Enhanced Lion Optimization with Efficient Path Routing Equalization Technique against DoS Attack in Wireless Sensor Network

  • Abstract
  • PDF
  • Literature Map
  • References
  • Citations
  • Similar Papers
Abstract
Translate article icon Translate Article Star icon
Take notes icon Take Notes

In WSN, DoS (denial of service) attack makes shortcoming system. The packets travel over and over in the sensor network. By that, all the assets like data transmission, memory, and vitality are squandered by this attack. However, the attacker ought to optimize its attacker plan for request to boost the impact on the system performance because of the deficiency of vitality at the aggressor side. Denial of service (DoS) attack on the Internet has become a squeezing issue. By staying away from these sorts of attacks, network performance can be improved. Therefore, security is a fundamental requirement for these networks. Effective routing is necessary in order to overcome the issued faced by the crosslayer in the DOS attack of the WSN network for the purpose of good transmission. This research work mainly focuses on performance evaluation using optimization methods. To establish the efficient path in the crosslayer against DoS attack, this paper has proposed enhanced lion optimization with an efficient path routing equalization technique (LOEPRE). If any failure node occurs in the network, then the node is recognized and the transfer of the data packet is done to the other node. Retransmission of data causes overload in the network. The proposed model focuses on these issues and overcomes these issues by improving the path efficiently with robust security. It consists of three phases: the initial phase includes the route discovery in the network. In the second phase, the transfer of data is done in the high router path for security purposes. Finally, the efficient path routing equalization technique is used for minimizing the overload in the network; it provides the equalized path length in the network and is highly efficient. Hence, the proposed LOEPRE technique is used to achieve energy efficiency in wireless network for prolonged network lifetime and minimum packet latency and minimize consumption of energy. Moreover, the simulation outcome of the proposed LOEPRE method is highly robust while comparing to the existing methods EFCRS, SSPRA ELOER, EFLOR, and TSTP. It achieves better performance than existing algorithms in comparing metric connectivity ratio, end-to-end delay, overhead, throughput, and packet delivery ratio.

Similar Papers
  • Book Chapter
  • Cite Count Icon 3
  • 10.1007/978-3-030-33582-3_74
Security Assessment Model to Analysis DOS Attacks in WSN
  • Nov 2, 2019
  • Abdulaziz Aborujilah + 7 more

Internet of Things (IoT) technology is getting more importance as many organizations from different sectors are moving toward adopting this technology. It introduces an efficient ways of collecting, processing and distributing data. Wireless sensor networks (WSNs) play a vital role in the expanding growth of internet of things (IoT). However, DoS (denial-of-service) attacks are a major threat of WSNs. In this study, graph theory based model has been proposed to analyse the security of WSN under DoS attacks. The proposed model describes and assesses the security of WSN when it encounter DoS attacks by finding the attacks success probability, attack cost, attack impact, mean-time-to-compromise, attack risk and return-on-attack values. The impact of mitigation methods toward strengthening the WSN security has been described. smart home scenario WSN has been tacking as an example. The results showed that the capability of the proposed model to analysis the effects of DoS attacks in WSN. Also it showed the impact of mitigation methods in improving WSN security.

  • Conference Article
  • Cite Count Icon 1
  • 10.1109/ibcast.2016.7429898
Formal specifications of Denial of Service attacks in Wireless Sensor Networks
  • Jan 1, 2016
  • Kashif Saghar + 3 more

Wireless Sensor Networks (WSN) are composed of small, low cost, resource-constrained computing nodes equipped with low power wireless transceivers. Their unattended nature and possible deployment in hostile environmental conditions poses several challenges in ensuring that a WSN is formed effectively and survives long enough to fulfill its function. WSN nodes are vulnerable to many Denial of Services(DoS) attacks. To secure WSN still against attacks many innovative solutions/protocols have been proposed. However, a number of ambiguities exist in the definition of these DoS attacks. To remove these ambiguities and to clarify our specifications we represented the DoS attacks in a formal modeling notation Z. The specifications are written in a bottom-up approach starting from the basic definitions (like node, message etc), specifying simple operations of WSN (like receive, transmit etc), complex operations (like eavesdrop key, node capture etc) and going all the way up to formally define the DoS attacks. Different WSN routing protocols are then specified to confirm their vulnerability against DoS attacks. Use of Formal methods, thus, confirms how vulnerable a particular routing protocol is against a particular attack. This is a novel work and to the best of our knowledge DoS attacks have not yet been formally defined.

  • Research Article
  • Cite Count Icon 8
  • 10.1080/00207217.2017.1279230
A hybrid protection approaches for denial of service (DoS) attacks in wireless sensor networks
  • Jan 21, 2017
  • International Journal of Electronics
  • Mahalakshmi Gunasekaran + 1 more

ABSTRACTWireless sensor network (WSN) contains the distributed autonomous devices with the sensing capability of physical and environmental conditions. During the clustering operation, the consumption of more energy causes the draining in battery power that leads to minimum network lifetime. Hence, the WSN devices are initially operated on low-power sleep mode to maximise the lifetime. But, the attacks arrival cause the disruption in low-power operating called denial of service (DoS) attacks. The conventional intrusion detection (ID) approaches such as rule-based and anomaly-based methods effectively detect the DoS attacks. But, the energy consumption and false detection rate are more. The absence of attack information and broadcast of its impact to the other cluster head (CH) leads to easy DoS attacks arrival. This article combines the isolation and routing tables to detect the attack in the specific cluster and broadcasts the information to other CH. The intercommunication between the CHs prevents the DoS attacks effectively. In addition, the swarm-based defence approach is proposed to migrate the fault channel to normal operating channel through frequency hop approaches. The comparative analysis between the proposed table-based intrusion detection systems (IDSs) and swarm-based defence approaches with the traditional IDS regarding the parameters of transmission overhead/efficiency, energy consumption, and false positive/negative rates proves the capability of DoS prediction/prevention in WSN.

  • Research Article
  • Cite Count Icon 27
  • 10.1109/access.2019.2905812
Research on Detection and Defense Mechanisms of DoS Attacks Based on BP Neural Network and Game Theory
  • Jan 1, 2019
  • IEEE Access
  • Lijun Gao + 4 more

DoS (Denial of Service) attacks are becoming one of the most serious security threats to global networks. We analyze the existing DoS detection methods and defense mechanisms in depth. In this paper, BP (back propagation) neural networks and game theory are introduced to design detection methods and defense mechanisms for the DoS attacks. The BP neural network DoS attacks detection model uses KDDCUP99 as the dataset and selects multiple feature vectors from the dataset that can efficiently identify DoS attacks by large-scale training, which improves the accuracy of detecting DoS attacks to 99.977%. Furthermore, we use game theory to perform secondary analysis on DoS attacks that are not recognized by the neural network model, so that the detection rate of Dos attacks increases from 99.97% to 99.998%. Finally, we propose a DoS attacks defense strategy based on game theory. The simulation results show that the proposed detection method and defense strategy are effective for DoS attacks.

  • Conference Article
  • 10.1109/ibcast.2017.7868092
Formally verified solution to resolve tunnel attacks in wireless sensor network
  • Jan 1, 2017
  • Kashif Saghar + 2 more

In ad-hoc and wireless networks, Denial of Service (DoS) attacks has always been problematic during data routing. DoS attacks disrupt the data routing and avert the generated data to reach the destination or the sink nodes. In tunnel attack, which is one of the type of DoS attacks, the intruder attracts all the traffic towards itself and prevent it from forwarding further to the neighboring nodes. Researchers have presented multiple solutions to cater the problem and minimize or avoid the tunnel attacks, but they all have their shortcomings. The main reason behind all the drawbacks is that those solutions have not been confirmed using formal methods. The formal methods can be utilized to authenticate whether or not the solutions are immune to DoS attacks. In our previous researches, it has been revealed that by employing formal methods, our newly developed protocol RAEED can detect and avoid many DoS attacks. In this research paper, it has been proved using model checker that RAEED can efficiently avoid both simple and intelligent tunnel attacks. Moreover, the results of formal methods have been confirmed with the help of computer simulations as well as practical implementation on MicaZ motes. In future we aim to employ formal methods to verify more wireless communication issues in multiple protocols.

  • Research Article
  • 10.24949/njes.v9i2.281
DOS Attacks on WSN and Their Classifications With Countermeasures - A Survey
  • Dec 31, 2016
  • Jahanzeb Shahid + 2 more

Wireless Sensor Networks (WSN) is a network of sensors, actuators, mobile and wearable devices that have processing and communication modules to monitor physical and environmental conditions. Currently millions of these type of smart devices serving in many fields like military, environment, and health services. Due to their unique deployment places even in hostile territories WSN are subject to various kinds of attacks. Self configuration, autonomous device addition, network connection and resource limitation are the main features of WSN that makes it highly prone to network attacks. Denial of Service (DoS) attacks which targets the availability of a WSN system is one of the most potent threat to which a WSN must be resilient in order to continue operations. This studies aim to analyze and classify the WSN DoS threats and their countermeasures. Based on the survey we present the best approach to designing a WSN resilient against DoS attacks.

  • Research Article
  • Cite Count Icon 2
  • 10.1201/1086/43320.11.2.20020501/36768.7
ISPs and Denial of Service Attacks
  • May 1, 2002
  • Information Systems Security
  • K Narayanaswamy

A denial of service (DOS) attack is any malicious attempt to deprive legitimate customers of their ability to access services, such as a Web server. DOS attacks fall into two broad categories: • Server vulnerability DOS attacks — attacks that exploit known bugs in operating systems and servers. These attacks typically will use the bugs to crash programs that users routinely rely upon, thereby depriving those users of their normal access to the services provided by those programs. Examples of vulnerable systems include all operating systems, such as Windows NT or Linux, and various Internet-based services such as DNS, Microsoft's IIS Servers, Web servers, etc. All of these programs, which have important and useful purposes, also have bugs that hackers exploit to bring them down or hack into them. This kind of DOS attack usually comes from a single location and searches for a known vulnerability in one of the programs it is targeting. Once it finds such a program, the DOS attack will attempt to crash the program to deny service to other users. Such an attack does not require high bandwidth. • Packet flooding DOS attacks — attacks that exploit weaknesses in the Internet infrastructure and its protocols. Floods of seemingly normal packets are used to overwhelm the processing resources of programs, thereby denying users the ability to use those services. Unlike the previous category of DOS attacks, which exploit bugs, flood attacks require high bandwidth in order to succeed. Rather than use the attacker's own infrastructure to mount the attack (which might be easier to detect), the attacker is increasingly likely to carry out attacks through intermediary computers (called zombies) that the attacker has earlier broken into. Zombies are coordinated by the hacker at a later time to launch a distributed DOS (DDOS) attack on a victim. Such attacks are extremely difficult to trace and defend with the present-day Internet. Most zombies come from home computers, universities, and other vulnerable infrastructures. Often, the owners of the computers are not even aware that their machines are being co- opted in such attacks. The hacker community has invented numerous scripts to make it convenient for those interested in mounting such attacks to set up and orchestrate the zombies. Many references are available on this topic.1–4

  • Research Article
  • 10.5120/10462-5173
DAP-LECP: Dos Attack Prevention and Low Energy Consumption Protocol for Wireless Sensor Networks
  • Feb 15, 2013
  • International Journal of Computer Applications
  • Fakhre Alam + 3 more

The wide-spread deployment of wireless sensor networks (WSN) promises extensive applications in military and civilian fields. So far the major research focus has been to make WSN more useful and scalable in order to cope with future challenges of communication technologies, small emphasis is placed till now for the secure communication in WSN. A lot number of WSN protocols exist that have been designed to figure out the weaknesses and to provide feasible solutions concerning the security, Denial of service (DoS) attacks, data routing, data dissemination and power consumption. Our research work have analyzed a variety of key distribution and sharing protocols designed to detect and avoid DoS attacks in WSN. We propose a security protocol, modified form of identifier based protocol, for prevention of denial of service attack in WSN that provides a solution to battery exhaustion of sensor network by disseminating the identity of a malicious node.

  • Conference Article
  • Cite Count Icon 7
  • 10.1109/icadw.2016.7942518
DoS attacks prevention using IDS and data mining
  • Dec 1, 2016
  • Anand Keshri + 3 more

Denial of Service (DoS) attacks pose a serious threat to business companies. DoS attacks is hard to defend because of many different ways that hacker may strike. DoS attacks focus on certain applications. DoS attack targets to make the service out of resources, so that it becomes unavailable to the legitimate users. Due to unpredictable behaviour of hacker it is difficult to distinguish between legitimate and malicious network traffic. Moreover, as defence against these improve, attacks also evolve. New kind of unknown attacks continue to strike and it is not easy to detect them based on information of pre-existing attacks. DOS attacks typically aim websites or services such as card payment gateways, banks, and even domain name servers. In this paper, we discuss about DOS attacks and briefly view the different prevention schemes. Then we discussed DoS prevention using firewall and IDS and different approaches to IDS using Data Mining techniques. We used NSL-KDD dataset, refined version of kdd'99 cup data set for applying Data Mining algorithms and testing.

  • Conference Article
  • Cite Count Icon 6
  • 10.1109/ibcast.2016.7429899
RAEED: A formally verified solution to resolve sinkhole attack in Wireless Sensor Network
  • Jan 1, 2016
  • Kashif Saghar + 3 more

Denial of Services (DoS) attacks has long been a problem in ad-hoc and wireless networks during data routing. The aim of DoS attacks is to disrupt the routing and prevent data generated from the wireless source nodes to reach the sink or destination nodes. The sinkhole attack is a type of DoS in which the intruder attracts all the data traffic towards itself and does not forward it further. Although numerous solutions have been proposed to avoid sinkhole attack, they all have drawbacks. The main reason is that application of formal methods has not been utilized to confirm whether the solutions are immune from DoS attacks. We have earlier shown how formal modeling can be utilized efficiently to detect the vulnerabilities of existing routing protocols against DoS attacks. We also proposed a new protocol, RAEED (Robust formally Analysed protocol for wirEless sEnsor networks Deployment), which is able to address the problems of most DoS attacks. In this paper we have proved formally that RAEED can avoid Sinkhole attack. Finally computer simulations and practical implementation on McaZ motes have confirmed our results of formal methods.

  • Research Article
  • Cite Count Icon 2
  • 10.2298/csis120914029k
Traffic deflection method for dos attack defense using a location-based routing protocol in the sensor network
  • Jan 1, 2013
  • Computer Science and Information Systems
  • Ho-Seok Kang + 2 more

As the ubiquitous computing environment gets more attention and development, WSN (Wireless Sensor Network) is getting popular as well. Especially, the development of wireless communication and sensor equipment greatly contributes to the popularization of WSN. On the other hand, the safety and security of WSN attracts lots of attention due to such a development and distribution. The DoS (Denial of Service) attack, which gets more sophisticated and broadens its domain into various services fields, may have negative effects on WSN, making it vulnerable to attacks. Since WSN collects information through sensors that are already deployed, it is difficult to have its energy recharged. When WSN is under a DoS attack, sensor nodes consume lots of energy, bringing about a fatal result to the sensor network. In this paper, we propose a method to efficiently defend against DoS attacks by modifying routing protocols in the WSN. This method uses a location based routing protocol that is simple and easy to implement. In the WSN environment where the location-based routing protocol is implemented, this method disperses the DoS attack concentration of traffic by using the traffic deflection technique and blocks it out before arriving at the target destinations. To find out the number of traffic redirection nodes proper for this method, we have performed a few experiments, through which the number of such nodes was optimized.

  • Conference Article
  • Cite Count Icon 5
  • 10.1109/icict.2017.8320164
Detection and mitigation of Denial of Service (DoS) attacks using performance aware Software Defined Networking (SDN)
  • Dec 1, 2017
  • Wajahat Navid + 1 more

Software Defined Networking (SDN) stands to transmute our modern networks and data centers, opening them up into highly agile frameworks that can be reconfigured depending on the requirement. Denial of Service (DoS) attacks are considered as one of the most destructive attacks. This paper, is about DoS attack detection and mitigation using SDN. DoS attack can minimize the bandwidth utilization, leaving the network unavailable for legitimate traffic. To provide a solution to the problem, concept of performance aware Software Defined Networking is used which involves real time network monitoring using sFlow as a visibility protocol. So, OpenFlow along with sFlow is used as an application to fight DoS attacks. Our analysis and results demonstrate that using this technique, DoS attacks are successfully defended implying that SDN has promising potential to detect and mitigate DoS attacks.

  • Research Article
  • 10.15623/ijret.2014.0305124
THE TECHNIQUE TO DETECT AND AVOID THE DENIAL OF SERVICE ATTACKS IN WIRELESS SENSOR NETWORKS
  • May 25, 2014
  • International Journal of Research in Engineering and Technology
  • Nagarathna C.R

Wireless Sensor Networks (WSNs) have being used in many fields like ocean and wildlife monitoring, manufacturing machinery performance monitoring, building safety and earthquake monitoring, military applications and health related applications. The harsh and unattended deployment of these networks along with that in wireless sensor networks each node has limited energy, computation and storage space makes they are more vulnerable to attacks than wired networks. . It is a critical challenge to present the effective and lightweight security protocol to prevent various attacks for WSN, especially for the denial of service (DOS) attack. However, the adversaries can compromise some sensors and launch the DoS attack by replaying redundant messages or making overdose of fake messages. Under this situation, DoS attack breaks off the wireless communication channel and causes either unintentionally in the form of interference, noise or collision between the block the communication bandwidth, which makes the network not work well even fail down. In this paper we design message observation and common key authentication mechanisms by which cluster head (CH) as well as any other sensor nodes in network can able to identify the communicating node is an attacker node or not and isolate that attacker node. This approach is efficiently, detect and avoids Dos attack completely. Keywords-Wireless Sensor Networks, Denial of service attacks, Security ---------------------------------------------------------------------***-----------------------------------------------------------------

  • Conference Article
  • Cite Count Icon 1
  • 10.1145/2801948.2801949
A simulation platform for evaluating DoS attacks in wireless sensor networks
  • Oct 1, 2015
  • Eleni Darra + 2 more

Wireless Sensor Networks (WSNs) have been studied in depth for several decades. Their main role is to provide bridges between the virtual world of information technology and the real physical world. They promise unprecedented new abilities to observe and understand large-scale, real-world phenomena at a fine spatio-temporal resolution. However, this potential does not come for free; WSNs have been known to be vulnerable to several types of attacks aiming at compromising their security. Among these types, Denial of Service (DoS) attacks stand out, as most WSNs are vulnerable to such attacks, which affect the routing behavior. This paper introduces a simulation platform, based on the network simulator ns-2, that allows the in-depth study of DoS attacks against WSNs. We simulate and analyze the performance of routing protocols for WSNs using a scenario-based experiment, in order to analyze the network's behavior under all the simulated attacks, namely Blackhole, Flooding, Rushing and Selective Forwarding. The analysis involves several network characteristics and is aimed towards identifying easily measured features that can be used for efficiently detecting and classifying DoS attacks in WSNs.

  • Conference Article
  • Cite Count Icon 14
  • 10.1109/wf-iot48130.2020.9221146
Machine Learning Methods Assessment for Denial of Service Detection in Wireless Sensor Networks
  • Jun 1, 2020
  • Silvio E Quincozes + 1 more

Intrusion Detection Systems (IDS) are important tools to detect malicious network traffic. Particularly, the efficient detection of Denial of Service (DoS) attacks poses a challenging issue especially in Internet of Things (IoT) scenarios composed of resource-constrained devices, as Wireless Sensor Networks (WSN). Additionally, machine learning classification methods have been presented as a prominent approach to DoS detection. However, a lack of a suitable and careful assessment of such methods becomes difficult to understand the real contribution of them to improve the detection of DoS attacks in WSNs. This work aiming at assessing the efficiency of machine learning classification approaches to detect (i) flooding, (ii) gray hole, and (iii) black hole DoS attacks in WSNs. Our evaluation is based on a WSN-based dataset, called WSN-DS, considering the accuracy and speediness metrics. Results reveal that—considering accuracy and speediness simultaneously—J48 method is recommended for detecting gray hole and black hole attacks, whereas the Random Tree method is the best option for flooding detection. Regarding the speediness, the J48 method is the fastest consuming 0.54µs of processing on average per sample.

More from: Wireless Communications and Mobile Computing
  • Addendum
  • 10.1155/wcm/9786782
RETRACTION: Energy‐Efficient Enhancement for the Prediction‐Based Scheduling Algorithm for the Improvement of Network Lifetime in WSNs
  • Jan 1, 2025
  • Wireless Communications and Mobile Computing
  • Wireless Communications And Mobile Computing

  • Addendum
  • 10.1155/wcm/9804148
RETRACTION: The Structural Features and Translation Skills of English in the Era of Radio Communication Networks
  • Jan 1, 2025
  • Wireless Communications and Mobile Computing
  • Wireless Communications And Mobile Computing

  • Addendum
  • 10.1155/wcm/9767142
RETRACTION: A Method for Classifying Information in Education Policy Texts Based on an Improved Attention Mechanism Model
  • Jan 1, 2025
  • Wireless Communications and Mobile Computing
  • Wireless Communications And Mobile Computing

  • Addendum
  • 10.1155/wcm/9853872
RETRACTION: Deconstruction of Immersive Animation Image Interaction Design under Virtual Reality Technology
  • Jan 1, 2025
  • Wireless Communications and Mobile Computing
  • Wireless Communications And Mobile Computing

  • Addendum
  • 10.1155/wcm/9759783
RETRACTION: Real‐Time Monitoring of College Sports Dance Competition Scenes Using Deep Learning Algorithms
  • Jan 1, 2025
  • Wireless Communications and Mobile Computing
  • Wireless Communications And Mobile Computing

  • Addendum
  • 10.1155/wcm/9807384
RETRACTION: Principal Component Analysis and Prediction of Students’ Physical Health Standard Test Results Based on Recurrent Convolution Neural Network
  • Jan 1, 2025
  • Wireless Communications and Mobile Computing
  • Wireless Communications And Mobile Computing

  • Addendum
  • 10.1155/wcm/9851093
RETRACTION: Structure Optimization of e‐Commerce Platform Based on Artificial Intelligence and Blockchain Technology
  • Jan 1, 2025
  • Wireless Communications and Mobile Computing
  • Wireless Communications And Mobile Computing

  • Journal Issue
  • 10.1155/wcm.v2025.1
  • Jan 1, 2025
  • Wireless Communications and Mobile Computing

  • Addendum
  • 10.1155/wcm/9760783
RETRACTION: Application of High‐Resolution Remote Sensing Image for Individual Tree Identification of Pinus sylvestris and Pinus tabulaeformis
  • Jan 1, 2025
  • Wireless Communications and Mobile Computing
  • Wireless Communications And Mobile Computing

  • Addendum
  • 10.1155/wcm/9898626
RETRACTION: Research on Multimedia Technology‐Assisted College English Grammar Teaching
  • Jan 1, 2025
  • Wireless Communications and Mobile Computing
  • Wireless Communications And Mobile Computing

Save Icon
Up Arrow
Open/Close
  • Ask R Discovery Star icon
  • Chat PDF Star icon
Setting-up Chat
Loading Interface