Open Access Journal

ISSN : 2394 - 6849 (Online)

International Journal of Engineering Research in Electronics and Communication Engineering(IJERECE)

Monthly Journal for Electronics and Communication Engineering

Open Access Journal

International Journal of Engineering Research in Electronics and Communication Engineering(IJERECE)

Monthly Journal for Electronics and Communication Engineering

ISSN : 2394-6849 (Online)

Review on Path Based DOS Attack Prevention in WSN using Improved PSO techniques with QoS Parameters

Author : A.Praveena 1 Dr.E.S.Shamila 2 R.N.Devendra Kumar 3

Date of Publication :2nd May 2017

Abstract: Wireless sensor networks are more susceptible to various attacks due to the deployment in aggressive environment. These networks offer the promise of exciting new technological developments. They are emerging as one of the most reliable technologies for implementing ubiquitous computing ultimately leading to an all-pervasive paradigm of computing infrastructure. They are increasingly become viable solutions to many challenging problems and will successively be deployed in many areas in the future such as in environmental monitoring, business, and military There have been significant contributions to overcome many weaknesses in sensor networks like coverage problems, lack in power and making best use of limited network bandwidth, however; work in sensor network security is still in its infancy stage. In contrast to resource-rich networks such as the Internet, a WSN is less stable, more resource limited, subject to open wireless communication, and prone to the physical risks of in-situ deployment. Due to their inherent limitations, WSNs are especially sensitive to Denial of service (DoS) attacks and can cause serious damages. This paper addresses an especially damaging form of DoS attack, called PDoS (Path-based Denial of Service). In a PDoS attack, an adversary overwhelms sensor nodes a long distance away by flooding a multihop endto- end communication path with either replayed packets or injected spurious packets. The main idea of negotiation based routing in WSNs is to suppress duplicate information and prevent redundant data from being sent to the next sensor or the base-station by conducting a series of negotiation messages before the real data transmission begins. Negotiation messages can include optimum value using Particle Swarm Optimization along with data

Reference :

  1. [1] S. Chen, B. Mulgrew, and P. M. Grant, “A clustering technique for digital communications channel equalization using radial basis function networks,” IEEE Trans. on Neural Networks, vol. 4, pp. 570-578, July 1993.

    [2] Chan, Haowen, and Adrian Perrig. "Security and privacy in sensor networks." Computer 36.10 (2003): 103-105.

    [3] Mirkovic, Jelena, and Peter Reiher. "A taxonomy of DDoS attack and DDoS defense mechanisms." ACM SIGCOMM Computer Communication Review 34.2 (2004): 39-53.

    [4] Wood, Anthony D., and John A. Stankovic. "Denial of service in sensor networks." Computer 35.10 (2002): 54-62.

    [5] Li, Bai, and Lynn Batten. "Using mobile agents to detect node compromise in path-based DoS attacks on wireless sensor networks." Wireless Communications, Networking and Mobile Computing, 2007. WiCom 2007. International Conference on. IEEE, 2007.

    [6] Xu, Wenyuan, et al. "Jamming sensor networks: attack and defensestrategies." Network, iEEE 20.3 (2006): 41-47.

    [7] Jain, Sushil Kumar, and Kumkum Garg. "A hybrid model of defense techniques against base station jamming attack in wireless sensor networks." Computational Intelligence, Communication Systems and Networks, 2009. CICSYN'09. First International Conference on. IEEE, 2009.

    [8] Badal, Tapas, and Dipti Verma. "A Modular Approach for Intrusion Detection System in Wireless Networks." (2011): 57-61. [9] Xie, Miao, et al. "Anomaly detection in wireless sensor networks: A survey." Journal of Network and Computer Applications 34.4 (2011): 1302- 1325.

    [10] M. Kaur, A. Jain and A. K. Goel, "Energy Efficient Two Level Distributed Clustering Scheme to Prolong Stability Period of Wireless Sensor Network", International Conference on Advances in Computing, Communications and Informatics (ICACCI), pp. 68-73

    [11] David R. Raymond and Scott F. Midkiff,(2008) "Denial-of-Service in Wireless Sensor Networks: Attacks and Defenses," IEEE Pervasive Computing, vol. 7, no. 1, 2008, pp. 74-81.

    [12] Deng, J., Han, R., and Mishra, S. (2005), Defending against Path-based DoS Attacks in Wireless Sensor Networks. ACM SASN’05, November 7, 2005, Alexandria, Virginia, USA, pp 89-96.

    [13] Doddapaneni.krishna chaitanya “Analysis of Denial-of-Service attacks on WSN using simulation” Middlesex University. [14] Al-sakib Khan Pathan “Denial of Service in Wireless sensor networks: issues and challenges.”Advances in communications and Media Research ISBN 978-1-60876-576-8.

    [15] A. Agah, S. K. Das, and K. Basu, “Enforcing security for prevention of DoS attack in wireless sensor networks using economical modeling, ” Proceedings of 2nd IEEE International Conference on Mobile Ad-Hoc and Sensor Systems (MASS), Washington, D.C., Nov. 2005.

    [16] Afrand Agah, Mehran Asadi and Sajal K, “Preventing of DoS Attacks using Repeated Game Theory”, May 2007.

    [17] Ouyang Xi, Tian Bin, Li Qi, Zhang Jian-yi, Hu Zheng-Ming, Xin Yang,“A Novel Framework of Defense System Agaist DoS attacks in WSN”, IEEE 2011.

    [18] S. Marti, T. Giuli, K. Lai, M. Baker,“Mitigating routing misbehaviour in mobile ad hoc networks”, In Proceedings of ACM International Conference on


Recent Article