8.
    Chen, Y., Ku, W.S., Sakai, K., DeCruze, C.: A novel DDoS attack defending framework with minimized bilateral damages. In: IEEE CCNC, 2010Google Scholar
  9. 9.
    Pandey, M., Verma, S.: Energy consumption patterns for different mobility conditions in WSN. Scientific Research, 2011Google Scholar

Copyright information

© Springer India 2015

Authors and Affiliations

  1. 1.School of Computer EngineeringKalinga Institute of Industrial TechnologyBhubaneswarIndia

Personalised recommendations