Advertisement

Cluster Computing

, Volume 22, Supplement 6, pp 15121–15126 | Cite as

Detection of denial of service attacks by domination graph application in wireless sensor networks

  • S. BalajiEmail author
  • T. Sasilatha
Article

Abstract

In many web services systems, need extended confirmation of confidential information including access control policies, which are cryptographically certified for secure data exchanges in wireless sensor networks. The domination set in graph theory enriches many applications in the field of networks. One of the application with the novel procedure named school bus routing approach is proposed, which can coordinate the characteristics of the system, with the goal of detection of denial of service attacks. This strategy is employed that is most powerful adequate to schedule the sensor nodes in such a route, to the point that it monitors the network traffic for identification of source of attack and for the denial of service provision to the users. The throughput, packet loss ratio and packet delivery results were simulated and analyzed in the network based on the implementation of proposed routing approach. Our approach is more resilient for incorporation environment.

Keywords

Sensors School bus routing Denial of service Domination application Wireless sensor networks (WSNs) 

References

  1. 1.
    Cardei, M., Du, D.: Improving wireless sensor network lifetime through power aware organization. Wirel. Netw. 11, 333–340 (2005)CrossRefGoogle Scholar
  2. 2.
    Huang, Y., Lee, W.: A cooperative intrusion detection system for ad hoc networks. In: SASN’03: Proceedings of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks, Fairfax, VA, pp. 135–147 (2003)Google Scholar
  3. 3.
    Khan, A.R.: Energy efficient protocol design issues in wireless sensor networks. J. Inf. Commun. Technol. 4(1), 12–18 (2010)MathSciNetGoogle Scholar
  4. 4.
    Bredin, J.L., Demaine, E.D.: Deploying sensor networks with guaranteed capacity and fault tolerance. In: Proceedings of the 6th ACM International Symposium on Mobile Ad Hoc Networking and Computing, pp. 309–319 (2005)Google Scholar
  5. 5.
    Frank, C.: Facility location. In: Algorithms for Sensor and Ad Hoc Networks, pp. 131–159. Springer, Berlin (2007)Google Scholar
  6. 6.
    Tan, G., Jarvis, S.A., Kermarrec, A.-M.: Connectivity guaranteed and obstacle-adaptive deployment schemes for mobile sensor networks. IEEE Sens. J. 14(3), 1–14 (2009)Google Scholar
  7. 7.
    Bai, X., Yun, Z., Xuan, D., Lai, T.H., Jia, W.: Optimal patterns for four-connectivity and full coverage in wireless sensor networks. IEEE Trans. Mob. Comput. 9(3), 435–448 (2010)CrossRefGoogle Scholar
  8. 8.
    Chang, J.H., Tassiulas, L.: Maximum lifetime routing in wireless sensor networks. IEEE/ACM Trans. Netw. 12, 609–619 (2004)CrossRefGoogle Scholar
  9. 9.
    Gope, P., Lee, J., Quek, T.Q.S.: Resilience of DoS attacks in designing anonymous user authentication protocol for wireless sensor networks. IEEE Sens. J. 17(2), 498–503 (2017)CrossRefGoogle Scholar
  10. 10.
    Gogu, N.D., Dilo, A., Meratnia, N.: Optimization problems in wireless sensor networks. In: IEEE Xplore, Complex, Intelligent and Software Intensive Systems, Seoul, pp. 302–309 (2011)Google Scholar
  11. 11.
    Yildiz, H.U., Tavli, B., Kahjogh, B.O., Dogdu, E.: The impact of incapacitation of multiple critical sensor nodes on wireless sensor network lifetime. IEEE Wirel. Commun. Lett. 6(3), 306–309 (2017)CrossRefGoogle Scholar
  12. 12.
    Wu, K., Gao, Y., Li, F., Xiao, Y.: Lightweight deployment-aware scheduling for wireless sensor networks. Mob. Netw. Appl. 10(6), 837–852 (2005).CrossRefGoogle Scholar
  13. 13.
    Li, Y., Quevedo, D.E., Dey, S., Shi, L.: SINR-based DoS attack on remote state estimation: a game-theoretic approach. IEEE Trans. Control Netw. Syst. 4(3), 632–642 (2017)MathSciNetCrossRefGoogle Scholar
  14. 14.
    Mahlous, A.R., Tounsi, M.: Operation research based techniques in wireless sensors networks. Commun. Netw. 9, 54–70 (2017)CrossRefGoogle Scholar
  15. 15.
    Illiano, V.P., Lupu, E.C.: Detecting malicious data injections in event detection wireless sensor networks. IEEE Trans. Netw. Serv. Manag. 12(3), 495–510 (2015)CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2018

Authors and Affiliations

  1. 1.Panimalar Engineering College, Anna UniversityChennaiIndia
  2. 2.Anna UniversityChennaiIndia

Personalised recommendations