A Centralized Mechanism for Preventing DDOS Attack in Wireless Sensor Networks

Author(s):  
Udaya Suriya Rajkumar Dhamodharan ◽  
Sathiyaraj Rajendran ◽  
Raj Anand Sundaramoorthy ◽  
M. Thirunavukkarasan

In modern time, Mobile Wireless Sensor Networks (MWSN) technology has gained tremendous popularity and is widely used in various applications. MWSN is a temporary network designed for a specific purpose. The dynamic nature of these networks makes them more usable in different fields. The autonomous systems of these wireless mobile nodes can be established anytime, anywhere. However, due to its high mobility, lack of centralized authority and the nature of open media, MWSN is more vulnerable to a variety of security threats and hence more vulnerable to security issues than traditional Wireless Sensor Networks (WSN). MWNs are extremely vulnerable to various types of threats, which will greatly reduce network performance in different situations. In this article, we first provide the general description about MWSN along with its component used and then reviewed the well-known work done by various researchers to detect distributed denial-of-service attack (DDoS). The review thoroughly identified different aspects of the proposed methodology. In addition, we also provide comparative analysis of various analyzed parameters that are examined to determine the effectiveness of the designed protection network against DDoS attack.


2016 ◽  
Vol 2016 ◽  
pp. 1-13 ◽  
Author(s):  
Katarzyna Mazur ◽  
Bogdan Ksiezopolski ◽  
Radoslaw Nielek

The growing popularity of wireless sensor networks increases the risk of security attacks. One of the most common and dangerous types of attack that takes place these days in any electronic society is a distributed denial of service attack. Due to the resource constraint nature of mobile sensors, DDoS attacks have become a major threat to its stability. In this paper, we established a model of a structural health monitoring network, being disturbed by one of the most common types of DDoS attacks, the flooding attack. Through a set of simulations, we explore the scope of flood-based DDoS attack problem, assessing the performance and the lifetime of the network under the attack condition. To conduct our research, we utilized the Quality of Protection Modeling Language. With the proposed approach, it was possible to examine numerous network configurations, parameters, attack options, and scenarios. The results of the carefully performed multilevel analysis allowed us to identify a new kind of DDoS attack, the delayed distributed denial of service, by the authors, referred to as DDDoS attack. Multilevel approach to DDoS attack analysis confirmed that, examining endangered environments, it is significant to take into account many characteristics at once, just to not overlook any important aspect.


Sign in / Sign up

Export Citation Format

Share Document