Abstract
Recently, with the meteoric evolution in the wireless communication technologies, countless real world applications which will reshape the way of seeking in robotic exploration, commercial, military, battle-field surveillance, border control and health-related areas. Due to its open nature, the network is easily prone to DoS attacks and can have significant influence on the behavior of Wireless Sensor Networks (WSN). Because of node energy capability the node verification using crypto analysis is a difficult one. In this paper, use of spatial information is used to detect and localize the multiple adversaries in both same and different node identity. This paper describes the scalable and energy efficient cluster based anomaly detection (SEECAD) mechanism to identify DoS attacks without the key management schemes to increase the lifetime of the network. Detection rate, false positive rate, packet delivery ratio, overhead, energy consumption and average delay of packets are various types of network parameters by which the performance can be measured. The result shows that the hit rate is achieved and high reliability in detecting and localizing multiple adversaries than previous systems is also achieved.
Similar content being viewed by others
Data Availability
All data generated or analyzed during this study are included in this published article.
References
Amato, F., Mazzocca, N., Moscato, F & Vivenzio, E. (2017). Multilayer perceptron: an intelligent model for classification and intrusion detection. In 31st International Conference on Advanced Information Networking and Applications Workshops, pp. 686–691.
Premkumar, M., & Sundararajan, T. V. P. (2021). Defense countermeasures for DoS attacks in WSNs using deep radial basis networks. Wireless Personal Communications, 120(4), 2545–2560.
Akyildiz, IF & Vuran, MC. (2010). Wireless sensor networks (Vol. 4)’, John Wiley & Sons.
Al Dhaheri, A., Yeun, C. Y., & Damiani, E. (2019, July). New two-level µTESLA protocol for IoT environments. In 2019 IEEE World Congress on Services (SERVICES) (Vol. 2642, pp. 84-91). IEEE.
Premkumar, M., Kathiravan, M., & Thirukkumaran, R. (2012). Efficient broadcast authentication using TSG algorithm for WSN. International Journal of Computer Applications, 58(4).
David, J., & Thomas, C. (2019). Efficient DDoS flood attack detection using dynamicthresholding on flow-based network traffic. Computers and Security, 82, 284–295.
Premkumar, M., Ashokkumar, S. R., Jeevanantham, V., Pallavi, S. A., Mohanbabu, G., & Raaj, R. S. (2022). Design of cost-effective real time tremor alerting system for patients of neurodegenerative diseases. Materials Today: Proceedings, 57, 1989–1994.
Gupta, BB., Dahiya, A., Upneja, C., Garg, A & Choudhary, R. (2020). A comprehensive survey on ddos attacks and recent defense mechanisms. Handbook of Research on Intrusion Detection Systems, pp. 186–218.
Premkumar, M., Sundararajan, T. V. P., & Kumar, K. V. (2019). Various defense countermeasures against DoS attacks in wireless sensor networks. International Journal of Scientific and Technology Research, 8(10), 2926–2935.
Lakshmanarao, K., & Maringanti, H. B. (2020). IbPaKdE: Identity-based pairing free authenticated key and data exchange protocol for wireless sensor networks. International Journal of Computational Intelligence Studies, 9(4), 320–335.
Ashokkumar, S. R., Anupallavi, S., Premkumar, M., & Jeevanantham, V. (2021). Implementation of deep neural networks for classifying electroencephalogram signal using fractional S-transform for epileptic seizure detection. International Journal of Imaging Systems and Technology, 31(2), 895–908.
Menezes, A. J., Van Oorschot, P. C., & Vanstone, S. A. (2018). Handbook of applied cryptography. CRC Press.
Ashokkumar, S. R., Anupallavi, S., MohanBabu, G., Premkumar, M., & Jeevanantham, V. (2022). Emotion identification by dynamic entropy and ensemble learning from electroencephalogram signals. International Journal of Imaging Systems and Technology, 32(1), 402–413.
Premkumar, M., Sundararajan, T. V. P., & Mohanbabu, G. (2022). Dynamic defense mechanism for DoS attacks in wireless environments using hybrid intrusion detection system and statistical approaches. Tehnički vjesnik, 29(3), 965–970.
Muda, Z., Yassin, W., Sulaiman, M. N., & Udzir, N. I. (2014). K-means clustering and naive bayes classification for intrusion detection. Journal of IT in Asia, 4(1), 13–25.
Ferrag, M. A., Maglaras, L., Moschoyiannis, S., & Janicke, H. (2020). Deep learning for cyber security intrusion detection: Approaches, datasets, and comparative study. Journal of Information Security and Applications, 50, 1–21.
Pump, R., Ahlers, V & Koschel, A. (2020). Evaluating artificial immune system algorithms for intrusion detection. Fourth World Conference on Smart Trends in Systems, Security and Sustainability, pp. 92–97.
Ramanujan, A & Varghese, BA. (2021). A survey on DDoS prevention, detection, and traceback in cloud. In Second International Conference on Networks and Advances in Computational Technologies, pp. 69–82.
Rehman, SU & Manickam, S. (2015). Rule-based mechanism to detect denial of service (DoS) attacks on duplicate address detection process in IPv6 link local communication. International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions), pp. 1–6.
Striegel, M., Heyszl, J., Jakobsmeier, F., Matveev, Y & Sigl, G. (2020). Secure and user-friendly over-the-air firmware distribution in a portable faraday cage. In Proceedings of the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, pp. 173–183.
Funding
The source for funding is fully contributed by authors.
Author information
Authors and Affiliations
Contributions
All authors contribute to the concept, the design, and developments of the algorithm and the simulation results in this manuscript. All authors read and approved the final manuscript.
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they have no competing interests.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Premkumar, M., Ashokkumar, S.R., Jeevanantham, V. et al. Scalable and Energy Efficient Cluster Based Anomaly Detection Against Denial of Service Attacks in Wireless Sensor Networks. Wireless Pers Commun 129, 2669–2691 (2023). https://doi.org/10.1007/s11277-023-10252-3
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-023-10252-3