Skip to main content
Log in

DAD: A Secured Routing Protocol for Detecting and Preventing Denial-of-Service in Wireless Networks

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

This paper aims to provide a complete security mechanism for DOS attacks in wireless networks. Various techniques and methodologies were proposed in the earlier studies against DOS attack and their solution in terms of detection and prevention rate is very less. In this paper DAD-(defending against DOS) approach is proposed to provide maximum level of security and DAD shows the efficiency in terms of detection and prevention. DAD has two main phases, such as authentication and monitoring. In authentication phase entire node verification and certification is provided by DAD approach. In monitoring phase the entire traffic flow is monitored with a help of USIP-recording and USIP-marking methods. The simulation result shows that the efficacy of DAD is better than the existing approaches in terms of detection and prevention.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11

Similar content being viewed by others

Abbreviations

BS:

Base station

RH:

Region head

TMA:

Traffic monitoring agent

AD:

Administrator node

Ni :

Node i

G:

Network G

NID:

Node-identification

USIP:

Unique static IP

Auth-Key:

Authentication key

M:

M number of nodes

RID:

Region identification

References

  1. Fatima, S. G., Sattar, S. A., & Anitha Sheela, K. (2014). Energy efficient intrusion detection system for wireless sensor network using neural network. Journal of Theoretical and Applied Information Technology, 59(2), 352–359.

  2. Agarwal, S., Jain, V., & Goswami, K. (2014). Energy efficient mac protocols for wireless sensor network. International Journal on Computational Sciences & Applications (IJCSA), 4(1), 153–160.

  3. Wang, Y., Fu, W., & Agrawal, D. P. (2013). Gaussian versus uniform distribution for intrusion detection in wireless sensor networks. IEEE Transactions on Parallel and Distributed systems, 24(2), 342–355.

  4. Sun, B., Shan, X., & Wu, K. (2013). Anomaly detection based secure in-network aggregation for wireless sensor networks. IEEE Systems Journal, 7(1), 13–25.

  5. Liu, B., Dousse, O., Nain, P., & Towsley, D. (2013). Dynamic coverage of mobile sensor networks. IEEE Transactions on Parallel and Distributed systems, 24(2), 301–311.

  6. Lee, Y.-J., Yeh, Y.-R, & Wang, Y.-C. F. (2013). Anomaly detection via online oversampling principal component analysis. IEEE Transactions on Knowledge and Data Engineering, 25(7), 1460–1470.

  7. Shan, Z., Wang, X., & Chiueh, T. (2013). Malware clearance for secure commitment of OS-level virtual machines. IEEE Transactions on Dependable and Secure Computing, 10(2), 70–83.

  8. Tartakovsky, A. G., Polunchenko, A. S., & Sokolov, G. (2013). Efficient computer network anomaly detection by changepoint detection methods. IEEE Journal of Selected Topics in Signal Processing , 7(1), 4–11.

  9. Wei, W., Chen, F., Xia, Y., & Jin, G. (2013). A rank correlation based detection against distributed reflection DoS attacks. IEEE Communications Letters, 17(1), 173–175.

  10. Wang, X., Xu, Y., Jiang, J., Ormond, O., Liu, B., & Wang, X. (2013). StriFA: Stride finite automata for high-speed regular expression matching in network intrusion detection systems. IEEE Systems Journal, 7(3), 374–384.

  11. Chen, Y., Ma, X., & Wu, X. (2013). DDoS detection algorithm based on preprocessing network traffic predicted method and chaos theory. IEEE Communications Letters , 17(5), 1052–1054.

  12. Al-Hamadi, H., & Chen, I.-R. (2013). Redundancy management of multipath routing for intrusion tolerance in heterogeneous wireless sensor networks. IEEE Transactions on Network and Service Management, 10(2), 189–203.

  13. Bhoopathy, V., & Parvathi, R. M. S. (2012). Securing node capture attacks for hierarchical data aggregation in wireless sensor networks. International Journal of Engineering Research and Applications (IJERA), 2(2), 466–474.

  14. Fulare, R. P., & Sakhare, A. V. (2014). Secure authentication technique in wireless integrated sensor network: Virtual certificate authority. International Journal of Application or Innovation in Engineering & Management (IJAIEM), 3(3), 152–160.

  15. Chen, I.-R., & Wang, Y. (2012). Reliability analysis of wireless sensor networks with distributed code attestation. IEEE Communications Letters, 16(10), 1640–1643.

  16. Fung, C. J., Zhang, J., & Boutaba, R. (2012). Effective acquaintance management based on bayesian learning for distributed intrusion detection networks. IEEE Transactions on Network and Service Management, 9(3), 320–332.

  17. Wang, C., Feng, T., Kim, J., Wang, G., & Zhang, W. (2012). Catching packet droppers and modifiers in wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems, 23(5), 835–843.

  18. Wang, G., Yu, J., & Xie, Q. (2013). Security analysis of a single sign-on mechanism for distributed computer networks. IEEE Transactions on Industrial Informatics, 9(1), 294–302.

  19. Gong, C., & Sarac, K. (2009). Toward a practical packet marking approach for IP traceback. International Journal of Network Security, 8, 271–281.

    Google Scholar 

  20. Merton, R. K. (1968). The Matthew effect in science: The reward and communication systems of science are considered. Science, 159(3810), 56–63.

    Article  Google Scholar 

  21. Yan, D., Wang, Y., Su, S., & Yang, F. (2012). A precise and practical IP traceback technique based on packet marking and logging. Journal of Information Science and Engineering, 28, 453–470.

    Google Scholar 

  22. Rajkumar, D. U. S., & Vayanaperumal, R. (2013). A leader based monitoring approach for sinkhole attack in wireless sensor network. Journal of Computer Science, 9(9), 1106–1116.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to A. Thomas Paul Roy.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Thomas Paul Roy, A., Balasubadra, K. DAD: A Secured Routing Protocol for Detecting and Preventing Denial-of-Service in Wireless Networks. Wireless Pers Commun 90, 457–471 (2016). https://doi.org/10.1007/s11277-015-3022-x

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-015-3022-x

Keywords