Classification of DoS Attacks in Wireless Sensor Network with Artificial Neural Network

Due to deployment in sensitive military areas and other security applications, wireless networks are becoming a famous research spot in the field of computer science. To ratify the security and reliability in such kinds of application intrusion detection system can play an important role. There is a need of intrusion detection system, which has the capability to detect a large number of possible threats in wireless sensor networks. This article contains a customized dataset for wireless sensor network that can be categorized into four types of DoS attacks (Blackhole, Grayhole, Flooding & Scheduling attacks). For the experimental purpose, since it is highly used in WSN, Low Energy Aware Cluster Hierarchy (LEACH) protocol has been used in this research work. Using NS 2 network simulator to model a scheme which define to collect network traffic and create the dataset. Artificial Neural Network has been applied to train the dataset to classify it into different DoS attacks. Experimental work performed here gives high classification rate and accuracy for mentioning attacks with the help of proposed dataset. In future, suggested method can be useful for more attacks like Sybil/Wormhole presented in datalink layer as DoS attacks.

[1]  Shakil Ahmed,et al.  A Survey of Energy Conservation Mechanisms for Dynamic Cluster Based Wireless Sensor Networks , 2018 .

[2]  Yiming Miao,et al.  Cluster-Head Election Algorithm for Wireless Sensor Networks Based on LEACH Protocol , 2015 .

[3]  Valerio Formicola,et al.  Enhancing Intrusion Detection in Wireless Sensor Networks through Decision Trees , 2013, EWDC.

[4]  Shu-Chin Wang,et al.  An Integrated Intrusion Detection System for Cluster-based Wireless Sensor Networks , 2011, Expert Syst. Appl..

[5]  Ravi Sankar,et al.  A Survey of Intrusion Detection Systems in Wireless Sensor Networks , 2014, IEEE Communications Surveys & Tutorials.

[6]  Jeong-Uk Kim,et al.  Study on Intrusion Detection Policy for Wireless Sensor Networks , 2013 .

[7]  S. Jangir,et al.  A comprehensive review on detection of wormhole attack in MANET , 2016, 2016 International Conference on ICT in Business Industry & Government (ICTBIG).

[8]  Rupinder Kaur,et al.  REVIEW OF BLACK HOLE AND GREY HOLE ATTACK , 2014 .

[9]  Sangita Chaudhari,et al.  DoS Attack Prevention Technique in Wireless Sensor Networks , 2016 .

[10]  Gerhard P. Hancke,et al.  Opportunities and Challenges of Wireless Sensor Networks in Smart Grid , 2010, IEEE Transactions on Industrial Electronics.

[11]  Najma Ismat,et al.  Connectivity and Coverage Based Grid-Cluster Size Calculation in Wireless Sensor Networks , 2017, Wirel. Pers. Commun..

[12]  Wendi Heinzelman,et al.  Energy-efficient communication protocol for wireless microsensor networks , 2000, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences.

[13]  N. Marriwala,et al.  An approach to increase the wireless sensor network lifetime , 2012, 2012 World Congress on Information and Communication Technologies.

[14]  Sudhir Kumar Sharma,et al.  Analysis of KDD Dataset Attributes - Class wise for Intrusion Detection , 2015 .

[15]  Neeraj Kumar,et al.  A systematic review on clustering and routing techniques based upon LEACH protocol for wireless sensor networks , 2013, J. Netw. Comput. Appl..

[16]  Luc Van Gool,et al.  The Pascal Visual Object Classes Challenge: A Retrospective , 2014, International Journal of Computer Vision.

[17]  Anazida Zainal,et al.  A Survey of Intrusion Detection Schemes in Wireless Sensor Networks , 2012 .