Classification of DoS Attacks in Smart Underwater Wireless Sensor Network

Due to deployment in sensitive military areas and other security applications, wireless networks are becoming a famous research spot in the field of computer science. To ratify the security and reliability in such kinds of application intrusion detection system can play an important role. There is a need of intrusion detection system, which has the capability to detect a large number of possible threats in wireless sensor networks. This article contains a customized dataset for smart underwater wireless sensor network that can be categorized into four types of DoS attacks (Blackhole, Grayhole, Flooding and Scheduling attacks). For the experimental purpose, since it is highly used in WSN, Low Energy Aware Cluster Hierarchy protocol has been used in this research work. Vector based forwarding provide scalable routing protocol to deploy smart underwater wireless sensor network. Using NS2 network simulator model a scheme has been defined to collect network traffic and create the dataset. Artificial Neural Network has been applied to train the dataset to classify it into different DoS attacks. Experimental work performed here gives high classification rate and accuracy for mentioning attacks with the help of proposed dataset. In future, suggested method can be useful for more attacks like Sybil/Wormhole presented in datalink layer as DoS attacks.

[1]  Wendi Heinzelman,et al.  Energy-efficient communication protocol for wireless microsensor networks , 2000, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences.

[2]  Gerhard P. Hancke,et al.  Opportunities and Challenges of Wireless Sensor Networks in Smart Grid , 2010, IEEE Transactions on Industrial Electronics.

[3]  Shu-Chin Wang,et al.  An Integrated Intrusion Detection System for Cluster-based Wireless Sensor Networks , 2011, Expert Syst. Appl..

[4]  Anazida Zainal,et al.  A Survey of Intrusion Detection Schemes in Wireless Sensor Networks , 2012 .

[5]  N. Marriwala,et al.  An approach to increase the wireless sensor network lifetime , 2012, 2012 World Congress on Information and Communication Technologies.

[6]  Hoon Oh,et al.  An Encryption Based Black Hole Detection Mechanism in Mobile Ad Hoc Networks , 2013 .

[7]  Valerio Formicola,et al.  Enhancing Intrusion Detection in Wireless Sensor Networks through Decision Trees , 2013, EWDC.

[8]  Neeraj Kumar,et al.  A systematic review on clustering and routing techniques based upon LEACH protocol for wireless sensor networks , 2013, J. Netw. Comput. Appl..

[9]  Luc Van Gool,et al.  The Pascal Visual Object Classes Challenge: A Retrospective , 2014, International Journal of Computer Vision.

[10]  Rupinder Kaur,et al.  REVIEW OF BLACK HOLE AND GREY HOLE ATTACK , 2014 .

[11]  Ravi Sankar,et al.  A Survey of Intrusion Detection Systems in Wireless Sensor Networks , 2014, IEEE Communications Surveys & Tutorials.

[12]  Sudhir Kumar Sharma,et al.  Analysis of KDD Dataset Attributes - Class wise for Intrusion Detection , 2015 .

[13]  Yiming Miao,et al.  Cluster-Head Election Algorithm for Wireless Sensor Networks Based on LEACH Protocol , 2015 .

[14]  Sangita Chaudhari,et al.  DoS Attack Prevention Technique in Wireless Sensor Networks , 2016 .

[15]  S. Jangir,et al.  A comprehensive review on detection of wormhole attack in MANET , 2016, 2016 International Conference on ICT in Business Industry & Government (ICTBIG).

[16]  Najma Ismat,et al.  Connectivity and Coverage Based Grid-Cluster Size Calculation in Wireless Sensor Networks , 2017, Wirel. Pers. Commun..

[17]  Shakil Ahmed,et al.  A Survey of Energy Conservation Mechanisms for Dynamic Cluster Based Wireless Sensor Networks , 2018 .