Defense and Detection of DDOS Attack using Secured Geographic Routing
The routing protocol needs a secure transfer of messages due to the lack of routing initiation system. The secured routing protocol plays the major role in the Wireless Sensor Networks. There are many existing routing protocol which implies the major drawback. The major drawback tends to be failure by the node to send message during the routing process as they are subjected by the attackers. The major attack which is considered during the proposed routing model is the Distributed Denial of Service (DDOS) attack. The secured routing which is carried out in the proposed work is the Secured Geographic Routing Protocol (SGRP). Increase in the reliability of the transmission process can be carried out using the Secured Geographic Routing Protocol (SGRP) protocol by selecting the certain source node. The paper proposed the identification and isolation of certain attacks from the Secured Geographic Routing Protocol (SGRP). Various experiments were carried out to analyze the simulation time and the efficiency of the proposed routing technique. The proposed routing technique demonstrates the performance by calculating the Packets Delivery Ratio(PDR) and Energy consumption.
B.Ksiezopolski,“The official webpage of the qopmlproject, 2012”.
M.Dhar and R.Singh, “Are view of security issues and denial of service attacks in wireless sensor networks, ”International Journal of Computer Science and Information Technology Research, vol. 3, no. 1,pp. 27–33, 2015.
G.Kumar,“Understanding denial of service(dos) attacks using osi reference model,” International Journal of Education and ScienceResearch,vol.1,no.5,2014.
Isha, A. Malik, and G. Raj,“Dos attacks on tcp/iplayersinwsn,” International Journal of Computer Networks and Communica- tionsSecurity,vol.1,no.2,pp.40–45,2013.
A. D. Wood and J. A. Stankovic, “A taxonomy for denial-of- service attacks in wireless sensor networks,” in Handbook of Sensor Networks CompactWireless and Wired Sensing Systems,
M.IlyasandI.Mahgoub,Eds.,CRCPress, NewYork, NY,USA, 2004.
J. Mirkovic and P. Reiher, “A taxonomy of DDoS attack and DDoS defense mechanisms,” ACMSIGCOMM Computer Com- municationReview, vol.34, no.2, pp.39–53, 2004.
A. Asosheh and N. Ramezani, “A comprehensive taxonomy of DDoS attacks and defense mechanism applying in a smart classification,”WSEAS Transactions on Computers,vol.7, no.4, pp. 281–290,2008.
D. K. Chaitanya and G. Arindam, “Analysis of denial-of- service attacks on wireless sensor networks using simulation,” in Proceedings of the IT Security for the NextGeneration—European Cup, University of Applied Sciences, Erfurt, Germany, January 2011.
Q.Huang, H.Kobayashi,and B.Liu, “Modeling of distributed denial of service attacks in wireless networks,” in Proceedings of the IEEEPacificRim Conference on Communications, Computers andsignalProcessing,pp.41–44,Victoria,Canada,August2003.
L. Pei, C. Li, R. Hou, Y. Zhang, and H. Ou, “Computer simulation of denial of service attack in military information network using opnet,” in Proceedings of the 3rd International ConferenceonMultimediaTechnology(ICMT’13),2013.
I. Mukhopadhayay, S. Polle, and P. Naskar, “Analysis ofdenial- of-service attacks on wireless sensor networks using simulation,” IOSR Journal of Computer Engineering (IOSR-JCE),vol. 16,2014.
R. Bhatnagar, “The proposal of hybrid intrusion detection for defence of sync flood attack in wireless sensor network,” International Journal of Computer Science& EngineeringSurvey, vol. 3, no. 2,pp. 31–38, 2012.
S. Tripathy and S. Nandi, “Defense against outside attacks in wireless sensor networks,” Computer Communications, vol.31, no. 4, pp. 818–826,2008.
J.-H. Son, H. Luo, and S.-W. Seo, “Denial of service attack- resistant flooding authentication in wireless sensor networks,” ComputerCommunications,vol.33,no.13,pp.1531–1542,2010.
V. S. Dines Kumar and C. Navaneethan, “Protection against denial of service (dos) attacks in wireless sensor networks,” International Journal of Advanced Research in ComputerScience &Technology,vol.2,no.1,pp.439–443,2014
L.-C.Chen,T.A.Longstaff,andK.M.Carley,“Characterization of defense mechanisms against distributed denial of service attacks,” Computers and Security, vol. 23, no. 8, pp. 665–678, 2004.
M. Eian and S. F. Mjølsnes, “The modeling and comparison of wireless network denial of service attacks,” in Proceedings of the 3rd ACM SOSP Workshop on Networking, Systems, and Applications on Mobile Handhelds (MobiHeld ’11), October2011.
G. Dini and M. Tiloca, “ASF: an attack simulation framework for wireless sensor networks,” in Proceedings of the IEEE 8th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob ’12), pp. 203–210, Barcelona, Spain, October2012.
Y.-Y.Zhang,X.-Z.Li,andY.-A.Liu,“The detection and defence of DoS attack for wireless sensor network,” The Journal of China Universities of Posts andTelecommunications,vol.19,no.2,pp. 52–56,2012.
B. Ksiezopolski, “QoP-ML: quality of protection modelling language for cryptographic protocols,” Computers & Security, vol.31,no.4,pp.569–596,2012.
B.Ksiezopolski, Multilevel Modeling of Secure Systems in QoP- ML,CRCPress/Taylor&Francis,NewYork,NY,USA,2015.
G. Anastasi, G. Lo Re, and M. Ortolani, “WSNs for structural health monitoring of historical buildings,” in Proceedings of the 2nd Conference on Human System Interactions (HSI ’09), pp. 574–579, IEEE, Catania, Italy, May2009.
Crossbow Technology,“TelosBmoteplatformdatasheet,”Doc- umentPartNumber6020-0094-01,revB,2004,http://www
I. Mansour, D. Rusinek, G. Chalhoub, P. Lafourcade, and B. Ksiezopolski, “Multihop node authentication mechanisms for wireless sensor networks,” in Ad-Hoc, Mobile, and Wireless Networks:13thInternationalConference,ADHOC-NOW2014, Benidorm, Spain, June 22–27, 2014 Proceedings, vol. 8487 of Lecture Notes in Computer Science, pp. 402–418, Springer, Berlin, Germany,2014.
D.Rusinek, B.Ksiezopolski, and A.Wierzbicki, “Securitytrade- off and energy efficiency analysis in wireless sensor networks,” International Journal of Distributed Sensor Networks, vol. 2015, ArticleID943475,17 pages,2015.
B.Księz˙opolski, D.Rusinek,and A.Wierzbicki,“Onthe modelling of kerberos protocol in the quality of protection modelling language (QoP-ML),” Annales UMCS, Informatica, vol.12,no.4,pp.69–81,2012.
P.Szalachowski,B.Ksiezopolski,andZ.Kotulski,“Optimization of the TL Ssecurity protocol,”Annales UMCS: Informatica,vol. 9, pp. 59–75,2009
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.