FBDR-Fuzzy based DDoS attack Detection and Recovery mechanism for wireless sensor networks

Author(s):  
Beslin Pajila ◽  
E. Golden Julie ◽  
Y. Harold Robinson

Abstract Wireless sensor networks (WSN) is considering as one of the exploring technology. WSN has a large number of sensor nodes, which sense the environment and collect the data. The collected data are sending to the sink through the intermediate nodes. Since the sensors node data are exposed to the internet, there is a possibility of vulnerability in the WSN. The common attack that affects most of the sensor nodes is the DDoS attack. In this paper aims to identify the DDoS attack quickly and to recover sensors using the fuzzy logic mechanism. In the Fuzzy based DDoS attack Detection and Recovery mechanism (FBDR) method uses type 1 fuzzy-logic to detect the occurrence of DDoS attack in a node. Similarly fuzzy- type 2 is used for recovery DDoS attack. Both the type 1 fuzzy-based rule and type 2 fuzzy-based rule perform well in terms of identifying the DDoS attack and recover the DDoS attack. It also helps to reduce the energy consumption of each node and improves the lifetime of the network. The proposed FBDR scheme is compared with other related schemes. The experimental results represent that the FBDR method works better than other similar schemes.

Author(s):  
Ghassan Samara ◽  
Mohammad Hassan ◽  
Yahya Zayed

Wireless sensor networks (WSNs) has a practical ability to link a set of sensors to build a wireless network that can be accessed remotely; this technology has become increasingly popular in recent years. Wi-Fi-enabled sensor networks (WSNs) are used to gather information from the environment in which the network operates. Many obstacles prevent wireless sensor networks from being used in a wide range of fields. This includes maintaining network stability and extending network life. In a wireless network, sensors are the most essential component. Sensors are powered by a battery that has a finite amount of power. The battery is prone to power loss, and the sensor is therefore rendered inoperative as a result. In addition, the growing number of sensor nodes off-site affects the network's stability. The transmission and reception of information between the sensors and the base consumes the most energy in the sensor. An Intelligent Vice Cluster Head Selection Protocol is proposed in this study (IVC LEACH). In order to achieve the best performance with the least amount of energy consumption, the proposed hierarchical protocol relies on a fuzzy logic algorithm using four parameters to calculate the value of each node in the network and divides them into three hierarchical levels based on their value. This improves network efficiency and reliability while extending network life by 50 percent more than the original Low Energy Adaptive Clustering Hierarchy protocol. Keywords: Wireless Sensor Networks, Sensors, Communication Protocol, Fuzzy logic, Leach protocol.


Mathematics ◽  
2021 ◽  
Vol 9 (18) ◽  
pp. 2251
Author(s):  
Amir Masoud Rahmani ◽  
Saqib Ali ◽  
Mohammad Sadegh Yousefpoor ◽  
Efat Yousefpoor ◽  
Rizwan Ali Naqvi ◽  
...  

Coverage is a fundamental issue in wireless sensor networks (WSNs). It plays a important role in network efficiency and performance. When sensor nodes are randomly scattered in the network environment, an ON/OFF scheduling mechanism can be designed for these nodes to ensure network coverage and increase the network lifetime. In this paper, we propose an appropriate and optimal area coverage method. The proposed area coverage scheme includes four phases: (1) Calculating the overlap between the sensing ranges of sensor nodes in the network. In this phase, we present a novel, distributed, and efficient method based on the digital matrix so that each sensor node can estimate the overlap between its sensing range and other neighboring nodes. (2) Designing a fuzzy scheduling mechanism. In this phase, an ON/OFF scheduling mechanism is designed using fuzzy logic. In this fuzzy system, if a sensor node has a high energy level, a low distance to the base station, and a low overlap between its sensing range and other neighboring nodes, then this node will be in the ON state for more time. (3) Predicting the node replacement time. In this phase, we seek to provide a suitable method to estimate the death time of sensor nodes and prevent possible holes in the network, and thus the data transmission process is not disturbed. (4) Reconstructing and covering the holes created in the network. In this phase, the goal is to find the best replacement strategy of mobile nodes to maximize the coverage rate and minimize the number of mobile sensor nodes used for covering the hole. For this purpose, we apply the shuffled frog-leaping algorithm (SFLA) and propose an appropriate multi-objective fitness function. To evaluate the performance of the proposed scheme, we simulate it using NS2 simulator and compare our scheme with three methods, including CCM-RL, CCA, and PCLA. The simulation results show that our proposed scheme outperformed the other methods in terms of the average number of active sensor nodes, coverage rate, energy consumption, and network lifetime.


Author(s):  
Amarjeet Kaur ◽  
Gagandeep Kaur ◽  
Gagandeep Kaur

In this sense, DoS, particularly DDoS, undermines the Internet, as well as debilitates the common security, because of its predominant utilization in digital wrongdoings. Accordingly to see well the attributes of DDoS issues and examine comparing protection instruments have noteworthy commitments for the scholarly world and industry, as well as for the government disability and crisis administration organizations, since they can utilize such learning to upgrade their capacities of hazard appraisals and help the partners to settle on suitable choices when confronting DDoS dangers. In the current research work the diverse sorts of issues, such viewpoint as far as distinguishing DoS assaults is to see the issue as that of a grouping issue on arrange state (and not on singular bundles or different units) by demonstrating ordinary and assault activity and characterizing the momentum condition of the system as great or terrible, in this way identifying assaults when they happen. Another is the Transmission disappointments or due date misses may bring about unsettling influences to the procedure, debasement of the general control execution. In future All these are settled with the assistance of a DDoS assault location and DSR Algorithm with Cryptography on Wireless Sensor organize and the WSN with BS, CH


2020 ◽  
Vol 8 (5) ◽  
pp. 1049-1054

Wireless Sensor Networks (WSN) are constructed by interconnecting miniature sensor nodes for monitoring the environment uninterrupted. These miniature nodes are having the sensing, processing and communication capability in a smaller scale powered by a battery unit. Proper energy conservation is required for the entire system. Clustering mechanism in WSN advances the lifetime and stability in the network. It achieves data aggregation and reduces the number of data transmission to the Base station (BS). But the Cluster Head (CH) nodes are affected by rapid energy depletion problem due to overload. A CH node spends its energy for receiving data from its member nodes, aggregation and transmission to the BS. In CH election, multiple overlapping factors makes it difficult and inefficient which costs the lifetime of the network. In recent years, Fuzzy Logic is widely used for CH election mechanism for WSN. But the underlying problem of the CHs node continues. In this research work, a new clustering algorithm DHCFL is proposed which elects two CHs for a cluster which shares the load of a conventional CH node. Data reception and aggregation will be done by CH aggregator (CH-A) node and data transmission to the BS will be carried over by CH relay (CH-R) node. Both CH-A and CH-R nodes are elected through fuzzy logic which addresses the uncertainty in the network too. The proposed algorithm DHCFL is compared and tested in different network scenarios with existing clustering algorithms and it is observed that DHCFL outperforms other algorithms in all the network scenarios.


Sign in / Sign up

Export Citation Format

Share Document