A Novel IDS to Detect Multiple DoS Attacks with Network Lifetime Estimation Based on Learning-Based Energy Prediction Algorithm for Hierarchical WSN

Lifetime of sensor network plays a crucial part in designing any WSN-based application. On the other hand, securing them against malicious activity is also important. Security and lifetime should work hand in hand to protect and conserve the network. For example, imparting any security solution should not decrease WSN’s lifetime. Thus, a novel energy prediction algorithm is developed and deployed in WSN structure that can actively look and report for any adversaries present within the network and can also report the network’s lifetime stating the remaining amount of time the network can work perfectly without losing its energy. The key idea is that by retrieving the residual energy of the nodes at an instance of time, the proposed algorithm can predict its energy consumption at various other time instances; in such a way how long the nodes can stay alive is predicted. Moreover, we observe that different types of DoS attack consume abnormal amount of energy; by predicting its energy consumption at various instances and comparing with its actual energy consumption, attacks can be identified and classified. This novel mechanism can look for and detect 5 types of DoS attacks at a time. By formulating the network’s lifetime, the design of WSN can be optimized according to the application requirements. Detailed performance analysis is done using NS-2 Mannasim framework. Simulation studies are done under various scenarios to prove its efficiency and accuracy.

[1]  Wendi Heinzelman,et al.  Energy-efficient communication protocol for wireless microsensor networks , 2000, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences.

[2]  Pallavi Sharma,et al.  An approach to defend against wormhole attack in ad hoc network using digital signature , 2011, 2011 IEEE 3rd International Conference on Communication Software and Networks.

[3]  Bo Yu,et al.  CHEMAS: Identify suspect nodes in selective forwarding attacks , 2007, J. Parallel Distributed Comput..

[4]  Meng-Yen Hsieh,et al.  Adaptive security design with malicious node detection in cluster-based sensor networks , 2007, Comput. Commun..

[5]  Issa M. Khalil,et al.  UnMask: Utilizing neighbor monitoring for attack mitigation in multihop wireless sensor networks , 2010, Ad Hoc Networks.

[6]  Rodrigo Roman,et al.  On the Vital Areas of Intrusion Detection Systems in Wireless Sensor Networks , 2013, IEEE Communications Surveys & Tutorials.

[7]  Yau-Hwang Kuo,et al.  eHIP: An energy-efficient hybrid intrusion prohibition system for cluster-based wireless sensor networks , 2007, Comput. Networks.

[8]  Yi-hua Zhu,et al.  An Ant Colony System Based Energy Prediction Routing Algorithms for Wireless Sensor Networks , 2008, 2008 4th International Conference on Wireless Communications, Networking and Mobile Computing.

[9]  Ivan Stojmenović,et al.  Handbook of Sensor Networks: Algorithms and Architectures , 2005, Handbook of Sensor Networks.

[10]  Theodore B. Zahariadis,et al.  Mobile Networks Trust management in wireless sensor networks , 2010, Eur. Trans. Telecommun..

[11]  Pooya Moradian Zadeh,et al.  A Bayesian Game Approach for Preventing DoS Attacks in Wireless Sensor Networks , 2009, 2009 WRI International Conference on Communications and Mobile Computing.

[12]  Guangjie Han,et al.  IDSEP: a novel intrusion detection scheme based on energy prediction in cluster-based wireless sensor networks , 2013, IET Inf. Secur..