Advertisement

Detection and Prevention of DDoS Attacks in Wireless Sensor Networks

  • Shivam DhuriaEmail author
  • Monika Sachdeva
Conference paper
  • 563 Downloads
Part of the Lecture Notes on Data Engineering and Communications Technologies book series (LNDECT, volume 3)

Abstract

Wireless Sensor Networks are emerging at a great pace due to their cost effective solutions for the sensitive and remote applications like military, medical and environmental applications (Chatterjee and Pandey in Int J Sci Eng Res 5, 2014) [1]. But due to limited range, memory, processing and power supply, gathering of important remote data from wireless sensors is really challenging. The use of ad hoc network and radio waves for data transmission has also increased the chance for attackers to attack on such networks. Various schemes have been proposed in the past to fight against the attacks in WSN (Sahu and Pandey in Mod Educ Comput Sci 1:65–71, 2014) [2], (Paul et al. in Wireless Sensor Network Security: A Survey. Auerbach Publications, Florida, 2006) [3]. In this paper two methods have been introduced, one is light weight two way authentication method that will prevent majority of attacks in WSN and other is traffic analysis based data filtering method that will detect and prevent DDoS attacks in WSN. The results have been verified using the Network Simulator 2 (NS2) on several performance metrics i.e. throughput, delay, lost packets, energy consumption and PDR.

Keywords

Data filtration Authentication Network performance Simulator Data rate Sensor Data packets Data traffic Base station Node 

References

  1. 1.
    Ananya Chatterjee, Manjusha Pandey “Practical Applications of Wireless Sensor Network Based on Military, Environmental, Health and Home Applications: A Survey”, International Journal of Scientific & Engineering Research, Volume 5, Issue 1, January-2014.Google Scholar
  2. 2.
    S.S. Sahu, M. Pandey “Distributed Denial of Service Attacks: A Review”, Modern Education and Computer Science, 2014, 1, 65–71.Google Scholar
  3. 3.
    John Paul, Walters, Zhengqiang Liang, Weisong Shi, Vipin Chaudhary “Wireless Sensor Network Security: A Survey”, Auerbach Publications, CRC Press, 2006.Google Scholar
  4. 4.
    Marco Tiloca, Domenico De Guglielmo, Gianluca Dini and Giuseppe Anastasi “SAD-SJ: a Self-Adaptive Decentralized solution against Selective Jamming attack in Wireless Sensor Networks”, Department of Information Engineering, University of PisaGoogle Scholar
  5. 5.
    Dhara Buch, D.C. Jinwala “Denial of Sevice Attacks in Wireless Sensor Networks”, Institute of Technology, Nirma Universiry Ahmedabad – 382 481, 09–11, December 2010.Google Scholar
  6. 6.
    Mahreen Shaikh, Abid. H Syed “A Survey on Jamming Attacks, Detection and Defending Strategies in Wireless Sensor Networks”, IJRET, Vol: 03 Issue: 03 | Mar 2014Google Scholar
  7. 7.
    Francesco Palmieri, Sergio Ricciardi, Ugo Fiore, Massimo Ficco, Aniello Castiglione “Energy-oriented denial of service attacks: an emerging menace for large cloud infrastructures”, The Journal of Supercomputing, May 2015, Volume 71, Issue 5, pp 1620–1641Google Scholar
  8. 8.
    S.S. Sahu, M. Pandey “A Probabilistic Packet Filtering-Based Approach for Distributed Denial of Service Attack in Wireless Sensor Network”, Springer India 2015.Google Scholar
  9. 9.
    Kanchan Kaushal, Varsha Sahni “Early Detection of DDoS Attack in WSN”, International Journal of Computer Applications (0975-8887) Volume 134 – No. 13, January 2016.Google Scholar
  10. 10.
    Ugo Fiore, Francesco Palmieri, Aniello Castiglione, Alfredo De Santisc “Network anomaly detection with the restricted Boltzmann machine”, Neurocomputing Volume 122, 25 December 2013, Pages 13–23Google Scholar
  11. 11.
    Francesco Palmieri, Ugo Fiore, Aniello Castiglione “A distributed approach to network anomaly detection based on independent component analysis”, Concurrency and Computation: Practice and Experience, 1532–0634, 2014Google Scholar
  12. 12.
    Genita Gautam, Biswaraj Sen “Design and Simulation of Wireless Sensor Network in NS2”, International Journal of Computer Applications (0975 – 8887) Volume 113 – No. 16, March 2015.Google Scholar
  13. 13.
    P.S. Karadge, Dr. S. V. Sankpal “A Performance Comparison of Energy Efficient AODV Protocols in Mobile Ad hoc Networks”, IJARCCE, Vol 2, Issue 1, January 2013Google Scholar
  14. 14.
    Muthana Najim Abdulleh, Salman Yussof, Hothefa Shaker Jassim “Comparative Study of Proactive, Reactive and Geographical MANET Routing Protocols”, Communications and Network, 2015, 7, 125–137.Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2018

Authors and Affiliations

  1. 1.CSESBSSTCFerozepurIndia
  2. 2.CSEIKGPTUKapurthalaIndia

Personalised recommendations