Abstract

The Wireless Sensor Network (WSN) has evolved into a new IoT scheme, and its adoption has no restrictions at present. Sadly, security has an impact on the network of wireless sensors, and Denial-of-Service (DOS) categories of attacks are security concerns. This study therefore focuses on the distributed denial of service (DDOS), especially on DDoS-PSH-ACK (ACK & PUSH ACK Flood) in WSN. An experimental analysis was developed to predict that many spoofed ACK packets were reoccurring in order to deflate the target node. In the proposed approach, several experimental scenarios for the DDOS detection function were established and implemented. The experimental analysis draws traffic flow within the several transmission sessions involving “the normal transmission within sensor nodes and cluster head”, as well as the “transmission and retransmission scenarios within the sensor nodes and cluster head” at same time with different signal sizes. The main contribution of the paper is predicting DDoS attack by variability of transmission behavior with high degree accuracy. It was established that the most ideal delay between transmissions is 23 milliseconds in order to ensure that the receiving end is not overwhelmed. The result of the current study highlighted that when transmission session gets overwhelmed, that influence DDOS success.

Highlights

  • The wireless sensor network is not different from the conventional computer network; it is exclusively the connected sensor network via radio connections without a central control system. [1]

  • This paper presents the actual tests for examining how Wireless Sensor Network (WSN) get overwhelmed, in such a way that all the threats behaviors associated to DDoS attack can be evaluated

  • The results of this study showed that the distributed denial of service (DDOS) can be devastating in WSN

Read more

Summary

Introduction

The wireless sensor network is not different from the conventional computer network; it is exclusively the connected sensor network via radio connections without a central control system. [1]. This is typical of distributed communication where a neighborhood node can be felt by every node in a system This type of network is implemented in a different environment, mainly in overhead water monitoring systems and so many others. They are developed and could be vulnerable to certain attacks in a coordinated setting. It is a major threat to all network security problems because it generates enormous amounts of data traffic to exhaust all target system resources and inactivate the communication link by stopping the server from processing legitimate requests for users to conduct transactions [3]. The DDOS operable computing resources are mainly the network bandwidth and processing unit of computers and memory This is, its capacity tends to be overpowered the communication channels. The DDOS attack scenarios on the left hand side are shown in conventional networked computing systems, and the WSN

Objectives
Methods
Findings
Discussion
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call