SlideShare una empresa de Scribd logo
1 de 8
Descargar para leer sin conexión
ISSN: 2312-7694
Shishupal et al, / International Journal of Computer and Communication System Engineering (IJCCSE), Vol. 2 (5), 2015, 708-715
708 | P a g e
© IJCCSE All Rights Reserved Vol. 02 No.05 Oct 2015 www.ijccse.com
Prevention of Denial-of-Service Attack In
Wireless Sensor Network via NS-2
Shishupal Kumar Dr. Vijay Km Chaurasiya
Dept. of Wireless Communication and Computing Dept. of Wireless Communication and Computing
IIIT-Allahabad IIIT-Allahabad
India India
robincoolmasti@gmail.com vijayk@iiita.c.in
Abstract—A wireless sensor network encompasses many
number of sensor nodes which are used to observer the
conditions of physical environment surroundings like
temperature, pressure etc. They are very limited in power.
Sensor are used to carry sensed data from one location to another
desired location for further processing. They are very useful in
many application areas like agriculture, military, industrial
applications etc. However they are distributed in nature and
contains wireless characteristics. So it is obvious that they are
more vulnerable to security attacks just because of their wireless
nature and simple architecture. Security creates great impact on
the performance of any network. More secure network tends to
high performance of wireless network. In this paper, we propose
a method to prevent the denial of service attack which is one of
the most serious attack in the wireless nature network. The
proposed method provides some sort of prevention to the
network from the Denial of service attack. Also, we have used
some simulation results in order to compare the performance of
wireless sensor network without any prevention of denial of
service attack to the network of sensor nodes with exhibits the
proposed methodology. The results are simulated in terms of
throughput, packet delivery fraction and delay.
Index Terms— Wireless Sensor Network (WSN), Denial-of-
Service (DoS), NS-2, Mannasim
I. INTRODUCTION
In the evolution of 1970’s, some sensors deployed which
are wired in nature and connected to any central location.
After, in 1980’s, sensors had been deployed which are wireless
in nature and contained distributed property. First, use of
Wireless sensors in military applications to sense the detection
of enemy. Now wireless sensor network reaches in the peak
level of industrial applications and as well as a research area.
[1] The nodes in wireless sensor network comprise of trivial
components like batteries, microcontroller, limited memory,
etc. They have very limited processing capability because of
partial power and memory. The properties of the sensor nodes
are, they cope with node failure very rapidly, they can work in
severe environmental conditions, they support a very high
number of nodes, and they efficiently support high mobility.
[2] The task performed by the nodes of sensor network
environment is very time sensitive i.e. at the exact time the data
should reach to the end user so that further processing will take
place. [3] Wireless sensor network consists of nodes which are
designed to perform specific functions and all the nodes in the
network perform the function altogether. [4] The basic function
of the sensor nodes in the wireless sensor network to sense the
data and to record it and sends this recorded data to particular
destination when event of specific conditions occurs. [5] The
hardware of the wireless sensor network are very small and can
transfer data at very low energies which basically makes
different to nodes in wireless sensor network from other
wireless network nodes. A simple structural layout of sensor
nodes in a wireless network is presented in the below figure.
Fig 1: The simple architecture of Wireless sensor network
ISSN: 2312-7694
Shishupal et al, / International Journal of Computer and Communication System Engineering (IJCCSE), Vol. 2 (5), 2015, 708-715
709 | P a g e
© IJCCSE All Rights Reserved Vol. 02 No.05 Oct 2015 www.ijccse.com
In a wireless sensor network, after sensing and recording
the data whenever a particular condition occur, the recorded
data is sent by the particular sender sensor node to the end user.
So for transmitting the data from one location to another
location definitely, a routing protocol is necessary. [6] The
routing protocol should be in such a way that it has to consume
very minimum energy and also have very minimum capability
i.e. not as much of overhead, for the reason that sensor nodes
have precise limited power and processing competency. The
protocols used in wireless sensor network for routing of data
from source node to destination node are AODV, DSDV etc.
The nodes of the wireless sensor network are distributed in
nature and because of their wireless nature they are always
vulnerable to security attacks. Security is one of the major
parameters which can directly impact on the performance of
the network. [7]There are various types of security attacks
possible in the wireless sensor network like flooding attack,
wormhole attack, denial of service attack, sinkhole attack, and
Sybil attack. [8]For enhancing the security of the sensor
network some cryptographic techniques can be used like key
exchange algorithm, [9]which provides authenticity,
availability etc. [10] an Extra remote home server (RHS) can
also be installed which take care of any illegal activity of all
the sensor node and can work as an administrator of the
wireless sensor network. [11] But the key goal should be to
propose a mechanism which takes very minimum energy
consumption and also provides some prevention from the any
kind of security attack. [12, 13, 14] A framework is proposed
for estimation of secure location of sensor nodes for various
WSN applications because of prevention from any
unauthorized access. [15, 16] Providing security in the network
of sensor node is very difficult as compared to mobile ad hoc
network because the nodes in wireless sensor network are
limited in power and processing. [17] For further enhancing
security, a distributed scheme is proposed which provides
security from replay attack in sensor network and this scheme
is called RED protocol. [18] For the handling of node failures,
also there are various protocols introduce like Tiny IDS. [19]
Bluetooth technology can also be used for providing security in
Wireless sensor network. [20] In a sensor network , a sensor
node sends data and sends to the base station and during this
process a secure communication and reliability is required
which can be provided by using the Hybrid Multipath Scheme.
[21] An entropy-based trust model is used for detection of
malicious nodes in environment of wireless sensor network.
[25] To cop up the link failures various types of data gathering
methods can be used which inherits colouring algorithm in
wireless sensor network called as SERENA. In this algorithm
each colour is allotted a unique time slot. [26] A new
technology is proposed whose name is ANT for wireless sensor
network which is widely uses the mac layer protocol and
specially developed for sports concerning sensor devices. Its
main focus on the proper optimization of bandwidth of the
network and low consumption of power. [27] To maintain the
continuous service and connectivity some strategy can be
followed like the Centralized Maintenance Strategy (CMS) and
the Centralized Maintenance Strategy with Anticipation
(CMSA). These strategy contains a small number of mobile
like robots which looks after the network of sensor nodes and
reports timely regarding failure, connectivity loss, coverage
problem etc. [28] a multi tree based approach can be used in
wireless sensor network which ensures that at least one node
can connect to the communication network when network
failure occurs. [29] Automatic firing practice system (AFPS)
can be used for special operations force, tactical paramilitary
and Law Enforcement Agencies. This implemented firing
system is very flexible and contain small alarms and supports
various mode of firing.
In this paper, our main focus is in denial of service attack
because this is considered as one of the most dangerous and
serious attack in the network environment. In the next, Section
2 will describe about denial of service (DOS) attack. Section 3
will contain the related work about proposed method. Section 4
will contain simulation parameters in tabulated form and at
last, Section 5 will contain results and comparison of wireless
sensor network without prevention to the wireless sensor
network under prevention from denial of service attack.
II. DENIAL OF SERVICE (DOS) ATTACK IN SENSOR
NODES OF WIRELESS NEYWORK
Wherever Denial of service attack is one of the harmful
attack for the network because in Denial of service attack
(DOS), [22] whenever a sensor node have data to send, it
forwards data to its neighbouring node which is in its
communication range and if this neighbouring node is working
as a malicious node then it does not forward data even creates
overloading request for data to the sender node and consumes
all its bandwidth. Sensor nodes in the wireless sensor network
have limited in power so the node will eventually die by this
type of attack as well as Denial of service attack also enlarge
the delay time by consumption of processor time and
bandwidth. It creates alternation in the content of data and
disturb the activity of the routing protocol by disruption of
routing information. It distorts the activity of the physical
components of the sensor nodes as well as it creates an
obstruction between the communication between the sender
and intended receiver. [23, 24] It aims to target on applications
of physical layer where the sensor nodes are located. DOS
attacks make the sensor node dies very rapidly because they
have already scarcity of limited computational power and
processing capability. In a wireless sensor network, every
sensor node is intended to perform a particular sensing tasks
and in the presence of malicious node there may be an event of
sending wrong information to the base station also happen. To
make the network under DOS the malicious node take two
ways to implement this attack. The first one is jamming and the
second one is power exhaustion. In this paper, we are
ISSN: 2312-7694
Shishupal et al, / International Journal of Computer and Communication System Engineering (IJCCSE), Vol. 2 (5), 2015, 708-715
710 | P a g e
© IJCCSE All Rights Reserved Vol. 02 No.05 Oct 2015 www.ijccse.com
discussing only DOS attack related to the network layer in
which malicious node drops all the data forward from the
source node and create network flooding by sending dummy
packets. The main focus is to prevent power exhaustion of
sensor nodes in the network because they are very limited in
energy resources. This type of DOS attack aims to disturb
sleep/duty cycles of sensor node continuously and results the
network of sensor node will die very soon. Denial of service
attack rapidly decrease the performance of overall wireless
sensor network and directly does bad impact on the
functionality of the sensor nodes.
In the below figure 2, wireless sensor network below DOS
attack is described in a practical manner and simulated in NS-2
environment. In this scenario, node 18 act as a base station.
Node 7, 8, 12, 14 act as a malicious node have aimed to
degrade the performance of the WSN environment. Node 17
and 19 act as a source node and their task is to forward data to
the base station by using AODV protocol. So for initiating the
communication between source node 19 and node 18 which act
as a base station, source node 19 communicates with their
neighbourhood sensor node, i.e. node 8 and this node 8 acts as
a malicious node in this scenario. The main focus of the
malicious node is to get attention from the source node so that
it always advertises itself with a higher sequence number with
minimum hope count. When source node 19 starts forwarding
data to the node 8 then malicious node 8 drops all the packets
so that the performance of wireless sensor network degrades
very rapidly. For making the system under into DOS attack,
these malicious node flood dummy data all over the network
with aim of consumption of power of sensor nodes in WSN by
disrupting their sleep or duty cycle. Eventually the power of
sensor nodes degrades very rapidly result nodes will die very
soon and the whole system of wireless sensor network will be
under DOS attack.
Fig 2: Wireless sensor network with AODV routing protocol under DOS
attack
II. PROPOSED METHOD
The In this paper, we are introducing a method which provides
prevention to the network from the denial of service attack.
The nodes in the wireless sensor network use very simple and
suitable routing protocol for routing of data from sender to the
corresponding receiver. This property makes the wireless
sensor network simple as well as lying to network security
attack. Besides this, complex algorithms and techniques
consumes lot of processing and computation power of the
nodes in wireless sensor network and there is already a scarcity
of these resources. So in this paper, a simple method is
introduced which takes prevention before sending a packet to
their neighbouring node. A sending node whenever have data
to send, it senses the neighbouring node which in its range of
transmission and communication. Before sending the data to its
intended neighbouring nodes, it first checks for the historical
throughput which is basically the value of the forwarded
number of packets. The value of this historical throughput is
stored in a variable. Whenever a node wants to send data, it
authenticates its neighbouring node’s historical throughput
value, whenever the value of this historical throughput variable
is equal to 0 or exceed over the predefined threshold than that
neighbouring node is suspected to be improper node and mark
this neighbouring node as a malicious sensor node. After this
step, the sending node again starts sensing another new
neighbouring node to send the data to the intended receiver.
For making a differentiation between the malicious node and
valid sensor node, it periodically flushes the value of historical
throughput of valid sensor node when its value becomes equal
to the predefine threshold value. So the value of historical
throughput of the valid sensor node will always lie between
greater than 0 and less than a predefined threshold. Below
figure 3 represents the flowchart for proposed methodology.
ISSN: 2312-7694
Shishupal et al, / International Journal of Computer and Communication System Engineering (IJCCSE), Vol. 2 (5), 2015, 708-715
711 | P a g e
© IJCCSE All Rights Reserved Vol. 02 No.05 Oct 2015 www.ijccse.com
Fig 3: Flowchart for proposed method
In the above flowchart, H[Th] represents the historical
throughput of the node. N.H[th] represents the historical
throughput of the neighbouring node which is sense by the
corresponding sender node and C.H[th] denoted historical
throughput of the current working node. Historical throughput
basically is the number of packets sent with respect to the time.
The procedure of the above mentioned flowchart can be well
understand by the following points:
• Whenever a Sender node wants to send data then it
first senses one of its neighbouring node. Before sending data
to its neighbourhood sensor node it first authorizes it to ensure
that it is not a malicious node to provide some protection to the
system from denial of service attack or any kind of security
attack. It does so by comparison of historical throughput of
neighbouring node.
• If historical throughput of neighbouring node is
greater than the predefined threshold value or equal to 0 then it
indicated that is working as a malicious node and sender node
will not send data packet to that node and will mark this node
as malicious node with again senses the another neighbourhood
node with in transmission range and again the procedure Will
applied. Below figure 4 shows above describe scenario:
Fig 4: An example of sensor network which describe above mentioned
procedure
In figure 4, green circle represents sender and receiver
sensor nodes while red circle represents malicious sensor node
and besides theses, all circles are remaining nodes of the sensor
network.
• If historical throughput of neighbourhood node is less
than the predefined threshold and also does not equal to 0 then
sender node will send data to this neighbourhood node. In this
scenario, if historical throughput of the current node becomes
equal to its predefined threshold then it flushes its H[th] values
and make it equal to 0 and after that it updated it by H[th] =
H[th] + 0.1. This step is due to maintain the proper
differentiation between the valid and malicious node. In this
way, the value of H[th] of every sensor node in the network
will between 0 and predefined threshold.
Fig 5: A wireless sensor network which shows above mentioned procedure
ISSN: 2312-7694
Shishupal et al, / International Journal of Computer and Communication System Engineering (IJCCSE), Vol. 2 (5), 2015, 708-715
712 | P a g e
© IJCCSE All Rights Reserved Vol. 02 No.05 Oct 2015 www.ijccse.com
III. SIMULATION PARAMETERS
In this paper, the proposed method of prevention from denial
of service attacks is simulated in network simulator (NS-2).
NS-2 is used for simulation of wired or wireless networking,
for the simulation of wireless sensor network an Extra
component is added in the NS-2 simulator which is called
Mannasim. Mannasim is a software which enables easy
simulation of wireless sensor network. The simulation
parameters for our proposed method is tabulated below:
Table I: simulation parameters of proposed methodology
Sr No Parameter Value
1 Simulator NS-2(Mannasim)
2 Channel type Channel/Wireless
channel
3 Radio Propagation Propagation/ Two ray
Model
ground wave
4 Network interface type Phy/WirelessPhy
5 MAC Type Mac /802.11
6 Frequency 914e+6
7 Routing Protocol AODV
8 Antenna Antenna/Omni Antenna
9 Initial energy 10
10 Area ( M*M) 500 * 500
11 Simulation Time 250 sec
12 No of Nodes 50
13 rxPower 0.5
14 txPower 1.0
15 idlePower 0.0
16 sensePower 0.3
17 CPThresh_ 10.0
18 sensing 2.28289e-11
range_CSThresh_
19 communication 2.28289e-11
range_RXThresh_
IV. RESULTS AND COMPARISON
The simulation of proposed wireless sensor network
environment is done in network simulator with Mannasim
software. The simulation results are evaluated in terms of
throughput, Packet delivery ratio and end-to-end delay. In this
paper, we compare the performance of a network of sensor
nodes under the prevention of the proposed methodology with
the network of sensor node without prevention from denial of
service attack. This result will evaluate the impact of the
proposed methodology to the wireless sensor network.
A: THROUGHPUT
The principal performance is measured in the relations of the
throughput. Throughput is represented in bits per second (bps)
and it is the number of packets which is received in per unit of
time. Figure 3 represents the throughput of the wireless sensor
network environment under no prevention
Fig 3: Throughput of wireless sensor network without prevention
In the above figure, it is shown that the Throughput of the
simulated wireless sensor network comes out to be about
1179.25 kbps. Figure 4 represents the throughput of the
proposed methodology in wireless sensor network.
ISSN: 2312-7694
Shishupal et al, / International Journal of Computer and Communication System Engineering (IJCCSE), Vol. 2 (5), 2015, 708-715
713 | P a g e
© IJCCSE All Rights Reserved Vol. 02 No.05 Oct 2015 www.ijccse.com
Fig 4: Throughput of the proposed method for wireless sensor network
In the above figure, the Average throughput is evaluated in
terms of Kbps and that comes out to be about 1305.71Kbps
which is much higher than the throughput from the sensor
network under without any prevention of security attacks.
B: PACKET DELIVERY RATIO/FRACTION
Packet delivery ratio (PDR) is the fraction concerning the
data Packets received by the destination for those sent by
sources. This evaluates the ability of the protocol performance
and its efficiency. Figure 5 represents the Packet delivery ratio
of wireless sensor network under no prevention.
Fig 5: packet loss in the simulated sensor node network without proposed
method
In the above figure, it is clearly shown that is number of
sending packets are 105266 and the number of received
packets are only 77753, so the total number of packets which
are lost are about 105266 – 77753=>27513 which is very high
and does harmful impact for network of sensor nodes.
Fig 6: Packet delivery ration of simulated wireless sensor network
In the above figure, It is clearly seen that the total number
of sent packets is 71574 and total number of receiving packets
ISSN: 2312-7694
Shishupal et al, / International Journal of Computer and Communication System Engineering (IJCCSE), Vol. 2 (5), 2015, 708-715
714 | P a g e
© IJCCSE All Rights Reserved Vol. 02 No.05 Oct 2015 www.ijccse.com
are 71572 i.e. the number of packets which are less in the
simulated environment are only 2, which is very less and hence
it leads to high performance of the wireless sensor network.
C: END-TO-END DELAY
End to end delay is the quantity of the time which is
occupied to sending packets from source to their respective
destination to receive those packets. More delay can lead to
low performance of the wireless sensor network and low delay
is the indication of high efficiency and speed of the network.
Figure 6 represents the end-to-end delay of the wireless sensor
network without taking any prevention.
Fig 7: End-to-end delay of wireless sensor network without any prevention
method
“
Fig 8: End-to-end delay of simulated wireless sensor network with proposed
method
CONCLUSION
Wireless sensor network is becoming very famous now
days in the field of various industrial and research
environments. They support a very large number of nodes up to
thousands and also support a high degree of mobility. The main
functionality of the sensor node to sense a particular data and
to store in its limited available memory and by occurring on
particular event they must send their sensed data to the
corresponding end user. However, in the network environment,
especially in the area of wireless, the nodes are distributed in
nature and they lead high chance of getting attacked by intruder
which badly decrease the performance of the network and let
the sensor node die of consumption of its computing and power
resources. As well as sensor node is like very small nodes
which have smaller components and the use of very complex
techniques for providing security leads to the sensor node dies
very soon and enlargement of delay. In this paper, a simple
methodology is proposed which takes very little computational
power and does not impact on the battery consumption of
sensor nodes as well as it offers some sort of authentication of
nodes so that network will at all times inhibit from any denial
of service attack (DOS).
References
[1] Raymond, D.R, Midkiff, S.F, „Denial of Service in
Wireless Networks: Attacks and Defences, IEEE CS: Security
and Privacy, 2008,pg 74-81.
[2] Bokare, Madhav, and Mrs Anagha Ralegaonkar. "Wireless
Sensor Network: A Promising Approach for Distributed Sensing
Tasks." Excel Journal of Engineering Technology and
ISSN: 2312-7694
Shishupal et al, / International Journal of Computer and Communication System Engineering (IJCCSE), Vol. 2 (5), 2015, 708-715
715 | P a g e
© IJCCSE All Rights Reserved Vol. 02 No.05 Oct 2015 www.ijccse.com
Management Science 1 (2012): 1-9.
[3] R. Shorey, A. Ananda, M. C. Chan and W. T. Ooi, “Mo-
bile Wireless and Sensor Networks Technology Applica- tion
and Future Directions,” China Machine Press, 2010.
[4] Introduction to Wireless Sensor Networks.
http://www.worldscibooks.com/comps ci/etextbook/6288/6288
_chap Ipdf on October 8. 2008
[5] L. Guibas , F. Zhao. Wireless Sensor Networks: An
Information Processing Approach.
[6] R.; Boulmalf, M., "Routing in wireless sensor networks,"
Multimedia Computing and Systems, 2009. ICMCS '09.
International Conference on ,vol., no., pp.495,500, 2-4 April
2009doi: 10.1109/MMCS.2009.5256646
[7] Krco, S.; Tsiatsis, V.; Matusikova, K.; Johansson, M.;
Cubic, I.; Glitho, R., "Mobile Network Supported Wireless
Sensor Network Services," Mobile Adhoc and Sensor Systems,
2007. MASS 2007. IEEE Internatonal Conference on , vol., no.,
pp.1,3, 8-11 Oct. 2007
[8] Nanda, R.; Venkata Krishna, P., "A self enforcing and
flexible security protocol for preventing Denial of Service
attacks in wireless sensor networks," Recent Advances in
Intelligent Computational Systems (RAICS), 2011 IEEE , vol.,
no., pp.847,850, 22-24 Sept. 2011
[9] Raymond, David R.; Midkiff, S.F., "Denial-of-Service in
Wireless Sensor Networks: Attacks and Defenses," Pervasive
Computing, IEEE , vol.7, no.1, pp.74,81, Jan.-March 2008 doi:
10.1109/MPRV.2008.6
[10] Gill, K.; Shuang-Hua Yang, "A scheme for preventing
denial of service attacks on wireless sensor networks," Industrial
Electronics, 2009. IECON '09. 35th Annual Conference of IEEE
, vol., no., pp.2603,2609, 3-5 Nov. 2009
[11] Zhang, Xuyuan, "Model Design of Wireless Sensor
Network Based on Scale-Free Network Theory," Wireless
Communications, Networking and Mobile Computing, 2009.
WiCom '09. 5th International Conference on , vol., no., pp.1,4,
24-26 Sept. 2009
[12] Jokhio, S.H.; Jokhio, I.A.; Kemp, A.H., "Light-weight
framework for security-sensitive wireless sensor networks
applications," Wireless Sensor Systems, IET , vol.3, no.4,
pp.298,306, December 2013.
[13] Lal, Kumari Nidhi, and Ashutosh Kumar Singh. "Modified
design of microstrip patch antenna for WiMAX communication
system." Students' Technology Symposium (TechSym), 2014
IEEE. IEEE, 2014.
[14] Lal, Nidhi. "An Effective Approach for Mobile ad hoc
Network via I-Watchdog Protocol."
[15] Lal, N.; Singh, A.P.; Kumar, S., "Modified trial division
algorithm using KNJ-factorization method to factorize RSA
public key encryption," Contemporary Computing and
Informatics (IC3I), 2014 International Conference on , vol., no.,
pp.992,995, 27-29 Nov. 2014
[16] Guizani, M.; Xiaojiang Du; Hsiao-Hwa Chen; Mueller, P.,
"Security in wireless mobile ad hoc and sensor networks [Guest
Editorial]," Wireless Communications, IEEE , vol.14, no.5,
pp.6,7, October 2007
[17] Conti, M.; Di Pietro, R.; Mancini, L.V.; Mei, A.,
"Distributed Detection of Clone Attacks in Wireless Sensor
Networks," Dependable and Secure Computing, IEEE
Transactions on , vol.8, no.5, pp.685,698, Sept.-Oct. 2011.
[18] Buttyan, L.; Gessner, D.; Hessler, A.; Langendoerfer, Peter,
"Application of wireless sensor networks in critical
infrastructure protection: challenges and design options
[Security and Privacy in Emerging Wireless Networks],"
Wireless Communications, IEEE , vol.17, no.5, pp.44,49,
October 2010.
[19] Soo-Hwan Choi; Byung-Kug Kim; Jinwoo Park; Chul-Hee
Kang; Doo-Seop Eom, "An implementation of wireless sensor
network," Consumer Electronics, IEEE Transactions on , vol.50,
no.1, pp.236,244, Feb 2004
[20] Wenjing Lou; Younggoo Kwon, "H-SPREAD: a hybrid
multipath scheme for secure and reliable data collection in
wireless sensor networks," Vehicular Technology, IEEE
Transactions on , vol.55, no.4, pp.1320,1330, July 2006
[21] Abdelhakim, M.; Lightfoot, L.E.; Jian Ren; Tongtong Li,
"Distributed Detection in Mobile Access Wireless Sensor
Networks under Byzantine Attacks," Parallel and Distributed
Systems, IEEE Transactions on , vol.25, no.4, pp.950,959, April
2014.
[22] krishna Chaitanya, Doddapaneni, and Ghosh Arindam.
"Analysis of Denial-of-Service attacks on Wireless Sensor
Networks Using Simulation."
[23] Sakarindr, Pitipatana; Ansari, N., "Security services in
group communications over wireless infrastructure, mobile ad
hoc, and wireless sensor networks," Wireless Communications,
IEEE , vol.14, no.5, pp.8,20, October 2007.
[24] Lal, Nidhi, et al. "A Heuristic EDF Uplink Scheduler for
Real Time Application in WiMAX Communication." arXiv
preprint arXiv:1501.04553 (2015).
[25] Amdouni, Ichrak, Pascale Minet, and Cedric Adjih.
"Adaptivity of a Coloring Algorithm to Unreliable
Communications for Data Gathering in Wireless Sensor
Networks." International Journal of Digital Information and
Wireless Communications (IJDIWC) 3.1 (2013): 61-74.
[26] Khssibi, Sabri, et al. "Presentation and analysis of a new
technology for low-power wireless sensor network."
International Journal of Digital Information and Wireless
Communications (IJDIWC) 3.1 (2013): 75-86.
[27] Abbas, Waseem, Nasim Abbas, and Uzma Majeed.
"PERFORMANCE ENHANCEMENT OF END-TO-END
QUALITY OF SERVICE IN WCDMA WIRELESS
NETWORKS." Science International 26.2 (2014).
[28] Snigdh, Itu, and Swarn Saurabh. "A Multi Tree based
Approach for Performance Analysis in Hierarchical Wireless
Sensor Networks." International Journal of Digital Information
and Wireless Communications (IJDIWC) 4.4 (2014): 438-446.

Más contenido relacionado

La actualidad más candente

WIRELESS SENSOR NETWORK
WIRELESS SENSOR NETWORKWIRELESS SENSOR NETWORK
WIRELESS SENSOR NETWORKTejas Wasule
 
seminar report on wireless Sensor network
seminar report on wireless Sensor networkseminar report on wireless Sensor network
seminar report on wireless Sensor networkJawhar Ali
 
Secure and Efficient DiDrip Protocol for Improving Performance of WSNs
Secure and Efficient DiDrip Protocol for Improving Performance of WSNsSecure and Efficient DiDrip Protocol for Improving Performance of WSNs
Secure and Efficient DiDrip Protocol for Improving Performance of WSNsINFOGAIN PUBLICATION
 
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...ijasuc
 
Report on WIRELESS SENSOR NETWORK
Report on WIRELESS SENSOR NETWORKReport on WIRELESS SENSOR NETWORK
Report on WIRELESS SENSOR NETWORKNishant Bhardwaj
 
Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Net...
Secure and Efficient Data Transmission  for Cluster-Based Wireless Sensor Net...Secure and Efficient Data Transmission  for Cluster-Based Wireless Sensor Net...
Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Net...Walchand college of Engineering,Sangli
 
Intrusion detection systems in wireless sensor networks
Intrusion detection systems in wireless sensor networksIntrusion detection systems in wireless sensor networks
Intrusion detection systems in wireless sensor networksBala Lavanya
 
Secure and efficient data transmission for cluster based wireless
Secure and efficient data transmission for cluster based wirelessSecure and efficient data transmission for cluster based wireless
Secure and efficient data transmission for cluster based wirelessSai Sirisha
 
Wireless sensor networks
Wireless sensor networksWireless sensor networks
Wireless sensor networksZaahir Salam
 
Secure Data Transmission
Secure Data TransmissionSecure Data Transmission
Secure Data Transmissionbjp4642
 
Some aspects of wireless sensor networks
Some aspects of wireless sensor networksSome aspects of wireless sensor networks
Some aspects of wireless sensor networkspijans
 
Wireless Sensor Network
Wireless Sensor NetworkWireless Sensor Network
Wireless Sensor NetworkGanesh Khadsan
 
The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)theijes
 
Wireless_Sensor_security
Wireless_Sensor_securityWireless_Sensor_security
Wireless_Sensor_securityTosha Shah
 
Public encryption with two ack approach to mitigate wormhole attack in wsn
Public encryption with two ack approach to mitigate wormhole attack in wsnPublic encryption with two ack approach to mitigate wormhole attack in wsn
Public encryption with two ack approach to mitigate wormhole attack in wsneSAT Journals
 

La actualidad más candente (20)

S04404116120
S04404116120S04404116120
S04404116120
 
WIRELESS SENSOR NETWORK
WIRELESS SENSOR NETWORKWIRELESS SENSOR NETWORK
WIRELESS SENSOR NETWORK
 
seminar report on wireless Sensor network
seminar report on wireless Sensor networkseminar report on wireless Sensor network
seminar report on wireless Sensor network
 
Sensor Network
Sensor NetworkSensor Network
Sensor Network
 
Secure and Efficient DiDrip Protocol for Improving Performance of WSNs
Secure and Efficient DiDrip Protocol for Improving Performance of WSNsSecure and Efficient DiDrip Protocol for Improving Performance of WSNs
Secure and Efficient DiDrip Protocol for Improving Performance of WSNs
 
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...
 
Report on WIRELESS SENSOR NETWORK
Report on WIRELESS SENSOR NETWORKReport on WIRELESS SENSOR NETWORK
Report on WIRELESS SENSOR NETWORK
 
Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Net...
Secure and Efficient Data Transmission  for Cluster-Based Wireless Sensor Net...Secure and Efficient Data Transmission  for Cluster-Based Wireless Sensor Net...
Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Net...
 
Wireless Sensor Networks ppt
Wireless Sensor Networks pptWireless Sensor Networks ppt
Wireless Sensor Networks ppt
 
Intrusion detection systems in wireless sensor networks
Intrusion detection systems in wireless sensor networksIntrusion detection systems in wireless sensor networks
Intrusion detection systems in wireless sensor networks
 
Secure and efficient data transmission for cluster based wireless
Secure and efficient data transmission for cluster based wirelessSecure and efficient data transmission for cluster based wireless
Secure and efficient data transmission for cluster based wireless
 
Wireless sensor networks
Wireless sensor networksWireless sensor networks
Wireless sensor networks
 
Secure Data Transmission
Secure Data TransmissionSecure Data Transmission
Secure Data Transmission
 
Some aspects of wireless sensor networks
Some aspects of wireless sensor networksSome aspects of wireless sensor networks
Some aspects of wireless sensor networks
 
Wireless Sensor Network
Wireless Sensor NetworkWireless Sensor Network
Wireless Sensor Network
 
The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)
 
50120140507012
5012014050701250120140507012
50120140507012
 
Wireless_Sensor_security
Wireless_Sensor_securityWireless_Sensor_security
Wireless_Sensor_security
 
Presentation1
Presentation1Presentation1
Presentation1
 
Public encryption with two ack approach to mitigate wormhole attack in wsn
Public encryption with two ack approach to mitigate wormhole attack in wsnPublic encryption with two ack approach to mitigate wormhole attack in wsn
Public encryption with two ack approach to mitigate wormhole attack in wsn
 

Destacado

Integrated Security and Attack Detection Scheme for Wireless Sensor Networks
Integrated Security and Attack Detection Scheme for Wireless Sensor NetworksIntegrated Security and Attack Detection Scheme for Wireless Sensor Networks
Integrated Security and Attack Detection Scheme for Wireless Sensor NetworksEditor IJMTER
 
Collision vulnerability for hash data structures in web platforms
Collision vulnerability for hash data structures in web platformsCollision vulnerability for hash data structures in web platforms
Collision vulnerability for hash data structures in web platformsBerescu Ionut
 
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGESA SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGESEditor IJCTER
 
Distributed Denial of Service Attack - Detection And Mitigation
Distributed Denial of Service Attack - Detection And MitigationDistributed Denial of Service Attack - Detection And Mitigation
Distributed Denial of Service Attack - Detection And MitigationPavel Odintsov
 
CEH - Module 10 : Denial of Service
CEH - Module 10 : Denial of ServiceCEH - Module 10 : Denial of Service
CEH - Module 10 : Denial of ServiceAvirot Mitamura
 
Denial of Service Attacks
Denial of Service AttacksDenial of Service Attacks
Denial of Service AttacksBrent Muir
 
An introduction to denial of service attacks
An introduction to denial of service attacksAn introduction to denial of service attacks
An introduction to denial of service attacksRollingsherman
 
Denial of service attack
Denial of service attackDenial of service attack
Denial of service attackKaustubh Padwad
 
Basics of Denial of Service Attacks
Basics of Denial of Service AttacksBasics of Denial of Service Attacks
Basics of Denial of Service AttacksHansa Nidushan
 
Denial of service attack
Denial of service attackDenial of service attack
Denial of service attackAhmed Ghazey
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networksrajatmal4
 

Destacado (20)

Integrated Security and Attack Detection Scheme for Wireless Sensor Networks
Integrated Security and Attack Detection Scheme for Wireless Sensor NetworksIntegrated Security and Attack Detection Scheme for Wireless Sensor Networks
Integrated Security and Attack Detection Scheme for Wireless Sensor Networks
 
Report on Hacking
Report on HackingReport on Hacking
Report on Hacking
 
Collision vulnerability for hash data structures in web platforms
Collision vulnerability for hash data structures in web platformsCollision vulnerability for hash data structures in web platforms
Collision vulnerability for hash data structures in web platforms
 
Computer and network security
Computer and network securityComputer and network security
Computer and network security
 
Computer Network Security
Computer Network SecurityComputer Network Security
Computer Network Security
 
Security issues
Security issuesSecurity issues
Security issues
 
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGESA SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
 
Distributed Denial of Service Attack - Detection And Mitigation
Distributed Denial of Service Attack - Detection And MitigationDistributed Denial of Service Attack - Detection And Mitigation
Distributed Denial of Service Attack - Detection And Mitigation
 
An introduction to denial of service attack
An introduction to denial of service attackAn introduction to denial of service attack
An introduction to denial of service attack
 
CEH - Module 10 : Denial of Service
CEH - Module 10 : Denial of ServiceCEH - Module 10 : Denial of Service
CEH - Module 10 : Denial of Service
 
Module 9 Dos
Module 9   DosModule 9   Dos
Module 9 Dos
 
Denial of Service Attacks
Denial of Service AttacksDenial of Service Attacks
Denial of Service Attacks
 
An introduction to denial of service attacks
An introduction to denial of service attacksAn introduction to denial of service attacks
An introduction to denial of service attacks
 
Denial of service attack
Denial of service attackDenial of service attack
Denial of service attack
 
Basics of Denial of Service Attacks
Basics of Denial of Service AttacksBasics of Denial of Service Attacks
Basics of Denial of Service Attacks
 
DoS or DDoS attack
DoS or DDoS attackDoS or DDoS attack
DoS or DDoS attack
 
Denial of service attack
Denial of service attackDenial of service attack
Denial of service attack
 
DDoS Attacks
DDoS AttacksDDoS Attacks
DDoS Attacks
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
 
Denial of Service Attacks
Denial of Service AttacksDenial of Service Attacks
Denial of Service Attacks
 

Similar a Prevention of Denial-of-Service Attack In Wireless Sensor Network via NS-2

International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) ijceronline
 
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...csandit
 
CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...
CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...
CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...cscpconf
 
A Brief Research Study Of Wireless Sensor Network
A Brief Research Study Of Wireless Sensor NetworkA Brief Research Study Of Wireless Sensor Network
A Brief Research Study Of Wireless Sensor NetworkCassie Romero
 
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor NetworkA Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Networkpijans
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Multiple Sink Positioning and Relocation for Improving Lifetime in Wireless S...
Multiple Sink Positioning and Relocation for Improving Lifetime in Wireless S...Multiple Sink Positioning and Relocation for Improving Lifetime in Wireless S...
Multiple Sink Positioning and Relocation for Improving Lifetime in Wireless S...IRJET Journal
 
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...journalBEEI
 
Secure and Efficient Hierarchical Data Aggregation in Wireless Sensor Networks
Secure and Efficient Hierarchical Data Aggregation in Wireless Sensor NetworksSecure and Efficient Hierarchical Data Aggregation in Wireless Sensor Networks
Secure and Efficient Hierarchical Data Aggregation in Wireless Sensor NetworksIJMER
 
A Review on Wireless Sensor Network Security
A Review on Wireless Sensor Network SecurityA Review on Wireless Sensor Network Security
A Review on Wireless Sensor Network Securityijtsrd
 
A Review of Physical, Data and Network Layer Specification and its Protocols ...
A Review of Physical, Data and Network Layer Specification and its Protocols ...A Review of Physical, Data and Network Layer Specification and its Protocols ...
A Review of Physical, Data and Network Layer Specification and its Protocols ...Editor IJMTER
 
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...IRJET Journal
 
Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...
Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...
Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...IJERA Editor
 
Features of wsn and various routing techniques for wsn a survey
Features of wsn and various routing techniques for wsn a surveyFeatures of wsn and various routing techniques for wsn a survey
Features of wsn and various routing techniques for wsn a surveyeSAT Publishing House
 
Features of wsn and various routing techniques for wsn a survey
Features of wsn and various routing techniques for wsn     a surveyFeatures of wsn and various routing techniques for wsn     a survey
Features of wsn and various routing techniques for wsn a surveyeSAT Journals
 
A Survey Paper On Wireless Sensor Network
A Survey Paper On Wireless Sensor NetworkA Survey Paper On Wireless Sensor Network
A Survey Paper On Wireless Sensor NetworkCrystal Sanchez
 

Similar a Prevention of Denial-of-Service Attack In Wireless Sensor Network via NS-2 (20)

Oj3425062509
Oj3425062509Oj3425062509
Oj3425062509
 
Chapter
ChapterChapter
Chapter
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...
 
CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...
CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...
CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...
 
A Brief Research Study Of Wireless Sensor Network
A Brief Research Study Of Wireless Sensor NetworkA Brief Research Study Of Wireless Sensor Network
A Brief Research Study Of Wireless Sensor Network
 
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor NetworkA Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Multiple Sink Positioning and Relocation for Improving Lifetime in Wireless S...
Multiple Sink Positioning and Relocation for Improving Lifetime in Wireless S...Multiple Sink Positioning and Relocation for Improving Lifetime in Wireless S...
Multiple Sink Positioning and Relocation for Improving Lifetime in Wireless S...
 
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...
 
Secure and Efficient Hierarchical Data Aggregation in Wireless Sensor Networks
Secure and Efficient Hierarchical Data Aggregation in Wireless Sensor NetworksSecure and Efficient Hierarchical Data Aggregation in Wireless Sensor Networks
Secure and Efficient Hierarchical Data Aggregation in Wireless Sensor Networks
 
A Review on Wireless Sensor Network Security
A Review on Wireless Sensor Network SecurityA Review on Wireless Sensor Network Security
A Review on Wireless Sensor Network Security
 
A Review of Physical, Data and Network Layer Specification and its Protocols ...
A Review of Physical, Data and Network Layer Specification and its Protocols ...A Review of Physical, Data and Network Layer Specification and its Protocols ...
A Review of Physical, Data and Network Layer Specification and its Protocols ...
 
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...
 
[IJET-V1I3P2] Authors :Monali Madne, Prof.Manjusha Yeola
[IJET-V1I3P2] Authors :Monali Madne, Prof.Manjusha Yeola[IJET-V1I3P2] Authors :Monali Madne, Prof.Manjusha Yeola
[IJET-V1I3P2] Authors :Monali Madne, Prof.Manjusha Yeola
 
Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...
Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...
Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...
 
Features of wsn and various routing techniques for wsn a survey
Features of wsn and various routing techniques for wsn a surveyFeatures of wsn and various routing techniques for wsn a survey
Features of wsn and various routing techniques for wsn a survey
 
Features of wsn and various routing techniques for wsn a survey
Features of wsn and various routing techniques for wsn     a surveyFeatures of wsn and various routing techniques for wsn     a survey
Features of wsn and various routing techniques for wsn a survey
 
A Survey Paper On Wireless Sensor Network
A Survey Paper On Wireless Sensor NetworkA Survey Paper On Wireless Sensor Network
A Survey Paper On Wireless Sensor Network
 
file4.pdf
file4.pdffile4.pdf
file4.pdf
 

Más de International Journal of Computer and Communication System Engineering

Más de International Journal of Computer and Communication System Engineering (20)

Cloud Security Analysis for Health Care Systems
Cloud Security Analysis for Health Care SystemsCloud Security Analysis for Health Care Systems
Cloud Security Analysis for Health Care Systems
 
Efficient stbc for the data rate of mimo ofdma
Efficient stbc for the data rate of mimo ofdmaEfficient stbc for the data rate of mimo ofdma
Efficient stbc for the data rate of mimo ofdma
 
A novel adaptive algorithm for removal of power line interference from ecg si...
A novel adaptive algorithm for removal of power line interference from ecg si...A novel adaptive algorithm for removal of power line interference from ecg si...
A novel adaptive algorithm for removal of power line interference from ecg si...
 
Modified MD5 Algorithm for Password Encryption
Modified MD5 Algorithm for Password EncryptionModified MD5 Algorithm for Password Encryption
Modified MD5 Algorithm for Password Encryption
 
Implementing Pareto Analysis of Total Quality Management for Service Industri...
Implementing Pareto Analysis of Total Quality Management for Service Industri...Implementing Pareto Analysis of Total Quality Management for Service Industri...
Implementing Pareto Analysis of Total Quality Management for Service Industri...
 
Real Time Parking Information Provider System on Android Phones
Real Time Parking Information Provider System on Android PhonesReal Time Parking Information Provider System on Android Phones
Real Time Parking Information Provider System on Android Phones
 
An Image-Based Bone fracture Detection Using AForge Library
An Image-Based Bone fracture Detection Using AForge LibraryAn Image-Based Bone fracture Detection Using AForge Library
An Image-Based Bone fracture Detection Using AForge Library
 
Compact Fractal Based UWB Band Notch Antenna
Compact Fractal Based UWB Band Notch AntennaCompact Fractal Based UWB Band Notch Antenna
Compact Fractal Based UWB Band Notch Antenna
 
Dynamic Key Based User Authentication (DKBUA) Framework for MobiCloud Environ...
Dynamic Key Based User Authentication (DKBUA) Framework for MobiCloud Environ...Dynamic Key Based User Authentication (DKBUA) Framework for MobiCloud Environ...
Dynamic Key Based User Authentication (DKBUA) Framework for MobiCloud Environ...
 
A Learning Automata Based Prediction Mechanism for Target Tracking in Wireles...
A Learning Automata Based Prediction Mechanism for Target Tracking in Wireles...A Learning Automata Based Prediction Mechanism for Target Tracking in Wireles...
A Learning Automata Based Prediction Mechanism for Target Tracking in Wireles...
 
An Approach of Improvisation in Efficiency of Apriori Algorithm
An Approach of Improvisation in Efficiency of Apriori AlgorithmAn Approach of Improvisation in Efficiency of Apriori Algorithm
An Approach of Improvisation in Efficiency of Apriori Algorithm
 
Cloud Computing for Exploring to Scope in Business
Cloud Computing for Exploring to Scope in BusinessCloud Computing for Exploring to Scope in Business
Cloud Computing for Exploring to Scope in Business
 
Mobile Effects on Human Body
Mobile Effects on Human BodyMobile Effects on Human Body
Mobile Effects on Human Body
 
Performance Analysis of WiMAX Based Vehicular Ad hoc Networks with Realistic ...
Performance Analysis of WiMAX Based Vehicular Ad hoc Networks with Realistic ...Performance Analysis of WiMAX Based Vehicular Ad hoc Networks with Realistic ...
Performance Analysis of WiMAX Based Vehicular Ad hoc Networks with Realistic ...
 
CLOUD TESTING MODEL – BENEFITS, LIMITATIONS AND CHALLENGES
CLOUD TESTING MODEL – BENEFITS, LIMITATIONS AND CHALLENGESCLOUD TESTING MODEL – BENEFITS, LIMITATIONS AND CHALLENGES
CLOUD TESTING MODEL – BENEFITS, LIMITATIONS AND CHALLENGES
 
Exploratory Analysis of AI Techniques in Computer Games and Challenges faced ...
Exploratory Analysis of AI Techniques in Computer Games and Challenges faced ...Exploratory Analysis of AI Techniques in Computer Games and Challenges faced ...
Exploratory Analysis of AI Techniques in Computer Games and Challenges faced ...
 
Feasibility Study on e-Voting System
Feasibility Study on e-Voting SystemFeasibility Study on e-Voting System
Feasibility Study on e-Voting System
 
Retrieval and Statistical Analysis of Genbank Data (RASA-GD)
Retrieval and Statistical Analysis of Genbank Data (RASA-GD)Retrieval and Statistical Analysis of Genbank Data (RASA-GD)
Retrieval and Statistical Analysis of Genbank Data (RASA-GD)
 
Rp 3010 5814
Rp 3010 5814Rp 3010 5814
Rp 3010 5814
 
Gabor Filter
Gabor FilterGabor Filter
Gabor Filter
 

Último

main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxKartikeyaDwivedi3
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
Correctly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleCorrectly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleAlluxio, Inc.
 
An introduction to Semiconductor and its types.pptx
An introduction to Semiconductor and its types.pptxAn introduction to Semiconductor and its types.pptx
An introduction to Semiconductor and its types.pptxPurva Nikam
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfme23b1001
 
Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...121011101441
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvLewisJB
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxk795866
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .Satyam Kumar
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 

Último (20)

main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 
Correctly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleCorrectly Loading Incremental Data at Scale
Correctly Loading Incremental Data at Scale
 
An introduction to Semiconductor and its types.pptx
An introduction to Semiconductor and its types.pptxAn introduction to Semiconductor and its types.pptx
An introduction to Semiconductor and its types.pptx
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
 
Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvv
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 

Prevention of Denial-of-Service Attack In Wireless Sensor Network via NS-2

  • 1. ISSN: 2312-7694 Shishupal et al, / International Journal of Computer and Communication System Engineering (IJCCSE), Vol. 2 (5), 2015, 708-715 708 | P a g e © IJCCSE All Rights Reserved Vol. 02 No.05 Oct 2015 www.ijccse.com Prevention of Denial-of-Service Attack In Wireless Sensor Network via NS-2 Shishupal Kumar Dr. Vijay Km Chaurasiya Dept. of Wireless Communication and Computing Dept. of Wireless Communication and Computing IIIT-Allahabad IIIT-Allahabad India India robincoolmasti@gmail.com vijayk@iiita.c.in Abstract—A wireless sensor network encompasses many number of sensor nodes which are used to observer the conditions of physical environment surroundings like temperature, pressure etc. They are very limited in power. Sensor are used to carry sensed data from one location to another desired location for further processing. They are very useful in many application areas like agriculture, military, industrial applications etc. However they are distributed in nature and contains wireless characteristics. So it is obvious that they are more vulnerable to security attacks just because of their wireless nature and simple architecture. Security creates great impact on the performance of any network. More secure network tends to high performance of wireless network. In this paper, we propose a method to prevent the denial of service attack which is one of the most serious attack in the wireless nature network. The proposed method provides some sort of prevention to the network from the Denial of service attack. Also, we have used some simulation results in order to compare the performance of wireless sensor network without any prevention of denial of service attack to the network of sensor nodes with exhibits the proposed methodology. The results are simulated in terms of throughput, packet delivery fraction and delay. Index Terms— Wireless Sensor Network (WSN), Denial-of- Service (DoS), NS-2, Mannasim I. INTRODUCTION In the evolution of 1970’s, some sensors deployed which are wired in nature and connected to any central location. After, in 1980’s, sensors had been deployed which are wireless in nature and contained distributed property. First, use of Wireless sensors in military applications to sense the detection of enemy. Now wireless sensor network reaches in the peak level of industrial applications and as well as a research area. [1] The nodes in wireless sensor network comprise of trivial components like batteries, microcontroller, limited memory, etc. They have very limited processing capability because of partial power and memory. The properties of the sensor nodes are, they cope with node failure very rapidly, they can work in severe environmental conditions, they support a very high number of nodes, and they efficiently support high mobility. [2] The task performed by the nodes of sensor network environment is very time sensitive i.e. at the exact time the data should reach to the end user so that further processing will take place. [3] Wireless sensor network consists of nodes which are designed to perform specific functions and all the nodes in the network perform the function altogether. [4] The basic function of the sensor nodes in the wireless sensor network to sense the data and to record it and sends this recorded data to particular destination when event of specific conditions occurs. [5] The hardware of the wireless sensor network are very small and can transfer data at very low energies which basically makes different to nodes in wireless sensor network from other wireless network nodes. A simple structural layout of sensor nodes in a wireless network is presented in the below figure. Fig 1: The simple architecture of Wireless sensor network
  • 2. ISSN: 2312-7694 Shishupal et al, / International Journal of Computer and Communication System Engineering (IJCCSE), Vol. 2 (5), 2015, 708-715 709 | P a g e © IJCCSE All Rights Reserved Vol. 02 No.05 Oct 2015 www.ijccse.com In a wireless sensor network, after sensing and recording the data whenever a particular condition occur, the recorded data is sent by the particular sender sensor node to the end user. So for transmitting the data from one location to another location definitely, a routing protocol is necessary. [6] The routing protocol should be in such a way that it has to consume very minimum energy and also have very minimum capability i.e. not as much of overhead, for the reason that sensor nodes have precise limited power and processing competency. The protocols used in wireless sensor network for routing of data from source node to destination node are AODV, DSDV etc. The nodes of the wireless sensor network are distributed in nature and because of their wireless nature they are always vulnerable to security attacks. Security is one of the major parameters which can directly impact on the performance of the network. [7]There are various types of security attacks possible in the wireless sensor network like flooding attack, wormhole attack, denial of service attack, sinkhole attack, and Sybil attack. [8]For enhancing the security of the sensor network some cryptographic techniques can be used like key exchange algorithm, [9]which provides authenticity, availability etc. [10] an Extra remote home server (RHS) can also be installed which take care of any illegal activity of all the sensor node and can work as an administrator of the wireless sensor network. [11] But the key goal should be to propose a mechanism which takes very minimum energy consumption and also provides some prevention from the any kind of security attack. [12, 13, 14] A framework is proposed for estimation of secure location of sensor nodes for various WSN applications because of prevention from any unauthorized access. [15, 16] Providing security in the network of sensor node is very difficult as compared to mobile ad hoc network because the nodes in wireless sensor network are limited in power and processing. [17] For further enhancing security, a distributed scheme is proposed which provides security from replay attack in sensor network and this scheme is called RED protocol. [18] For the handling of node failures, also there are various protocols introduce like Tiny IDS. [19] Bluetooth technology can also be used for providing security in Wireless sensor network. [20] In a sensor network , a sensor node sends data and sends to the base station and during this process a secure communication and reliability is required which can be provided by using the Hybrid Multipath Scheme. [21] An entropy-based trust model is used for detection of malicious nodes in environment of wireless sensor network. [25] To cop up the link failures various types of data gathering methods can be used which inherits colouring algorithm in wireless sensor network called as SERENA. In this algorithm each colour is allotted a unique time slot. [26] A new technology is proposed whose name is ANT for wireless sensor network which is widely uses the mac layer protocol and specially developed for sports concerning sensor devices. Its main focus on the proper optimization of bandwidth of the network and low consumption of power. [27] To maintain the continuous service and connectivity some strategy can be followed like the Centralized Maintenance Strategy (CMS) and the Centralized Maintenance Strategy with Anticipation (CMSA). These strategy contains a small number of mobile like robots which looks after the network of sensor nodes and reports timely regarding failure, connectivity loss, coverage problem etc. [28] a multi tree based approach can be used in wireless sensor network which ensures that at least one node can connect to the communication network when network failure occurs. [29] Automatic firing practice system (AFPS) can be used for special operations force, tactical paramilitary and Law Enforcement Agencies. This implemented firing system is very flexible and contain small alarms and supports various mode of firing. In this paper, our main focus is in denial of service attack because this is considered as one of the most dangerous and serious attack in the network environment. In the next, Section 2 will describe about denial of service (DOS) attack. Section 3 will contain the related work about proposed method. Section 4 will contain simulation parameters in tabulated form and at last, Section 5 will contain results and comparison of wireless sensor network without prevention to the wireless sensor network under prevention from denial of service attack. II. DENIAL OF SERVICE (DOS) ATTACK IN SENSOR NODES OF WIRELESS NEYWORK Wherever Denial of service attack is one of the harmful attack for the network because in Denial of service attack (DOS), [22] whenever a sensor node have data to send, it forwards data to its neighbouring node which is in its communication range and if this neighbouring node is working as a malicious node then it does not forward data even creates overloading request for data to the sender node and consumes all its bandwidth. Sensor nodes in the wireless sensor network have limited in power so the node will eventually die by this type of attack as well as Denial of service attack also enlarge the delay time by consumption of processor time and bandwidth. It creates alternation in the content of data and disturb the activity of the routing protocol by disruption of routing information. It distorts the activity of the physical components of the sensor nodes as well as it creates an obstruction between the communication between the sender and intended receiver. [23, 24] It aims to target on applications of physical layer where the sensor nodes are located. DOS attacks make the sensor node dies very rapidly because they have already scarcity of limited computational power and processing capability. In a wireless sensor network, every sensor node is intended to perform a particular sensing tasks and in the presence of malicious node there may be an event of sending wrong information to the base station also happen. To make the network under DOS the malicious node take two ways to implement this attack. The first one is jamming and the second one is power exhaustion. In this paper, we are
  • 3. ISSN: 2312-7694 Shishupal et al, / International Journal of Computer and Communication System Engineering (IJCCSE), Vol. 2 (5), 2015, 708-715 710 | P a g e © IJCCSE All Rights Reserved Vol. 02 No.05 Oct 2015 www.ijccse.com discussing only DOS attack related to the network layer in which malicious node drops all the data forward from the source node and create network flooding by sending dummy packets. The main focus is to prevent power exhaustion of sensor nodes in the network because they are very limited in energy resources. This type of DOS attack aims to disturb sleep/duty cycles of sensor node continuously and results the network of sensor node will die very soon. Denial of service attack rapidly decrease the performance of overall wireless sensor network and directly does bad impact on the functionality of the sensor nodes. In the below figure 2, wireless sensor network below DOS attack is described in a practical manner and simulated in NS-2 environment. In this scenario, node 18 act as a base station. Node 7, 8, 12, 14 act as a malicious node have aimed to degrade the performance of the WSN environment. Node 17 and 19 act as a source node and their task is to forward data to the base station by using AODV protocol. So for initiating the communication between source node 19 and node 18 which act as a base station, source node 19 communicates with their neighbourhood sensor node, i.e. node 8 and this node 8 acts as a malicious node in this scenario. The main focus of the malicious node is to get attention from the source node so that it always advertises itself with a higher sequence number with minimum hope count. When source node 19 starts forwarding data to the node 8 then malicious node 8 drops all the packets so that the performance of wireless sensor network degrades very rapidly. For making the system under into DOS attack, these malicious node flood dummy data all over the network with aim of consumption of power of sensor nodes in WSN by disrupting their sleep or duty cycle. Eventually the power of sensor nodes degrades very rapidly result nodes will die very soon and the whole system of wireless sensor network will be under DOS attack. Fig 2: Wireless sensor network with AODV routing protocol under DOS attack II. PROPOSED METHOD The In this paper, we are introducing a method which provides prevention to the network from the denial of service attack. The nodes in the wireless sensor network use very simple and suitable routing protocol for routing of data from sender to the corresponding receiver. This property makes the wireless sensor network simple as well as lying to network security attack. Besides this, complex algorithms and techniques consumes lot of processing and computation power of the nodes in wireless sensor network and there is already a scarcity of these resources. So in this paper, a simple method is introduced which takes prevention before sending a packet to their neighbouring node. A sending node whenever have data to send, it senses the neighbouring node which in its range of transmission and communication. Before sending the data to its intended neighbouring nodes, it first checks for the historical throughput which is basically the value of the forwarded number of packets. The value of this historical throughput is stored in a variable. Whenever a node wants to send data, it authenticates its neighbouring node’s historical throughput value, whenever the value of this historical throughput variable is equal to 0 or exceed over the predefined threshold than that neighbouring node is suspected to be improper node and mark this neighbouring node as a malicious sensor node. After this step, the sending node again starts sensing another new neighbouring node to send the data to the intended receiver. For making a differentiation between the malicious node and valid sensor node, it periodically flushes the value of historical throughput of valid sensor node when its value becomes equal to the predefine threshold value. So the value of historical throughput of the valid sensor node will always lie between greater than 0 and less than a predefined threshold. Below figure 3 represents the flowchart for proposed methodology.
  • 4. ISSN: 2312-7694 Shishupal et al, / International Journal of Computer and Communication System Engineering (IJCCSE), Vol. 2 (5), 2015, 708-715 711 | P a g e © IJCCSE All Rights Reserved Vol. 02 No.05 Oct 2015 www.ijccse.com Fig 3: Flowchart for proposed method In the above flowchart, H[Th] represents the historical throughput of the node. N.H[th] represents the historical throughput of the neighbouring node which is sense by the corresponding sender node and C.H[th] denoted historical throughput of the current working node. Historical throughput basically is the number of packets sent with respect to the time. The procedure of the above mentioned flowchart can be well understand by the following points: • Whenever a Sender node wants to send data then it first senses one of its neighbouring node. Before sending data to its neighbourhood sensor node it first authorizes it to ensure that it is not a malicious node to provide some protection to the system from denial of service attack or any kind of security attack. It does so by comparison of historical throughput of neighbouring node. • If historical throughput of neighbouring node is greater than the predefined threshold value or equal to 0 then it indicated that is working as a malicious node and sender node will not send data packet to that node and will mark this node as malicious node with again senses the another neighbourhood node with in transmission range and again the procedure Will applied. Below figure 4 shows above describe scenario: Fig 4: An example of sensor network which describe above mentioned procedure In figure 4, green circle represents sender and receiver sensor nodes while red circle represents malicious sensor node and besides theses, all circles are remaining nodes of the sensor network. • If historical throughput of neighbourhood node is less than the predefined threshold and also does not equal to 0 then sender node will send data to this neighbourhood node. In this scenario, if historical throughput of the current node becomes equal to its predefined threshold then it flushes its H[th] values and make it equal to 0 and after that it updated it by H[th] = H[th] + 0.1. This step is due to maintain the proper differentiation between the valid and malicious node. In this way, the value of H[th] of every sensor node in the network will between 0 and predefined threshold. Fig 5: A wireless sensor network which shows above mentioned procedure
  • 5. ISSN: 2312-7694 Shishupal et al, / International Journal of Computer and Communication System Engineering (IJCCSE), Vol. 2 (5), 2015, 708-715 712 | P a g e © IJCCSE All Rights Reserved Vol. 02 No.05 Oct 2015 www.ijccse.com III. SIMULATION PARAMETERS In this paper, the proposed method of prevention from denial of service attacks is simulated in network simulator (NS-2). NS-2 is used for simulation of wired or wireless networking, for the simulation of wireless sensor network an Extra component is added in the NS-2 simulator which is called Mannasim. Mannasim is a software which enables easy simulation of wireless sensor network. The simulation parameters for our proposed method is tabulated below: Table I: simulation parameters of proposed methodology Sr No Parameter Value 1 Simulator NS-2(Mannasim) 2 Channel type Channel/Wireless channel 3 Radio Propagation Propagation/ Two ray Model ground wave 4 Network interface type Phy/WirelessPhy 5 MAC Type Mac /802.11 6 Frequency 914e+6 7 Routing Protocol AODV 8 Antenna Antenna/Omni Antenna 9 Initial energy 10 10 Area ( M*M) 500 * 500 11 Simulation Time 250 sec 12 No of Nodes 50 13 rxPower 0.5 14 txPower 1.0 15 idlePower 0.0 16 sensePower 0.3 17 CPThresh_ 10.0 18 sensing 2.28289e-11 range_CSThresh_ 19 communication 2.28289e-11 range_RXThresh_ IV. RESULTS AND COMPARISON The simulation of proposed wireless sensor network environment is done in network simulator with Mannasim software. The simulation results are evaluated in terms of throughput, Packet delivery ratio and end-to-end delay. In this paper, we compare the performance of a network of sensor nodes under the prevention of the proposed methodology with the network of sensor node without prevention from denial of service attack. This result will evaluate the impact of the proposed methodology to the wireless sensor network. A: THROUGHPUT The principal performance is measured in the relations of the throughput. Throughput is represented in bits per second (bps) and it is the number of packets which is received in per unit of time. Figure 3 represents the throughput of the wireless sensor network environment under no prevention Fig 3: Throughput of wireless sensor network without prevention In the above figure, it is shown that the Throughput of the simulated wireless sensor network comes out to be about 1179.25 kbps. Figure 4 represents the throughput of the proposed methodology in wireless sensor network.
  • 6. ISSN: 2312-7694 Shishupal et al, / International Journal of Computer and Communication System Engineering (IJCCSE), Vol. 2 (5), 2015, 708-715 713 | P a g e © IJCCSE All Rights Reserved Vol. 02 No.05 Oct 2015 www.ijccse.com Fig 4: Throughput of the proposed method for wireless sensor network In the above figure, the Average throughput is evaluated in terms of Kbps and that comes out to be about 1305.71Kbps which is much higher than the throughput from the sensor network under without any prevention of security attacks. B: PACKET DELIVERY RATIO/FRACTION Packet delivery ratio (PDR) is the fraction concerning the data Packets received by the destination for those sent by sources. This evaluates the ability of the protocol performance and its efficiency. Figure 5 represents the Packet delivery ratio of wireless sensor network under no prevention. Fig 5: packet loss in the simulated sensor node network without proposed method In the above figure, it is clearly shown that is number of sending packets are 105266 and the number of received packets are only 77753, so the total number of packets which are lost are about 105266 – 77753=>27513 which is very high and does harmful impact for network of sensor nodes. Fig 6: Packet delivery ration of simulated wireless sensor network In the above figure, It is clearly seen that the total number of sent packets is 71574 and total number of receiving packets
  • 7. ISSN: 2312-7694 Shishupal et al, / International Journal of Computer and Communication System Engineering (IJCCSE), Vol. 2 (5), 2015, 708-715 714 | P a g e © IJCCSE All Rights Reserved Vol. 02 No.05 Oct 2015 www.ijccse.com are 71572 i.e. the number of packets which are less in the simulated environment are only 2, which is very less and hence it leads to high performance of the wireless sensor network. C: END-TO-END DELAY End to end delay is the quantity of the time which is occupied to sending packets from source to their respective destination to receive those packets. More delay can lead to low performance of the wireless sensor network and low delay is the indication of high efficiency and speed of the network. Figure 6 represents the end-to-end delay of the wireless sensor network without taking any prevention. Fig 7: End-to-end delay of wireless sensor network without any prevention method “ Fig 8: End-to-end delay of simulated wireless sensor network with proposed method CONCLUSION Wireless sensor network is becoming very famous now days in the field of various industrial and research environments. They support a very large number of nodes up to thousands and also support a high degree of mobility. The main functionality of the sensor node to sense a particular data and to store in its limited available memory and by occurring on particular event they must send their sensed data to the corresponding end user. However, in the network environment, especially in the area of wireless, the nodes are distributed in nature and they lead high chance of getting attacked by intruder which badly decrease the performance of the network and let the sensor node die of consumption of its computing and power resources. As well as sensor node is like very small nodes which have smaller components and the use of very complex techniques for providing security leads to the sensor node dies very soon and enlargement of delay. In this paper, a simple methodology is proposed which takes very little computational power and does not impact on the battery consumption of sensor nodes as well as it offers some sort of authentication of nodes so that network will at all times inhibit from any denial of service attack (DOS). References [1] Raymond, D.R, Midkiff, S.F, „Denial of Service in Wireless Networks: Attacks and Defences, IEEE CS: Security and Privacy, 2008,pg 74-81. [2] Bokare, Madhav, and Mrs Anagha Ralegaonkar. "Wireless Sensor Network: A Promising Approach for Distributed Sensing Tasks." Excel Journal of Engineering Technology and
  • 8. ISSN: 2312-7694 Shishupal et al, / International Journal of Computer and Communication System Engineering (IJCCSE), Vol. 2 (5), 2015, 708-715 715 | P a g e © IJCCSE All Rights Reserved Vol. 02 No.05 Oct 2015 www.ijccse.com Management Science 1 (2012): 1-9. [3] R. Shorey, A. Ananda, M. C. Chan and W. T. Ooi, “Mo- bile Wireless and Sensor Networks Technology Applica- tion and Future Directions,” China Machine Press, 2010. [4] Introduction to Wireless Sensor Networks. http://www.worldscibooks.com/comps ci/etextbook/6288/6288 _chap Ipdf on October 8. 2008 [5] L. Guibas , F. Zhao. Wireless Sensor Networks: An Information Processing Approach. [6] R.; Boulmalf, M., "Routing in wireless sensor networks," Multimedia Computing and Systems, 2009. ICMCS '09. International Conference on ,vol., no., pp.495,500, 2-4 April 2009doi: 10.1109/MMCS.2009.5256646 [7] Krco, S.; Tsiatsis, V.; Matusikova, K.; Johansson, M.; Cubic, I.; Glitho, R., "Mobile Network Supported Wireless Sensor Network Services," Mobile Adhoc and Sensor Systems, 2007. MASS 2007. IEEE Internatonal Conference on , vol., no., pp.1,3, 8-11 Oct. 2007 [8] Nanda, R.; Venkata Krishna, P., "A self enforcing and flexible security protocol for preventing Denial of Service attacks in wireless sensor networks," Recent Advances in Intelligent Computational Systems (RAICS), 2011 IEEE , vol., no., pp.847,850, 22-24 Sept. 2011 [9] Raymond, David R.; Midkiff, S.F., "Denial-of-Service in Wireless Sensor Networks: Attacks and Defenses," Pervasive Computing, IEEE , vol.7, no.1, pp.74,81, Jan.-March 2008 doi: 10.1109/MPRV.2008.6 [10] Gill, K.; Shuang-Hua Yang, "A scheme for preventing denial of service attacks on wireless sensor networks," Industrial Electronics, 2009. IECON '09. 35th Annual Conference of IEEE , vol., no., pp.2603,2609, 3-5 Nov. 2009 [11] Zhang, Xuyuan, "Model Design of Wireless Sensor Network Based on Scale-Free Network Theory," Wireless Communications, Networking and Mobile Computing, 2009. WiCom '09. 5th International Conference on , vol., no., pp.1,4, 24-26 Sept. 2009 [12] Jokhio, S.H.; Jokhio, I.A.; Kemp, A.H., "Light-weight framework for security-sensitive wireless sensor networks applications," Wireless Sensor Systems, IET , vol.3, no.4, pp.298,306, December 2013. [13] Lal, Kumari Nidhi, and Ashutosh Kumar Singh. "Modified design of microstrip patch antenna for WiMAX communication system." Students' Technology Symposium (TechSym), 2014 IEEE. IEEE, 2014. [14] Lal, Nidhi. "An Effective Approach for Mobile ad hoc Network via I-Watchdog Protocol." [15] Lal, N.; Singh, A.P.; Kumar, S., "Modified trial division algorithm using KNJ-factorization method to factorize RSA public key encryption," Contemporary Computing and Informatics (IC3I), 2014 International Conference on , vol., no., pp.992,995, 27-29 Nov. 2014 [16] Guizani, M.; Xiaojiang Du; Hsiao-Hwa Chen; Mueller, P., "Security in wireless mobile ad hoc and sensor networks [Guest Editorial]," Wireless Communications, IEEE , vol.14, no.5, pp.6,7, October 2007 [17] Conti, M.; Di Pietro, R.; Mancini, L.V.; Mei, A., "Distributed Detection of Clone Attacks in Wireless Sensor Networks," Dependable and Secure Computing, IEEE Transactions on , vol.8, no.5, pp.685,698, Sept.-Oct. 2011. [18] Buttyan, L.; Gessner, D.; Hessler, A.; Langendoerfer, Peter, "Application of wireless sensor networks in critical infrastructure protection: challenges and design options [Security and Privacy in Emerging Wireless Networks]," Wireless Communications, IEEE , vol.17, no.5, pp.44,49, October 2010. [19] Soo-Hwan Choi; Byung-Kug Kim; Jinwoo Park; Chul-Hee Kang; Doo-Seop Eom, "An implementation of wireless sensor network," Consumer Electronics, IEEE Transactions on , vol.50, no.1, pp.236,244, Feb 2004 [20] Wenjing Lou; Younggoo Kwon, "H-SPREAD: a hybrid multipath scheme for secure and reliable data collection in wireless sensor networks," Vehicular Technology, IEEE Transactions on , vol.55, no.4, pp.1320,1330, July 2006 [21] Abdelhakim, M.; Lightfoot, L.E.; Jian Ren; Tongtong Li, "Distributed Detection in Mobile Access Wireless Sensor Networks under Byzantine Attacks," Parallel and Distributed Systems, IEEE Transactions on , vol.25, no.4, pp.950,959, April 2014. [22] krishna Chaitanya, Doddapaneni, and Ghosh Arindam. "Analysis of Denial-of-Service attacks on Wireless Sensor Networks Using Simulation." [23] Sakarindr, Pitipatana; Ansari, N., "Security services in group communications over wireless infrastructure, mobile ad hoc, and wireless sensor networks," Wireless Communications, IEEE , vol.14, no.5, pp.8,20, October 2007. [24] Lal, Nidhi, et al. "A Heuristic EDF Uplink Scheduler for Real Time Application in WiMAX Communication." arXiv preprint arXiv:1501.04553 (2015). [25] Amdouni, Ichrak, Pascale Minet, and Cedric Adjih. "Adaptivity of a Coloring Algorithm to Unreliable Communications for Data Gathering in Wireless Sensor Networks." International Journal of Digital Information and Wireless Communications (IJDIWC) 3.1 (2013): 61-74. [26] Khssibi, Sabri, et al. "Presentation and analysis of a new technology for low-power wireless sensor network." International Journal of Digital Information and Wireless Communications (IJDIWC) 3.1 (2013): 75-86. [27] Abbas, Waseem, Nasim Abbas, and Uzma Majeed. "PERFORMANCE ENHANCEMENT OF END-TO-END QUALITY OF SERVICE IN WCDMA WIRELESS NETWORKS." Science International 26.2 (2014). [28] Snigdh, Itu, and Swarn Saurabh. "A Multi Tree based Approach for Performance Analysis in Hierarchical Wireless Sensor Networks." International Journal of Digital Information and Wireless Communications (IJDIWC) 4.4 (2014): 438-446.