Skip to main content
Log in

Using Improved Hilbert–Huang Transformation Method to Detect Routing-Layer Reduce of Quality Attack in Wireless Sensor Network

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Denial of Service (DoS) attack is a serious threat to the security of Wireless Sensor Netwokr (WSN). Moreover, Reduce of Quality (RoQ) attack is a special DoS attack type. The RoQ attack is a potential DoS attack, it is simulator to normal traffic,so it is difficult to be detected by traditional detection method. Hilbert–Huang Transform (HHT) time–frequency analysis method can be used to analyze the non-linear signal generated by RoQ attack. However, mode mixing and false component are the challenge problems to analyze the RoQ attack by HHT method. Ensemble empirical mode decomposition (EEMD) method is used to eliminate the mode mixing problem. Correlated coefficient method is used to recognize the false components. In this paper, EEMD and correlated coefficient methods are combined to detect the weak signal generated by RoQ attack. Ad Hoc On-demand Multi-path Distance Vector routing protocol and random Routing REQuest flooding attack are simulated to implement RoQ attack in wireless sensor network by Network Simulator. Suitable white noises are added to original signal to detect the weak RoQ attack signal. Experiment results show that the improved HHT methods are highly effective to detect RoQ attack, when the standard deviation of white noise is 0.01 and the number of ensemble is 80, the detection results is best. When the correlated coefficient of intrinsic mode functions (IMFs) is greater than 0.2, the IMFs can be used to analyze and detect RoQ attack. To our knowledge, this is the first quantitative experiment and method research on the routing-layer RoQ attack detection in WSN.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18

Similar content being viewed by others

References

  1. Krishna Chaitanya, D., Ghosh, A., & Ever, E. (2011). Analysis of denial of service attacks on wireless sensor networks using simulation. In Kaspersky Lab IT security conference for the next generation, Erfurt, Germany, January 27–30.

  2. He, Y.et al. (2009). Reduction of Quality (RoQ) attacks on structured peer-to-peer networks. In IEEE international parallel and distributed processing symposium (IPDPS 09).

  3. Guirguis, M., Bestavros, A., Matta, I., & Zhang, Y. (2005). Reduction of Quality (RoQ) attacks on internet end- systems. IEEE INFOCOM, 2, 1362–1372.

    Google Scholar 

  4. Chen, W., Zhang, Y., & Wei, Y. (2008). The feasibility of launching Reduction of Quality (RoQ) attacks in 802.11 wireless networks. In International conference on parallel and distributed systems - ICPADS 2008 (pp. 517–524).

  5. Barros, U., Bouet, M., Santos, T. A., & Nogueira, M. (2010). Assessing RoQ attacks on MANETs over aware and unaware TPC techniques. In 2010 International conference on network and service management (pp. 1–5).

  6. Ren, W., Yeung, D.-Y., & Jin, H. (2007). Pulsing RoQ DDoS attack and defense scheme in mobile ad hoc networks. International Journal of Network Security, 4(2), 227–234.

    Google Scholar 

  7. Wen, K., Yang, J., Cheng, F., Li, C., Wang, Z., & Yin, H. (2014). Two-stage detection algorithm for RoQ attack based on localized periodicity analysis of traffic anomaly. In ICCCN, 2014 (pp. 1–6).

  8. Hong, R., Hui-Mei, W., & Ming, X. (2013). A novel method for detecting Reduction of Quality (RoQ) attack based on fast independent component analysis. Journal of Electronics & Information Technology, 35(10), 2307–2313.

    Google Scholar 

  9. Torrence, C., & Compo, G. (1998). A practical guide to wavelet analysis. Bulletin of the American Meteorological Society, 79(1), 61–78.

    Article  Google Scholar 

  10. Huang, N. E., Shen, Z., & Long, S. R. (1998). The empirical ode decomposition and the Hilbert spectrum for nonlinear and non-stationary time series analysis. Proceedings of the Royal Society of London A, 454, 903–995.

    Article  MATH  Google Scholar 

  11. Kangfeng, Z., Xiujuan, W., Yixian, Y., & Shize, G. (2011). Detecting DDoS attack With Hilbert–Huang transformation. China Communications, 8(2), 126–133.

    Google Scholar 

  12. Han, J., & Zhang, J. Z. (2013). Network traffic anomaly detection using weighted self-similarity based on EMD. In 2013 Proceedings of IEEE Southeastcon, Southeastcon (pp. 1–5).

  13. Han, J. (2013). Network traffic anomaly detection using EMD and Hilbert-Huan transform. 2013 Western Carolina University (WCU) Thesis.

  14. Le, A., & Loo, J. (2013). The impact of rank attack on network topology of routing protocol for low-power and lossy networks. IEEE Sensors Journal, 13(10), 3685–3692.

    Article  Google Scholar 

  15. Hsueh, C.-T., & Wen, Chih-Yu. (2015). A secure scheme against power exhausting attacks in hierarchical wireless sensor networks. IEEE Sensors Journal, 15(6), 3590–3602.

    Article  Google Scholar 

  16. Shiravi, A., Shiravi, H., Tavallaee, M., & Ghorbani, A. A. (2012). Toward developing a systematic approach to generate benchmark datasets for intrusion detection. Computers & Security, 31(3), 357–374.

    Article  Google Scholar 

  17. Hamedheidari, S., & Rafeh, R. (2013). A novel agent-based approach to detect sinkhole attacks in wireless sensor networks. Computers & Security, 37(20), 1–14.

    Article  Google Scholar 

  18. Hongsong, C., Zhenzhou, J., & Mingzeng, H. (2007). Design and performance evaluation of a multi-agent-based dynamic lifetime security scheme for AODV routing protocol. Journal of Network & Computer Applications, 30(1), 145–166.

    Article  Google Scholar 

  19. Huang, N. E., Shen, Z., & Long, S. R. (1999). A new view of nonlinear water waves: The Hilbert spectrum. Annual Review of Fluid Mechanics, 31, 417–457.

    Article  MathSciNet  Google Scholar 

  20. Wu, Z., & Huang, N. E. (2009). Ensemble empirical mode decomposition: A noise-assisted data analysis method. Advances in Adaptive Data Analysis, 1, 1–41.

    Article  Google Scholar 

  21. http://www.isi.edu/nsnam/ns. Accessed Jan 2017.

  22. Zhang, W., Wang, C., & Wang, H. (2012). Hilbert–Huang transform-based electrostatic signal analysis of ring-shape electrodes with different widths. IEEE Instrumentation and Measurement Society, 64(5), 1209–1217.

    Article  Google Scholar 

  23. Wang, L., Yan, Y., Hu, Y., & Qian, X. (2014). Rotational speed measurement through electrostatic sensing and correlation signal processing. IEEE Transactions on Instrumentation and Measurement, 63(5), 1190–1199.

    Article  Google Scholar 

  24. Chen, H., Bhargava, B., & Zhongchuan, F. (2014). Multilabels-based scalable access control for big data applications. IEEE Cloud Computing Magazine, 1(3), 65–71.

    Article  Google Scholar 

Download references

Acknowledgements

This work was supported by National Key Research and Development Program of China (2018YFB0803403, 2018YFB0803400). National Social Science Fund of China (18BGJ071). Fundamental Research Funds for the Central Universities (TW201706). Beijing Natural Science Foundation (4142034).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hongsong Chen.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Chen, H., Liu, M. & Zhongchuan, F. Using Improved Hilbert–Huang Transformation Method to Detect Routing-Layer Reduce of Quality Attack in Wireless Sensor Network. Wireless Pers Commun 104, 595–615 (2019). https://doi.org/10.1007/s11277-018-6036-3

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-018-6036-3

Keywords

Navigation