Secure routing against DDoS attack in wireless sensor network
Title | Secure routing against DDoS attack in wireless sensor network |
Publication Type | Conference Paper |
Year of Publication | 2017 |
Authors | Nagar, S., Rajput, S. S., Gupta, A. K., Trivedi, M. C. |
Conference Name | 2017 3rd International Conference on Computational Intelligence Communication Technology (CICT) |
Publisher | IEEE |
ISBN Number | 978-1-5090-6218-8 |
Keywords | composability, Computer crime, computer network security, DDoS Attack, DDoS Attack Prevention, Human Behavior, intrusion, intrusion prevention scheme, IP networks, IPS, IPS node, message passing, Metrics, Monitoring, pubcrawl, Resiliency, Routing, Routing protocols, secure routing protocol, security Algorithm, security scheme, sensor nodes, sensor placement, sink node, TCP messages, UDP messages, Wireless Sensor Network, Wireless sensor networks, WSNs |
Abstract | Wireless sensor network is a low cost network to solve many of the real world problems. These sensor nodes used to deploy in the hostile or unattended areas to sense and monitor the atmospheric situations such as motion, pressure, sound, temperature and vibration etc. The sensor nodes have low energy and low computing power, any security scheme for wireless sensor network must not be computationally complex and it should be efficient. In this paper we introduced a secure routing protocol for WSNs, which is able to prevent the network from DDoS attack. In our methodology we scan the infected nodes using the proposed algorithm and block that node from any further activities in the network. To protect the network we use intrusion prevention scheme, where specific nodes of the network acts as IPS node. These nodes operate in their radio range for the region of the network and scan the neighbors regularly. When the IPS node find a misbehavior node which is involves in frequent message passing other than UDP and TCP messages, IPS node blocks the infected node and also send the information to all genuine sender nodes to change their routes. All simulation work has been done using NS 2.35. After simulation the proposed scheme gives feasible results to protect the network against DDoS attack. The performance parameters have been improved after applying the security mechanism on an infected network. |
URL | https://ieeexplore.ieee.org/document/7977375/ |
DOI | 10.1109/CIACT.2017.7977375 |
Citation Key | nagar_secure_2017 |
- pubcrawl
- WSNs
- wireless sensor networks
- Wireless Sensor Network
- UDP messages
- TCP messages
- sink node
- sensor placement
- sensor nodes
- security scheme
- security Algorithm
- secure routing protocol
- Routing protocols
- Routing
- Resiliency
- composability
- Monitoring
- Metrics
- message passing
- IPS node
- IPS
- IP networks
- intrusion prevention scheme
- intrusion
- Human behavior
- DDoS Attack Prevention
- DDoS Attack
- computer network security
- Computer crime