Abstract

Wireless sensor networks (WSN) is considered as one of the exploring technology for its deployment of the massive number of dedicated sensor nodes which sense the environment and collect the data. The collected data are sent to the sink node through the intermediate nodes. Since the sensors node data are exposed to the internet, there is a possibility of vulnerability in the WSN. The common attack that affects most of the sensor nodes is the Distributed Denial of Services (DDoS) attack. This paper aims to identify the DDoS (Flooding) attack quickly and to recover the data of sensor nodes using the fuzzy logic mechanism. Fuzzy based DDoS attack Detection and Recovery mechanism (FBDR) uses type 1 fuzzy logic to detect the occurrence of DDoS attack in a node. Similarly fuzzy- type 2 is used for the recovery of data from the DDoS attack. Both the type 1 fuzzy-based rule and type 2 fuzzy-based rule perform well in terms of identifying the DDoS attack and recover the data under attack. It also helps to reduce the energy consumption of each node and improves the lifetime of the network. The proposed FBDR scheme is also compared with other related existing schemes. The proposed method saves energy usage by up to 20% compared with the related schemes. The experimental results represent that the FBDR method works better than other similar schemes.

Highlights

  • In day to day life, Wireless Sensor Networks (WSN) is one of the recent developing areas

  • The common attack that affects most of the sensor nodes is the DDoS attack

  • In this paper aims to identify the DDoS attack quickly and to recover sensors using the fuzzy logic mechanism

Read more

Summary

Introduction

In day to day life, Wireless Sensor Networks (WSN) is one of the recent developing areas. WSN has wide-ranging applications for gathering data and data transmission in the military, health care, smart grid, surveillance, etc They are exposed to security attacks due to security reasons for effective security measures are needed to secure the sensor nodes [4]. The damage caused by a DDoS attack may lead to network or system shut down, rapid battery drainage of the sensor nodes and denial of services. To identify the DDoS attack we use the fuzzy-based logic system This system is considered as the most effective attack detection method, which resolves with imprecise and vague boundaries among the normal traffic and various levels of attacks. ✓ Type Fuzzy-based rule is framed to detect DDos attacks with the input values of Energy Consumption, Response time and Packet count.

Related works
Fuzzy Method
Proposed work
Recovery Method
Performance Evaluation
Findings
Conclusion

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.