Skip to main content

Advertisement

Log in

Scalable and Energy Efficient Cluster Based Anomaly Detection Against Denial of Service Attacks in Wireless Sensor Networks

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Recently, with the meteoric evolution in the wireless communication technologies, countless real world applications which will reshape the way of seeking in robotic exploration, commercial, military, battle-field surveillance, border control and health-related areas. Due to its open nature, the network is easily prone to DoS attacks and can have significant influence on the behavior of Wireless Sensor Networks (WSN). Because of node energy capability the node verification using crypto analysis is a difficult one. In this paper, use of spatial information is used to detect and localize the multiple adversaries in both same and different node identity. This paper describes the scalable and energy efficient cluster based anomaly detection (SEECAD) mechanism to identify DoS attacks without the key management schemes to increase the lifetime of the network. Detection rate, false positive rate, packet delivery ratio, overhead, energy consumption and average delay of packets are various types of network parameters by which the performance can be measured. The result shows that the hit rate is achieved and high reliability in detecting and localizing multiple adversaries than previous systems is also achieved.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18
Fig. 19
Fig. 20
Fig. 21
Fig. 22
Fig. 23

Similar content being viewed by others

Data Availability

All data generated or analyzed during this study are included in this published article.

References

  1. Amato, F., Mazzocca, N., Moscato, F & Vivenzio, E. (2017). Multilayer perceptron: an intelligent model for classification and intrusion detection. In 31st International Conference on Advanced Information Networking and Applications Workshops, pp. 686–691.

  2. Premkumar, M., & Sundararajan, T. V. P. (2021). Defense countermeasures for DoS attacks in WSNs using deep radial basis networks. Wireless Personal Communications, 120(4), 2545–2560.

    Article  Google Scholar 

  3. Akyildiz, IF & Vuran, MC. (2010). Wireless sensor networks (Vol. 4)’, John Wiley & Sons.

  4. Al Dhaheri, A., Yeun, C. Y., & Damiani, E. (2019, July). New two-level µTESLA protocol for IoT environments. In 2019 IEEE World Congress on Services (SERVICES) (Vol. 2642, pp. 84-91). IEEE.

  5. Premkumar, M., Kathiravan, M., & Thirukkumaran, R. (2012). Efficient broadcast authentication using TSG algorithm for WSN. International Journal of Computer Applications, 58(4).

  6. David, J., & Thomas, C. (2019). Efficient DDoS flood attack detection using dynamicthresholding on flow-based network traffic. Computers and Security, 82, 284–295.

    Article  Google Scholar 

  7. Premkumar, M., Ashokkumar, S. R., Jeevanantham, V., Pallavi, S. A., Mohanbabu, G., & Raaj, R. S. (2022). Design of cost-effective real time tremor alerting system for patients of neurodegenerative diseases. Materials Today: Proceedings, 57, 1989–1994.

    Google Scholar 

  8. Gupta, BB., Dahiya, A., Upneja, C., Garg, A & Choudhary, R. (2020). A comprehensive survey on ddos attacks and recent defense mechanisms. Handbook of Research on Intrusion Detection Systems, pp. 186–218.

  9. Premkumar, M., Sundararajan, T. V. P., & Kumar, K. V. (2019). Various defense countermeasures against DoS attacks in wireless sensor networks. International Journal of Scientific and Technology Research, 8(10), 2926–2935.

    Google Scholar 

  10. Lakshmanarao, K., & Maringanti, H. B. (2020). IbPaKdE: Identity-based pairing free authenticated key and data exchange protocol for wireless sensor networks. International Journal of Computational Intelligence Studies, 9(4), 320–335.

    Article  Google Scholar 

  11. Ashokkumar, S. R., Anupallavi, S., Premkumar, M., & Jeevanantham, V. (2021). Implementation of deep neural networks for classifying electroencephalogram signal using fractional S-transform for epileptic seizure detection. International Journal of Imaging Systems and Technology, 31(2), 895–908.

    Article  Google Scholar 

  12. Menezes, A. J., Van Oorschot, P. C., & Vanstone, S. A. (2018). Handbook of applied cryptography. CRC Press.

    Book  MATH  Google Scholar 

  13. Ashokkumar, S. R., Anupallavi, S., MohanBabu, G., Premkumar, M., & Jeevanantham, V. (2022). Emotion identification by dynamic entropy and ensemble learning from electroencephalogram signals. International Journal of Imaging Systems and Technology, 32(1), 402–413.

    Article  Google Scholar 

  14. Premkumar, M., Sundararajan, T. V. P., & Mohanbabu, G. (2022). Dynamic defense mechanism for DoS attacks in wireless environments using hybrid intrusion detection system and statistical approaches. Tehnički vjesnik, 29(3), 965–970.

    Google Scholar 

  15. Muda, Z., Yassin, W., Sulaiman, M. N., & Udzir, N. I. (2014). K-means clustering and naive bayes classification for intrusion detection. Journal of IT in Asia, 4(1), 13–25.

    Article  Google Scholar 

  16. Ferrag, M. A., Maglaras, L., Moschoyiannis, S., & Janicke, H. (2020). Deep learning for cyber security intrusion detection: Approaches, datasets, and comparative study. Journal of Information Security and Applications, 50, 1–21.

    Article  Google Scholar 

  17. Pump, R., Ahlers, V & Koschel, A. (2020). Evaluating artificial immune system algorithms for intrusion detection. Fourth World Conference on Smart Trends in Systems, Security and Sustainability, pp. 92–97.

  18. Ramanujan, A & Varghese, BA. (2021). A survey on DDoS prevention, detection, and traceback in cloud. In Second International Conference on Networks and Advances in Computational Technologies, pp. 69–82.

  19. Rehman, SU & Manickam, S. (2015). Rule-based mechanism to detect denial of service (DoS) attacks on duplicate address detection process in IPv6 link local communication. International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions), pp. 1–6.

  20. Striegel, M., Heyszl, J., Jakobsmeier, F., Matveev, Y & Sigl, G. (2020). Secure and user-friendly over-the-air firmware distribution in a portable faraday cage. In Proceedings of the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, pp. 173–183.

Download references

Funding

The source for funding is fully contributed by authors.

Author information

Authors and Affiliations

Authors

Contributions

All authors contribute to the concept, the design, and developments of the algorithm and the simulation results in this manuscript. All authors read and approved the final manuscript.

Corresponding author

Correspondence to M. Premkumar.

Ethics declarations

Conflict of interest

The authors declare that they have no competing interests.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Premkumar, M., Ashokkumar, S.R., Jeevanantham, V. et al. Scalable and Energy Efficient Cluster Based Anomaly Detection Against Denial of Service Attacks in Wireless Sensor Networks. Wireless Pers Commun 129, 2669–2691 (2023). https://doi.org/10.1007/s11277-023-10252-3

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-023-10252-3

Keywords

Navigation