FBDR-Fuzzy Based DDoS Attack Detection and Recovery Mechanism for Wireless Sensor Networks
نویسندگان
چکیده
Wireless sensor networks (WSN) is considered as one of the exploring technology for its deployment massive number dedicated nodes which sense environment and collect data. The collected data are sent to sink node through intermediate nodes. Since sensors exposed internet, there a possibility vulnerability in WSN. common attack that affects most Distributed Denial Services (DDoS) attack. This paper aims identify DDoS (Flooding) quickly recover using fuzzy logic mechanism. Fuzzy based Detection Recovery mechanism (FBDR) uses type 1 detect occurrence node. Similarly fuzzy- 2 used recovery from Both fuzzy-based rule perform well terms identifying under It also helps reduce energy consumption each improves lifetime network. proposed FBDR scheme compared with other related existing schemes. method saves usage by up 20% experimental results represent works better than similar
منابع مشابه
Information Warfare-Worthy Jamming Attack Detection Mechanism for Wireless Sensor Networks Using a Fuzzy Inference System
The proposed mechanism for jamming attack detection for wireless sensor networks is novel in three respects: firstly, it upgrades the jammer to include versatile military jammers; secondly, it graduates from the existing node-centric detection system to the network-centric system making it robust and economical at the nodes, and thirdly, it tackles the problem through fuzzy inference system, as...
متن کاملDDOS Attack Detection on Wireless Sensor Network: A Review
In this sense, DoS, especially DDoS, not only threatens the Internet, but also threatens the civil security, due to its prevalent usage in cyber-crimes. Thus to understand well the characteristics of DDoS problems and investigate corresponding defense mechanisms have significant contributions not only for academia and industry, but also for the social security and emergency management agencies,...
متن کاملHash Based Sinkhole Attack Detection Scheme For Wireless Sensor Networks
This paper investigates one of the most severe routing attacks in sensor networks, namely sinkhole attack. A compromised node tries to draw all or as much traffic as possible from a particular area, by making it look attractive to the surrounding nodes with respect to the underlying routing metric. The detection of sinkhole attack in wireless sensor networks is proposed using an enhanced double...
متن کاملAn Adaptive LEACH-based Clustering Algorithm for Wireless Sensor Networks
LEACH is the most popular clastering algorithm in Wireless Sensor Networks (WSNs). However, it has two main drawbacks, including random selection of cluster heads, and direct communication of cluster heads with the sink. This paper aims to introduce a new centralized cluster-based routing protocol named LEACH-AEC (LEACH with Adaptive Energy Consumption), which guarantees to generate balanced cl...
متن کاملDistributed and Cooperative Compressive Sensing Recovery Algorithm for Wireless Sensor Networks with Bi-directional Incremental Topology
Recently, the problem of compressive sensing (CS) has attracted lots of attention in the area of signal processing. So, much of the research in this field is being carried out in this issue. One of the applications where CS could be used is wireless sensor networks (WSNs). The structure of WSNs consists of many low power wireless sensors. This requires that any improved algorithm for this appli...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Wireless Personal Communications
سال: 2021
ISSN: ['1572-834X', '0929-6212']
DOI: https://doi.org/10.1007/s11277-021-09040-8