Skip to main content

Advertisement

Log in

A Centralized Mechanism for Preventing DDOS Attack in Wireless Sensor Networks

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Wireless sensor networks face numerous limitations. Security and Privacy are the two most essential parameters that require consideration in wireless sensor networks for conveying responsive information amid basic applications. High density and limited communication range of sensor nodes, forwarding packets in sensor networks have caused the performance of during multi-hop data transmission. Hence communication with different devices these days are not secure, due to the absence of centralized monitoring and overprotective requirements. This paper is related to speak about Distributed Denial of Service which debilitates the ability of the network and the data being transmitted. The earlier system guarantees the WSN through a self arranged and confined procedure between the nodes in the sensor environment. Here, the authors present the Centralized Detect Eliminate and Control algorithm for authorization and centralized monitoring component to discover the node that has turned into a victim node and to get rid of the information communicated to the fatality node from the neighbour nodes. Overprotective of the communication between the nodes leads to dependability. The simulation results improve the malicious node detection rate and increase the various parameters like throughput and reduce the average delay. This leads to, the overall detection rate built, eventually enhancing the parameters of the network environment.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

Data Availability

The datasets generated during and/or analysed during the current study are available from the corresponding author on reasonable request.

References

  1. Sha, K., Gehlot, J., & Greve, R. (2013). Multi path routing techniques in wireless sensor networks: A survey. Wireless Personal Communications, 70(2), 807–829.

    Article  Google Scholar 

  2. Ghosha, A., & Dasb, S. K. (2008). Coverage and connectivity issues in wireless sensor networks: A survey. Pervasive and Mobile Computing, 4(3), 303–334.

    Article  Google Scholar 

  3. Gavric, Z., & Simic, D. (2018). Overview of DOS attacks on wireless sensor networks and experimental results for simulation of interference attacks. Ingenieria and Investigation, 38(1), 130–138.

    Article  Google Scholar 

  4. Zhang, Y., Li, X., & Liu, Y. (2012). The detection and defense of DOS attack for wireless sensor network. The Journal of China Universities of Posts and Telecommunications, 19(2), 52–56.

    Google Scholar 

  5. Patil, S., & Chaudhari, S. (2016). DoS attack prevention technique in wireless sensor networks. Procedia Computer Science, 79, 715–721.

    Article  Google Scholar 

  6. Han, G., Shen, W., Duong, T. Q., Guizani, M., & Hara, T. (2011). A proposed security scheme against denial of service attacks in cluster-based wireless sensor networks. Security and Communication Networks, 7(2), 2542–2554.

    Google Scholar 

  7. Padilla, P., Camacho, J., Maciá-Fernández, G., Díaz-Verdejo, J. E., García-Teodoro, P., & Gómez-Calero, C. (2013). On the influence of the propagation channel in the performance of energy-efficient geographic routing algorithms for wireless sensor networks(WSN). Wireless Personal Communication, 7(1), 39–40.

    Article  Google Scholar 

  8. Lee, S. M., Kim, D. S., Lee, J. K., & Park, J. S. (2012). Detection of DDOS attack using optimized traffic matrix. Computer and Mathematics with Applications, 63(2), 501–510.

    Article  Google Scholar 

  9. Tariq, U., Malik, Y., & Abdulrazak, B. (2012). Defense and monitoring model for distributed denial of service attacks. In The second international workshop on internet of ubiquitous and pervasive things (IUPT2012) (pp. 1052–1056).

  10. Juneja, D., Arora, N., & Bansal, S. (2010). An ant-based routing algorithm for detecting attacks in wireless sensor networks. International Journal of Computational Intelligence and Research, 6(2), 311–330.

    Google Scholar 

  11. Kumar, V. S. D., & Navaneethan, C. (2014). Protection against Denial of Service (DoS) attacks in wireless sensor network. International Journal of Advanced Research in Computer Science & Technology, 2(1), 439–443.

    Google Scholar 

  12. Juneja, D., & Arora, N. (2010). An ant based framework for preventing DDoS attack in wireless sensor network. International Journal of Advanced in Technology, 1(1), 34–44.

    Google Scholar 

  13. Patil, S., & Chaudhari, S. (2016). DoS attack prevention technique in wireless sensor networks. In Proceedings of international conference on communication computing and virtualization (ICCCV’2016) (pp. 715–721).

  14. Sharma, P., Sharma, N., & Sharma, R. (2012). A secure intrusion detection system against DDoS attack in wireless ad-hoc network. International Journal of Computer Applications, 41(21), 16–21.

    Article  Google Scholar 

  15. Anjusree, S., & Praveena, V. (2013). A relative study for detection and prevention of DDoS attack. International Journal of Innovative Research in Computer and Communication Engineering, 1(8), 1786–1792.

    Article  Google Scholar 

  16. Bose, S., & Kannan, A. (2008). Detecting Denial of service attacks using cross layer based intrusion detection system in wireless adhoc networks. In IEEE international conference on signal processing, communications and networking (ICSCN’08), Chennai (pp. 182–188).

  17. Reddy, K. S. S., Varadarajan, S., & Kumar, M. S. (2011). Improving QOS under DDos attacks in wireless sensor networks using ANT system. International Journal of Engineering and Technology, 3(6), 5057–5065.

    Google Scholar 

  18. Zhang, Y. Y., Li, X. Z., & Liu, Y. A. (2012). The detection and defense of DOS attack for wireless sensor network. The Journal Universities of Posts and Telecommunications, 19(2), 52–56.

    Google Scholar 

  19. Han, G., Shen, W., Duong, T. Q., Guizani, M., & Hara, T. (2014). A proposed security scheme against denial of service attacks in cluster-based wireless sensor networks. Security and Communication Networks, 7(12), 2542–2554.

    Article  Google Scholar 

  20. Kaushal, K., & Sahni, V. (2016). Early detection of DDoS attack in WSN. International Journal of Computer Applications, 134(13), 14–18.

    Article  Google Scholar 

  21. Jinhui, X., Yang, T., Feiyue, Y., Leina, P., Juann, X., & Yao, H. (2018). Intrusion detection system for hybrid DoS attacks using energy trust in wireless sensor networks. In International congress of information and communication technology, ICICT-2018 (pp. 1188–1195).

  22. Del-Valle-Soto, C., Mex-Perera, C., Nolazco Flores, J. A., Rodriguez, A., Rosascaro, J. C., & Martinez Herrera, A. F. (2021). A low-cost jamming detection approach using performance metrics in cluster-based wireless sensor networks. Sensors, 21(4), 1–20.

    Article  Google Scholar 

  23. Patil, N. V., Krishna, C. R., & Kumar, K. (2021). Distributed frameworks for detecting distributed denial of service attacks: A comprehensive review, challenges and future directions. Concurrency and computation practice and Experience, 33(10), 1–12.

    Article  Google Scholar 

  24. Del-Valle-Soto, C., Mex-Perera, C., Nolazco-Flores, J. A., Rodríguez, A., Rosas-Caro, J. C., & Martínez-Herrera, A. F. (2021). A low-cost jamming detection approach using performance metrics in cluster-based wireless sensor networks. Sensors, 10(3390), 1–28.

    Google Scholar 

  25. Abidoye, A. P., & Obagbuwa, I. B. (2018). DDoS attack in WSNs: Detection and countermeasures. IET Wireless Sensor Systems, 8(2), 52–59.

    Article  Google Scholar 

  26. Mazur, K., Ksiezopolski, B., & Nielek, R. (2016). Multilevel modeling of distributed denial of service attacks in wireless sensor networks. Journal of Sensors, 10(1155), 1–13.

    Article  Google Scholar 

  27. Guangjie, H., Shen, W., Duong, T. Q., Guizani, M., & Hara, T. (2014). A proposed security scheme against denial of service attacks in cluster-based wireless sensor networks. Security and Communication Networks, 7(12), 2542–2554.

    Article  Google Scholar 

  28. Malik, M., & Singh, Y. (2015). A review: DoS and DDoS attacks. International Journal of Computer Science and Mobile Computing, 4(6), 260–265.

    Google Scholar 

  29. Dhivyasri, K., Suphalakshmi, A., & Revathi, M. (2020). Wireless sensor network jammer attack: A detailed review. International Journal for Research in Applied Science & Engineering Technology, 8(8), 233–238.

    Article  Google Scholar 

  30. Rajkumar, D. U. S., et al. (2019). Artificial bee colony method for identifying eaves dropper in terrestrial cellular networks. Transaction Emerging on Telecommunication Technology, 10(1002), 1–17.

    Google Scholar 

  31. Ganeshkumar, P., Vijayakumar, K. P., & Anandaraj, M. (2016). A novel jammer detection framework for cluster-based wireless sensor networks. EURASIP Journal on Wireless Communication and Networking, 20(35), 1–25.

    Google Scholar 

  32. Zhang, C. (2021). Impact of defending strategy decision on DDoS attack. Hindawi Complexity, 10(1155), 1–11.

    Google Scholar 

Download references

Funding

The authors did not receive support from any organization for the submitted work.

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Udaya Suriya Rajkumar Dhamodharan or Sathiyaraj Rajendran.

Ethics declarations

Conflict of interest

The authors have no conflicts of interest to declare that are relevant to the content of this article.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Dhamodharan, U.S.R., Rajendran, S., Sundaramoorthy, R.A. et al. A Centralized Mechanism for Preventing DDOS Attack in Wireless Sensor Networks. Wireless Pers Commun 124, 1191–1208 (2022). https://doi.org/10.1007/s11277-021-09401-3

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-021-09401-3

Keywords