An Efficient Routing Approach for Detection of Syn Flooding Attacks in Wireless Sensor Networks

Sasilatha, T. and Balaji, S. and Kumar, P. Suresh Mohan (2018) An Efficient Routing Approach for Detection of Syn Flooding Attacks in Wireless Sensor Networks. EAI Endorsed Transactions on Energy Web, 5 (20): e7. ISSN 2032-944X

[img]
Preview
Text
eai.12-9-2018.155562.pdf - Published Version
Available under License Creative Commons Attribution No Derivatives.

Download (1MB) | Preview

Abstract

In wireless environment researches on security issues in various layering level of the networks are focused recent times. One of the major issue is denial of service attacks. This paper mainly deals with the detection of syn flooding attacks which is one form of denial of service attacks in wireless sensor networks. It is a type of attack done by the attacker to a specific server to down them by flooding the requests. So, the server will be busy waiting for the requests created by the attacker. In view to this attack an efficient routing approach by distance-2 dominating set is proposed to exhibit the plan of clustering the nodes in the network for effective data transmission. The traffic limit method is used to monitor the bandwidth usage of the nodes concerned in the network to find the flooding attacks in real time event detection environment. The test cases are implemented using network simulation tool. The outcomes discussed about here are to demonstrate the packet delivery ratio, end-to-end delay and the bandwidth usage by the malicious nodes which will be high of the various other authorized nodes in the system.

Item Type: Article
Uncontrolled Keywords: Network security, denial of service, syn flooding, domination set, wireless sensor networks
Subjects: Q Science > QA Mathematics > QA75 Electronic computers. Computer science
QA75 Electronic computers. Computer science
Depositing User: EAI Editor II.
Date Deposited: 22 Sep 2020 13:47
Last Modified: 22 Sep 2020 13:47
URI: https://eprints.eudl.eu/id/eprint/543

Actions (login required)

View Item View Item