Trust Based DoS Attack Detection in Wireless Sensor Networks for Reliable Data Transmission (original) (raw)

References

  1. Liu, X., Jiguo, Yu., Li, F., Lv, W., Wang, Y., & Cheng, X. (2020). Data aggregation in wireless sensor networks: From the perspective of security. IEEE Internet of Things Journal, 7(7), 6495–6513.
    Article Google Scholar
  2. Xie, H., Yan, Z., Yao, Z., & Atiquzzaman, M. (2019). Data collection for security measurement in wireless sensor networks: A survey. IEEE Internet of Things Journal, 6(2), 2205–2224.
    Article Google Scholar
  3. Tomić, I., & McCann, J. A. (2017). A survey of potential security issues in existing wireless sensor network protocols. IEEE Internet of Things Journal, 4(6), 1910–1923.
    Article Google Scholar
  4. Osanaiye, O. A., Alfa, A. S., & Hancke, G. P. (2018). Denial of service defence for resource availability in wireless sensor networks. IEEE Access, 6, 6975–7004.
    Article Google Scholar
  5. Smys, S. (2019). DDoS attack detection in telecommunication network using machine learning. Journal of Ubiquitous Computing and Communication Technologies, 1(01), 33–44.
    Article Google Scholar
  6. Luo, X., Chen, Y., Li, M., Luo, Q., Xue, K., Liu, S., & Chen, L. (2019). CREDND: A novel secure neighbor discovery algorithm for wormhole attack. IEEE Access, 7, 18194–18205.
    Article Google Scholar
  7. Ahutu, O. R., & El-Ocla, H. (2020). Centralized routing protocol for detecting wormhole attacks in wireless sensor networks. IEEE Access, 8, 63270–63282.
    Article Google Scholar
  8. Ren, J., Zhang, Y., Zhang, K., & Shen, X. (2016). Adaptive and channel-aware detection of selective forwarding attacks in wireless sensor networks. IEEE Transactions on Wireless Communications, 15(5), 3718–3731.
    Article Google Scholar
  9. Li, Y., & Wu, Y. (2020). Combine clustering with game to resist selective forwarding in wireless sensor networks. IEEE Access, 8, 138382–138395.
    Article Google Scholar
  10. Ding, J., Zhang, H., Guo, Z., & Wu, Y. (2021). The DPC-based scheme for detecting selective forwarding in clustered wireless sensor networks. IEEE Access, 9, 20954–20967.
    Article Google Scholar
  11. Smys, S., & Vijesh Joe, C. (2021). Metric routing protocol for detecting untrustworthy nodes for packet transmission. Journal of Information Technology, 3(02), 67–76.
    Google Scholar
  12. Chen, H., Meng, C., Shan, Z., Fu, Z., & Bhargava, B. K. (2019). A novel low-rate denial of service attack detection approach in ZigBee wireless sensor network by combining Hilbert–Huang transformation and trust evaluation. IEEE Access, 7, 32853–32866.
    Article Google Scholar
  13. Vashist, A., Keats, A., Dinakarrao, S. M. P., & Ganguly, A. (2019). Securing a wireless network-on-chip against jamming-based denial-of-service and eavesdropping attacks. IEEE Transactions on Very Large-Scale Integration (VLSI) Systems, 27(12), 2781–2791.
    Article Google Scholar
  14. Mugunthan, S. R. (2021). Wireless rechargeable sensor network fault modeling and stability analysis. Journal of Soft Computing Paradigm (JSCP), 3(01), 47–54.
    Article Google Scholar
  15. Gope, P., Lee, J., & Quek, T. Q. S. (2017). Resilience of DoS attacks in designing anonymous user authentication protocol for wireless sensor networks. IEEE Sensors Journal, 17(2), 498–503.
    Article Google Scholar
  16. Lyu, C., Zhang, X., Liu, Z., & Chi, C.-H. (2019). Selective authentication based geographic opportunistic routing in wireless sensor networks for internet of things against DoS attacks. IEEE Access, 7, 31068–31082.
    Article Google Scholar
  17. Jeena, J. I., & Darney, P. E. (2021). Artificial bee colony optimization algorithm for enhancing routing in wireless networks. Journal of Artificial Intelligence, 3(01), 62–71.
    Google Scholar
  18. Teng, Z., Pang, B., Du, C., & Li, Z. (2020). Malicious node identification strategy with environmental parameters. IEEE Access, 8, 149522–149530.
    Article Google Scholar
  19. Jinhui, X., Yang, T., Feiyue, Y., Pan Leina, Xu., & Juan, H. Y. (2018). Intrusion detection system for hybrid DoS attacks using energy trust in wireless sensor networks. Procedia Computer Science, 131, 1188–1195.
    Article Google Scholar
  20. Smys, S., Bashar, A., & Haoxiang, W. (2021). Taxonomy classification and comparison of routing protocol based on energy efficient rate. Journal of ISMAC, 3(02), 96–110.
    Google Scholar
  21. Zhao, J., Huang, J., & Xiong, N. (2019). An effective exponential-based trust and reputation evaluation system in wireless sensor networks. IEEE Access, 7, 33859–33869.
    Article Google Scholar
  22. Sun, B., & Li, D. (2018). A comprehensive trust-aware routing protocol with multi-attributes for WSNs. IEEE Access, 6, 4725–4741.
    Article Google Scholar
  23. Khan, T., Singh, K., Son, L. H., Abdel-Basset, M., Long, H. V., Singh, S. P., & Manjul, M. (2019). A novel and comprehensive trust estimation clustering based approach for large scale wireless sensor networks. IEEE Access, 7, 58221–58240.
    Article Google Scholar
  24. Desai, S. S., & Nene, M. J. (2019). Node-level trust evaluation in wireless sensor networks. IEEE Transactions on Information Forensics and Security, 14(8), 2139–2152.
    Article Google Scholar
  25. Mehetre, D. C., Roslin, S. E., & Wagh, S. J. (2018). Detection and prevention of black hole and selective forwarding attack in clustered WSN with Active Trust. Cluster Computing, 1(1), 78–92.
    Google Scholar
  26. Jinhui, X., Yang, T., Feiyue, Y., Leina, P., Juan, X., & Yao, H. (2018). Intrusion detection system for hybrid DoS attacks using energy trust in wireless sensor networks. Procedia Computer Science, 131(1), 1188–1195.
    Article Google Scholar
  27. Ji, Y. (2018). A wireless sensor network-based defence model against selective forwarding attack. International Journal of Online Engineering, 14(5), 70–80.
    Article Google Scholar
  28. Sivaganesan, D. (2021). A data driven trust mechanism based on blockchain in IoT sensor networks for detection and mitigation of attacks. Journal of trends in Computer Science and Smart technology (TCSST), 3(01), 59–69.
    Article Google Scholar

Download references