Himani Sharma, B. Shajahan, Rajesh Elangovan, Manikandan Thirumalaisamy
{"title":"无线传感器网络中的DoS攻击检测机制","authors":"Himani Sharma, B. Shajahan, Rajesh Elangovan, Manikandan Thirumalaisamy","doi":"10.56294/saludcyt2022244","DOIUrl":null,"url":null,"abstract":"Wireless sensor networks (WSNs) are not like traditional networks in terms of their characteristics. Unlike WSN, in classic networks, networking mechanisms have decision-making power with reference to the management of an incoming packet only based on its internet protocol (IP) destination address. Assailant nodes can activate a denial of service (DoS) attack after entering the network. This research work focuses on tracing these collusive nodes by applying a trust-based scheme. The trust-based scheme includes measuring the degree of trust among all nodes. Nodes with minimum trust are designated as malicious nodes. Trust is measured based on the overall packets transferred during the time slot allotted. The node forwarding maximal packets and exploiting minimal assists will be tagged as malicious. The nascent architecture was deployed in NS2, and the outcomes were analysed based on particular performance metrics. To calculate trust, the overall packets forwarded by nodes in the allotted slot were considered. The node that transmits the largest number of packets and uses negligible assets was declared a vindictive node. This task implementation presents the approach in the NS2 software and analyses the results based on certain metrics.","PeriodicalId":184806,"journal":{"name":"Salud Ciencia y Tecnología","volume":"15 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"DoS Attack Detection Mechanism in Wireless Sensor Networks\",\"authors\":\"Himani Sharma, B. Shajahan, Rajesh Elangovan, Manikandan Thirumalaisamy\",\"doi\":\"10.56294/saludcyt2022244\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Wireless sensor networks (WSNs) are not like traditional networks in terms of their characteristics. Unlike WSN, in classic networks, networking mechanisms have decision-making power with reference to the management of an incoming packet only based on its internet protocol (IP) destination address. Assailant nodes can activate a denial of service (DoS) attack after entering the network. This research work focuses on tracing these collusive nodes by applying a trust-based scheme. The trust-based scheme includes measuring the degree of trust among all nodes. Nodes with minimum trust are designated as malicious nodes. Trust is measured based on the overall packets transferred during the time slot allotted. The node forwarding maximal packets and exploiting minimal assists will be tagged as malicious. The nascent architecture was deployed in NS2, and the outcomes were analysed based on particular performance metrics. To calculate trust, the overall packets forwarded by nodes in the allotted slot were considered. The node that transmits the largest number of packets and uses negligible assets was declared a vindictive node. This task implementation presents the approach in the NS2 software and analyses the results based on certain metrics.\",\"PeriodicalId\":184806,\"journal\":{\"name\":\"Salud Ciencia y Tecnología\",\"volume\":\"15 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-12-31\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Salud Ciencia y Tecnología\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.56294/saludcyt2022244\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Salud Ciencia y Tecnología","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.56294/saludcyt2022244","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
摘要
无线传感器网络(WSNs)的特点与传统网络不同。与WSN不同的是,在经典网络中,网络机制仅根据IP目的地址对传入数据包进行管理,从而具有决策能力。攻击节点进入网络后,可以启动DoS (denial of service)攻击。本研究的重点是通过应用基于信任的方案来跟踪这些串通节点。基于信任的方案包括度量所有节点之间的信任程度。具有最小信任的节点被指定为恶意节点。信任是根据分配的时间段内传输的数据包总数来衡量的。转发最大数据包和利用最小辅助的节点将被标记为恶意节点。在NS2中部署了新生的架构,并根据特定的性能指标分析了结果。为了计算信任,考虑分配槽位内节点转发的总体报文。传输数据包数量最多且使用资产可忽略不计的节点被称为报复性节点。本任务实现在NS2软件中展示了该方法,并基于某些指标分析了结果。
DoS Attack Detection Mechanism in Wireless Sensor Networks
Wireless sensor networks (WSNs) are not like traditional networks in terms of their characteristics. Unlike WSN, in classic networks, networking mechanisms have decision-making power with reference to the management of an incoming packet only based on its internet protocol (IP) destination address. Assailant nodes can activate a denial of service (DoS) attack after entering the network. This research work focuses on tracing these collusive nodes by applying a trust-based scheme. The trust-based scheme includes measuring the degree of trust among all nodes. Nodes with minimum trust are designated as malicious nodes. Trust is measured based on the overall packets transferred during the time slot allotted. The node forwarding maximal packets and exploiting minimal assists will be tagged as malicious. The nascent architecture was deployed in NS2, and the outcomes were analysed based on particular performance metrics. To calculate trust, the overall packets forwarded by nodes in the allotted slot were considered. The node that transmits the largest number of packets and uses negligible assets was declared a vindictive node. This task implementation presents the approach in the NS2 software and analyses the results based on certain metrics.