Total views : 206

Recognition and Handling of Insider and Outsider DDOS Attacks in WSN


  • CSE, SBSSTC, Ferozepur – 152004, Punjab, India
  • IKGPTU Main Campus, Kapurthala – 144603, Punjab, India
  • SBSSTC, Ferozepur – 152004, Punjab, India


Objectives: Recognition and Handling of Insider and Outsider DDoS attacks are very important in WSN. Various schemes have been proposed in the past to fight against DDoS attacks in WSN. But they have either used a complex approach for recognizing the attack or they were not able to handle the attack efficiently after recognizing it. The presented method has followed a simplified and effective approach to recognize and handle the DDoS attack. Methods: In this paper two methods have been introduced, Authentication method is based upon a mathematical formula which is only known to legitimate nodes in the network. In data filtration method, each node in the network checks the input data volumes coming from other nodes against a threshold value to find the traffic abnormalities. Both these methods are simple and can be deployed at every node in the network. Findings: The results have been verified using the Network Simulator 2 (NS2) on various performance metrics i.e. throughput, delay, lost packets, energy consumption and PDR. It has been observed that fixing the threshold value results in recognition of attack at very early stages and blocking the communication with the attacker results in saving approx 56% energy of the network.. The threshold value can be decided as per the bandwidth usage that may vary in different applications. Improvements: The data filtration method can be enhanced in future by using historical methods so as to analyze and mitigate other severe attacks like blackhole and sinkhole attacks.


Authentication, Data Filtration, DDoS, NS2, Threshold, WSN.

Full Text:

 |  (PDF views: 136)


  • Chatterjee A, Pandey M. Practical Applications of Wireless Sensor Network Based on Military, Environmental, Health and Home Applications: A Survey. International Journal of Scientific and Engineering Research. 2014 Jan; 5(1):1–1.
  • Xing K, Srinivasan SSR, Rivera MJM, Li J, Cheng X. Network Security. In: Attacks and Countermeasures in Sensor Networks: A Survey. Springer US. 2010 Jun; 251–72.
  • Sahu SS, Pandey M. Distributed Denial of Service Attacks: A Review. Modern Education and Computer Science. 2014; 1:65–71. Crossref
  • Walters JP, Liang Z, Shi W, Chaudhary V. Security in Distributed, Grid, and Pervasive Computing. In: Xiao Y editor. In: Wireless Sensor Network Security: A Survey. CRC Press: Boca Raton, FL, USA. 2006; 1–50.
  • Palmieri F, Ugo SR, Massimo F, Castiglione FA. Energy-oriented denial of service attacks: an emerging menace for large cloud infrastructures. The Journal of Supercomputing. 2015 May; 71(5):1620–41. Crossref
  • Shaikh M, Syed AH. A Survey on Jamming Attacks, Detection and Defending Strategies in Wireless Sensor Networks. International Journal of Research in Engineering and Technology. 2014 Mar; 3(3):1–4.
  • Sahu SS, Pandey M. A Probabilistic Packet Filtering-Based Approach for Distributed Denial of Service Attack in Wireless Sensor Network. In: Jain L, Patnaik S, Ichalkaranje N. editors. Intelligent Computing, Communication and Devices. Advances in Intelligent Systems and Computing. Springer, New Delhi. 2015; 309:65–70. Crossref
  • Kaushal K, Sahni V. Early Detection of DDOS Attack in WSN. International Journal of Computer Applications. 2016 Jan; 134(13):0975–8887.
  • Buch D, Jinwala DC. Denial of Service Attacks in Wireless Sensor Networks. International Conference on Current Trends In Technology. 2010 Dec; 382(481). p. 09–11.
  • Tiloca M, Guglielmo DD, Dini G and Anastasi G. SAD-SJ: a Self-Adaptive Decentralized solution against Selective Jamming attack in Wireless Sensor Networks. Emerging Technologies and Factory Automation, IEEE 18th Conference. INSPEC. 2013 Oct. p. 1–8. Crossref
  • Abdallah W, Boudriga N, Kim D, An S. An Efficient and Scalable Key Management Mechanism for Wireless Sensor Networks. Advanced Communication Technology (ICACT), IEEE 17th International Conference. INSPEC. 2015 Aug. p. 480–93. Crossref
  • Kodali RK. Key Management Technique for WSN. IEEE Region 10 Symposium. INSPEC. 2014 Jul; 540–5. Crossref
  • Morshed M, Islam R. CBSRP: Cluster Based Secure Routing Protocol. Proceedings of Advance Computing Conference (IACC), IEEE 3rd International. INSPEC. 2013 May. p. 571–6.
  • Gautam G, Sen B. Design and Simulation of Wireless Sensor Network in NS2. International Journal of Computer Applications. 2015 Mar; 113(6):1–3. Crossref
  • Karadge PS, Sankpal SV. A Performance Comparision of Energy Efficient AODV Protocols in Mobile Ad hoc Networks. IJARCCE. 2013 Jan; 2(1):1–5.
  • Abdulleh MN, Yussof S, Jassim HS. Comparative Study of Proactive, Reactive and Geographical MANET Routing Protocols. Communications and Network. 2015 May; 7:125–37. Crossref


  • There are currently no refbacks.

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.