Visible to the public Secure routing against DDoS attack in wireless sensor network

TitleSecure routing against DDoS attack in wireless sensor network
Publication TypeConference Paper
Year of Publication2017
AuthorsNagar, S., Rajput, S. S., Gupta, A. K., Trivedi, M. C.
Conference Name2017 3rd International Conference on Computational Intelligence Communication Technology (CICT)
PublisherIEEE
ISBN Number978-1-5090-6218-8
Keywordscomposability, Computer crime, computer network security, DDoS Attack, DDoS Attack Prevention, Human Behavior, intrusion, intrusion prevention scheme, IP networks, IPS, IPS node, message passing, Metrics, Monitoring, pubcrawl, Resiliency, Routing, Routing protocols, secure routing protocol, security Algorithm, security scheme, sensor nodes, sensor placement, sink node, TCP messages, UDP messages, Wireless Sensor Network, Wireless sensor networks, WSNs
Abstract

Wireless sensor network is a low cost network to solve many of the real world problems. These sensor nodes used to deploy in the hostile or unattended areas to sense and monitor the atmospheric situations such as motion, pressure, sound, temperature and vibration etc. The sensor nodes have low energy and low computing power, any security scheme for wireless sensor network must not be computationally complex and it should be efficient. In this paper we introduced a secure routing protocol for WSNs, which is able to prevent the network from DDoS attack. In our methodology we scan the infected nodes using the proposed algorithm and block that node from any further activities in the network. To protect the network we use intrusion prevention scheme, where specific nodes of the network acts as IPS node. These nodes operate in their radio range for the region of the network and scan the neighbors regularly. When the IPS node find a misbehavior node which is involves in frequent message passing other than UDP and TCP messages, IPS node blocks the infected node and also send the information to all genuine sender nodes to change their routes. All simulation work has been done using NS 2.35. After simulation the proposed scheme gives feasible results to protect the network against DDoS attack. The performance parameters have been improved after applying the security mechanism on an infected network.

URLhttps://ieeexplore.ieee.org/document/7977375/
DOI10.1109/CIACT.2017.7977375
Citation Keynagar_secure_2017