Open Access Open Access  Restricted Access Subscription Access

Recognition and Handling of Insider and Outsider DDOS Attacks in WSN


Affiliations
1 CSE, SBSSTC, Ferozepur – 152004, Punjab, India
2 IKGPTU Main Campus, Kapurthala – 144603, Punjab, India
3 SBSSTC, Ferozepur – 152004, Punjab, India
 

Objectives: Recognition and Handling of Insider and Outsider DDoS attacks are very important in WSN. Various schemes have been proposed in the past to fight against DDoS attacks in WSN. But they have either used a complex approach for recognizing the attack or they were not able to handle the attack efficiently after recognizing it. The presented method has followed a simplified and effective approach to recognize and handle the DDoS attack. Methods: In this paper two methods have been introduced, Authentication method is based upon a mathematical formula which is only known to legitimate nodes in the network. In data filtration method, each node in the network checks the input data volumes coming from other nodes against a threshold value to find the traffic abnormalities. Both these methods are simple and can be deployed at every node in the network. Findings: The results have been verified using the Network Simulator 2 (NS2) on various performance metrics i.e. throughput, delay, lost packets, energy consumption and PDR. It has been observed that fixing the threshold value results in recognition of attack at very early stages and blocking the communication with the attacker results in saving approx 56% energy of the network.. The threshold value can be decided as per the bandwidth usage that may vary in different applications. Improvements: The data filtration method can be enhanced in future by using historical methods so as to analyze and mitigate other severe attacks like blackhole and sinkhole attacks.

Keywords

Authentication, Data Filtration, DDoS, NS2, Threshold, WSN.
User

Abstract Views: 232

PDF Views: 0




  • Recognition and Handling of Insider and Outsider DDOS Attacks in WSN

Abstract Views: 232  |  PDF Views: 0

Authors

Shivam Dhuria
CSE, SBSSTC, Ferozepur – 152004, Punjab, India
Monika Sachdeva
IKGPTU Main Campus, Kapurthala – 144603, Punjab, India
Gulshan Kumar
SBSSTC, Ferozepur – 152004, Punjab, India

Abstract


Objectives: Recognition and Handling of Insider and Outsider DDoS attacks are very important in WSN. Various schemes have been proposed in the past to fight against DDoS attacks in WSN. But they have either used a complex approach for recognizing the attack or they were not able to handle the attack efficiently after recognizing it. The presented method has followed a simplified and effective approach to recognize and handle the DDoS attack. Methods: In this paper two methods have been introduced, Authentication method is based upon a mathematical formula which is only known to legitimate nodes in the network. In data filtration method, each node in the network checks the input data volumes coming from other nodes against a threshold value to find the traffic abnormalities. Both these methods are simple and can be deployed at every node in the network. Findings: The results have been verified using the Network Simulator 2 (NS2) on various performance metrics i.e. throughput, delay, lost packets, energy consumption and PDR. It has been observed that fixing the threshold value results in recognition of attack at very early stages and blocking the communication with the attacker results in saving approx 56% energy of the network.. The threshold value can be decided as per the bandwidth usage that may vary in different applications. Improvements: The data filtration method can be enhanced in future by using historical methods so as to analyze and mitigate other severe attacks like blackhole and sinkhole attacks.

Keywords


Authentication, Data Filtration, DDoS, NS2, Threshold, WSN.



DOI: https://doi.org/10.17485/ijst%2F2017%2Fv10i19%2F150570