Table of Contents Author Guidelines Submit a Manuscript
Security and Communication Networks
Volume 2017, Article ID 9863032, 10 pages
https://doi.org/10.1155/2017/9863032
Research Article

GA-DoSLD: Genetic Algorithm Based Denial-of-Sleep Attack Detection in WSN

1Department of Computer Science and Engineering, NPR College of Engineering and Technology, Tamil Nadu 624001, India
2Department of Information Technology, Kamaraj College of Engineering & Technology, Tamil Nadu, India

Correspondence should be addressed to Mahalakshmi Gunasekaran; moc.liamtoh@51tiimhskalaham

Received 23 July 2016; Accepted 17 November 2016; Published 17 January 2017

Academic Editor: Qing Yang

Copyright © 2017 Mahalakshmi Gunasekaran and Subathra Periakaruppan. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. V. C. Manju, S. L. Senthil Lekha, and M. Sasi Kumar, “Mechanisms for detecting and preventing denial of sleep attacks on wireless sensor networks,” in Proceedings of the IEEE Conference on Information and Communication Technologies (ICT '13), pp. 74–77, Tamil Nadu, India, April 2013. View at Publisher · View at Google Scholar · View at Scopus
  2. D. R. Raymond, R. C. Marchany, M. I. Brownfield, and S. F. Midkiff, “Effects of denial-of-sleep attacks on wireless sensor network MAC protocols,” IEEE Transactions on Vehicular Technology, vol. 58, no. 1, pp. 367–380, 2009. View at Publisher · View at Google Scholar · View at Scopus
  3. R. P. Manohar and E. Baburaj, “Detection of Stealthy Denial of Service (S-DoS) attacks in wireless sensor networks,” International Journal of Computer Science and Information Security (IJCSIS), vol. 14, pp. 343–348, 2016. View at Google Scholar
  4. D. Mansouri, L. Mokddad, J. Ben-Othman, and M. Ioualalen, “Preventing denial of service attacks in wireless sensor networks,” in Proceedings of the IEEE International Conference on Communications (ICC '15), pp. 3014–3019, London, UK, June 2015. View at Publisher · View at Google Scholar · View at Scopus
  5. D. Mansouri, L. Mokdad, J. Ben-Othman, and M. Ioualalen, “Detecting DoS attacks in WSN based on clustering technique,” in Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC '13), pp. 2214–2219, Shanghai, China, April 2013. View at Publisher · View at Google Scholar · View at Scopus
  6. J.-L. Chen, Y.-W. Ma, X. Wang, Y.-M. Huang, and Y.-F. Lai, “Time-division secret key protocol for wireless sensor networking,” Institution of Engineering and Technology Communications, vol. 5, no. 12, pp. 1720–1726, 2011. View at Publisher · View at Google Scholar · View at Scopus
  7. D. He, C. Chen, S. Chan, and J. Bu, “DiCode: DoS-resistant and distributed code dissemination in wireless sensor networks,” IEEE Transactions on Wireless Communications, vol. 11, no. 5, pp. 1946–1956, 2012. View at Publisher · View at Google Scholar · View at Scopus
  8. G. Han, J. Jiang, W. Shen, L. Shu, and J. Rodrigues, “IDSEP: a novel intrusion detection scheme based on energy prediction in cluster-based wireless sensor networks,” IET Information Security, vol. 7, no. 2, pp. 97–105, 2013. View at Publisher · View at Google Scholar · View at Scopus
  9. E. B. Ram Pradheep Manohar, “Detection of stealthy denial of service (S-DoS) attacks in wireless sensor networks,” International Journal of Computer Science and Information Security (IJCSIS), vol. 14, 2016. View at Google Scholar
  10. H. Tan, D. Ostry, J. Zic, and S. Jha, “A confidential and DoS-resistant multi-hop code dissemination protocol for wireless sensor networks,” Computers & Security, vol. 32, pp. 36–55, 2013. View at Publisher · View at Google Scholar · View at Scopus
  11. S. M. Nam and T. H. Cho, “Energy efficient method for detection and prevention of false reports in wireless sensor networks,” in Proceedings of the 8th International Conference on Information Science and Digital Content Technology (ICIDT '12), pp. 766–769, Jeju Island, South Korea, June 2012. View at Scopus
  12. S. Naik and N. Shekokar, “Conservation of energy in wireless sensor network by preventing denial of sleep attack,” Procedia Computer Science, vol. 45, pp. 370–379, 2015. View at Publisher · View at Google Scholar
  13. C.-T. Hsueh, C.-Y. Wen, and Y.-C. Ouyang, “A secure scheme against power exhausting attacks in hierarchical wireless sensor networks,” IEEE Sensors Journal, vol. 15, no. 6, pp. 3590–3602, 2015. View at Publisher · View at Google Scholar · View at Scopus
  14. S. Kaur and M. Ataullah, “Securing the wireless sensor network from denial of sleep attack by isolating the nodes,” International Journal of Computer Applications, vol. 103, no. 1, pp. 29–33, 2014. View at Publisher · View at Google Scholar
  15. S. Shamshirband, A. Amini, N. B. Anuar, M. L. Mat Kiah, Y. W. Teh, and S. Furnell, “D-FICCA: a density-based fuzzy imperialist competitive clustering algorithm for intrusion detection in wireless sensor networks,” Measurement, vol. 55, pp. 212–226, 2014. View at Publisher · View at Google Scholar · View at Scopus
  16. S. Shamshirband, A. Patel, N. B. Anuar, M. L. M. Kiah, and A. Abraham, “Cooperative game theoretic approach using fuzzy Q-learning for detecting and preventing intrusions in wireless sensor networks,” Engineering Applications of Artificial Intelligence, vol. 32, pp. 228–241, 2014. View at Publisher · View at Google Scholar · View at Scopus
  17. N. K. Sreelaja and G. A. Vijayalakshmi Pai, “Swarm intelligence based approach for sinkhole attack detection in wireless sensor networks,” Applied Soft Computing Journal, vol. 19, pp. 68–79, 2014. View at Publisher · View at Google Scholar · View at Scopus
  18. G. Keerthana and G. Padmavathi, “Detecting sinkhole attack in wireless sensor network using enhanced particle swarm optimization technique,” International Journal of Security and Its Applications, vol. 10, no. 3, pp. 41–54, 2016. View at Publisher · View at Google Scholar
  19. A. Saeed, A. Ahmadinia, A. Javed, and H. Larijani, “Random neural network based intelligent intrusion detection for wireless sensor networks,” Procedia Computer Science, vol. 80, pp. 2372–2376, 2016. View at Publisher · View at Google Scholar
  20. D. Management, “RSA Algorithm,” 2016, http://www.di-mgt.com.au/rsa_alg.html.
  21. M. Zhao, Y. Li, and W. Wang, “Modeling and analytical study of link properties in multihop wireless networks,” IEEE Transactions on Communications, vol. 60, no. 2, pp. 445–455, 2012. View at Publisher · View at Google Scholar · View at Scopus
  22. C.-T. Hsueh, C.-Y. Wen, and Y.-C. Ouyang, “A secure scheme against power exhausting attacks in hierarchical wireless sensor networks,” IEEE Sensors Journal, vol. 15, no. 6, pp. 3590–3602, 2015. View at Publisher · View at Google Scholar · View at Scopus
  23. D. N. S. Swapna Naik, “Conservation of energy in wireless sensor network by preventing denial of sleep attack,” in Proceedings of the International Conference on Advanced Computing Technologies and Applications (ICACTA '15), pp. 370–379, Mumbai, India, March 2015. View at Publisher · View at Google Scholar · View at Scopus