scholarly journals Enhanced LION Optimization with Efficient Path Routing Equilization Technique Against DOS Attack in WSN

Author(s):  
Elavarasan R ◽  
Chithra K

Abstract In WSN, DOS (Denial of service) attack makes shortcoming system. The packets travel over and over in the sensor network. By that all the assets like data transmission, memory, and vitality are squandered by this attack. However, the attacker ought to optimize its attacker plan for request to boost the impact on the system performance because of the deficiency of vitality at the aggressor side. Denial of service (DoS) attack on the Internet has become a squeezing issue. By staying away from these sorts of attacks network performance can be improved. Therefore, Security is a fundamental requirement for these networks. Hence, to overcome the issues faced by the cross layer in the presence of DOS attack in WSN. For reliable data transmission, effective routing is required. This research work mainly focuses on the performance evaluation using optimization methods. To establish the efficient path in the Cross layer against DOS attack, this paper has proposed Enhanced lion optimization with efficient path routing equalization technique (LOEPRE). If there is any failure node occurs in the network then the node is recognized and communication of data packets again transmitted in another node. Retransmission of data causes overload in the network. The proposed model focuses on these issues and overcome these issues by improving the path efficiently with robust security. It consists of three phases: In initial phase include the route discovery in the network. In second phase, enhanced lion optimization technique is used for establish a route to transfer data with high security level. Finally, efficient path routing equalization technique is used for minimize the overload in the network, it provides the equalize path length in the network and is highly efficient. Hence, the proposed LOEPRE technique is used to achieve energy efficiency in wireless network for prolong network lifetime, minimum packet latency, minimize consumption of energy. Moreover, the simulation outcome of the proposed LOEPRE method highly robust while comparing to the existing methods EFCRS, SSPRA ELOER, EFLOR and TSTP. It achieves better performance than existing algorithms in comparing metrics connectivity ratio, end to end delay, overhead, throughput and packet delivery ratio.

2021 ◽  
Vol 18 (4(Suppl.)) ◽  
pp. 1371
Author(s):  
Nasrina M Samir ◽  
Maisarah Musni ◽  
Zurina Mohd Hanapi ◽  
Mohamed Ridzal Radzuan

Directional Compact Geographic Forwarding (DCGF) routing protocol promises a minimal overhead generation by utilizing a smart antenna and Quality of Service (QoS) aware aggregation. However, DCGF was tested only in the attack-free scenario without involving the security elements. Therefore, an investigation was conducted to examine the routing protocol algorithm whether it is secure against attack-based networks in the presence of Denial-of-Service (DoS) attack. This analysis on DoS attack was carried out using a single optimal attacker, A1, to investigate the impact of DoS attack on DCGF in a communication link. The study showed that DCGF does not perform efficiently in terms of packet delivery ratio and energy consumption even on a single attacker.


Author(s):  
Thangavel M. ◽  
Nithya S ◽  
Sindhuja R

Cloud computing is the fastest growing technology in today's world. Cloud services provide pay as go models on capacity or usage. For providing better cloud services, capacity planning is very important. Proper capacity planning will maximize efficiency and on the other side proper control over the resources will help to overcome from attacks. As the technology develops in one side, threats and vulnerabilities to security also increases on the other side. A complete analysis of Denial of Service (DOS) attacks in cloud computing and how are they done in the cloud environment and the impact of reduced capacity in cloud causes greater significance. Among all the cloud computing attacks, DOS is a major threat to the cloud environment. In this book chapter, we are going to discuss DOS attack in the cloud and its types, what are the tools used to perform DOS attack and how they are detected and prevented. Finally it deals with the measures to protect the cloud services from DOS attack and also penetration testing for DOS attack.


Energies ◽  
2021 ◽  
Vol 14 (24) ◽  
pp. 8255
Author(s):  
R. Thenmozhi ◽  
B. Amutha ◽  
Sreeram Valsalakumar ◽  
Thundil Karuppa Raj Rajagopal ◽  
Senthilarasu Sundaram

The impact of multimedia in day-to-day life and its applications will be increased greatly with the proposed model (MSVPC)–5G Multicast SDN network eminence video transmission obtained using PSO and cross layer progress in wireless nodes. The drone inspection and analysis in a solar farm requires a very high number of transmissions of various videos, data, animations, along with all sets of audio, text and visuals. Thus, it is necessary to regulate the transmissions of various videos due to a huge amount of bandwidth requirement for videos. A software-defined network (SDN) enables forwarder selection through particle swarm optimization (PSO) mode for streaming video packets through multicast routing transmissions. Transmission delay and packet errors are the main factors in selecting a forwarder. The nodes that transfer the videos with the shortest delay and the lowest errors have been calculated and sent to the destination through the forwarder. This method involves streaming to be increased with the highest throughput and less delay. Here, the achieved throughput is shown as 0.0699412 bits per second for 160 s of simulation time. Also, the achieved packet delivery ratio is 81.9005 percentage for 150 nodes on the network. All these metrics can be changed according to the network design and can have new results. Thus, the application of MSVPC- 5G Multicast SDN Network Eminence Video Transmission in drone thermal imaging helps in monitoring solar farms more effectively, and may lead to the development of certain algorithms in prescriptive analytics which recommends the best practices for solar farm development.


Sensor Review ◽  
2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Farzad Kiani ◽  
Amir Seyyedabbasi ◽  
Sajjad Nematzadeh

Purpose Efficient resource utilization in wireless sensor networks is an important issue. Clustering structure has an important effect on the efficient use of energy, which is one of the most critical resources. However, it is extremely vital to choose efficient and suitable cluster head (CH) elements in these structures to harness their benefits. Selecting appropriate CHs and finding optimal coefficients for each parameter of a relevant fitness function in CHs election is a non-deterministic polynomial-time (NP-hard) problem that requires additional processing. Therefore, the purpose of this paper is to propose efficient solutions to achieve the main goal by addressing the related issues. Design/methodology/approach This paper draws inspiration from three metaheuristic-based algorithms; gray wolf optimizer (GWO), incremental GWO and expanded GWO. These methods perform various complex processes very efficiently and much faster. They consist of cluster setup and data transmission phases. The first phase focuses on clusters formation and CHs election, and the second phase tries to find routes for data transmission. The CH selection is obtained using a new fitness function. This function focuses on four parameters, i.e. energy of each node, energy of its neighbors, number of neighbors and its distance from the base station. Findings The results obtained from the proposed methods have been compared with HEEL, EESTDC, iABC and NR-LEACH algorithms and are found to be successful using various analysis parameters. Particularly, I-HEELEx-GWO method has provided the best results. Originality/value This paper proposes three new methods to elect optimal CH that prolong the networks lifetime, save energy, improve overhead along with packet delivery ratio.


Author(s):  
Thangavel M. ◽  
Nithya S ◽  
Sindhuja R

Cloud computing is the fastest growing technology in today's world. Cloud services provide pay as go models on capacity or usage. For providing better cloud services, capacity planning is very important. Proper capacity planning will maximize efficiency and on the other side proper control over the resources will help to overcome from attacks. As the technology develops in one side, threats and vulnerabilities to security also increases on the other side. A complete analysis of Denial of Service (DOS) attacks in cloud computing and how are they done in the cloud environment and the impact of reduced capacity in cloud causes greater significance. Among all the cloud computing attacks, DOS is a major threat to the cloud environment. In this book chapter, we are going to discuss DOS attack in the cloud and its types, what are the tools used to perform DOS attack and how they are detected and prevented. Finally it deals with the measures to protect the cloud services from DOS attack and also penetration testing for DOS attack.


2021 ◽  
Author(s):  
Huaying Yin ◽  
Hongmei Yang ◽  
Maryam Hajiee

Abstract Rapid developments in radio technology and processors have led to the emergence of small sensor nodes that provide communication over Wireless Sensor Networks (WSNs). The crucial issues in these networks are energy consumption management and reliable data exchange. Due to the limited resources of sensor nodes, WSNs become a vulnerable target against many security attacks. Thus, energy-aware trust-based techniques have become a powerful tool for detecting nodes’ behavior and providing security solutions in WSN. Clustering-based routings are one of the most effective methods in increasing the WSN performance. In this paper, an Energy-Aware Trust algorithm based on the AODV protocol and Multi-path Routing approach (EATMR) is proposed to improve the security of WSNs. EATMR consists of two main phases: firstly, the nodes are clustered based on the Open-Source Development Model Algorithm (ODMA), and then in the second phase, clustering-based routing is applied. In this paper, the routing process follows the AODV protocol and multi-path routes approach with considering energy-aware trust. Here, the optimal and safe route is determined based on various parameters, namely energy, trust, hop-count, and distance. In this regard, we emphasize the evaluation of node trust using direct trust, indirect trust, and a multi-objective function. The simulation has been performed in MATLAB software in the presence of a Denial of Service (DoS) attack. The simulation results show that EATMR performs better than other approaches such as M-CSO and SQEER in terms of successfully detecting malicious nodes and enhancing network lifetime, energy consumption, and packet delivery ratio.


2021 ◽  
Vol 2131 (2) ◽  
pp. 022095
Author(s):  
A A Privalov ◽  
V L Lukicheva ◽  
D N Tsvetkov ◽  
S S Titov

Abstract The purpose of this study is to develop a mechanism to account for the effects of a distributed denial of service attack on a switching node, as well as to assess the quality of its functioning under destructive effects. Relevance stems from the possibility of disruption of regional economic complex management due to the impact on the elements of the technological network of data transmission attacker type “distributed denial of service”. Based on the mathematical apparatus of GERT-networks the authors propose an approach to assess the quality of switching nodes. The essence lies in the representation of the data flow service node switching network data transmission under attack by an intruder in the form of a stochastic network, setting the type of partial distributions, the definition of the equivalent function, followed by determining the distribution function delay time packets. The model proposed by the authors allows to evaluate the quality of switching nodes operation under the conditions of “distributed denial of service” intruder attacks, both when transmitting stationary Poisson and self-similar traffic, represented by the Weibull and Pareto flow models. The results obtained are in good agreement with the data given in previously published works. The model allows to analyze and develop directions to improve the quality of functioning of switching nodes of technological network of data transmission under conditions of destructive information impact of the intruder.


Author(s):  
Rajeev Singh ◽  
T. P. Sharma

Distributed Denial of Service (DDoS) attack harms the digital availability in Internet. The user’s perspective of getting quick and effective services may be badly hit by the DDoS attackers. There are several reports of DDoS attack incidences that have caused devastating effects on the user and web services in the Internet world. In the present digital world dominated by wireless, mobile and IoT devices, the numbers of users are increasing day by day. Most of the users are novice and therefore their devices either fell prey to DDoS attacks or unknowingly add themselves to the DDoS attack Army. We soon will witness the 5G mobile revolution but there are reports that 5G networks are also falling prey to DDoS attacks and hence, the realization of DoS attack as a threat needs to be understood. The paper targets to assess the DDoS attack threat. It identifies the impact of attack and also reviews existing Indian laws.


2021 ◽  
Author(s):  
Davi Alves

Bandwidth depletion Denial-of-Service (DoS) attack can impact the propagation of a mined block in the Bitcoin blockchain network. On Bitcoin Proof-of-Work (PoW) consensus several machines try to resolve an expensive cryptographic puzzle faster than anyone else and succeed to mine a valid block. Despite a DoS attack impedes one machine to propagate its mined block allowing it to become valid for most peers, there will be several other peers to resolve the puzzle in time, hence the blockchain will continue to grow. However, from the perspective of the owner of the attacked machine, this can be critical because it will not receive a mining reward. This chapter covers such an attack in the Lisk blockchain that utilizes the Delegated Proof of Stake (DPoS) consensus mechanism. A mitigation strategy was created based on two tools that I have created allowing a delegate account to be configured in more than one node, allowing to forge a block even when one of its nodes is under DoS attack. Also, the transaction flood DoS attack is explored, and a mitigation strategy was created for a specific sidechain in the Lisk ecosystem. The mitigation strategy identifies spam transactions and rejects them to be included on the Lisk nodes transaction pool, hence they will not be propagated into the blockchain. Towards the end, I evaluated scenarios and mitigation strategies created for each attack demonstrating solutions for several scenarios.


Author(s):  
Trung Q. Duong ◽  
Hans-Jürgen Zepernick

This chapter will therefore present some new results for the cross-layer design for packet data transmission applied to co-located MIMO with maximum ratio transmission. In this context, closed-form expressions for the average packet error rate, average achievable spectral efficiency, and outage probability are derived. This enables one to evaluate the performance of the cross-layer design under predetermined delay and packet loss constraints. Some important results in the high Signal-to-Noise Ratio (SNR) regime are also provided, revealing insights on how system and channel parameters affect system performance. More importantly, a mathematical analysis is proved to be a powerful tool to investigate the impact of practical issues such as channel estimation error, feedback delay, antenna correlation, and rank-deficient MIMO channel matrix, on the performance of cross-layer design.


Sign in / Sign up

Export Citation Format

Share Document