Skip to main content
Log in

Detection of denial of service attacks by domination graph application in wireless sensor networks

  • Published:
Cluster Computing Aims and scope Submit manuscript

Abstract

In many web services systems, need extended confirmation of confidential information including access control policies, which are cryptographically certified for secure data exchanges in wireless sensor networks. The domination set in graph theory enriches many applications in the field of networks. One of the application with the novel procedure named school bus routing approach is proposed, which can coordinate the characteristics of the system, with the goal of detection of denial of service attacks. This strategy is employed that is most powerful adequate to schedule the sensor nodes in such a route, to the point that it monitors the network traffic for identification of source of attack and for the denial of service provision to the users. The throughput, packet loss ratio and packet delivery results were simulated and analyzed in the network based on the implementation of proposed routing approach. Our approach is more resilient for incorporation environment.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

References

  1. Cardei, M., Du, D.: Improving wireless sensor network lifetime through power aware organization. Wirel. Netw. 11, 333–340 (2005)

    Article  Google Scholar 

  2. Huang, Y., Lee, W.: A cooperative intrusion detection system for ad hoc networks. In: SASN’03: Proceedings of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks, Fairfax, VA, pp. 135–147 (2003)

  3. Khan, A.R.: Energy efficient protocol design issues in wireless sensor networks. J. Inf. Commun. Technol. 4(1), 12–18 (2010)

    MathSciNet  Google Scholar 

  4. Bredin, J.L., Demaine, E.D.: Deploying sensor networks with guaranteed capacity and fault tolerance. In: Proceedings of the 6th ACM International Symposium on Mobile Ad Hoc Networking and Computing, pp. 309–319 (2005)

  5. Frank, C.: Facility location. In: Algorithms for Sensor and Ad Hoc Networks, pp. 131–159. Springer, Berlin (2007)

  6. Tan, G., Jarvis, S.A., Kermarrec, A.-M.: Connectivity guaranteed and obstacle-adaptive deployment schemes for mobile sensor networks. IEEE Sens. J. 14(3), 1–14 (2009)

  7. Bai, X., Yun, Z., Xuan, D., Lai, T.H., Jia, W.: Optimal patterns for four-connectivity and full coverage in wireless sensor networks. IEEE Trans. Mob. Comput. 9(3), 435–448 (2010)

    Article  Google Scholar 

  8. Chang, J.H., Tassiulas, L.: Maximum lifetime routing in wireless sensor networks. IEEE/ACM Trans. Netw. 12, 609–619 (2004)

    Article  Google Scholar 

  9. Gope, P., Lee, J., Quek, T.Q.S.: Resilience of DoS attacks in designing anonymous user authentication protocol for wireless sensor networks. IEEE Sens. J. 17(2), 498–503 (2017)

    Article  Google Scholar 

  10. Gogu, N.D., Dilo, A., Meratnia, N.: Optimization problems in wireless sensor networks. In: IEEE Xplore, Complex, Intelligent and Software Intensive Systems, Seoul, pp. 302–309 (2011)

  11. Yildiz, H.U., Tavli, B., Kahjogh, B.O., Dogdu, E.: The impact of incapacitation of multiple critical sensor nodes on wireless sensor network lifetime. IEEE Wirel. Commun. Lett. 6(3), 306–309 (2017)

    Article  Google Scholar 

  12. Wu, K., Gao, Y., Li, F., Xiao, Y.: Lightweight deployment-aware scheduling for wireless sensor networks. Mob. Netw. Appl. 10(6), 837–852 (2005).

    Article  Google Scholar 

  13. Li, Y., Quevedo, D.E., Dey, S., Shi, L.: SINR-based DoS attack on remote state estimation: a game-theoretic approach. IEEE Trans. Control Netw. Syst. 4(3), 632–642 (2017)

    Article  MathSciNet  Google Scholar 

  14. Mahlous, A.R., Tounsi, M.: Operation research based techniques in wireless sensors networks. Commun. Netw. 9, 54–70 (2017)

    Article  Google Scholar 

  15. Illiano, V.P., Lupu, E.C.: Detecting malicious data injections in event detection wireless sensor networks. IEEE Trans. Netw. Serv. Manag. 12(3), 495–510 (2015)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to S. Balaji.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Balaji, S., Sasilatha, T. Detection of denial of service attacks by domination graph application in wireless sensor networks. Cluster Comput 22 (Suppl 6), 15121–15126 (2019). https://doi.org/10.1007/s10586-018-2504-5

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10586-018-2504-5

Keywords

Navigation