Abstract
In many web services systems, need extended confirmation of confidential information including access control policies, which are cryptographically certified for secure data exchanges in wireless sensor networks. The domination set in graph theory enriches many applications in the field of networks. One of the application with the novel procedure named school bus routing approach is proposed, which can coordinate the characteristics of the system, with the goal of detection of denial of service attacks. This strategy is employed that is most powerful adequate to schedule the sensor nodes in such a route, to the point that it monitors the network traffic for identification of source of attack and for the denial of service provision to the users. The throughput, packet loss ratio and packet delivery results were simulated and analyzed in the network based on the implementation of proposed routing approach. Our approach is more resilient for incorporation environment.
Similar content being viewed by others
References
Cardei, M., Du, D.: Improving wireless sensor network lifetime through power aware organization. Wirel. Netw. 11, 333–340 (2005)
Huang, Y., Lee, W.: A cooperative intrusion detection system for ad hoc networks. In: SASN’03: Proceedings of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks, Fairfax, VA, pp. 135–147 (2003)
Khan, A.R.: Energy efficient protocol design issues in wireless sensor networks. J. Inf. Commun. Technol. 4(1), 12–18 (2010)
Bredin, J.L., Demaine, E.D.: Deploying sensor networks with guaranteed capacity and fault tolerance. In: Proceedings of the 6th ACM International Symposium on Mobile Ad Hoc Networking and Computing, pp. 309–319 (2005)
Frank, C.: Facility location. In: Algorithms for Sensor and Ad Hoc Networks, pp. 131–159. Springer, Berlin (2007)
Tan, G., Jarvis, S.A., Kermarrec, A.-M.: Connectivity guaranteed and obstacle-adaptive deployment schemes for mobile sensor networks. IEEE Sens. J. 14(3), 1–14 (2009)
Bai, X., Yun, Z., Xuan, D., Lai, T.H., Jia, W.: Optimal patterns for four-connectivity and full coverage in wireless sensor networks. IEEE Trans. Mob. Comput. 9(3), 435–448 (2010)
Chang, J.H., Tassiulas, L.: Maximum lifetime routing in wireless sensor networks. IEEE/ACM Trans. Netw. 12, 609–619 (2004)
Gope, P., Lee, J., Quek, T.Q.S.: Resilience of DoS attacks in designing anonymous user authentication protocol for wireless sensor networks. IEEE Sens. J. 17(2), 498–503 (2017)
Gogu, N.D., Dilo, A., Meratnia, N.: Optimization problems in wireless sensor networks. In: IEEE Xplore, Complex, Intelligent and Software Intensive Systems, Seoul, pp. 302–309 (2011)
Yildiz, H.U., Tavli, B., Kahjogh, B.O., Dogdu, E.: The impact of incapacitation of multiple critical sensor nodes on wireless sensor network lifetime. IEEE Wirel. Commun. Lett. 6(3), 306–309 (2017)
Wu, K., Gao, Y., Li, F., Xiao, Y.: Lightweight deployment-aware scheduling for wireless sensor networks. Mob. Netw. Appl. 10(6), 837–852 (2005).
Li, Y., Quevedo, D.E., Dey, S., Shi, L.: SINR-based DoS attack on remote state estimation: a game-theoretic approach. IEEE Trans. Control Netw. Syst. 4(3), 632–642 (2017)
Mahlous, A.R., Tounsi, M.: Operation research based techniques in wireless sensors networks. Commun. Netw. 9, 54–70 (2017)
Illiano, V.P., Lupu, E.C.: Detecting malicious data injections in event detection wireless sensor networks. IEEE Trans. Netw. Serv. Manag. 12(3), 495–510 (2015)
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Balaji, S., Sasilatha, T. Detection of denial of service attacks by domination graph application in wireless sensor networks. Cluster Comput 22 (Suppl 6), 15121–15126 (2019). https://doi.org/10.1007/s10586-018-2504-5
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10586-018-2504-5