ew 18(20): e7

Research Article

An Efficient Routing Approach for Detection of Syn Flooding Attacks in Wireless Sensor Networks

Download1042 downloads
  • @ARTICLE{10.4108/eai.12-9-2018.155562,
        author={Dr. T. Sasilatha and S. Balaji and Dr. P. Suresh Mohan Kumar},
        title={An Efficient Routing Approach for Detection of Syn Flooding Attacks in Wireless Sensor Networks},
        journal={EAI Endorsed Transactions on Energy Web and Information Technologies},
        volume={5},
        number={20},
        publisher={EAI},
        journal_a={EW},
        year={2018},
        month={9},
        keywords={Network security, denial of service, syn flooding, domination set, wireless sensor networks.},
        doi={10.4108/eai.12-9-2018.155562}
    }
    
  • Dr. T. Sasilatha
    S. Balaji
    Dr. P. Suresh Mohan Kumar
    Year: 2018
    An Efficient Routing Approach for Detection of Syn Flooding Attacks in Wireless Sensor Networks
    EW
    EAI
    DOI: 10.4108/eai.12-9-2018.155562
Dr. T. Sasilatha1,*, S. Balaji2, Dr. P. Suresh Mohan Kumar3
  • 1: Dean, Department of EEE, AMET Deemed to be University, Chennai, Tamilnadu, INDIA – 603112.
  • 2: Asst. Prof, CSE Department, Panimalar Engineering College, Chennai, Tamilnadu, INDIA – 600123.
  • 3: Professor and Dean, DMI College of Engineering, Chennai, Tamilnadu, INDIA – 600123.
*Contact email: sasi_saha@yahoo.com

Abstract

In wireless environment researches on security issues in various layering level of the networks are focused recent times. One of the major issue is denial of service attacks. This paper mainly deals with the detection of syn flooding attacks which is one form of denial of service attacks in wireless sensor networks. It is a type of attack done by the attacker to a specific server to down them by flooding the requests. So, the server will be busy waiting for the requests created by the attacker. In view to this attack an efficient routing approach by distance-2 dominating set is proposed to exhibit the plan of clustering the nodes in the network for effective data transmission. The traffic limit method is used to monitor the bandwidth usage of the nodes concerned in the network to find the flooding attacks in real time event detection environment. The test cases are implemented using network simulation tool. The outcomes discussed about here are to demonstrate the packet delivery ratio, end-to-end delay and the bandwidth usage by the malicious nodes which will be high of the various other authorized nodes in the system.