Detect and prevent HELLO FLOOD Attack using Centralized technique in WSN

In wireless sensor networks, wirelessly nodes communicate with each other. WSN is a very large array of diverse sensor nodes that are interconnected by a communication network . The battery lifetime of nodes in wireless sensor networks have limited, the focus must always be given to conserve their energy so that they can work for longer duration of time. While some of the attacks such as black hole attack or worm hole attack focus on the dropping the data packets which are being transmitted in the network, other attacks such as hello flood attack focus on consuming up the resources of the network like battery power of the nodes etc. These kind of attacks prove to be very harmful to the network. In wireless sensor network, By the use of LEACH protocol nodes are usually clustered in the groups. This technique is applied in most of the cases to conserve the energy of the nodes. Hello flood attack is one common misbehaving activity which targets the cluster head which are formed in the clusters of the wireless sensor network. This study presents the detection and prevention of hello flood attacks by use cenetralized technique in wireless sensor networks. KeywordsWSN, HELLO Flood Attack , LEACH, Cenetralized technique, clustering,Cluster Head.

[1]  Michele Nogueira Lima,et al.  Detection of sinkhole attacks for supporting secure routing on 6LoWPAN for Internet of Things , 2015, 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM).

[2]  R.B. Ahmad,et al.  TCP SYN flood detection based on payload analysis , 2010, 2010 IEEE Student Conference on Research and Development (SCOReD).

[3]  Chai Kiat Yeo,et al.  Detecting Flooding Attack in Delay Tolerant Networks by Piggybacking Encounter Records , 2015, 2015 2nd International Conference on Information Science and Security (ICISS).

[4]  S. Sharma,et al.  Detection and Prevention of Flooding Attack Using SVM , 2013, 2013 International Conference on Communication Systems and Network Technologies.

[5]  A. Pravin Renold,et al.  Distributed detection of flooding and gray hole attacks in Wireless Sensor Network , 2015, 2015 International Conference on Smart Technologies and Management for Computing, Communication, Controls, Energy and Materials (ICSTM).

[6]  Ismael Ali Ali,et al.  Design and implementation of artificial immune system for detecting flooding attacks , 2011, 2011 International Conference on High Performance Computing & Simulation.

[7]  Krishan Kumar,et al.  Detection of HELLO flood attack on LEACH protocol , 2014, 2014 IEEE International Advance Computing Conference (IACC).

[8]  Jie Wu,et al.  A Novel k-Parent Flooding Tree for Secure and Reliable Broadcasting in Sensor Networks , 2007, 2007 IEEE International Conference on Communications.