PhD in DoS Attack Prvention Techniques in WSN Networks

Cooja simulator coding implementation Quality Assurance
February 4, 2021
Research Topic Selection in wireless energy efficiency
May 14, 2021

PhD in DoS Attack Prvention Techniques in WSN Networks

Denial of Service (DoS) attack is one of the popular attacks that occur in the sensor nodes of the Wireless Sensor Network (WSN). Therefore, to prevent this attack we propose DoS Attack Prevention Techniques in WSN Networks through which we can enhance the accuracy rate of attack prevention and minimize the false alarm. The existing system has the disadvantage of lack of learning capabilities and hence it has to be updated. Two learning parameters are added to the fuzzy system in the proposed work which improves the existing cooperative fuzzy artificial immune system (Co-FAIS).

PhD projects in DoS Attack Prvention Techniques in Wireless Sensor Networks

PhD in DoS Attack Prvention Techniques in WSN Networks

Figure depicts the proposed immune system to prevent DoS attack on wireless sensor networks. There are two fuzzy modules in the proposed system. The number of learning parameters is altered. Throughput and sleep interval are the two learning parameters that are added to the existing system. Sniffer module grabs the packets and transmits them to the Fuzzy misuse detection module for preprocessing. It also creates log file of packets. Fuzzy misuse detector module is used to identify the malicious packet. Danger detector module calculates the difference between the parameters of malicious packet and normal packet. The actual attacks are observed in the fuzzy Q vaccination module. Cooperative decision-making module merges the output of FMDM and FQVM. Response module updates the database or alters the hosts of the network.

PhD in DoS Attack Prvention Techniques in WSN Networks ​

PhD projects in DoS Attack Prvention Techniques  in Wireless Sensor Networks

Problem Statement

  • False labeling prevails in the existing system
  • Existing system faces more packet loss
  • Regular dynamic source routing (DSR) faces more packet loss
  • DSR does not react to the improper behavior of nodes
  • System accuracy is less

PhD projects in DoS Attack Prvention Techniques  in Wireless Sensor Networks

Proposed Solution

  • Watch list is used to find the malicious node
  • Utility value is used to select the safe route
  • Node misbehavior is calculated through cooperation and reputation
  • Utility based dynamic source routing (UDSR) is employed as routing protocol which looses very few fractions of packets because of malicious nodes.
  • UDSR and watch list isolate the node by marking the node as malicious node.
  • Auction theory is employed to find the non-cooperative nodes.

Contact PhD Support to have a comprehensive and end to end PhD projects in DoS Attack Prevention Techniques in Wireless Sensor Networks.

Contact Now
× How can I help you?