Enhancement of security using optimized DoS (denial-of-service) detection algorithm for wireless sensor network


Wireless sensor networks involved every part of application in today’s life. This can detect the various type of information from environment and communicated to users in real time. Information is stored by using cloud technology and that can be accessed by the users. The information is prone to attacks as they are part of cooperative communication. Building algorithms at node level is not secured as they transfer data in open traffic. This has provided scope for this study to concentrate on algorithms that are available for denial-of-service attacks as they put down the network performance to a less minimum. The paper henceforth proposes optimized energy-based constraint DoS (denial-of-service) detection algorithm, i.e., OBES algorithm for handling denial-of-service attacks that learns the network traffic and manages the intruders. This has been compared with denial-of-service attack detection with energy constraint in WSN. The implementation has been done in NS2. The performance has been presented in terms of nodes, interval and lifetime. From results, it can be observed that the proposed OBES algorithm is efficient as it achieves more available energy, less delay, less packet loss and more lifetime for the network. From results, it can be observed that OBES algorithm performs well compared to denial-of-service attack detection with energy constraint algorithm.

This is a preview of subscription content, log in to check access.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8


  1. Aamir M, Zaidi SMA (2019) DDoS attack detection with feature engineering and machine learning: the framework and performance evaluation. Int J Inf Secur 18(6):1–25

    Article  Google Scholar 

  2. Balaji S, Sasilatha T (2018) Detection of denial of service attacks by domination graph application in wireless sensor networks. Clust Comput 6:1–6

    Google Scholar 

  3. Bashaa MH, Al-Alak SM, Idrees AK (2019) Secret key generation in wireless sensor network using public key encryption. In: Proceedings of the international conference on information and communication technology, pp 106–112

  4. Cao Y et al (2019) AccFlow: defending against the low-rate TCP DoS attack in wireless sensor networks. arXiv:1903.06394

  5. Chang S-Y, Kumar SL, Hu Y-C, Park Y (2019) Power-positive networking: wireless-charging-based networking to protect energy against battery DoS attacks. ACM Trans Sensor Netw 15(3):27

    Article  Google Scholar 

  6. Chen H et al (2019) A novel low-rate denial of service attack detection approach in zigbee wireless sensor network by combining Hilbert–Huang transformation and trust evaluation. IEEE Access 7:32853–32866

    Article  Google Scholar 

  7. Cheng J, Li J, Tang X, Sheng VS, Zhang C, Li M (2019) A novel DDoS attack detection method using optimized generalized multiple kernel learning. arXiv:1906.08204

  8. Daud M, Rasiah R, George M, Asirvatham D, Rahman AFA, Halim AA (2018) Denial of service: (DoS) impact on sensors. In: 2018 4th international conference on information management (ICIM), Oxford, 2018, pp 270–274

  9. Debayan D, Golder A, Danial J, Ghosh S, Raychowdhury A, Sen S (2019) X-DeepSCA: cross-device deep learning side channel attack. In: Proceedings of the 56th annual design automation conference, pp 1–6

  10. Dwivedi AD, Malina L, Dzurenda P, Srivastava G (2019) Optimized blockchain model for internet of things based healthcare applications. arXiv:1906.06517

  11. Girish SV, Prakash R, Swetha SNH, Pareek G, Kumar TS (2016) A network model of GUI-based implementation of sensor node for indoor air quality monitoring. In: Advances in intelligent systems and computing published—Springer, 2016—from the proceedings of international conference ICSCS 2015, vol 397, pp 209–217,. ISBN: 978-81-322-2669-7 (Print) 978-81-322-2671-0 (Online)

  12. Krishnan SSN (2019) Denial of service (DoS) detection in wireless sensor networks applying geometrically varying clusters. In: International conference on computer networks and communication technologies. Springer, Singapore

  13. Ma W, Wu Y, Gong M, Qin C, Wang S (2017) Local probabilistic matrix factorization for personal recommendation. In: 2017 13th international conference on computational intelligence and security (CIS). Hong Kong, pp 97–101

  14. Moser D, Lenders V, Capkun S (2019) Digital radio signal cancellation attacks: an experimental evaluation. In: Proceedings of the 12th conference on security and privacy in wireless and mobile networks, pp 23–33

  15. Osanaiye OA, Alfa AS, Hancke GP (2018) Denial of service defence for resource availability in wireless sensor networks. IEEE Access 6:6975–7004

    Article  Google Scholar 

  16. Pareek S, Sharma PK (2018) Denial of service attack detection by enhanced dendritic cell algorithm. In: 2018 3rd international conference and workshops on recent advances and innovations in engineering (ICRAIE). IEEE

  17. Pereira de Almeida M et al (2018) New DoS defense method based on strong designated verifier signatures. Sensors 18(9):2813

    Article  Google Scholar 

  18. Pourazarm S, Cassandras CG (2017) Energy-based lifetime maximization and security of wireless-sensor networks with general nonideal battery models. IEEE Trans Control Netw Syst 4(2):323–335

    MathSciNet  Article  Google Scholar 

  19. Pu C, Song T (2018) Hatchetman attack: a denial of service attack against routing in low power and lossy networks. In: 2018 5th IEEE international conference on cyber security and cloud computing (CSCloud)/2018 4th IEEE international conference on edge computing and scalable cloud (EdgeCom). IEEE

  20. Qin J, Li M, Shi L, Yu X (2018) Optimal denial-of-service attack scheduling with energy constraint over packet-dropping networks. IEEE Trans Autom Control 63(6):1648–1663

    MathSciNet  Article  Google Scholar 

  21. Sarwar MA, Hussain M, Anwar MU, Ahmad M (2019) FlowJustifier: an optimized trust-based request prioritization approach for mitigation of SDN controller DDoS attacks in the IoT paradigm. In: Proceedings of the 3rd international conference on future networks and distributed systems. ACM, p 43

  22. Sicari S et al (2018) REATO: REActing TO denial of service attacks in the internet of things. Comput Netw 137:37–48

    Article  Google Scholar 

  23. Wen W, Wen X, Yuan L, Xu H (2018) Range-free localization using expected hop progress in anisotropic wireless sensor networks. EURASIP J Wirel Commun Networking 2018:299

    Article  Google Scholar 

Download references


This research is not supported by any funding.

Author information



Corresponding author

Correspondence to N. M. Saravana Kumar.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Human participants and/or animal

This article does not contain any studies with human participants or animals performed by any of the authors.

Informed consent

All referred study is highlighted in the literature review.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Communicated by V. Loia.

Rights and permissions

Reprints and Permissions

About this article

Verify currency and authenticity via CrossMark

Cite this article

Suryaprabha, E., Saravana Kumar, N.M. Enhancement of security using optimized DoS (denial-of-service) detection algorithm for wireless sensor network. Soft Comput 24, 10681–10691 (2020). https://doi.org/10.1007/s00500-019-04573-4

Download citation


  • Sensors
  • Denial of service
  • Attack
  • Wireless sensor network