GA-DoSLD: Genetic Algorithm Based Denial-of-Sleep Attack Detection in WSN

Denial-of-sleep (DoSL) attack is a special category of denial-of-service attack that prevents the battery powered sensor nodes from going into the sleep mode, thus affecting the network performance. The existing schemes used for the DoSL attack detection do not provide an optimal energy conservation and key pairing operation. Hence, in this paper, an efficient Genetic Algorithm (GA) based denial-of-sleep attack detection (GA-DoSLD) algorithm is suggested for analyzing the misbehaviors of the nodes. The suggested algorithm implements a Modified-RSA (MRSA) algorithm in the base station (BS) for generating and distributing the key pair among the sensor nodes. Before sending/receiving the packets, the sensor nodes determine the optimal route using Ad Hoc On-Demand Distance Vector Routing (AODV) protocol and then ensure the trustworthiness of the relay node using the fitness calculation. The crossover and mutation operations detect and analyze the methods that the attackers use for implementing the attack. On determining an attacker node, the BS broadcasts the blocked information to all the other sensor nodes in the network. Simulation results prove that the suggested algorithm is optimal compared to the existing algorithms such as X-MAC, ZKP, and TE2P schemes.

[1]  Ron,et al.  The RSA Algorithm , 2009 .

[2]  John Zic,et al.  A confidential and DoS-resistant multi-hop code dissemination protocol for wireless sensor networks , 2009, WiSec '09.

[3]  John Zic,et al.  A confidential and DoS-resistant multi-hop code dissemination protocol for wireless sensor networks , 2013, Comput. Secur..

[4]  Tae Ho Cho,et al.  Energy efficient method for detection and prevention of false reports in wireless sensor networks , 2012, 2012 8th International Conference on Information Science and Digital Content Technology (ICIDT2012).

[5]  G. A. Vijayalakshmi Pai,et al.  Swarm intelligence based approach for sinkhole attack detection in wireless sensor networks , 2014, Appl. Soft Comput..

[6]  Ming Zhao,et al.  Modeling and Analytical Study of Link Properties in Multihop Wireless Networks , 2012, IEEE Transactions on Communications.

[7]  Jalel Ben-Othman,et al.  Preventing Denial of Service attacks in Wireless Sensor Networks , 2015, 2015 IEEE International Conference on Communications (ICC).

[8]  Shahaboddin Shamshirband,et al.  Cooperative game theoretic approach using fuzzy Q-learning for detecting and preventing intrusions in wireless sensor networks , 2014, Eng. Appl. Artif. Intell..

[9]  Jalel Ben-Othman,et al.  Detecting DoS attacks in WSN based on clustering technique , 2013, 2013 IEEE Wireless Communications and Networking Conference (WCNC).

[10]  Guangjie Han,et al.  IDSEP: a novel intrusion detection scheme based on energy prediction in cluster-based wireless sensor networks , 2013, IET Inf. Secur..

[11]  Scott F. Midkiff,et al.  Effects of Denial-of-Sleep Attacks on Wireless Sensor Network MAC Protocols , 2009, IEEE Transactions on Vehicular Technology.

[12]  Yen-Chieh Ouyang,et al.  A Secure Scheme Against Power Exhausting Attacks in Hierarchical Wireless Sensor Networks , 2015, IEEE Sensors Journal.

[13]  X. Wang,et al.  Time-division secret key protocol for wireless sensor networking , 2011, IET Commun..

[14]  V. C. Manju,et al.  Mechanisms for detecting and preventing denial of sleep attacks on wireless sensor networks , 2013, 2013 IEEE CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES.

[15]  Chun Chen,et al.  DiCode: DoS-Resistant and Distributed Code Dissemination in Wireless Sensor Networks , 2012, IEEE Transactions on Wireless Communications.

[16]  G. Padmavathi,et al.  Detecting Sinkhole Attack in Wireless Sensor Network using Enhanced Particle Swarm Optimization Technique , 2016 .

[17]  Narendra Shekokar,et al.  Conservation of Energy in Wireless Sensor Network by Preventing Denial of Sleep Attack , 2015 .

[18]  Steven Furnell,et al.  D-FICCA: A density-based fuzzy imperialist competitive clustering algorithm for intrusion detection in wireless sensor networks , 2014 .

[19]  Simerpreet Kaur,et al.  Securing the Wireless Sensor Network from Denial of Sleep attack by isolating the Nodes , 2014 .

[20]  Abbas Javed,et al.  Random Neural Network Based Intelligent Intrusion Detection for Wireless Sensor Networks , 2016, ICCS.

[21]  Ijcsis Detection of Stealthy Denial of Service (S-DoS) Attacks in Wireless Sensor Networks , 2016 .