{"title":"Optimised watchdog system for detection of DDOS and wormhole attacks in IEEE802.15.4-based wireless sensor networks","authors":"J. Govindasamy, Samundiswary Punniakodi","doi":"10.1504/IJMNDI.2018.10011192","DOIUrl":null,"url":null,"abstract":"Owing to wireless broadcast nature of communication, wireless sensor networks (WSNs) are vulnerable to denial-of-service (DOS) attacks and hole attacks. Preserving security and confidentiality in WSN are crucial, so it is required to design an energy efficient intruder detection system (IDS) to detect and mitigate the attacks. In this paper, an energy efficient intruder detection system based on energy prediction (EE-IDSEP) has been proposed for IEEE 802.15.4-based WSN to detect and mitigate the distributed denial-of-service (DDoS) attack (i.e., resource depletion attack, power exhaustion attack and flooding) and wormhole attacks. The design of EE-IDSEP consists of optimised watchdog system and hidden Markov model (HMM). The wormhole attack is detected using the optimised watchdog system. The optimised watchdog mechanism is a trust-based method which is used to evaluate the validity of all the nodes of the network. The DDoS attack is detected based on energy consumed using the hidden Markov model. The model of EE-IDS is simulated using NS2 simulator and then it is compared with existing energy efficient trust system (EE-TS) in terms of packet delivery ratio (PDR), packet drop, and energy consumption.","PeriodicalId":35022,"journal":{"name":"International Journal of Mobile Network Design and Innovation","volume":"56 1","pages":"36"},"PeriodicalIF":0.0000,"publicationDate":"2018-03-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Mobile Network Design and Innovation","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1504/IJMNDI.2018.10011192","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"Business, Management and Accounting","Score":null,"Total":0}
引用次数: 4
Abstract
Owing to wireless broadcast nature of communication, wireless sensor networks (WSNs) are vulnerable to denial-of-service (DOS) attacks and hole attacks. Preserving security and confidentiality in WSN are crucial, so it is required to design an energy efficient intruder detection system (IDS) to detect and mitigate the attacks. In this paper, an energy efficient intruder detection system based on energy prediction (EE-IDSEP) has been proposed for IEEE 802.15.4-based WSN to detect and mitigate the distributed denial-of-service (DDoS) attack (i.e., resource depletion attack, power exhaustion attack and flooding) and wormhole attacks. The design of EE-IDSEP consists of optimised watchdog system and hidden Markov model (HMM). The wormhole attack is detected using the optimised watchdog system. The optimised watchdog mechanism is a trust-based method which is used to evaluate the validity of all the nodes of the network. The DDoS attack is detected based on energy consumed using the hidden Markov model. The model of EE-IDS is simulated using NS2 simulator and then it is compared with existing energy efficient trust system (EE-TS) in terms of packet delivery ratio (PDR), packet drop, and energy consumption.
期刊介绍:
The IJMNDI addresses the state-of-the-art in computerisation for the deployment and operation of current and future wireless networks. Following the trend in many other engineering disciplines, intelligent and automatic computer software has become the critical factor for obtaining high performance network solutions that meet the objectives of both the network subscriber and operator. Characteristically, high performance and innovative techniques are required to address computationally intensive radio engineering planning problems while providing optimised solutions and knowledge which will enhance the deployment and operation of expensive wireless resources.