CFP last date
20 January 2025
Call for Paper
February Edition
IJCA solicits high quality original research papers for the upcoming February edition of the journal. The last date of research paper submission is 20 January 2025

Submit your paper
Know more
Reseach Article

Early Detection of DDoS Attack in WSN

by Kanchan Kaushal, Varsha Sahni
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 134 - Number 13
Year of Publication: 2016
Authors: Kanchan Kaushal, Varsha Sahni
10.5120/ijca2016908117

Kanchan Kaushal, Varsha Sahni . Early Detection of DDoS Attack in WSN. International Journal of Computer Applications. 134, 13 ( January 2016), 14-18. DOI=10.5120/ijca2016908117

@article{ 10.5120/ijca2016908117,
author = { Kanchan Kaushal, Varsha Sahni },
title = { Early Detection of DDoS Attack in WSN },
journal = { International Journal of Computer Applications },
issue_date = { January 2016 },
volume = { 134 },
number = { 13 },
month = { January },
year = { 2016 },
issn = { 0975-8887 },
pages = { 14-18 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume134/number13/23974-2016908117/ },
doi = { 10.5120/ijca2016908117 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:34:07.177682+05:30
%A Kanchan Kaushal
%A Varsha Sahni
%T Early Detection of DDoS Attack in WSN
%J International Journal of Computer Applications
%@ 0975-8887
%V 134
%N 13
%P 14-18
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Wireless Sensor Networks carry out has great significance in many applications, such as battlefields surveillance, patient health monitoring, traffic control, home automation, environmental observation and building intrusion surveillance. However, wireless technology also creates new threats. Since WSNs communicate by using radio frequencies therefore the risk of interference is more than with wired networks. If the message to be passed is not in an encrypted form, or is encrypted by using a weak algorithm, the attacker can read it, and it is the compromise to the confidentiality. In this paper we describe the security goals and DDoS attack in WSNs. Most of the schemes are available for the detection of DDoS attacks in WSNs. But these schemes prevent the attack after the attack has been completely launched which leads to data loss and consumes resources of sensor nodes which are very limited. In this paper a new scheme early detection of DDoS attack in WSN has been introduced for the detection of DDoS attack. It will detect the attack on early stages so that data loss can be prevented and more energy can be reserved after the prevention of attacks. Performance of this scheme has been seen on the basis of throughput, packet delivery ratio, no. of packets flooded and remaining energy of the network.

References
  1. Varsha Nigam, Saurabh Jain and Dr. Kavita Burse, “Profile based Scheme against DDoS Attack in WSN”, 2014 Fourth International Conference on Communication Systems and Network Technologies, IEEE, 2014.
  2. Shikha Jindal and Raman Maini “An Efficient Technique for Detection of Flooding and Jamming Attacks in Wireless Sensor Networks”, International journal of computer applications, 0975-8887, Vol. 98, No. 10, 2014.
  3. Upavi .E.Vijay1, Nikhil Sameul2, “Study of Various Kinds of Attacks and Prevention Measures in WSN”, International Journal of Advanced Research Trends in Engineering and Technology (IJARTET),Vol. II, Special Issue X, March 2015.
  4. Ahmad Abed, Alhameed Alkhatib, and Gurvinder Singh Baicher “Wireless Sensor Network Architecture,” International Conference on Computer Networks and Communication Systems, IPCSIT, vol. 35, 2012.
  5. Jing Deng, Richard Han, and Shivakant Mishra, “Defending against Path based DoS Attacks in Wireless Sensor Networks”, SASN’05, 2005, Alexandria, Virginia, USA.
  6. Sonali Swetapadma Sahu et.a. “Distributed Denial of Service Attacks: A Review”, I.J. Modern Education and Computer Science, 2014, 1, 65-71 Published Online January 2014 in MECS.
  7. Y.-C. Hu, A. Perrig, D.B. Johnson: Adriane: A Secure On-Demand Routing Protocol for Ad Hoc Networks, Annual ACM Int. Conference on Mobile Computing and Networking (MobiCom) 2002.
  8. K. Kifayat, M. Merabti, Q. Shi, D. Llewellyn-Jones: Group-based secure communication for large scale wireless sensor networks, J. Information Assurance Security. Vol 2, 139–147, 2007.
  9. Najma Farooq1, Irwa Zahoor2, Sandip Mandal3 and Taabish Gulzar4, “Systematic Analysis of DoS Attacks in Wireless Sensor Networks with Wormhole Injection”, International Journal of Information and Computation Technology,Volume 4, Number 2 (2014), pp. 173-182.
  10. Ms. Shagun Chaudhary1, Mr. Prashant Thanvi2, “Performance Analysis of Modified AODV Protocol in Context of Denial of Service (Dos) Attack in Wireless Sensor Networks”, International Journal of Engineering Research and General Science Volume 3, Issue 3, May-June, 2015.
  11. Prajeet Sharma, Niresh Sharma, Rajdeep Singh, “A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network”, International Journal of Computer Applications (0975 – 8887) Volume 41– No.21, March 2012.
  12. Saman Taghavi Zargar et.al. , “A Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding Attacks”, IEEE COMMUNICATIONS SURVEYS & TUTORIALS, published online Feb. 2013.Guangjie Han, Wen Shen, Trung Q. Duong, Mohsen Guizani and Takahiro Hara , “A proposed security scheme against Denial of Service attacks in cluster-based wireless sensor networks”, Security and Communication Networks,Published on 9 SEP 2011.
Index Terms

Computer Science
Information Sciences

Keywords

Network security Attacks on WSN Security mechanisms prevention of attacks from security threats.