Detection of Network Layer Attacks in Wireless Sensor Network

  • V.Gowtami Annapurna
  • K. Anusha
  • CH. Kamala Varsha
  • M. Deepthi
  • G. Keerthi

Abstract

The Wireless Sensor Network (WSN) technology is being used in a huge number of monitoring applications. It consists of a large number of sensor nodes with limited battery life. These sensor devices are deployed randomly in a sensor zone to collect the data. But these are threatened and attacked by several malicious behaviors caused by some nodes, which result in security attacks. Several security attacks occur in different layers of the wireless sensor network. Due to these attacks, confidential information can be stolen by attackers or unauthorized users, which can cause several problems for authorized users. Cyber-attacks by sending large data packets that deplete computer network service resources by using multiple computers when attacking are called wormhole and Sybil attacks. It is important to identify these attacks to prevent further damage. To overcome these problems, we use a prediction module that consists of various machine learning algorithms to find the best-performing algorithm. we use XGBoost, Adaboost, Random Forest, and KNN algorithms. To train these algorithms, we have used the WHASA dataset which contains 10 different attacks of the VANET environment and benign (normal) class. By using these algorithms classification of attacks can be done which occur on the computer network service that is " normal " access or access under " attack " by Wormhole and Sybil attack as an output.

Keywords: Wireless Sensor Network, XGBOOST, Adaboost, Random Forest, and KNN

Downloads

Download data is not yet available.

References

[1]. Pinar, Yasaroglu, et al. "Wireless sensor networks (WSNs)." 2016 IEEE Long Island Systems, Applications and Technology Conference (LISAT). IEEE, 2016 DOI:
10.1109/LISAT.2016.7494144.
[2]. Vikhyath, K. B., and S. H. Brahmanand. "Wireless sensor networks security issues and challenges: A survey." Int. J. Eng. Technol 7.2 (2018): 89-94 DOI:10.14419/ijet.v7i2.33.13861.
[3]. Panicker, Athira V., and G. Jisha. "Network layer attacks and protection in MANETA survey." International Journal of Computer Science and Information Technologies 5.3 (2014): 3437-3443.
[4]. Shruthi, N., and C. K. Vinay. "Network layer attack: Analysis & solutions a survey." IOSR Journal of Computer Engineering 18.2 (2016): 67-80 DOI:10.9790/0661-18020.
[5]. Gawali, Sanjana et al. “Intrusion Detection Using Hidden Markov Model and XGBoost Algorithm.” International Journal of Scientific Research in Computer Science, Engineering and Information Technology (2020): n. pag 2456-3307 DOI:10.32628/CSEIT206287.

[6]. Li, Wenchao, et al. "A new intrusion detection system based on KNN classification algorithm in wireless sensor network." Journal of Electrical and Computer Engineering 2014 (2014) https://doi.org/10.1155/2014/240217.
[7]. Anitha, A. Arul, and L. Arockiam. "Ada-IDS: AdaBoost Intrusion Detection System for ICMPv6 based Attacks in Internet of Things." International Journal of Advanced Computer Science and Applications 12.11 (2021) (DOI) : 10.14569/IJACSA.2021.0121156.
[8]. Song, Yan, et al. "A method of intrusion detection based on woa-xgboost algorithm." Discrete Dynamics in Nature and Society 2022 (2022) https://doi.org/10.1155/2022/5245622.
[9]. Rampaul, Deepak, Rajeev Kumar Patial, and Dilip Kumar. "Detection of DoS attack in VANETs." Indian Journal of Science and Technology 9.47 (2016): 1-6 DOI: 10.17485/ijst/2016/v9i47/106865.
[10]. Dwivedi, Rajendra Kumar, Prachi Sharma, and Rakesh Kumar. "Detection and prevention analysis of wormhole attack in wireless sensor network." 2018 8th international conference on cloud computing, data science & engineering (confluence). IEEE, 2018 DOI:10.1109/CONFLUENCE.2018.8442601.
[11]. Chen, Liguo, et al. "Detection of dns ddos attacks with random forest algorithm on spark." Procedia computer science 134 (2018): 310-315 https://doi.org/10.1016/j.procs.2018.07.177.
[12]. Ren, Qiong, Hui Cheng, and Hai Han. "Research on machine learning framework based on random forest algorithm." AIP conference proceedings. Vol. 1820. No. 1. AIP Publishing LLC, 2017 https://doi.org/10.1063/1.4977376.
[13]. Xiao, P.; Li, Z.; Qi, H.; Qu, W.; Yu, H. “An Efficient wormhole and sybil Detection with Bloom Filter in VANET”. IEEE Trustcom/BigDataSE/ISPA, Tianjin, China, 23–26 August 2016; pp. 1–6. doi:10.1109/TrustCom.2016.0038.
Statistics
0 Views | 0 Downloads
How to Cite
Annapurna, V., Anusha, K., Varsha, C. K., Deepthi, M., & Keerthi, G. (2023). Detection of Network Layer Attacks in Wireless Sensor Network. Asian Journal For Convergence In Technology (AJCT) ISSN -2350-1146, 9(1), 42-48. https://doi.org/10.33130/AJCT.2023v09i01.009