Classification of DoS Attacks in Smart Underwater Wireless Sensor Network

被引:0
|
作者
Bilal Ahmad
Wang Jian
Rabia Noor Enam
Ali Abbas
机构
[1] Nanjing University of Aeronautics and Astronautics,Department of Computer Science and Technology
[2] Sir Syed University of Engineering and Technology,Department of Computer Science
[3] Middle East College,Department of Computing
来源
关键词
Smart underwater wireless sensor network; LEACH protocol; DoS attacks; Underwater communication;
D O I
暂无
中图分类号
学科分类号
摘要
Due to deployment in sensitive military areas and other security applications, wireless networks are becoming a famous research spot in the field of computer science. To ratify the security and reliability in such kinds of application intrusion detection system can play an important role. There is a need of intrusion detection system, which has the capability to detect a large number of possible threats in wireless sensor networks. This article contains a customized dataset for smart underwater wireless sensor network that can be categorized into four types of DoS attacks (Blackhole, Grayhole, Flooding and Scheduling attacks). For the experimental purpose, since it is highly used in WSN, Low Energy Aware Cluster Hierarchy protocol has been used in this research work. Vector based forwarding provide scalable routing protocol to deploy smart underwater wireless sensor network. Using NS2 network simulator model a scheme has been defined to collect network traffic and create the dataset. Artificial Neural Network has been applied to train the dataset to classify it into different DoS attacks. Experimental work performed here gives high classification rate and accuracy for mentioning attacks with the help of proposed dataset. In future, suggested method can be useful for more attacks like Sybil/Wormhole presented in datalink layer as DoS attacks.
引用
收藏
页码:1055 / 1069
页数:14
相关论文
共 50 条
  • [1] Classification of DoS Attacks in Smart Underwater Wireless Sensor Network
    Ahmad, Bilal
    Jian, Wang
    Enam, Rabia Noor
    Abbas, Ali
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2021, 116 (02) : 1055 - 1069
  • [2] An Effective Classification for DoS Attacks in Wireless Sensor Networks
    Thi-Thu-Huong Le
    Park, Taehwan
    Cho, Dongkeun
    Kim, Howon
    [J]. 2018 TENTH INTERNATIONAL CONFERENCE ON UBIQUITOUS AND FUTURE NETWORKS (ICUFN 2018), 2018, : 683 - 686
  • [3] Firmware-Based DoS Attacks in Wireless Sensor Network
    Phi Tuong Lau
    Katzenbeisser, Stefan
    [J]. COMPUTER SECURITY. ESORICS 2023 INTERNATIONAL WORKSHOPS, CPS4CIP, PT II, 2024, 14399 : 214 - 232
  • [4] Smart Decision Making for Internal Attacks in Wireless Sensor Network
    Ahmed, Muhammad R.
    Huang, Xu
    Cui, Hongyan
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2012, 12 (12): : 15 - 23
  • [5] Smart Plankton: a Nature Inspired Underwater Wireless Sensor Network
    Anguita, Davide
    Brizzolara, Davide
    Ghio, Alessandro
    Parodi, Giancarlo
    [J]. ICNC 2008: FOURTH INTERNATIONAL CONFERENCE ON NATURAL COMPUTATION, VOL 7, PROCEEDINGS, 2008, : 701 - 705
  • [6] A Scrutinized study on DoS attacks in Wireless Sensor Networks and need of SDN in Mitigating DoS attacks
    Sarkunavathi, A.
    Srinivasan, V
    [J]. 2021 INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND INFORMATICS (ICCCI), 2021,
  • [7] Performance evaluation of deep learning techniques for DoS attacks detection in wireless sensor network
    Salmi, Salim
    Oughdir, Lahcen
    [J]. JOURNAL OF BIG DATA, 2023, 10 (01)
  • [8] Insider DoS Attacks on Epidemic Propagation Strategies of Network Reprogramming in Wireless Sensor Networks
    Zhang, Yu
    Zhou, Xing She
    Law, Yee Wei
    Palaniswami, Marimuthu
    [J]. FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 263 - +
  • [9] Performance evaluation of deep learning techniques for DoS attacks detection in wireless sensor network
    Salim Salmi
    Lahcen Oughdir
    [J]. Journal of Big Data, 10
  • [10] Survivability Evaluation of Cluster-Based Wireless Sensor Network under DoS Attacks
    Jiang Zhongqiu
    Yan Shu
    Wang Liangmin
    [J]. 2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8, 2009, : 3117 - 3120