Genetic Algorithm Based Denial of Sleep Attack Detection in WSN

Authors

  • Prof. Sucheta Raut  Department of Electronics and Department of Electronics and Telecommunications, G.N.I.T., Nagpur, Maharashtra, India
  • Priyanka Ghodmare  Department of Electronics and Department of Electronics and Telecommunications, G.N.I.T., Nagpur, Maharashtra, India
  • Nidhi Meshram  Department of Electronics and Department of Electronics and Telecommunications, G.N.I.T., Nagpur, Maharashtra, India
  • Mangesh Jibhkate  Department of Electronics and Department of Electronics and Telecommunications, G.N.I.T., Nagpur, Maharashtra, India
  • Vaibhao Bele  Department of Electronics and Department of Electronics and Telecommunications, G.N.I.T., Nagpur, Maharashtra, India
  • Pranoti Girhe  Department of Electronics and Department of Electronics and Telecommunications, G.N.I.T., Nagpur, Maharashtra, India

Keywords:

Genetic Algorithm, Wireless Sensor Networks, Cross Layer Security, Denial of Sleep Attacks.

Abstract

The wireless ad hoc networks are highly vulnerable to denial of service (DoS) attacks because of its unique characteristics such as open network architecture, shared wireless medium and stringent resource constraints. These attacks throttle the tcp throughput heavily and reduce the quality of service (QoS) to end systems gradually rather than refusing the clients from the services completely. In this paper, we discussed the DoS attacks and proposed a defence scheme to improve the performance of the ad hoc networks. Our proposed defence mechanism uses the medium access control (MAC) layer information to detect the attackers. The status values from MAC layer that can be used for detection are Frequency of receiving RTS/CTS packets, Frequency of sensing a busy channel and the number of RTS/DATA retransmissions. Once the attackers are identified, all the packets from those nodes will be blocked. The network resources are made available to the legitimate users. We perform the simulation with Network Simulator NS2 and we proved that our proposed system improves the network performance.

References

  1. C. Manju, S. L. Senthil Lekha, and M. Sasi Kumar, "Mechanisms for detecting and preventing denial of sleep attacks on wireless sensor networks," in Proceedings of the IEEE Conference on Information and Communication Technologies (ICT '13), pp. 74–77, Tamil Nadu, India, April 2013.
  2. D. R. Raymond, R. C. Marchany, M. I. Brownfield, and S. F. Midkiff, "Effects of denial-of-sleep attacks on wireless sensor network MAC protocols," IEEE Transactions on Vehicular Technology, vol. 58, no. 1, pp. 367–380, 2009.
  3. R. P. Manohar and E. Baburaj, "Detection of Stealthy Denial of Service (S-DoS) attacks in wireless sensor networks," International Journal of Computer Science and Information Security (IJCSIS), vol. 14, pp. 343–348, 2016.
  4. D. Mansouri, L. Mokddad, J. Ben-Othman, and M. Ioualalen, "Preventing denial of service attacks in wireless sensor networks," in Proceedings of the IEEE International Conference on Communications (ICC '15), pp. 3014–3019, London, UK, June 2015. 
  5. D. Mansouri, L. Mokdad, J. Ben-Othman, and M. Ioualalen, "Detecting DoS attacks in WSN based on clustering technique," in Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC '13), pp. 2214–2219, Shanghai, China, April 2013.
  6. "Wireless Sensor Network" by S. Swapna Kumar.
  7. "Protocols and Architecture for Wireless Sensor Network" by Holger Karl & Andreas Willing.
  8. "Wireless Sensor Network" by Sunil Gupta & Dr. Harsh K. Verma.
  9. www.wikipedia.com

Downloads

Published

2018-04-30

Issue

Section

Research Articles

How to Cite

[1]
Prof. Sucheta Raut, Priyanka Ghodmare, Nidhi Meshram, Mangesh Jibhkate, Vaibhao Bele, Pranoti Girhe, " Genetic Algorithm Based Denial of Sleep Attack Detection in WSN, International Journal of Scientific Research in Science and Technology(IJSRST), Online ISSN : 2395-602X, Print ISSN : 2395-6011, Volume 4, Issue 5, pp.884-888, March-April-2018.