We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

An Efficient Technique for Detection of Flooding and Jamming Attacks in Wireless Sensor Networks

by Shikha Jindal, Raman Maini
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 98 - Number 10
Year of Publication: 2014
Authors: Shikha Jindal, Raman Maini
10.5120/17220-7458

Shikha Jindal, Raman Maini . An Efficient Technique for Detection of Flooding and Jamming Attacks in Wireless Sensor Networks. International Journal of Computer Applications. 98, 10 ( July 2014), 25-33. DOI=10.5120/17220-7458

@article{ 10.5120/17220-7458,
author = { Shikha Jindal, Raman Maini },
title = { An Efficient Technique for Detection of Flooding and Jamming Attacks in Wireless Sensor Networks },
journal = { International Journal of Computer Applications },
issue_date = { July 2014 },
volume = { 98 },
number = { 10 },
month = { July },
year = { 2014 },
issn = { 0975-8887 },
pages = { 25-33 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume98/number10/17220-7458/ },
doi = { 10.5120/17220-7458 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:26:23.292344+05:30
%A Shikha Jindal
%A Raman Maini
%T An Efficient Technique for Detection of Flooding and Jamming Attacks in Wireless Sensor Networks
%J International Journal of Computer Applications
%@ 0975-8887
%V 98
%N 10
%P 25-33
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Distributed denial of service attacks are a major threat for wireless sensor network. The aim of these attacks is that genuine users can not use network such as bandwidth, computing power and operating system data structures. Jamming and flooding attacks are one of the most popular attacks on WSN which cause DDoS. There is a requirement for the detection of these attacks rapidly and perfectly. For detection of these attacks, this paper suggests an efficient method. This method provides improved performance over the existing methods. The method is simulated using NS2 simulator. It has been concluded that this efficient method performs better in terms of energy, delay, throughput, packet loss and packet delivery ratio.

References
  1. D. Boyle, T. Newe "Securing Wireless Sensor Networks: Security Architectures" in journal of networks, VOL. 3, NO. 1, JANUARY 2008
  2. H. B. Hubboub "Denial of Service Attack in Wireless Sensor Networks" library. iugaza. edu. ps/thesis/92125. pdf
  3. A. D. Wood and J. A. Stankovic, "Denial of Service in sensor networks", Computer, vol. 35, no. 10, pp. 54-62, 2002
  4. S. M. Specht, R. B. Lee "Distributed Denial of Service: Taxonomies of Attacks, Tools and Countermeasures" in Proceedings of the 17th International Conference on Parallel and Distributed Computing Systems, 2004 International Workshop on Security in Parallel and Distributed Systems, pp. 543-550, September 2004
  5. J. H. Jun, H. Oh, S. H. Kim "DDoS flooding attack detection through a step-by-step investigation" Published in Networked Embedded Systems for Enterprise Applications (NESEA), 2011 IEEE 2nd International Conference on
  6. O. Xi , T. Bin , L. Qi , Z. J. yi , H. Z. Ming , X. Yang "A Novel Framework of Defense System Agaist DoS Attacks in Wireless Sensor Networks" in Wireless Communications, Networking and Mobile Computing (WiCOM), 2011 7th International Conference.
  7. R. Meher, S. Ladhe "Review Paper on Flooding Attack in MANET" in Int. Journal of Engineering Research and Applications, ISSN : 2248-9622, Vol. 4, Issue 1( Version 2), January 2014, pp. 39-46
  8. M. V. c, S. Kumar M. "Detection of Jamming Style DoS attack in Wireless Sensor Network" in 2012 2nd IEEE International Conference on Parallel, Distributed and Grid Computing
  9. J. A. Jahanshahi, S. A. Ghorashi, and M. Eslami "A Support Vector Machine based Algorithm for Jamming Attacks Detection in Cellular Networks" in Wireless Advanced (WiAd), 2011
  10. P. Yi et al. , "A New Routing Attack in Mobile Ad Hoc Networks," Int'l. J. Info. Tech. , vol. 11, no. 2, 2005.
  11. S. Desilva, and R. V. Boppana, "Mitigating Malicious Control Packet Floods in Ad Hoc Networks," Proc. IEEE Wireless Commun. and Networking Conf. , New Orleans, LA, 2005.
  12. Sathish. T, Sasikala. E" Dynamic Profile Based Technique to Detect Flooding Attack in MANET" in International Journal of Innovative Research in Computer and Communication Engineering Vol. 2, Special Issue 1, March 2014
  13. A. D. Wood, J. A. Stankovic, and S. H. Son "JAM: A Jammed-Area Mapping Service for Sensor Networks" Proceedings of the 24th IEEE International Real-Time Systems Symposium (RTSS'03), IEEE, 2003.
  14. S. D. Babar, N. R. Prasad, R. Prasad "Game Theoretic Modelling of WSN Jamming Attack and Detection Mechanism" Published in Wireless Personal Multimedia Communications (WPMC), 2013 16th International Symposium on
  15. D. Liu, J. Raymer, A. Fox "Ef?cient and Timely Jamming Detection in Wireless Sensor Networks" in 9th International Conference on Mobile Adhoc and Sensor Systems MASS, page 335-343. IEEE Computer Society, (December 2012)
  16. R. Choubey, S. Sahu, R. S. Dubey, S. Dubey "Flooding Attack Prevention Algorithm in AODV Protocol for Mobile Ad-hoc Network" in International Journal of Science and Advanced Technology, Volume 1 No 6 August 2011
  17. A. Mummoorthy , S. S. Kumar "A Detailed Study on the Evolution of Recent Jammers in Wireless Sensor Networks" in International Journal of Engineering Research and Development Volume 4, Issue 6 (October 2012), PP. 12-15
Index Terms

Computer Science
Information Sciences

Keywords

Distributed Denial of service flooding jamming security wireless sensor networks