GA-DoSLD: Genetic Algorithm Based Denial-of-Sleep Attack...

11
Research Article GA-DoSLD: Genetic Algorithm Based Denial-of-Sleep Attack Detection in WSN Mahalakshmi Gunasekaran 1 and Subathra Periakaruppan 2 1 Department of Computer Science and Engineering, NPR College of Engineering and Technology, Tamil Nadu 624001, India 2 Department of Information Technology, Kamaraj College of Engineering & Technology, Tamil Nadu, India Correspondence should be addressed to Mahalakshmi Gunasekaran; [email protected] Received 23 July 2016; Accepted 17 November 2016; Published 17 January 2017 Academic Editor: Qing Yang Copyright © 2017 Mahalakshmi Gunasekaran and Subathra Periakaruppan. is is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Denial-of-sleep (DoSL) attack is a special category of denial-of-service attack that prevents the battery powered sensor nodes from going into the sleep mode, thus affecting the network performance. e existing schemes used for the DoSL attack detection do not provide an optimal energy conservation and key pairing operation. Hence, in this paper, an efficient Genetic Algorithm (GA) based denial-of-sleep attack detection (GA-DoSLD) algorithm is suggested for analyzing the misbehaviors of the nodes. e suggested algorithm implements a Modified-RSA (MRSA) algorithm in the base station (BS) for generating and distributing the key pair among the sensor nodes. Before sending/receiving the packets, the sensor nodes determine the optimal route using Ad Hoc On-Demand Distance Vector Routing (AODV) protocol and then ensure the trustworthiness of the relay node using the fitness calculation. e crossover and mutation operations detect and analyze the methods that the attackers use for implementing the attack. On determining an attacker node, the BS broadcasts the blocked information to all the other sensor nodes in the network. Simulation results prove that the suggested algorithm is optimal compared to the existing algorithms such as X-MAC, ZKP, and TE 2 P schemes. 1. Introduction Wireless Sensor Network (WSN) contains a collection of self-governing sensors that monitors the conditions such as sound, temperature, pressure, and vibration [1]. e sensor nodes in the WSN are energized using the batteries. But, one of the major issues of WSN is energy loss. It is caused due to the following reasons [2]: (i) Collisions (ii) Overhearing (iii) Idle listening (iv) Control packet overhead In the collision loss, the collision of data packets in the wire- less medium introduces the energy loss. In the overhearing loss, the maintenance of radios in the receiving mode during data packet transmission introduces the energy loss. e idle listening loss is created by a node’s radio in just monitoring the channel. As the control packets may have to be received by all the nodes in the transmission range, the control packet overhead is introduced. Generally, the WSN is prone to two types of attacks such as invasive attack and noninvasive attack. e noninvasive attacks affect the power, frequency, and timing of the channel, whereas the invasive attacks affect the information transmission, routing process, and service availability [3]. Among the attacks of WSN, the denial-of- service attacks make the system or service inaccessible. e important properties of the DoSL attacks are (i) malicious, (ii) disruptive, (iii) remote. When the denial-of-service attack is performed intentionally, it is termed as malicious. When the DoSL attack is successful, the capability or service in WSN is affected. us, disrupting the affected service is not the only goal of the attacker. Hindawi Security and Communication Networks Volume 2017, Article ID 9863032, 10 pages https://doi.org/10.1155/2017/9863032

Transcript of GA-DoSLD: Genetic Algorithm Based Denial-of-Sleep Attack...

Page 1: GA-DoSLD: Genetic Algorithm Based Denial-of-Sleep Attack ...downloads.hindawi.com/journals/scn/2017/9863032.pdf · node can forward the fake data packets to the authorized nodes,

Research ArticleGA-DoSLD Genetic Algorithm Based Denial-of-SleepAttack Detection in WSN

Mahalakshmi Gunasekaran1 and Subathra Periakaruppan2

1Department of Computer Science and Engineering NPR College of Engineering and Technology Tamil Nadu 624001 India2Department of Information Technology Kamaraj College of Engineering amp Technology Tamil Nadu India

Correspondence should be addressed to Mahalakshmi Gunasekaran mahalakshmiit15hotmailcom

Received 23 July 2016 Accepted 17 November 2016 Published 17 January 2017

Academic Editor Qing Yang

Copyright copy 2017 Mahalakshmi Gunasekaran and Subathra Periakaruppan This is an open access article distributed under theCreative Commons Attribution License which permits unrestricted use distribution and reproduction in any medium providedthe original work is properly cited

Denial-of-sleep (DoSL) attack is a special category of denial-of-service attack that prevents the battery powered sensor nodes fromgoing into the sleep mode thus affecting the network performance The existing schemes used for the DoSL attack detectiondo not provide an optimal energy conservation and key pairing operation Hence in this paper an efficient Genetic Algorithm(GA) based denial-of-sleep attack detection (GA-DoSLD) algorithm is suggested for analyzing the misbehaviors of the nodes Thesuggested algorithm implements a Modified-RSA (MRSA) algorithm in the base station (BS) for generating and distributing thekey pair among the sensor nodes Before sendingreceiving the packets the sensor nodes determine the optimal route using AdHocOn-Demand Distance Vector Routing (AODV) protocol and then ensure the trustworthiness of the relay node using the fitnesscalculation The crossover and mutation operations detect and analyze the methods that the attackers use for implementing theattack On determining an attacker node the BS broadcasts the blocked information to all the other sensor nodes in the networkSimulation results prove that the suggested algorithm is optimal compared to the existing algorithms such as X-MAC ZKP andTE2P schemes

1 Introduction

Wireless Sensor Network (WSN) contains a collection ofself-governing sensors that monitors the conditions such assound temperature pressure and vibration [1] The sensornodes in the WSN are energized using the batteries But oneof the major issues of WSN is energy loss It is caused due tothe following reasons [2]

(i) Collisions(ii) Overhearing(iii) Idle listening(iv) Control packet overhead

In the collision loss the collision of data packets in the wire-less medium introduces the energy loss In the overhearingloss the maintenance of radios in the receiving mode duringdata packet transmission introduces the energy loss The idlelistening loss is created by a nodersquos radio in just monitoring

the channel As the control packets may have to be receivedby all the nodes in the transmission range the control packetoverhead is introduced Generally the WSN is prone totwo types of attacks such as invasive attack and noninvasiveattack The noninvasive attacks affect the power frequencyand timing of the channel whereas the invasive attacks affectthe information transmission routing process and serviceavailability [3] Among the attacks of WSN the denial-of-service attacks make the system or service inaccessible Theimportant properties of the DoSL attacks are

(i) malicious(ii) disruptive(iii) remote

When the denial-of-service attack is performed intentionallyit is termed as maliciousWhen the DoSL attack is successfulthe capability or service in WSN is affected Thus disruptingthe affected service is not the only goal of the attacker

HindawiSecurity and Communication NetworksVolume 2017 Article ID 9863032 10 pageshttpsdoiorg10115520179863032

2 Security and Communication Networks

Attacker node

Node 1Cluster head

Node 2 Node 3 Node 4

Figure 1 Denial-of-sleep attack [2]

As the physical presence of the attacker is uncomfortablefor launching multiple types of DoSL attacks the attack isperformed from a remote place One of the special categoriesof denial-of-service attack is DoSL attack

An example of the DoSL attack is represented in Figure 1In this attack the energy consumption of the sensor nodesis increased by preventing them from sleeping The attackernode can forward the fake data packets to the authorizednodes thus resulting in unnecessary transmissions Onreceiving the data packets if the receiver could not identifythe source it will process the data obtained from the attackernodes

This makes the receiver node to be awake till the datatransmission gets completed thus exhausting the batterypower of the nodes Further the attacker nodes can transmit afalse acknowledgment andmake the source node transmit allthe services thus maximizing the power consumption Theexisting components used for defending the DoSL attack areas follows [2]

(i) Strong link-layer authentication(ii) Antireplay protection(iii) Jamming identification(iv) Broadcast attack protection

The strong layer authentication is a key component ofthe DoSL defense On integrating this component to theWSN the DoSL attacks can be prevented efficiently Theantireplay protection component is used for preventing thereplay attacks that force the nodes to forward the old trafficinformation The jamming identification component is usedfor preventing the jamming attack that prevents the sensornodes from accessing the wireless medium This compo-nent integrates the sensor nodes with the simple radiosGenerally the MAC protocols are prone to unauthenticatedbroadcast attacks The broadcast attack protection technique

differentiates the legitimate traffic from the malicious trafficfor minimizing the energy consumption But the demeritsof the existing DoSL defense mechanisms are nonoptimalenergy conservation and lack of key pairing operations forpreventing the attacker from implementing the attack Thusto address the issues in the existing DoSL defense schemesan efficient GA-DoSLD algorithm is suggested

ObjectivesThe key objectives of the suggestedGA-DoSLDareas follows

(i) To analyze the neighbor information for creating thepopulation

(ii) To perform the key pairing using MRSA algorithm(iii) To deploy the AODV protocol for determining the

optimal route(iv) To determine the behavior of the already existing

attacker by estimating the fitness value(v) To provide an alert message to the base station

regarding the behavior of the neighbor node(vi) To broadcast the blocked information to other sensor

nodes in the network

The rest of the paper is organized as follows Section 2discusses the existing techniques used for detecting the DoSLattacks energy draining attacks and soft computing algo-rithms exploited for addressing the energy draining attacksSection 3 provides a detailed description of the proposedGA-DoSLD algorithm Section 4 discusses the experimentalanalysis of the proposed method and the study is concludedin Section 5

2 Related Works

This section illustrates the existing techniques used for DoSattack detection energy draining attacks and soft computingalgorithms used for addressing the energy draining attacks

21 Detection of DoS Attacks in WSN Mansouri et al [4]proposed a clustering technique for addressing the DoSattacks The suggested technique exploited the energy con-sumption of the nodes Mansouri et al [5] detected thecompromised nodes in WSN using energy-preserving solu-tion The suggested algorithm detected the controlled nodes(Cnode) using a hierarchical clustering technique Experi-mental results proved that the suggested technique achievedoptimal energy balance throughput detection coverage anddelay between the packet transmissions Chen et al [6]proposed a time-division secret key protocol for detectingthe DoS attack The simulation results proved that thecipher function was optimal for WSN Further the detectionjamming scheme increased the network lifetime of theWSNHe et al [7] suggested a distributed code disseminationprotocol namely DiCode for detecting the DoS attacks Thedemerits of the suggested protocol were nonoptimal securityproperties and consequences on the network availability Hanet al [8] proposed an Intrusion Detection System basedEnergy Prediction (IDSEP) for the cluster-based WSN The

Security and Communication Networks 3

suggested scheme exploited the energy consumption of thesensor nodes for detecting the malicious nodes Furtherbased on the energy consumption thresholds the categoriesof the DoS attacks were determined Simulation resultsproved that the suggested IDSEP efficiently detected themalicious nodes Ram Pradheep Manohar [9] proposed theSlowly Increasing and Decreasing under Constraint DoSAttack Strategy (SIDCAS) for detecting the Stealthy DoS (S-DoS) attacks in WSN In addition to providing security thesuggested approach also decreased the resource maintenancecost Tan et al [10] suggested a Deluge based multihop codedissemination protocol for enhancing the confidentiality ofthe WSN Experimental results proved that the suggestedapproach provided optimal latency dissemination rate andenergy consumption

22 Energy Draining Attacks Nam and Cho [11] suggesteda Statistical En-Route Filtering (SEF) scheme for detectingthe false reports in the intermediate nodes Further thefalse report injection attack was defended using three typesof keys such as individual key pairwise key and clusterkey The comparison of SEF with the suggested methodproved that the proposed method enhanced the energysavings than the SEF in sensor networks Manju et al [1]suggested three steps such as network organizationmaliciousnode detection and selective authentication for detecting thedenial-of-sleep attack in WSN Experimental results provedthat the suggested method was optimal for defending theattacker from performing the task Naik and Shekokar [12]addressed the denial-of-sleep attack using zero knowledgeprotocol and interlock protocol Experimental results provedthat the suggested protocols prevented the replay attack andman-in-the-middle attack and also minimized the resourceconsumption Hsueh et al [13] suggested a cross-layer designof secure scheme with MAC protocol for minimizing theenergy consumption of the sensor nodes Analysis resultsproved that the suggested protocol efficiently defended thereplay attacks and forge attacks Further the security require-ments and energy conservation were coordinated Kaurand Ataullah [14] suggested a hierarchical clustering basedisolation of nodes for addressing the denial-of-sleep attackThe suggested approach enhanced the network lifetime butthe idle listening problem was unaddressed Hsueh et al[13] proposed a cross-layer design of secure scheme inte-grated with MAC protocol for defending against the replayattack and forge attack Experimental results proved that thesuggested protocol coordinated the energy conservation andsecurity requirements

23 Soft Computing Algorithms Used for Addressing theEnergy Draining Attack Shamshirband et al [15] proposeda Density-Based Fuzzy Imperialist Competitive ClusteringAlgorithm (D-FICCA) for detecting the intruders in WSNWhen compared to the existing algorithms the proposedalgorithm produced 87 detection accuracy and 099 clus-tering quality Shamshirband et al [16] suggested a cooper-ative Game-Based Fuzzy Q-Learning (G-FQL) approach fordetecting the intrusions in the WSN The suggested modeldeployed the cooperative defense counterattack scenario for

the sink node and game theory strategy for the base stationnodes When compared to the Low Energy Adaptive Cluster-ingHierarchy (LEACH) the suggestedmodel produced opti-mal detection accuracy counterdefense energy consump-tion and network lifetime Further when compared to theexistingmachine learningmethods the suggestedmodel pro-vided enhanced detection and defense accuracy Sreelaja andVijayalakshmi Pai [17] suggested an Ant Colony Optimiza-tion Attack Detection (ACO-AD) algorithm for detecting thesinkhole attacks in WSN The keys were distributed amongthe alerted nodes using Ant Colony Optimization BooleanExpression Evolver Sign Generation (ABXES) algorithmExperimental results proved that when compared to theexisting LIDeA architecture the suggested architecture min-imized the false positives and also minimized the storage inthe sensor nodes Keerthana and Padmavathi [18] suggestedanEnhancedParticle SwarmOptimization (EPSO) techniquefor detecting the sinkhole attacks in WSN When comparedto the existing ACO and PSO algorithms the suggestedalgorithm provided optimal packet delivery ratio messagedrop average delay and false alarm rate Saeed et al [19]suggested a RandomNeural Network based IDS for detectingthe attackers Experimental results proved that the suggestedIDS provided higher accuracy and reduced performanceoverhead

From the analysis of the existing techniques it is clearthat they do not address the idle listening problem Furtherthe solutions suggested for preventing the DoSL attacksare unrealistic Thus to address the issues in the existingtechniques an efficient GA-DoSLD algorithm is proposed

3 Proposed Method

This section describes the proposed GA-DoSLD algorithmfor analyzing the misbehaviors of the sensor nodes in WSNThe overall flow of the suggested algorithm is represented inFigure 2

From the figure it is clear that the key steps involved inthe suggested algorithm are as follows

(i) WSN initialization(ii) Population generation(iii) Generation and distribution of key pair(iv) Route discovery(v) Behavior monitoring

A detailed description of every step is provided in thefollowing sections

31 WSN Initialization The initial step involved in thesuggested approach is WSN initialization By exploiting theNS2 tool the WSN is initialized with 100 numbers of sensornodes that have random waypoint mobility model Thetransmission range of the WSN is 250 meters Further theinitialized WSN poses the specifications listed in Table 1

32 Population Generation and BS Configuration Once theWSN environment is initialized the suggested GA-DoSLD

4 Security and Communication Networks

Initialization of WSN

Population generation

Route discovery

Verify the relay node

Behaviour monitoring

Update populations N

Evaluate fitnessObjective function

Rule set matching

Decision making (attacknormal)

Generate the key pair and distributeBS configuration process

Calculate personal fitness value

Estimate the fitness value for every

Select pair of chromosome for mating

Include the resulting chromosome

The probability of cross gt random

value

valueThe probability of mutation gt random

chromosome

Pc

Pm

rrarr Op_cross

rrarr Op_Mutant

Figure 2 Overall flow of the proposed GA-DoSLD algorithm

Security and Communication Networks 5

Table 1 System specifications

Simulation parameters ValuesPacket size 1024KbpsPacket rate Random packetssecRouting protocol AODVChannel bit rate 10MBsInitial power 25 JSensor node sensing power 5 times 10minus8 JTransmission range 150ndash250 metersDuty cycle 20-time slots

algorithm generates the population using population gen-eration algorithm The suggested algorithm initially loadsthe two-hop neighbor information to the base station thenfor every member in the neighbor list the next-of-neighboris initialized as the population The steps involved in thesuggested algorithm are illustrated as follows

Algorithm 1 (population generation algorithm)

Step 1 Load the two-hop neighbor information with the basestation

Step 2

for (member in the neighbor list)

Population larr Load Individual (newneighbor (next-of-neighbor))

During the implementation of the population generation

algorithm the BS configuration process is performed inparallel for analyzing the behavior of the nodes in the WSN

33 Generation and Distribution of Key Pair After the gener-ation of the population the BS deploys the MRSA algorithmfor generating a public key and private key pair Among thekeys the public key is used for the BS and the private key isused for the sensor nodes The main objective of this step isto prevent the attacker from implementing the DoSL attackBy deploying this step the attacker node is blocked at theinitial level before sending or receiving the packet thus savingthe energy of the sensor nodes The steps involved in thesuggested algorithm are illustrated as follows [20]

Algorithm 2 (MRSA algorithm)

Step 1 Choose the large prime numbers ldquo119899rdquo and ldquo119903rdquoStep 2 Compute the modulus totient using

Φ (119886) = (119899 minus 1) lowast (119903 minus 1) (1)

Step 3 Choose the public exponent ldquo119894rdquo such that 1 lt 119894 lt Φ(119899)and GCD(119894 Φ(119886)) = 1

Step 4 Estimate the private exponent ldquo119898rdquo such that 119898 =119894minus1modΦ(119886)Step 5 Estimate the private key as (119898 119886)Step 6 Estimate the public key as (119894 119886)

The suggested MRSA algorithm has a key size of 512 bitsAmong the total number of bits 256 bits are used as the publickey in the base station and the remaining 256 bits are usedas the private key in the sensor nodes The minimal key sizeprovides the following advantages

(i) Minimal computational complexity(ii) Achieving memory optimization

34 Route Discovery and Relay Node Validation Before ini-tiating the packet transmission the sensor nodes determinethe optimal route usingAdHocOn-DemandDistanceVector(AODV) routing protocol An example of the route discoveryprocess is represented in Figure 3 The suggested protocolhas two key operations such as route discovery and routemaintenance When the source node demands a route to thedestination node or when the lifetime of the existing route tothe destination node has expired the route discovery oper-ation is initiated with the broadcast of the RREQ messagesOn receiving the RREQ messages the intermediate nodesprovide an optimal route to the destination node When theintermediate node is the destination node the RREP packetsare directly transferred to the source node

The steps involved in the suggested AODV based routediscovery are described as follows

Algorithm 3 (AODV routing protocol)Step 1 When a sensor node seeks a route the RREQ packet ispropagated through the entire network till the packet reachesthe destination node

Step 2 When the source node and destination nodes areplaced at the corners of the network the RREQ packets haveto travel a maximum number of hops

Step 3 On receiving the RREQ packets the relay nodesbroadcast it ahead till it reaches the destination

Step 4 The overhead created due to the route request processis represented as follows

119877RREQ = 119873sum119886minus1

(119867) 119864119873minus1 119867sum119887=2

[(119886 minus 1 minus 119887) minus 119873minus1sum119888=1

119877119888]119875119862119887 (2)

Step 5 Once the RREQ packet reaches the destination nodeit replies back to the source node as RREP packet through thesame sequence for reaching the source node

Step 6 According to [21] the overhead created for the RREPpackets is represented as follows

119877RREP = 119873 + 1198732 (119886 minus ℎ minus 2) 119901 (3)

6 Security and Communication Networks

A

B

J

F YL

K

BSC P

D

E

H

I

T

Z

Base station

Destination

RREQRREP

Figure 3 Example for the route discovery process using AODV

Step 7 The overall overhead introduced for the route discov-ery process is

119877Overall = RREQ + RREP119877Overall = 119873sum

119886minus1

(119867) 119864119873minus1 119867sum119887=2

[(119886 minus 1 minus 119887) minus 119873minus1sum119888=1

119877119888]119875119862119887+ 119873 + 1198732 (119886 minus ℎ minus 2) 119901

(4)

The merits of using the AODV routing protocol for theroute discovery process are as follows

(i) Loop-free routes(ii) Faster response to link breakage(iii) Minimal demand for the broadcast

After establishing an optimal route the sensor nodesestimate the trustworthiness of the neighbor nodes usingfitness evaluation function

35 Behavior Monitoring After ensuring the trustworthinessof the neighbor nodes the sensor nodes forward the packetsDuring the transmission if the sensor node suspects any

malicious behaviors as follows it estimates the fitness valuebased on the information provided by the BS

(i) Flooding of data packets(ii) Transmission of large sized data packets that exceed

the data capacity of the sensor nodes

By estimating the fitness value based on attacker ID thechromosome of the already existing attacker is determinedAfter estimating the fitness value the sensor nodes providealert messages about the neighbor node behavior to the BSOn receiving the alertmessage the BS performs the crossoverandmutation operations on the chromosomes for identifyingand analyzing the method that is used by the attackerfor implementing the attack The resultant chromosomesobtained from the crossover and mutation operation areadded to the existing population Finally the BS confirmswhether the particular neighbor node is a normal node oran attacker node If the BS determines the neighbor nodeas an attacker node then the BS broadcasts the blockedinformation to all the other sensor nodes in the WSN Byexploiting the suggested GA-DoSLD algorithm the attackernodes that introduce the DoSL attacks are eliminated fromthe communication thus saving the energy of the sensornodes Notations describe the symbols used in Algorithm 4

Security and Communication Networks 7

for the proposed GA-DoSLD The steps involved in thesuggested GA-DoSLD algorithm are illustrated below

Algorithm 4 (GA-DoSLD algorithm)

Input Population

Output Optimal population with fitness value

Step 1 Compute the index of individuals

Individual larr Random member (population)Initialize the array of fittest as emptyFor (node in population)If (FittestgetFitness() = getIndividual(node)getFit-ness())

Fittest = getIndividual (node) (5)

Individuals [index] = Fittest

Step 2 Compute fitness function

Load member populationCompute the weight accuracy (119882ac) and relativeaccuracy (119877ac)Compute the occurrences of weight (119882oc) and relativeweight (119877oc)

Fitness = 119882ac lowast accuracy of 119898 hop + 119882oc

lowast occurrence of 119898 hopFitness = (1198821 + 1198822) lowast af + (minus1198822) lowast 119877oc

(6)

Step 3 Execute reproduction

Initialize the new pop as an empty setselect the random member in the input populationbased on fitness functionFor (119894 = 1 119894 le maximum size of population 119894 + +)119883 larr Random selected member in population basedon fitness function119884 larr Random selected member in population basedon fitness functionFind the parent profiles of (119883119884)Len 119883 larr length (119883)Len 119884 larr length (119884)

119888 = Select random number between 1 and Len 119883new chromosome

= (substring (119883 1 119888) substring (119884 1 119888)) (7)

Set offspring as new chromosome

Step 4 Population Update

If (random probability to mutate ge threshold)

off spring larr997888 Mutates (off spring)Set new population

larr997888 Union (new population offspring)(8)

End doPopulation larr Union (new population new pop)Return Best (Population Fitness)

4 Performance Analysis

This section describes the performance results of the pro-posed GA-DoSLD algorithm for the following metrics

(i) Normalized energy consumption(ii) Effective packet number(iii) End-to-end delay(iv) Average energy consumption(v) Packet delivery ratio(vi) Throughput ratio versus packet rate

To prove the superiority of the proposed GA-DoSLD algo-rithm it is compared with the existing algorithms such aszero knowledge protocol (ZKP) [22] X-MAC and Two-TierEnergy-Efficient Secure (TE2S) scheme [23] and their resultsare discussed in the following sections

41 Normalized Energy Consumption Normalized energyconsumption is the amount of energy consumed for transfer-ring 3 packets per second The normalized energy consump-tion of the existing X-MAC algorithm ZKP TE2P schemeand the proposed GA-DoSLD algorithm is validated for mul-tiple intervals of attackThe comparison result represented inFigure 4 depicts that for all the attack intervals the suggestedGA-DoSLD algorithm consumes minimal energy

42 Effective Packet Number The effective packet number ofthe existing X-MAC algorithm ZKP TE2S scheme and theproposed GA-DoSLD algorithm is validated for the variableattack intervals The comparison considers the packet send-ing rate as 1 packet every 3 seconds The comparison resultrepresented in Figure 5 shows that the suggested GA-DoSLDalgorithm provides higher scores on effective packet numberthan the existing schemes

8 Security and Communication Networks

0

20

40

60

80

100

05 1 15 2 25 3 35 4

Ener

gy co

nsum

ptio

n (m

JSec

)

Attack interval

X-MACZKP

GA-DoSLDTE2S

Figure 4 Comparison of normalized energy consumption for theexisting and the proposed methods

0

200

400

600

800

1000

1200

1400

X-MACZKP

GA-DoSLD

05 1 15 2 25 3 35 4Attack interval

Effec

tive p

acke

t num

ber (

pack

et3

sec)

TE2S

Figure 5 Comparison of packet number versus attack interval

43 End-to-End Delay The end-to-end delay is defined asthe average time consumed for transmitting the packets Theanalysis of end-to-end delay with respect to the packet size isrepresented in Figure 6 From the figure it is clear that whencompared to existing X-MAC ZKP and TE2S algorithms thesuggested GA-DoSLD algorithm provides a minimal end-to-end delay for the variable packet sizes

44 Average Energy Consumption The average energy con-sumption is the amount of energy consumed by the algo-rithms for transmitting the data packets The comparison ofaverage energy consumption for the existing X-MAC ZKPTE2S schemes and the proposed GA-DoSLD algorithm isrepresented in Figure 7 From the figure it is clear that thesuggested GA-DoSLD algorithm provides minimal energyconsumption than the existing schemes

005

115

225

335

128 256 384 512 640Packet size

X-MACZKP

GA-DoSLD

End-

to-e

nd d

elay

(sec

onds

)

4

TE2S

Figure 6 Comparison of end-to-end delay versus packet size for theexisting and the proposed methods

0

05

1

15

2

25

10 20 30 40 50 60 70Simulation time (ms)

X-MACZKP

GA-DoSLD

Aver

age e

nerg

y co

nsum

ptio

n (J

S)

TE2S

Figure 7 Analysis of average energy consumption versus simula-tion time for the existing and the proposed methods

45 Packet Delivery Ratio The packet delivery ratio (PDR) isdefined as the ratio of the number of data packets successfullydelivered to the destination node to the number of datapackets transmitted from the source The estimation of thePDR is based on the following equation

PDR = 119875119877 lowast 100sum119899119886minus1

119875Gen119886

(9)

where 119875119877 represents the number of data packets received atthe destination node 119875Gen is the total number of data packetsgenerated by the source nodes and 119899 denotes the numberof sensor nodes The comparison of PDR with respect to thesimulation time is represented in Figure 8

From the figure it is analyzed that when compared to theexisting X-MAC ZKP and TE2S schemes the proposed GA-DoSLD algorithm provides higher PDR

Security and Communication Networks 9

0

20

40

60

80

100

5 10 15 20 25 30 35 40 45 50

Pack

et d

eliv

ery

ratio

()

Simulation time (ms)

X-MACZKP

GA-DoSLDTE2S

Figure 8 Comparison of packet delivery ratio versus simulationtime for the existing and proposed schemes

46 Throughput Performance for Various Packet SendingRates The effectiveness of the protocol depends on thesuccessful reception and transmission of data packets underthe various sending rates such as 1 packet3 seconds 1packet5 seconds and 1 packet7 seconds [22] In this paperthe packet sending rate of 1 packet3 seconds is taken tovalidate the performance of proposed work The estimationof the throughput ratio is based on the following equation

Throughput ratio = 119875NS119875NT (10)

where 119875NS denotes the packet number under simulation sce-nario and 119875NT represents the packet number delivered underthe theoretical scenarioThe superiority of the suggested GA-DoSLD algorithm is validated against the existing algorithmssuch as X-MAC ZKP and TE2P for a packer rate of 1 packetper 3 seconds Figure 9 represents the comparison of thethroughput ratio with respect to the variable attack interval

From the figure it is clear that the suggested GA-DoSLDalgorithm provides higher throughput than the existing algo-rithms under the packet sending rate of 1 packet3 seconds

5 Conclusion and Future Work

In this paper an efficient GA-DoSLD algorithm is proposedfor generating the DoSL attack profiles from multiple sensornodes such that the attacker nodes can be prevented from thecommunication process Initially a WSN is simulated with100 numbers of static sensor nodes then the BS performs theoperations such as key pair generation and behaviormonitor-ing in parallel The base station monitors the behavior of thesensor nodes and initializes every behavior as a chromosomeThe MRSA algorithm is implemented in the base stationfor generating and distributing the key pair among thesensor nodes Before initiating the communication betweenthe sensor nodes the AODV routing protocol estimates theoptimal route To validate the trustworthiness of the relaynodes in the route the fitness value is estimated for every

0

5000

10000

15000

20000

25000

30000

35000

40000

45000

50000

05 1 15 2 25 3 35 4Attack interval (secs)

X-MACZKP

GA-DoSLDTh

roug

hput

for t

he p

acke

t sen

ding

rate

of 1

pac

ket3

seco

nds

TE2P

Figure 9 Comparison of throughput under packet sending rate of1 packet3 seconds versus attack interval

chromosome If the chromosome is determined as unusualit is validated against the existing attack profiles If there doesnot exist a match the pair of chromosomes is subjected tothe crossover and mutation operations The resultant chro-mosomes are added to the existing chromosomes Finally theBS determines the attacker nodes broadcasting the blockedinformation to all the sensor nodes in the network To provethe superiority of the suggested GA-DoSLD algorithm itis compared against the existing X-MAC ZKP and TE2Sschemes for the metrics such as normalized energy con-sumption effective packet number end-to-end delay averageenergy consumption packet delivery ratio and throughputratio versus packet rate The validation results prove thatwhen compared to the existing schemes the proposedalgorithm provides optimal results for all the metrics Therepeated execution of the GA-DoSLD algorithm in the sensornodes consumes a considerable amount of energy Thus toachieve the energy optimization a different soft computingalgorithm other than GA can be used in future for detectingthe denial-of-sleep attack in the WSN environment

Notations

119873 Expected number of hops119867 Number of hops between the source anddestination119864 Number of neighbors at the higher tiers119877119888 Expected number of neighbors at 119888th hop119862119887 Additional coverage index of the nodewith 119887 neighbors119882ac Weight accuracy

10 Security and Communication Networks

119877ac Accuracy relative119882oc Occurrence119877oc Relative weight of occurrence

Competing Interests

The authors declare that there is no conflict of interestsregarding the publication of this paper

References

[1] V C Manju S L Senthil Lekha and M Sasi Kumar ldquoMech-anisms for detecting and preventing denial of sleep attacks onwireless sensor networksrdquo in Proceedings of the IEEE Conferenceon Information and Communication Technologies (ICT rsquo13) pp74ndash77 Tamil Nadu India April 2013

[2] D R Raymond R C Marchany M I Brownfield and S FMidkiff ldquoEffects of denial-of-sleep attacks on wireless sensornetworkMAC protocolsrdquo IEEE Transactions on Vehicular Tech-nology vol 58 no 1 pp 367ndash380 2009

[3] R P Manohar and E Baburaj ldquoDetection of Stealthy Denialof Service (S-DoS) attacks in wireless sensor networksrdquo Inter-national Journal of Computer Science and Information Security(IJCSIS) vol 14 pp 343ndash348 2016

[4] D Mansouri L Mokddad J Ben-Othman and M IoualalenldquoPreventing denial of service attacks in wireless sensor net-worksrdquo in Proceedings of the IEEE International Conference onCommunications (ICC rsquo15) pp 3014ndash3019 London UK June2015

[5] D Mansouri L Mokdad J Ben-Othman and M IoualalenldquoDetecting DoS attacks in WSN based on clustering tech-niquerdquo in Proceedings of the IEEEWireless Communications andNetworking Conference (WCNC rsquo13) pp 2214ndash2219 ShanghaiChina April 2013

[6] J-L Chen Y-W Ma X Wang Y-M Huang and Y-F LaildquoTime-division secret key protocol for wireless sensor network-ingrdquo Institution of Engineering andTechnology Communicationsvol 5 no 12 pp 1720ndash1726 2011

[7] D He C Chen S Chan and J Bu ldquoDiCode DoS-resistant anddistributed code dissemination in wireless sensor networksrdquoIEEE Transactions on Wireless Communications vol 11 no 5pp 1946ndash1956 2012

[8] G Han J Jiang W Shen L Shu and J Rodrigues ldquoIDSEP anovel intrusion detection scheme based on energy predictionin cluster-based wireless sensor networksrdquo IET InformationSecurity vol 7 no 2 pp 97ndash105 2013

[9] E B Ram Pradheep Manohar ldquoDetection of stealthy denialof service (S-DoS) attacks in wireless sensor networksrdquo Inter-national Journal of Computer Science and Information Security(IJCSIS) vol 14 2016

[10] H Tan D Ostry J Zic and S Jha ldquoA confidential and DoS-resistant multi-hop code dissemination protocol for wirelesssensor networksrdquoComputersamp Security vol 32 pp 36ndash55 2013

[11] S M Nam and T H Cho ldquoEnergy efficient method fordetection and prevention of false reports in wireless sensornetworksrdquo in Proceedings of the 8th International Conference onInformation Science and Digital Content Technology (ICIDT rsquo12)pp 766ndash769 Jeju Island South Korea June 2012

[12] S Naik and N Shekokar ldquoConservation of energy in wirelesssensor network by preventing denial of sleep attackrdquo ProcediaComputer Science vol 45 pp 370ndash379 2015

[13] C-T Hsueh C-Y Wen and Y-C Ouyang ldquoA secure schemeagainst power exhausting attacks in hierarchical wireless sensornetworksrdquo IEEE Sensors Journal vol 15 no 6 pp 3590ndash36022015

[14] S Kaur andM Ataullah ldquoSecuring the wireless sensor networkfrom denial of sleep attack by isolating the nodesrdquo InternationalJournal of Computer Applications vol 103 no 1 pp 29ndash33 2014

[15] S Shamshirband A Amini N B Anuar M L Mat Kiah Y WTeh and S Furnell ldquoD-FICCA a density-based fuzzy imperi-alist competitive clustering algorithm for intrusion detection inwireless sensor networksrdquo Measurement vol 55 pp 212ndash2262014

[16] S Shamshirband A Patel N B Anuar M L M Kiah andA Abraham ldquoCooperative game theoretic approach usingfuzzy Q-learning for detecting and preventing intrusions inwireless sensor networksrdquo Engineering Applications of ArtificialIntelligence vol 32 pp 228ndash241 2014

[17] N K Sreelaja and G A Vijayalakshmi Pai ldquoSwarm intelligencebased approach for sinkhole attack detection in wireless sensornetworksrdquo Applied Soft Computing Journal vol 19 pp 68ndash792014

[18] G Keerthana and G Padmavathi ldquoDetecting sinkhole attackin wireless sensor network using enhanced particle swarmoptimization techniquerdquo International Journal of Security andIts Applications vol 10 no 3 pp 41ndash54 2016

[19] A Saeed A Ahmadinia A Javed and H Larijani ldquoRandomneural network based intelligent intrusion detection forwirelesssensor networksrdquo Procedia Computer Science vol 80 pp 2372ndash2376 2016

[20] D Management ldquoRSA Algorithmrdquo 2016 httpwwwdi-mgtcomaursa alghtml

[21] M Zhao Y Li and W Wang ldquoModeling and analyticalstudy of link properties in multihop wireless networksrdquo IEEETransactions on Communications vol 60 no 2 pp 445ndash4552012

[22] C-T Hsueh C-Y Wen and Y-C Ouyang ldquoA secure schemeagainst power exhausting attacks in hierarchical wireless sensornetworksrdquo IEEE Sensors Journal vol 15 no 6 pp 3590ndash36022015

[23] D N S Swapna Naik ldquoConservation of energy in wireless sen-sor network by preventing denial of sleep attackrdquo in Proceedingsof the International Conference on Advanced Computing Tech-nologies and Applications (ICACTA rsquo15) pp 370ndash379 MumbaiIndia March 2015

International Journal of

AerospaceEngineeringHindawi Publishing Corporationhttpwwwhindawicom Volume 2014

RoboticsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Active and Passive Electronic Components

Control Scienceand Engineering

Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

International Journal of

RotatingMachinery

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporation httpwwwhindawicom

Journal ofEngineeringVolume 2014

Submit your manuscripts athttpswwwhindawicom

VLSI Design

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Shock and Vibration

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Civil EngineeringAdvances in

Acoustics and VibrationAdvances in

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Electrical and Computer Engineering

Journal of

Advances inOptoElectronics

Hindawi Publishing Corporation httpwwwhindawicom

Volume 2014

The Scientific World JournalHindawi Publishing Corporation httpwwwhindawicom Volume 2014

SensorsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Modelling amp Simulation in EngineeringHindawi Publishing Corporation httpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Chemical EngineeringInternational Journal of Antennas and

Propagation

International Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Navigation and Observation

International Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

DistributedSensor Networks

International Journal of

Page 2: GA-DoSLD: Genetic Algorithm Based Denial-of-Sleep Attack ...downloads.hindawi.com/journals/scn/2017/9863032.pdf · node can forward the fake data packets to the authorized nodes,

2 Security and Communication Networks

Attacker node

Node 1Cluster head

Node 2 Node 3 Node 4

Figure 1 Denial-of-sleep attack [2]

As the physical presence of the attacker is uncomfortablefor launching multiple types of DoSL attacks the attack isperformed from a remote place One of the special categoriesof denial-of-service attack is DoSL attack

An example of the DoSL attack is represented in Figure 1In this attack the energy consumption of the sensor nodesis increased by preventing them from sleeping The attackernode can forward the fake data packets to the authorizednodes thus resulting in unnecessary transmissions Onreceiving the data packets if the receiver could not identifythe source it will process the data obtained from the attackernodes

This makes the receiver node to be awake till the datatransmission gets completed thus exhausting the batterypower of the nodes Further the attacker nodes can transmit afalse acknowledgment andmake the source node transmit allthe services thus maximizing the power consumption Theexisting components used for defending the DoSL attack areas follows [2]

(i) Strong link-layer authentication(ii) Antireplay protection(iii) Jamming identification(iv) Broadcast attack protection

The strong layer authentication is a key component ofthe DoSL defense On integrating this component to theWSN the DoSL attacks can be prevented efficiently Theantireplay protection component is used for preventing thereplay attacks that force the nodes to forward the old trafficinformation The jamming identification component is usedfor preventing the jamming attack that prevents the sensornodes from accessing the wireless medium This compo-nent integrates the sensor nodes with the simple radiosGenerally the MAC protocols are prone to unauthenticatedbroadcast attacks The broadcast attack protection technique

differentiates the legitimate traffic from the malicious trafficfor minimizing the energy consumption But the demeritsof the existing DoSL defense mechanisms are nonoptimalenergy conservation and lack of key pairing operations forpreventing the attacker from implementing the attack Thusto address the issues in the existing DoSL defense schemesan efficient GA-DoSLD algorithm is suggested

ObjectivesThe key objectives of the suggestedGA-DoSLDareas follows

(i) To analyze the neighbor information for creating thepopulation

(ii) To perform the key pairing using MRSA algorithm(iii) To deploy the AODV protocol for determining the

optimal route(iv) To determine the behavior of the already existing

attacker by estimating the fitness value(v) To provide an alert message to the base station

regarding the behavior of the neighbor node(vi) To broadcast the blocked information to other sensor

nodes in the network

The rest of the paper is organized as follows Section 2discusses the existing techniques used for detecting the DoSLattacks energy draining attacks and soft computing algo-rithms exploited for addressing the energy draining attacksSection 3 provides a detailed description of the proposedGA-DoSLD algorithm Section 4 discusses the experimentalanalysis of the proposed method and the study is concludedin Section 5

2 Related Works

This section illustrates the existing techniques used for DoSattack detection energy draining attacks and soft computingalgorithms used for addressing the energy draining attacks

21 Detection of DoS Attacks in WSN Mansouri et al [4]proposed a clustering technique for addressing the DoSattacks The suggested technique exploited the energy con-sumption of the nodes Mansouri et al [5] detected thecompromised nodes in WSN using energy-preserving solu-tion The suggested algorithm detected the controlled nodes(Cnode) using a hierarchical clustering technique Experi-mental results proved that the suggested technique achievedoptimal energy balance throughput detection coverage anddelay between the packet transmissions Chen et al [6]proposed a time-division secret key protocol for detectingthe DoS attack The simulation results proved that thecipher function was optimal for WSN Further the detectionjamming scheme increased the network lifetime of theWSNHe et al [7] suggested a distributed code disseminationprotocol namely DiCode for detecting the DoS attacks Thedemerits of the suggested protocol were nonoptimal securityproperties and consequences on the network availability Hanet al [8] proposed an Intrusion Detection System basedEnergy Prediction (IDSEP) for the cluster-based WSN The

Security and Communication Networks 3

suggested scheme exploited the energy consumption of thesensor nodes for detecting the malicious nodes Furtherbased on the energy consumption thresholds the categoriesof the DoS attacks were determined Simulation resultsproved that the suggested IDSEP efficiently detected themalicious nodes Ram Pradheep Manohar [9] proposed theSlowly Increasing and Decreasing under Constraint DoSAttack Strategy (SIDCAS) for detecting the Stealthy DoS (S-DoS) attacks in WSN In addition to providing security thesuggested approach also decreased the resource maintenancecost Tan et al [10] suggested a Deluge based multihop codedissemination protocol for enhancing the confidentiality ofthe WSN Experimental results proved that the suggestedapproach provided optimal latency dissemination rate andenergy consumption

22 Energy Draining Attacks Nam and Cho [11] suggesteda Statistical En-Route Filtering (SEF) scheme for detectingthe false reports in the intermediate nodes Further thefalse report injection attack was defended using three typesof keys such as individual key pairwise key and clusterkey The comparison of SEF with the suggested methodproved that the proposed method enhanced the energysavings than the SEF in sensor networks Manju et al [1]suggested three steps such as network organizationmaliciousnode detection and selective authentication for detecting thedenial-of-sleep attack in WSN Experimental results provedthat the suggested method was optimal for defending theattacker from performing the task Naik and Shekokar [12]addressed the denial-of-sleep attack using zero knowledgeprotocol and interlock protocol Experimental results provedthat the suggested protocols prevented the replay attack andman-in-the-middle attack and also minimized the resourceconsumption Hsueh et al [13] suggested a cross-layer designof secure scheme with MAC protocol for minimizing theenergy consumption of the sensor nodes Analysis resultsproved that the suggested protocol efficiently defended thereplay attacks and forge attacks Further the security require-ments and energy conservation were coordinated Kaurand Ataullah [14] suggested a hierarchical clustering basedisolation of nodes for addressing the denial-of-sleep attackThe suggested approach enhanced the network lifetime butthe idle listening problem was unaddressed Hsueh et al[13] proposed a cross-layer design of secure scheme inte-grated with MAC protocol for defending against the replayattack and forge attack Experimental results proved that thesuggested protocol coordinated the energy conservation andsecurity requirements

23 Soft Computing Algorithms Used for Addressing theEnergy Draining Attack Shamshirband et al [15] proposeda Density-Based Fuzzy Imperialist Competitive ClusteringAlgorithm (D-FICCA) for detecting the intruders in WSNWhen compared to the existing algorithms the proposedalgorithm produced 87 detection accuracy and 099 clus-tering quality Shamshirband et al [16] suggested a cooper-ative Game-Based Fuzzy Q-Learning (G-FQL) approach fordetecting the intrusions in the WSN The suggested modeldeployed the cooperative defense counterattack scenario for

the sink node and game theory strategy for the base stationnodes When compared to the Low Energy Adaptive Cluster-ingHierarchy (LEACH) the suggestedmodel produced opti-mal detection accuracy counterdefense energy consump-tion and network lifetime Further when compared to theexistingmachine learningmethods the suggestedmodel pro-vided enhanced detection and defense accuracy Sreelaja andVijayalakshmi Pai [17] suggested an Ant Colony Optimiza-tion Attack Detection (ACO-AD) algorithm for detecting thesinkhole attacks in WSN The keys were distributed amongthe alerted nodes using Ant Colony Optimization BooleanExpression Evolver Sign Generation (ABXES) algorithmExperimental results proved that when compared to theexisting LIDeA architecture the suggested architecture min-imized the false positives and also minimized the storage inthe sensor nodes Keerthana and Padmavathi [18] suggestedanEnhancedParticle SwarmOptimization (EPSO) techniquefor detecting the sinkhole attacks in WSN When comparedto the existing ACO and PSO algorithms the suggestedalgorithm provided optimal packet delivery ratio messagedrop average delay and false alarm rate Saeed et al [19]suggested a RandomNeural Network based IDS for detectingthe attackers Experimental results proved that the suggestedIDS provided higher accuracy and reduced performanceoverhead

From the analysis of the existing techniques it is clearthat they do not address the idle listening problem Furtherthe solutions suggested for preventing the DoSL attacksare unrealistic Thus to address the issues in the existingtechniques an efficient GA-DoSLD algorithm is proposed

3 Proposed Method

This section describes the proposed GA-DoSLD algorithmfor analyzing the misbehaviors of the sensor nodes in WSNThe overall flow of the suggested algorithm is represented inFigure 2

From the figure it is clear that the key steps involved inthe suggested algorithm are as follows

(i) WSN initialization(ii) Population generation(iii) Generation and distribution of key pair(iv) Route discovery(v) Behavior monitoring

A detailed description of every step is provided in thefollowing sections

31 WSN Initialization The initial step involved in thesuggested approach is WSN initialization By exploiting theNS2 tool the WSN is initialized with 100 numbers of sensornodes that have random waypoint mobility model Thetransmission range of the WSN is 250 meters Further theinitialized WSN poses the specifications listed in Table 1

32 Population Generation and BS Configuration Once theWSN environment is initialized the suggested GA-DoSLD

4 Security and Communication Networks

Initialization of WSN

Population generation

Route discovery

Verify the relay node

Behaviour monitoring

Update populations N

Evaluate fitnessObjective function

Rule set matching

Decision making (attacknormal)

Generate the key pair and distributeBS configuration process

Calculate personal fitness value

Estimate the fitness value for every

Select pair of chromosome for mating

Include the resulting chromosome

The probability of cross gt random

value

valueThe probability of mutation gt random

chromosome

Pc

Pm

rrarr Op_cross

rrarr Op_Mutant

Figure 2 Overall flow of the proposed GA-DoSLD algorithm

Security and Communication Networks 5

Table 1 System specifications

Simulation parameters ValuesPacket size 1024KbpsPacket rate Random packetssecRouting protocol AODVChannel bit rate 10MBsInitial power 25 JSensor node sensing power 5 times 10minus8 JTransmission range 150ndash250 metersDuty cycle 20-time slots

algorithm generates the population using population gen-eration algorithm The suggested algorithm initially loadsthe two-hop neighbor information to the base station thenfor every member in the neighbor list the next-of-neighboris initialized as the population The steps involved in thesuggested algorithm are illustrated as follows

Algorithm 1 (population generation algorithm)

Step 1 Load the two-hop neighbor information with the basestation

Step 2

for (member in the neighbor list)

Population larr Load Individual (newneighbor (next-of-neighbor))

During the implementation of the population generation

algorithm the BS configuration process is performed inparallel for analyzing the behavior of the nodes in the WSN

33 Generation and Distribution of Key Pair After the gener-ation of the population the BS deploys the MRSA algorithmfor generating a public key and private key pair Among thekeys the public key is used for the BS and the private key isused for the sensor nodes The main objective of this step isto prevent the attacker from implementing the DoSL attackBy deploying this step the attacker node is blocked at theinitial level before sending or receiving the packet thus savingthe energy of the sensor nodes The steps involved in thesuggested algorithm are illustrated as follows [20]

Algorithm 2 (MRSA algorithm)

Step 1 Choose the large prime numbers ldquo119899rdquo and ldquo119903rdquoStep 2 Compute the modulus totient using

Φ (119886) = (119899 minus 1) lowast (119903 minus 1) (1)

Step 3 Choose the public exponent ldquo119894rdquo such that 1 lt 119894 lt Φ(119899)and GCD(119894 Φ(119886)) = 1

Step 4 Estimate the private exponent ldquo119898rdquo such that 119898 =119894minus1modΦ(119886)Step 5 Estimate the private key as (119898 119886)Step 6 Estimate the public key as (119894 119886)

The suggested MRSA algorithm has a key size of 512 bitsAmong the total number of bits 256 bits are used as the publickey in the base station and the remaining 256 bits are usedas the private key in the sensor nodes The minimal key sizeprovides the following advantages

(i) Minimal computational complexity(ii) Achieving memory optimization

34 Route Discovery and Relay Node Validation Before ini-tiating the packet transmission the sensor nodes determinethe optimal route usingAdHocOn-DemandDistanceVector(AODV) routing protocol An example of the route discoveryprocess is represented in Figure 3 The suggested protocolhas two key operations such as route discovery and routemaintenance When the source node demands a route to thedestination node or when the lifetime of the existing route tothe destination node has expired the route discovery oper-ation is initiated with the broadcast of the RREQ messagesOn receiving the RREQ messages the intermediate nodesprovide an optimal route to the destination node When theintermediate node is the destination node the RREP packetsare directly transferred to the source node

The steps involved in the suggested AODV based routediscovery are described as follows

Algorithm 3 (AODV routing protocol)Step 1 When a sensor node seeks a route the RREQ packet ispropagated through the entire network till the packet reachesthe destination node

Step 2 When the source node and destination nodes areplaced at the corners of the network the RREQ packets haveto travel a maximum number of hops

Step 3 On receiving the RREQ packets the relay nodesbroadcast it ahead till it reaches the destination

Step 4 The overhead created due to the route request processis represented as follows

119877RREQ = 119873sum119886minus1

(119867) 119864119873minus1 119867sum119887=2

[(119886 minus 1 minus 119887) minus 119873minus1sum119888=1

119877119888]119875119862119887 (2)

Step 5 Once the RREQ packet reaches the destination nodeit replies back to the source node as RREP packet through thesame sequence for reaching the source node

Step 6 According to [21] the overhead created for the RREPpackets is represented as follows

119877RREP = 119873 + 1198732 (119886 minus ℎ minus 2) 119901 (3)

6 Security and Communication Networks

A

B

J

F YL

K

BSC P

D

E

H

I

T

Z

Base station

Destination

RREQRREP

Figure 3 Example for the route discovery process using AODV

Step 7 The overall overhead introduced for the route discov-ery process is

119877Overall = RREQ + RREP119877Overall = 119873sum

119886minus1

(119867) 119864119873minus1 119867sum119887=2

[(119886 minus 1 minus 119887) minus 119873minus1sum119888=1

119877119888]119875119862119887+ 119873 + 1198732 (119886 minus ℎ minus 2) 119901

(4)

The merits of using the AODV routing protocol for theroute discovery process are as follows

(i) Loop-free routes(ii) Faster response to link breakage(iii) Minimal demand for the broadcast

After establishing an optimal route the sensor nodesestimate the trustworthiness of the neighbor nodes usingfitness evaluation function

35 Behavior Monitoring After ensuring the trustworthinessof the neighbor nodes the sensor nodes forward the packetsDuring the transmission if the sensor node suspects any

malicious behaviors as follows it estimates the fitness valuebased on the information provided by the BS

(i) Flooding of data packets(ii) Transmission of large sized data packets that exceed

the data capacity of the sensor nodes

By estimating the fitness value based on attacker ID thechromosome of the already existing attacker is determinedAfter estimating the fitness value the sensor nodes providealert messages about the neighbor node behavior to the BSOn receiving the alertmessage the BS performs the crossoverandmutation operations on the chromosomes for identifyingand analyzing the method that is used by the attackerfor implementing the attack The resultant chromosomesobtained from the crossover and mutation operation areadded to the existing population Finally the BS confirmswhether the particular neighbor node is a normal node oran attacker node If the BS determines the neighbor nodeas an attacker node then the BS broadcasts the blockedinformation to all the other sensor nodes in the WSN Byexploiting the suggested GA-DoSLD algorithm the attackernodes that introduce the DoSL attacks are eliminated fromthe communication thus saving the energy of the sensornodes Notations describe the symbols used in Algorithm 4

Security and Communication Networks 7

for the proposed GA-DoSLD The steps involved in thesuggested GA-DoSLD algorithm are illustrated below

Algorithm 4 (GA-DoSLD algorithm)

Input Population

Output Optimal population with fitness value

Step 1 Compute the index of individuals

Individual larr Random member (population)Initialize the array of fittest as emptyFor (node in population)If (FittestgetFitness() = getIndividual(node)getFit-ness())

Fittest = getIndividual (node) (5)

Individuals [index] = Fittest

Step 2 Compute fitness function

Load member populationCompute the weight accuracy (119882ac) and relativeaccuracy (119877ac)Compute the occurrences of weight (119882oc) and relativeweight (119877oc)

Fitness = 119882ac lowast accuracy of 119898 hop + 119882oc

lowast occurrence of 119898 hopFitness = (1198821 + 1198822) lowast af + (minus1198822) lowast 119877oc

(6)

Step 3 Execute reproduction

Initialize the new pop as an empty setselect the random member in the input populationbased on fitness functionFor (119894 = 1 119894 le maximum size of population 119894 + +)119883 larr Random selected member in population basedon fitness function119884 larr Random selected member in population basedon fitness functionFind the parent profiles of (119883119884)Len 119883 larr length (119883)Len 119884 larr length (119884)

119888 = Select random number between 1 and Len 119883new chromosome

= (substring (119883 1 119888) substring (119884 1 119888)) (7)

Set offspring as new chromosome

Step 4 Population Update

If (random probability to mutate ge threshold)

off spring larr997888 Mutates (off spring)Set new population

larr997888 Union (new population offspring)(8)

End doPopulation larr Union (new population new pop)Return Best (Population Fitness)

4 Performance Analysis

This section describes the performance results of the pro-posed GA-DoSLD algorithm for the following metrics

(i) Normalized energy consumption(ii) Effective packet number(iii) End-to-end delay(iv) Average energy consumption(v) Packet delivery ratio(vi) Throughput ratio versus packet rate

To prove the superiority of the proposed GA-DoSLD algo-rithm it is compared with the existing algorithms such aszero knowledge protocol (ZKP) [22] X-MAC and Two-TierEnergy-Efficient Secure (TE2S) scheme [23] and their resultsare discussed in the following sections

41 Normalized Energy Consumption Normalized energyconsumption is the amount of energy consumed for transfer-ring 3 packets per second The normalized energy consump-tion of the existing X-MAC algorithm ZKP TE2P schemeand the proposed GA-DoSLD algorithm is validated for mul-tiple intervals of attackThe comparison result represented inFigure 4 depicts that for all the attack intervals the suggestedGA-DoSLD algorithm consumes minimal energy

42 Effective Packet Number The effective packet number ofthe existing X-MAC algorithm ZKP TE2S scheme and theproposed GA-DoSLD algorithm is validated for the variableattack intervals The comparison considers the packet send-ing rate as 1 packet every 3 seconds The comparison resultrepresented in Figure 5 shows that the suggested GA-DoSLDalgorithm provides higher scores on effective packet numberthan the existing schemes

8 Security and Communication Networks

0

20

40

60

80

100

05 1 15 2 25 3 35 4

Ener

gy co

nsum

ptio

n (m

JSec

)

Attack interval

X-MACZKP

GA-DoSLDTE2S

Figure 4 Comparison of normalized energy consumption for theexisting and the proposed methods

0

200

400

600

800

1000

1200

1400

X-MACZKP

GA-DoSLD

05 1 15 2 25 3 35 4Attack interval

Effec

tive p

acke

t num

ber (

pack

et3

sec)

TE2S

Figure 5 Comparison of packet number versus attack interval

43 End-to-End Delay The end-to-end delay is defined asthe average time consumed for transmitting the packets Theanalysis of end-to-end delay with respect to the packet size isrepresented in Figure 6 From the figure it is clear that whencompared to existing X-MAC ZKP and TE2S algorithms thesuggested GA-DoSLD algorithm provides a minimal end-to-end delay for the variable packet sizes

44 Average Energy Consumption The average energy con-sumption is the amount of energy consumed by the algo-rithms for transmitting the data packets The comparison ofaverage energy consumption for the existing X-MAC ZKPTE2S schemes and the proposed GA-DoSLD algorithm isrepresented in Figure 7 From the figure it is clear that thesuggested GA-DoSLD algorithm provides minimal energyconsumption than the existing schemes

005

115

225

335

128 256 384 512 640Packet size

X-MACZKP

GA-DoSLD

End-

to-e

nd d

elay

(sec

onds

)

4

TE2S

Figure 6 Comparison of end-to-end delay versus packet size for theexisting and the proposed methods

0

05

1

15

2

25

10 20 30 40 50 60 70Simulation time (ms)

X-MACZKP

GA-DoSLD

Aver

age e

nerg

y co

nsum

ptio

n (J

S)

TE2S

Figure 7 Analysis of average energy consumption versus simula-tion time for the existing and the proposed methods

45 Packet Delivery Ratio The packet delivery ratio (PDR) isdefined as the ratio of the number of data packets successfullydelivered to the destination node to the number of datapackets transmitted from the source The estimation of thePDR is based on the following equation

PDR = 119875119877 lowast 100sum119899119886minus1

119875Gen119886

(9)

where 119875119877 represents the number of data packets received atthe destination node 119875Gen is the total number of data packetsgenerated by the source nodes and 119899 denotes the numberof sensor nodes The comparison of PDR with respect to thesimulation time is represented in Figure 8

From the figure it is analyzed that when compared to theexisting X-MAC ZKP and TE2S schemes the proposed GA-DoSLD algorithm provides higher PDR

Security and Communication Networks 9

0

20

40

60

80

100

5 10 15 20 25 30 35 40 45 50

Pack

et d

eliv

ery

ratio

()

Simulation time (ms)

X-MACZKP

GA-DoSLDTE2S

Figure 8 Comparison of packet delivery ratio versus simulationtime for the existing and proposed schemes

46 Throughput Performance for Various Packet SendingRates The effectiveness of the protocol depends on thesuccessful reception and transmission of data packets underthe various sending rates such as 1 packet3 seconds 1packet5 seconds and 1 packet7 seconds [22] In this paperthe packet sending rate of 1 packet3 seconds is taken tovalidate the performance of proposed work The estimationof the throughput ratio is based on the following equation

Throughput ratio = 119875NS119875NT (10)

where 119875NS denotes the packet number under simulation sce-nario and 119875NT represents the packet number delivered underthe theoretical scenarioThe superiority of the suggested GA-DoSLD algorithm is validated against the existing algorithmssuch as X-MAC ZKP and TE2P for a packer rate of 1 packetper 3 seconds Figure 9 represents the comparison of thethroughput ratio with respect to the variable attack interval

From the figure it is clear that the suggested GA-DoSLDalgorithm provides higher throughput than the existing algo-rithms under the packet sending rate of 1 packet3 seconds

5 Conclusion and Future Work

In this paper an efficient GA-DoSLD algorithm is proposedfor generating the DoSL attack profiles from multiple sensornodes such that the attacker nodes can be prevented from thecommunication process Initially a WSN is simulated with100 numbers of static sensor nodes then the BS performs theoperations such as key pair generation and behaviormonitor-ing in parallel The base station monitors the behavior of thesensor nodes and initializes every behavior as a chromosomeThe MRSA algorithm is implemented in the base stationfor generating and distributing the key pair among thesensor nodes Before initiating the communication betweenthe sensor nodes the AODV routing protocol estimates theoptimal route To validate the trustworthiness of the relaynodes in the route the fitness value is estimated for every

0

5000

10000

15000

20000

25000

30000

35000

40000

45000

50000

05 1 15 2 25 3 35 4Attack interval (secs)

X-MACZKP

GA-DoSLDTh

roug

hput

for t

he p

acke

t sen

ding

rate

of 1

pac

ket3

seco

nds

TE2P

Figure 9 Comparison of throughput under packet sending rate of1 packet3 seconds versus attack interval

chromosome If the chromosome is determined as unusualit is validated against the existing attack profiles If there doesnot exist a match the pair of chromosomes is subjected tothe crossover and mutation operations The resultant chro-mosomes are added to the existing chromosomes Finally theBS determines the attacker nodes broadcasting the blockedinformation to all the sensor nodes in the network To provethe superiority of the suggested GA-DoSLD algorithm itis compared against the existing X-MAC ZKP and TE2Sschemes for the metrics such as normalized energy con-sumption effective packet number end-to-end delay averageenergy consumption packet delivery ratio and throughputratio versus packet rate The validation results prove thatwhen compared to the existing schemes the proposedalgorithm provides optimal results for all the metrics Therepeated execution of the GA-DoSLD algorithm in the sensornodes consumes a considerable amount of energy Thus toachieve the energy optimization a different soft computingalgorithm other than GA can be used in future for detectingthe denial-of-sleep attack in the WSN environment

Notations

119873 Expected number of hops119867 Number of hops between the source anddestination119864 Number of neighbors at the higher tiers119877119888 Expected number of neighbors at 119888th hop119862119887 Additional coverage index of the nodewith 119887 neighbors119882ac Weight accuracy

10 Security and Communication Networks

119877ac Accuracy relative119882oc Occurrence119877oc Relative weight of occurrence

Competing Interests

The authors declare that there is no conflict of interestsregarding the publication of this paper

References

[1] V C Manju S L Senthil Lekha and M Sasi Kumar ldquoMech-anisms for detecting and preventing denial of sleep attacks onwireless sensor networksrdquo in Proceedings of the IEEE Conferenceon Information and Communication Technologies (ICT rsquo13) pp74ndash77 Tamil Nadu India April 2013

[2] D R Raymond R C Marchany M I Brownfield and S FMidkiff ldquoEffects of denial-of-sleep attacks on wireless sensornetworkMAC protocolsrdquo IEEE Transactions on Vehicular Tech-nology vol 58 no 1 pp 367ndash380 2009

[3] R P Manohar and E Baburaj ldquoDetection of Stealthy Denialof Service (S-DoS) attacks in wireless sensor networksrdquo Inter-national Journal of Computer Science and Information Security(IJCSIS) vol 14 pp 343ndash348 2016

[4] D Mansouri L Mokddad J Ben-Othman and M IoualalenldquoPreventing denial of service attacks in wireless sensor net-worksrdquo in Proceedings of the IEEE International Conference onCommunications (ICC rsquo15) pp 3014ndash3019 London UK June2015

[5] D Mansouri L Mokdad J Ben-Othman and M IoualalenldquoDetecting DoS attacks in WSN based on clustering tech-niquerdquo in Proceedings of the IEEEWireless Communications andNetworking Conference (WCNC rsquo13) pp 2214ndash2219 ShanghaiChina April 2013

[6] J-L Chen Y-W Ma X Wang Y-M Huang and Y-F LaildquoTime-division secret key protocol for wireless sensor network-ingrdquo Institution of Engineering andTechnology Communicationsvol 5 no 12 pp 1720ndash1726 2011

[7] D He C Chen S Chan and J Bu ldquoDiCode DoS-resistant anddistributed code dissemination in wireless sensor networksrdquoIEEE Transactions on Wireless Communications vol 11 no 5pp 1946ndash1956 2012

[8] G Han J Jiang W Shen L Shu and J Rodrigues ldquoIDSEP anovel intrusion detection scheme based on energy predictionin cluster-based wireless sensor networksrdquo IET InformationSecurity vol 7 no 2 pp 97ndash105 2013

[9] E B Ram Pradheep Manohar ldquoDetection of stealthy denialof service (S-DoS) attacks in wireless sensor networksrdquo Inter-national Journal of Computer Science and Information Security(IJCSIS) vol 14 2016

[10] H Tan D Ostry J Zic and S Jha ldquoA confidential and DoS-resistant multi-hop code dissemination protocol for wirelesssensor networksrdquoComputersamp Security vol 32 pp 36ndash55 2013

[11] S M Nam and T H Cho ldquoEnergy efficient method fordetection and prevention of false reports in wireless sensornetworksrdquo in Proceedings of the 8th International Conference onInformation Science and Digital Content Technology (ICIDT rsquo12)pp 766ndash769 Jeju Island South Korea June 2012

[12] S Naik and N Shekokar ldquoConservation of energy in wirelesssensor network by preventing denial of sleep attackrdquo ProcediaComputer Science vol 45 pp 370ndash379 2015

[13] C-T Hsueh C-Y Wen and Y-C Ouyang ldquoA secure schemeagainst power exhausting attacks in hierarchical wireless sensornetworksrdquo IEEE Sensors Journal vol 15 no 6 pp 3590ndash36022015

[14] S Kaur andM Ataullah ldquoSecuring the wireless sensor networkfrom denial of sleep attack by isolating the nodesrdquo InternationalJournal of Computer Applications vol 103 no 1 pp 29ndash33 2014

[15] S Shamshirband A Amini N B Anuar M L Mat Kiah Y WTeh and S Furnell ldquoD-FICCA a density-based fuzzy imperi-alist competitive clustering algorithm for intrusion detection inwireless sensor networksrdquo Measurement vol 55 pp 212ndash2262014

[16] S Shamshirband A Patel N B Anuar M L M Kiah andA Abraham ldquoCooperative game theoretic approach usingfuzzy Q-learning for detecting and preventing intrusions inwireless sensor networksrdquo Engineering Applications of ArtificialIntelligence vol 32 pp 228ndash241 2014

[17] N K Sreelaja and G A Vijayalakshmi Pai ldquoSwarm intelligencebased approach for sinkhole attack detection in wireless sensornetworksrdquo Applied Soft Computing Journal vol 19 pp 68ndash792014

[18] G Keerthana and G Padmavathi ldquoDetecting sinkhole attackin wireless sensor network using enhanced particle swarmoptimization techniquerdquo International Journal of Security andIts Applications vol 10 no 3 pp 41ndash54 2016

[19] A Saeed A Ahmadinia A Javed and H Larijani ldquoRandomneural network based intelligent intrusion detection forwirelesssensor networksrdquo Procedia Computer Science vol 80 pp 2372ndash2376 2016

[20] D Management ldquoRSA Algorithmrdquo 2016 httpwwwdi-mgtcomaursa alghtml

[21] M Zhao Y Li and W Wang ldquoModeling and analyticalstudy of link properties in multihop wireless networksrdquo IEEETransactions on Communications vol 60 no 2 pp 445ndash4552012

[22] C-T Hsueh C-Y Wen and Y-C Ouyang ldquoA secure schemeagainst power exhausting attacks in hierarchical wireless sensornetworksrdquo IEEE Sensors Journal vol 15 no 6 pp 3590ndash36022015

[23] D N S Swapna Naik ldquoConservation of energy in wireless sen-sor network by preventing denial of sleep attackrdquo in Proceedingsof the International Conference on Advanced Computing Tech-nologies and Applications (ICACTA rsquo15) pp 370ndash379 MumbaiIndia March 2015

International Journal of

AerospaceEngineeringHindawi Publishing Corporationhttpwwwhindawicom Volume 2014

RoboticsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Active and Passive Electronic Components

Control Scienceand Engineering

Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

International Journal of

RotatingMachinery

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporation httpwwwhindawicom

Journal ofEngineeringVolume 2014

Submit your manuscripts athttpswwwhindawicom

VLSI Design

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Shock and Vibration

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Civil EngineeringAdvances in

Acoustics and VibrationAdvances in

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Electrical and Computer Engineering

Journal of

Advances inOptoElectronics

Hindawi Publishing Corporation httpwwwhindawicom

Volume 2014

The Scientific World JournalHindawi Publishing Corporation httpwwwhindawicom Volume 2014

SensorsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Modelling amp Simulation in EngineeringHindawi Publishing Corporation httpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Chemical EngineeringInternational Journal of Antennas and

Propagation

International Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Navigation and Observation

International Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

DistributedSensor Networks

International Journal of

Page 3: GA-DoSLD: Genetic Algorithm Based Denial-of-Sleep Attack ...downloads.hindawi.com/journals/scn/2017/9863032.pdf · node can forward the fake data packets to the authorized nodes,

Security and Communication Networks 3

suggested scheme exploited the energy consumption of thesensor nodes for detecting the malicious nodes Furtherbased on the energy consumption thresholds the categoriesof the DoS attacks were determined Simulation resultsproved that the suggested IDSEP efficiently detected themalicious nodes Ram Pradheep Manohar [9] proposed theSlowly Increasing and Decreasing under Constraint DoSAttack Strategy (SIDCAS) for detecting the Stealthy DoS (S-DoS) attacks in WSN In addition to providing security thesuggested approach also decreased the resource maintenancecost Tan et al [10] suggested a Deluge based multihop codedissemination protocol for enhancing the confidentiality ofthe WSN Experimental results proved that the suggestedapproach provided optimal latency dissemination rate andenergy consumption

22 Energy Draining Attacks Nam and Cho [11] suggesteda Statistical En-Route Filtering (SEF) scheme for detectingthe false reports in the intermediate nodes Further thefalse report injection attack was defended using three typesof keys such as individual key pairwise key and clusterkey The comparison of SEF with the suggested methodproved that the proposed method enhanced the energysavings than the SEF in sensor networks Manju et al [1]suggested three steps such as network organizationmaliciousnode detection and selective authentication for detecting thedenial-of-sleep attack in WSN Experimental results provedthat the suggested method was optimal for defending theattacker from performing the task Naik and Shekokar [12]addressed the denial-of-sleep attack using zero knowledgeprotocol and interlock protocol Experimental results provedthat the suggested protocols prevented the replay attack andman-in-the-middle attack and also minimized the resourceconsumption Hsueh et al [13] suggested a cross-layer designof secure scheme with MAC protocol for minimizing theenergy consumption of the sensor nodes Analysis resultsproved that the suggested protocol efficiently defended thereplay attacks and forge attacks Further the security require-ments and energy conservation were coordinated Kaurand Ataullah [14] suggested a hierarchical clustering basedisolation of nodes for addressing the denial-of-sleep attackThe suggested approach enhanced the network lifetime butthe idle listening problem was unaddressed Hsueh et al[13] proposed a cross-layer design of secure scheme inte-grated with MAC protocol for defending against the replayattack and forge attack Experimental results proved that thesuggested protocol coordinated the energy conservation andsecurity requirements

23 Soft Computing Algorithms Used for Addressing theEnergy Draining Attack Shamshirband et al [15] proposeda Density-Based Fuzzy Imperialist Competitive ClusteringAlgorithm (D-FICCA) for detecting the intruders in WSNWhen compared to the existing algorithms the proposedalgorithm produced 87 detection accuracy and 099 clus-tering quality Shamshirband et al [16] suggested a cooper-ative Game-Based Fuzzy Q-Learning (G-FQL) approach fordetecting the intrusions in the WSN The suggested modeldeployed the cooperative defense counterattack scenario for

the sink node and game theory strategy for the base stationnodes When compared to the Low Energy Adaptive Cluster-ingHierarchy (LEACH) the suggestedmodel produced opti-mal detection accuracy counterdefense energy consump-tion and network lifetime Further when compared to theexistingmachine learningmethods the suggestedmodel pro-vided enhanced detection and defense accuracy Sreelaja andVijayalakshmi Pai [17] suggested an Ant Colony Optimiza-tion Attack Detection (ACO-AD) algorithm for detecting thesinkhole attacks in WSN The keys were distributed amongthe alerted nodes using Ant Colony Optimization BooleanExpression Evolver Sign Generation (ABXES) algorithmExperimental results proved that when compared to theexisting LIDeA architecture the suggested architecture min-imized the false positives and also minimized the storage inthe sensor nodes Keerthana and Padmavathi [18] suggestedanEnhancedParticle SwarmOptimization (EPSO) techniquefor detecting the sinkhole attacks in WSN When comparedto the existing ACO and PSO algorithms the suggestedalgorithm provided optimal packet delivery ratio messagedrop average delay and false alarm rate Saeed et al [19]suggested a RandomNeural Network based IDS for detectingthe attackers Experimental results proved that the suggestedIDS provided higher accuracy and reduced performanceoverhead

From the analysis of the existing techniques it is clearthat they do not address the idle listening problem Furtherthe solutions suggested for preventing the DoSL attacksare unrealistic Thus to address the issues in the existingtechniques an efficient GA-DoSLD algorithm is proposed

3 Proposed Method

This section describes the proposed GA-DoSLD algorithmfor analyzing the misbehaviors of the sensor nodes in WSNThe overall flow of the suggested algorithm is represented inFigure 2

From the figure it is clear that the key steps involved inthe suggested algorithm are as follows

(i) WSN initialization(ii) Population generation(iii) Generation and distribution of key pair(iv) Route discovery(v) Behavior monitoring

A detailed description of every step is provided in thefollowing sections

31 WSN Initialization The initial step involved in thesuggested approach is WSN initialization By exploiting theNS2 tool the WSN is initialized with 100 numbers of sensornodes that have random waypoint mobility model Thetransmission range of the WSN is 250 meters Further theinitialized WSN poses the specifications listed in Table 1

32 Population Generation and BS Configuration Once theWSN environment is initialized the suggested GA-DoSLD

4 Security and Communication Networks

Initialization of WSN

Population generation

Route discovery

Verify the relay node

Behaviour monitoring

Update populations N

Evaluate fitnessObjective function

Rule set matching

Decision making (attacknormal)

Generate the key pair and distributeBS configuration process

Calculate personal fitness value

Estimate the fitness value for every

Select pair of chromosome for mating

Include the resulting chromosome

The probability of cross gt random

value

valueThe probability of mutation gt random

chromosome

Pc

Pm

rrarr Op_cross

rrarr Op_Mutant

Figure 2 Overall flow of the proposed GA-DoSLD algorithm

Security and Communication Networks 5

Table 1 System specifications

Simulation parameters ValuesPacket size 1024KbpsPacket rate Random packetssecRouting protocol AODVChannel bit rate 10MBsInitial power 25 JSensor node sensing power 5 times 10minus8 JTransmission range 150ndash250 metersDuty cycle 20-time slots

algorithm generates the population using population gen-eration algorithm The suggested algorithm initially loadsthe two-hop neighbor information to the base station thenfor every member in the neighbor list the next-of-neighboris initialized as the population The steps involved in thesuggested algorithm are illustrated as follows

Algorithm 1 (population generation algorithm)

Step 1 Load the two-hop neighbor information with the basestation

Step 2

for (member in the neighbor list)

Population larr Load Individual (newneighbor (next-of-neighbor))

During the implementation of the population generation

algorithm the BS configuration process is performed inparallel for analyzing the behavior of the nodes in the WSN

33 Generation and Distribution of Key Pair After the gener-ation of the population the BS deploys the MRSA algorithmfor generating a public key and private key pair Among thekeys the public key is used for the BS and the private key isused for the sensor nodes The main objective of this step isto prevent the attacker from implementing the DoSL attackBy deploying this step the attacker node is blocked at theinitial level before sending or receiving the packet thus savingthe energy of the sensor nodes The steps involved in thesuggested algorithm are illustrated as follows [20]

Algorithm 2 (MRSA algorithm)

Step 1 Choose the large prime numbers ldquo119899rdquo and ldquo119903rdquoStep 2 Compute the modulus totient using

Φ (119886) = (119899 minus 1) lowast (119903 minus 1) (1)

Step 3 Choose the public exponent ldquo119894rdquo such that 1 lt 119894 lt Φ(119899)and GCD(119894 Φ(119886)) = 1

Step 4 Estimate the private exponent ldquo119898rdquo such that 119898 =119894minus1modΦ(119886)Step 5 Estimate the private key as (119898 119886)Step 6 Estimate the public key as (119894 119886)

The suggested MRSA algorithm has a key size of 512 bitsAmong the total number of bits 256 bits are used as the publickey in the base station and the remaining 256 bits are usedas the private key in the sensor nodes The minimal key sizeprovides the following advantages

(i) Minimal computational complexity(ii) Achieving memory optimization

34 Route Discovery and Relay Node Validation Before ini-tiating the packet transmission the sensor nodes determinethe optimal route usingAdHocOn-DemandDistanceVector(AODV) routing protocol An example of the route discoveryprocess is represented in Figure 3 The suggested protocolhas two key operations such as route discovery and routemaintenance When the source node demands a route to thedestination node or when the lifetime of the existing route tothe destination node has expired the route discovery oper-ation is initiated with the broadcast of the RREQ messagesOn receiving the RREQ messages the intermediate nodesprovide an optimal route to the destination node When theintermediate node is the destination node the RREP packetsare directly transferred to the source node

The steps involved in the suggested AODV based routediscovery are described as follows

Algorithm 3 (AODV routing protocol)Step 1 When a sensor node seeks a route the RREQ packet ispropagated through the entire network till the packet reachesthe destination node

Step 2 When the source node and destination nodes areplaced at the corners of the network the RREQ packets haveto travel a maximum number of hops

Step 3 On receiving the RREQ packets the relay nodesbroadcast it ahead till it reaches the destination

Step 4 The overhead created due to the route request processis represented as follows

119877RREQ = 119873sum119886minus1

(119867) 119864119873minus1 119867sum119887=2

[(119886 minus 1 minus 119887) minus 119873minus1sum119888=1

119877119888]119875119862119887 (2)

Step 5 Once the RREQ packet reaches the destination nodeit replies back to the source node as RREP packet through thesame sequence for reaching the source node

Step 6 According to [21] the overhead created for the RREPpackets is represented as follows

119877RREP = 119873 + 1198732 (119886 minus ℎ minus 2) 119901 (3)

6 Security and Communication Networks

A

B

J

F YL

K

BSC P

D

E

H

I

T

Z

Base station

Destination

RREQRREP

Figure 3 Example for the route discovery process using AODV

Step 7 The overall overhead introduced for the route discov-ery process is

119877Overall = RREQ + RREP119877Overall = 119873sum

119886minus1

(119867) 119864119873minus1 119867sum119887=2

[(119886 minus 1 minus 119887) minus 119873minus1sum119888=1

119877119888]119875119862119887+ 119873 + 1198732 (119886 minus ℎ minus 2) 119901

(4)

The merits of using the AODV routing protocol for theroute discovery process are as follows

(i) Loop-free routes(ii) Faster response to link breakage(iii) Minimal demand for the broadcast

After establishing an optimal route the sensor nodesestimate the trustworthiness of the neighbor nodes usingfitness evaluation function

35 Behavior Monitoring After ensuring the trustworthinessof the neighbor nodes the sensor nodes forward the packetsDuring the transmission if the sensor node suspects any

malicious behaviors as follows it estimates the fitness valuebased on the information provided by the BS

(i) Flooding of data packets(ii) Transmission of large sized data packets that exceed

the data capacity of the sensor nodes

By estimating the fitness value based on attacker ID thechromosome of the already existing attacker is determinedAfter estimating the fitness value the sensor nodes providealert messages about the neighbor node behavior to the BSOn receiving the alertmessage the BS performs the crossoverandmutation operations on the chromosomes for identifyingand analyzing the method that is used by the attackerfor implementing the attack The resultant chromosomesobtained from the crossover and mutation operation areadded to the existing population Finally the BS confirmswhether the particular neighbor node is a normal node oran attacker node If the BS determines the neighbor nodeas an attacker node then the BS broadcasts the blockedinformation to all the other sensor nodes in the WSN Byexploiting the suggested GA-DoSLD algorithm the attackernodes that introduce the DoSL attacks are eliminated fromthe communication thus saving the energy of the sensornodes Notations describe the symbols used in Algorithm 4

Security and Communication Networks 7

for the proposed GA-DoSLD The steps involved in thesuggested GA-DoSLD algorithm are illustrated below

Algorithm 4 (GA-DoSLD algorithm)

Input Population

Output Optimal population with fitness value

Step 1 Compute the index of individuals

Individual larr Random member (population)Initialize the array of fittest as emptyFor (node in population)If (FittestgetFitness() = getIndividual(node)getFit-ness())

Fittest = getIndividual (node) (5)

Individuals [index] = Fittest

Step 2 Compute fitness function

Load member populationCompute the weight accuracy (119882ac) and relativeaccuracy (119877ac)Compute the occurrences of weight (119882oc) and relativeweight (119877oc)

Fitness = 119882ac lowast accuracy of 119898 hop + 119882oc

lowast occurrence of 119898 hopFitness = (1198821 + 1198822) lowast af + (minus1198822) lowast 119877oc

(6)

Step 3 Execute reproduction

Initialize the new pop as an empty setselect the random member in the input populationbased on fitness functionFor (119894 = 1 119894 le maximum size of population 119894 + +)119883 larr Random selected member in population basedon fitness function119884 larr Random selected member in population basedon fitness functionFind the parent profiles of (119883119884)Len 119883 larr length (119883)Len 119884 larr length (119884)

119888 = Select random number between 1 and Len 119883new chromosome

= (substring (119883 1 119888) substring (119884 1 119888)) (7)

Set offspring as new chromosome

Step 4 Population Update

If (random probability to mutate ge threshold)

off spring larr997888 Mutates (off spring)Set new population

larr997888 Union (new population offspring)(8)

End doPopulation larr Union (new population new pop)Return Best (Population Fitness)

4 Performance Analysis

This section describes the performance results of the pro-posed GA-DoSLD algorithm for the following metrics

(i) Normalized energy consumption(ii) Effective packet number(iii) End-to-end delay(iv) Average energy consumption(v) Packet delivery ratio(vi) Throughput ratio versus packet rate

To prove the superiority of the proposed GA-DoSLD algo-rithm it is compared with the existing algorithms such aszero knowledge protocol (ZKP) [22] X-MAC and Two-TierEnergy-Efficient Secure (TE2S) scheme [23] and their resultsare discussed in the following sections

41 Normalized Energy Consumption Normalized energyconsumption is the amount of energy consumed for transfer-ring 3 packets per second The normalized energy consump-tion of the existing X-MAC algorithm ZKP TE2P schemeand the proposed GA-DoSLD algorithm is validated for mul-tiple intervals of attackThe comparison result represented inFigure 4 depicts that for all the attack intervals the suggestedGA-DoSLD algorithm consumes minimal energy

42 Effective Packet Number The effective packet number ofthe existing X-MAC algorithm ZKP TE2S scheme and theproposed GA-DoSLD algorithm is validated for the variableattack intervals The comparison considers the packet send-ing rate as 1 packet every 3 seconds The comparison resultrepresented in Figure 5 shows that the suggested GA-DoSLDalgorithm provides higher scores on effective packet numberthan the existing schemes

8 Security and Communication Networks

0

20

40

60

80

100

05 1 15 2 25 3 35 4

Ener

gy co

nsum

ptio

n (m

JSec

)

Attack interval

X-MACZKP

GA-DoSLDTE2S

Figure 4 Comparison of normalized energy consumption for theexisting and the proposed methods

0

200

400

600

800

1000

1200

1400

X-MACZKP

GA-DoSLD

05 1 15 2 25 3 35 4Attack interval

Effec

tive p

acke

t num

ber (

pack

et3

sec)

TE2S

Figure 5 Comparison of packet number versus attack interval

43 End-to-End Delay The end-to-end delay is defined asthe average time consumed for transmitting the packets Theanalysis of end-to-end delay with respect to the packet size isrepresented in Figure 6 From the figure it is clear that whencompared to existing X-MAC ZKP and TE2S algorithms thesuggested GA-DoSLD algorithm provides a minimal end-to-end delay for the variable packet sizes

44 Average Energy Consumption The average energy con-sumption is the amount of energy consumed by the algo-rithms for transmitting the data packets The comparison ofaverage energy consumption for the existing X-MAC ZKPTE2S schemes and the proposed GA-DoSLD algorithm isrepresented in Figure 7 From the figure it is clear that thesuggested GA-DoSLD algorithm provides minimal energyconsumption than the existing schemes

005

115

225

335

128 256 384 512 640Packet size

X-MACZKP

GA-DoSLD

End-

to-e

nd d

elay

(sec

onds

)

4

TE2S

Figure 6 Comparison of end-to-end delay versus packet size for theexisting and the proposed methods

0

05

1

15

2

25

10 20 30 40 50 60 70Simulation time (ms)

X-MACZKP

GA-DoSLD

Aver

age e

nerg

y co

nsum

ptio

n (J

S)

TE2S

Figure 7 Analysis of average energy consumption versus simula-tion time for the existing and the proposed methods

45 Packet Delivery Ratio The packet delivery ratio (PDR) isdefined as the ratio of the number of data packets successfullydelivered to the destination node to the number of datapackets transmitted from the source The estimation of thePDR is based on the following equation

PDR = 119875119877 lowast 100sum119899119886minus1

119875Gen119886

(9)

where 119875119877 represents the number of data packets received atthe destination node 119875Gen is the total number of data packetsgenerated by the source nodes and 119899 denotes the numberof sensor nodes The comparison of PDR with respect to thesimulation time is represented in Figure 8

From the figure it is analyzed that when compared to theexisting X-MAC ZKP and TE2S schemes the proposed GA-DoSLD algorithm provides higher PDR

Security and Communication Networks 9

0

20

40

60

80

100

5 10 15 20 25 30 35 40 45 50

Pack

et d

eliv

ery

ratio

()

Simulation time (ms)

X-MACZKP

GA-DoSLDTE2S

Figure 8 Comparison of packet delivery ratio versus simulationtime for the existing and proposed schemes

46 Throughput Performance for Various Packet SendingRates The effectiveness of the protocol depends on thesuccessful reception and transmission of data packets underthe various sending rates such as 1 packet3 seconds 1packet5 seconds and 1 packet7 seconds [22] In this paperthe packet sending rate of 1 packet3 seconds is taken tovalidate the performance of proposed work The estimationof the throughput ratio is based on the following equation

Throughput ratio = 119875NS119875NT (10)

where 119875NS denotes the packet number under simulation sce-nario and 119875NT represents the packet number delivered underthe theoretical scenarioThe superiority of the suggested GA-DoSLD algorithm is validated against the existing algorithmssuch as X-MAC ZKP and TE2P for a packer rate of 1 packetper 3 seconds Figure 9 represents the comparison of thethroughput ratio with respect to the variable attack interval

From the figure it is clear that the suggested GA-DoSLDalgorithm provides higher throughput than the existing algo-rithms under the packet sending rate of 1 packet3 seconds

5 Conclusion and Future Work

In this paper an efficient GA-DoSLD algorithm is proposedfor generating the DoSL attack profiles from multiple sensornodes such that the attacker nodes can be prevented from thecommunication process Initially a WSN is simulated with100 numbers of static sensor nodes then the BS performs theoperations such as key pair generation and behaviormonitor-ing in parallel The base station monitors the behavior of thesensor nodes and initializes every behavior as a chromosomeThe MRSA algorithm is implemented in the base stationfor generating and distributing the key pair among thesensor nodes Before initiating the communication betweenthe sensor nodes the AODV routing protocol estimates theoptimal route To validate the trustworthiness of the relaynodes in the route the fitness value is estimated for every

0

5000

10000

15000

20000

25000

30000

35000

40000

45000

50000

05 1 15 2 25 3 35 4Attack interval (secs)

X-MACZKP

GA-DoSLDTh

roug

hput

for t

he p

acke

t sen

ding

rate

of 1

pac

ket3

seco

nds

TE2P

Figure 9 Comparison of throughput under packet sending rate of1 packet3 seconds versus attack interval

chromosome If the chromosome is determined as unusualit is validated against the existing attack profiles If there doesnot exist a match the pair of chromosomes is subjected tothe crossover and mutation operations The resultant chro-mosomes are added to the existing chromosomes Finally theBS determines the attacker nodes broadcasting the blockedinformation to all the sensor nodes in the network To provethe superiority of the suggested GA-DoSLD algorithm itis compared against the existing X-MAC ZKP and TE2Sschemes for the metrics such as normalized energy con-sumption effective packet number end-to-end delay averageenergy consumption packet delivery ratio and throughputratio versus packet rate The validation results prove thatwhen compared to the existing schemes the proposedalgorithm provides optimal results for all the metrics Therepeated execution of the GA-DoSLD algorithm in the sensornodes consumes a considerable amount of energy Thus toachieve the energy optimization a different soft computingalgorithm other than GA can be used in future for detectingthe denial-of-sleep attack in the WSN environment

Notations

119873 Expected number of hops119867 Number of hops between the source anddestination119864 Number of neighbors at the higher tiers119877119888 Expected number of neighbors at 119888th hop119862119887 Additional coverage index of the nodewith 119887 neighbors119882ac Weight accuracy

10 Security and Communication Networks

119877ac Accuracy relative119882oc Occurrence119877oc Relative weight of occurrence

Competing Interests

The authors declare that there is no conflict of interestsregarding the publication of this paper

References

[1] V C Manju S L Senthil Lekha and M Sasi Kumar ldquoMech-anisms for detecting and preventing denial of sleep attacks onwireless sensor networksrdquo in Proceedings of the IEEE Conferenceon Information and Communication Technologies (ICT rsquo13) pp74ndash77 Tamil Nadu India April 2013

[2] D R Raymond R C Marchany M I Brownfield and S FMidkiff ldquoEffects of denial-of-sleep attacks on wireless sensornetworkMAC protocolsrdquo IEEE Transactions on Vehicular Tech-nology vol 58 no 1 pp 367ndash380 2009

[3] R P Manohar and E Baburaj ldquoDetection of Stealthy Denialof Service (S-DoS) attacks in wireless sensor networksrdquo Inter-national Journal of Computer Science and Information Security(IJCSIS) vol 14 pp 343ndash348 2016

[4] D Mansouri L Mokddad J Ben-Othman and M IoualalenldquoPreventing denial of service attacks in wireless sensor net-worksrdquo in Proceedings of the IEEE International Conference onCommunications (ICC rsquo15) pp 3014ndash3019 London UK June2015

[5] D Mansouri L Mokdad J Ben-Othman and M IoualalenldquoDetecting DoS attacks in WSN based on clustering tech-niquerdquo in Proceedings of the IEEEWireless Communications andNetworking Conference (WCNC rsquo13) pp 2214ndash2219 ShanghaiChina April 2013

[6] J-L Chen Y-W Ma X Wang Y-M Huang and Y-F LaildquoTime-division secret key protocol for wireless sensor network-ingrdquo Institution of Engineering andTechnology Communicationsvol 5 no 12 pp 1720ndash1726 2011

[7] D He C Chen S Chan and J Bu ldquoDiCode DoS-resistant anddistributed code dissemination in wireless sensor networksrdquoIEEE Transactions on Wireless Communications vol 11 no 5pp 1946ndash1956 2012

[8] G Han J Jiang W Shen L Shu and J Rodrigues ldquoIDSEP anovel intrusion detection scheme based on energy predictionin cluster-based wireless sensor networksrdquo IET InformationSecurity vol 7 no 2 pp 97ndash105 2013

[9] E B Ram Pradheep Manohar ldquoDetection of stealthy denialof service (S-DoS) attacks in wireless sensor networksrdquo Inter-national Journal of Computer Science and Information Security(IJCSIS) vol 14 2016

[10] H Tan D Ostry J Zic and S Jha ldquoA confidential and DoS-resistant multi-hop code dissemination protocol for wirelesssensor networksrdquoComputersamp Security vol 32 pp 36ndash55 2013

[11] S M Nam and T H Cho ldquoEnergy efficient method fordetection and prevention of false reports in wireless sensornetworksrdquo in Proceedings of the 8th International Conference onInformation Science and Digital Content Technology (ICIDT rsquo12)pp 766ndash769 Jeju Island South Korea June 2012

[12] S Naik and N Shekokar ldquoConservation of energy in wirelesssensor network by preventing denial of sleep attackrdquo ProcediaComputer Science vol 45 pp 370ndash379 2015

[13] C-T Hsueh C-Y Wen and Y-C Ouyang ldquoA secure schemeagainst power exhausting attacks in hierarchical wireless sensornetworksrdquo IEEE Sensors Journal vol 15 no 6 pp 3590ndash36022015

[14] S Kaur andM Ataullah ldquoSecuring the wireless sensor networkfrom denial of sleep attack by isolating the nodesrdquo InternationalJournal of Computer Applications vol 103 no 1 pp 29ndash33 2014

[15] S Shamshirband A Amini N B Anuar M L Mat Kiah Y WTeh and S Furnell ldquoD-FICCA a density-based fuzzy imperi-alist competitive clustering algorithm for intrusion detection inwireless sensor networksrdquo Measurement vol 55 pp 212ndash2262014

[16] S Shamshirband A Patel N B Anuar M L M Kiah andA Abraham ldquoCooperative game theoretic approach usingfuzzy Q-learning for detecting and preventing intrusions inwireless sensor networksrdquo Engineering Applications of ArtificialIntelligence vol 32 pp 228ndash241 2014

[17] N K Sreelaja and G A Vijayalakshmi Pai ldquoSwarm intelligencebased approach for sinkhole attack detection in wireless sensornetworksrdquo Applied Soft Computing Journal vol 19 pp 68ndash792014

[18] G Keerthana and G Padmavathi ldquoDetecting sinkhole attackin wireless sensor network using enhanced particle swarmoptimization techniquerdquo International Journal of Security andIts Applications vol 10 no 3 pp 41ndash54 2016

[19] A Saeed A Ahmadinia A Javed and H Larijani ldquoRandomneural network based intelligent intrusion detection forwirelesssensor networksrdquo Procedia Computer Science vol 80 pp 2372ndash2376 2016

[20] D Management ldquoRSA Algorithmrdquo 2016 httpwwwdi-mgtcomaursa alghtml

[21] M Zhao Y Li and W Wang ldquoModeling and analyticalstudy of link properties in multihop wireless networksrdquo IEEETransactions on Communications vol 60 no 2 pp 445ndash4552012

[22] C-T Hsueh C-Y Wen and Y-C Ouyang ldquoA secure schemeagainst power exhausting attacks in hierarchical wireless sensornetworksrdquo IEEE Sensors Journal vol 15 no 6 pp 3590ndash36022015

[23] D N S Swapna Naik ldquoConservation of energy in wireless sen-sor network by preventing denial of sleep attackrdquo in Proceedingsof the International Conference on Advanced Computing Tech-nologies and Applications (ICACTA rsquo15) pp 370ndash379 MumbaiIndia March 2015

International Journal of

AerospaceEngineeringHindawi Publishing Corporationhttpwwwhindawicom Volume 2014

RoboticsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Active and Passive Electronic Components

Control Scienceand Engineering

Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

International Journal of

RotatingMachinery

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporation httpwwwhindawicom

Journal ofEngineeringVolume 2014

Submit your manuscripts athttpswwwhindawicom

VLSI Design

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Shock and Vibration

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Civil EngineeringAdvances in

Acoustics and VibrationAdvances in

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Electrical and Computer Engineering

Journal of

Advances inOptoElectronics

Hindawi Publishing Corporation httpwwwhindawicom

Volume 2014

The Scientific World JournalHindawi Publishing Corporation httpwwwhindawicom Volume 2014

SensorsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Modelling amp Simulation in EngineeringHindawi Publishing Corporation httpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Chemical EngineeringInternational Journal of Antennas and

Propagation

International Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Navigation and Observation

International Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

DistributedSensor Networks

International Journal of

Page 4: GA-DoSLD: Genetic Algorithm Based Denial-of-Sleep Attack ...downloads.hindawi.com/journals/scn/2017/9863032.pdf · node can forward the fake data packets to the authorized nodes,

4 Security and Communication Networks

Initialization of WSN

Population generation

Route discovery

Verify the relay node

Behaviour monitoring

Update populations N

Evaluate fitnessObjective function

Rule set matching

Decision making (attacknormal)

Generate the key pair and distributeBS configuration process

Calculate personal fitness value

Estimate the fitness value for every

Select pair of chromosome for mating

Include the resulting chromosome

The probability of cross gt random

value

valueThe probability of mutation gt random

chromosome

Pc

Pm

rrarr Op_cross

rrarr Op_Mutant

Figure 2 Overall flow of the proposed GA-DoSLD algorithm

Security and Communication Networks 5

Table 1 System specifications

Simulation parameters ValuesPacket size 1024KbpsPacket rate Random packetssecRouting protocol AODVChannel bit rate 10MBsInitial power 25 JSensor node sensing power 5 times 10minus8 JTransmission range 150ndash250 metersDuty cycle 20-time slots

algorithm generates the population using population gen-eration algorithm The suggested algorithm initially loadsthe two-hop neighbor information to the base station thenfor every member in the neighbor list the next-of-neighboris initialized as the population The steps involved in thesuggested algorithm are illustrated as follows

Algorithm 1 (population generation algorithm)

Step 1 Load the two-hop neighbor information with the basestation

Step 2

for (member in the neighbor list)

Population larr Load Individual (newneighbor (next-of-neighbor))

During the implementation of the population generation

algorithm the BS configuration process is performed inparallel for analyzing the behavior of the nodes in the WSN

33 Generation and Distribution of Key Pair After the gener-ation of the population the BS deploys the MRSA algorithmfor generating a public key and private key pair Among thekeys the public key is used for the BS and the private key isused for the sensor nodes The main objective of this step isto prevent the attacker from implementing the DoSL attackBy deploying this step the attacker node is blocked at theinitial level before sending or receiving the packet thus savingthe energy of the sensor nodes The steps involved in thesuggested algorithm are illustrated as follows [20]

Algorithm 2 (MRSA algorithm)

Step 1 Choose the large prime numbers ldquo119899rdquo and ldquo119903rdquoStep 2 Compute the modulus totient using

Φ (119886) = (119899 minus 1) lowast (119903 minus 1) (1)

Step 3 Choose the public exponent ldquo119894rdquo such that 1 lt 119894 lt Φ(119899)and GCD(119894 Φ(119886)) = 1

Step 4 Estimate the private exponent ldquo119898rdquo such that 119898 =119894minus1modΦ(119886)Step 5 Estimate the private key as (119898 119886)Step 6 Estimate the public key as (119894 119886)

The suggested MRSA algorithm has a key size of 512 bitsAmong the total number of bits 256 bits are used as the publickey in the base station and the remaining 256 bits are usedas the private key in the sensor nodes The minimal key sizeprovides the following advantages

(i) Minimal computational complexity(ii) Achieving memory optimization

34 Route Discovery and Relay Node Validation Before ini-tiating the packet transmission the sensor nodes determinethe optimal route usingAdHocOn-DemandDistanceVector(AODV) routing protocol An example of the route discoveryprocess is represented in Figure 3 The suggested protocolhas two key operations such as route discovery and routemaintenance When the source node demands a route to thedestination node or when the lifetime of the existing route tothe destination node has expired the route discovery oper-ation is initiated with the broadcast of the RREQ messagesOn receiving the RREQ messages the intermediate nodesprovide an optimal route to the destination node When theintermediate node is the destination node the RREP packetsare directly transferred to the source node

The steps involved in the suggested AODV based routediscovery are described as follows

Algorithm 3 (AODV routing protocol)Step 1 When a sensor node seeks a route the RREQ packet ispropagated through the entire network till the packet reachesthe destination node

Step 2 When the source node and destination nodes areplaced at the corners of the network the RREQ packets haveto travel a maximum number of hops

Step 3 On receiving the RREQ packets the relay nodesbroadcast it ahead till it reaches the destination

Step 4 The overhead created due to the route request processis represented as follows

119877RREQ = 119873sum119886minus1

(119867) 119864119873minus1 119867sum119887=2

[(119886 minus 1 minus 119887) minus 119873minus1sum119888=1

119877119888]119875119862119887 (2)

Step 5 Once the RREQ packet reaches the destination nodeit replies back to the source node as RREP packet through thesame sequence for reaching the source node

Step 6 According to [21] the overhead created for the RREPpackets is represented as follows

119877RREP = 119873 + 1198732 (119886 minus ℎ minus 2) 119901 (3)

6 Security and Communication Networks

A

B

J

F YL

K

BSC P

D

E

H

I

T

Z

Base station

Destination

RREQRREP

Figure 3 Example for the route discovery process using AODV

Step 7 The overall overhead introduced for the route discov-ery process is

119877Overall = RREQ + RREP119877Overall = 119873sum

119886minus1

(119867) 119864119873minus1 119867sum119887=2

[(119886 minus 1 minus 119887) minus 119873minus1sum119888=1

119877119888]119875119862119887+ 119873 + 1198732 (119886 minus ℎ minus 2) 119901

(4)

The merits of using the AODV routing protocol for theroute discovery process are as follows

(i) Loop-free routes(ii) Faster response to link breakage(iii) Minimal demand for the broadcast

After establishing an optimal route the sensor nodesestimate the trustworthiness of the neighbor nodes usingfitness evaluation function

35 Behavior Monitoring After ensuring the trustworthinessof the neighbor nodes the sensor nodes forward the packetsDuring the transmission if the sensor node suspects any

malicious behaviors as follows it estimates the fitness valuebased on the information provided by the BS

(i) Flooding of data packets(ii) Transmission of large sized data packets that exceed

the data capacity of the sensor nodes

By estimating the fitness value based on attacker ID thechromosome of the already existing attacker is determinedAfter estimating the fitness value the sensor nodes providealert messages about the neighbor node behavior to the BSOn receiving the alertmessage the BS performs the crossoverandmutation operations on the chromosomes for identifyingand analyzing the method that is used by the attackerfor implementing the attack The resultant chromosomesobtained from the crossover and mutation operation areadded to the existing population Finally the BS confirmswhether the particular neighbor node is a normal node oran attacker node If the BS determines the neighbor nodeas an attacker node then the BS broadcasts the blockedinformation to all the other sensor nodes in the WSN Byexploiting the suggested GA-DoSLD algorithm the attackernodes that introduce the DoSL attacks are eliminated fromthe communication thus saving the energy of the sensornodes Notations describe the symbols used in Algorithm 4

Security and Communication Networks 7

for the proposed GA-DoSLD The steps involved in thesuggested GA-DoSLD algorithm are illustrated below

Algorithm 4 (GA-DoSLD algorithm)

Input Population

Output Optimal population with fitness value

Step 1 Compute the index of individuals

Individual larr Random member (population)Initialize the array of fittest as emptyFor (node in population)If (FittestgetFitness() = getIndividual(node)getFit-ness())

Fittest = getIndividual (node) (5)

Individuals [index] = Fittest

Step 2 Compute fitness function

Load member populationCompute the weight accuracy (119882ac) and relativeaccuracy (119877ac)Compute the occurrences of weight (119882oc) and relativeweight (119877oc)

Fitness = 119882ac lowast accuracy of 119898 hop + 119882oc

lowast occurrence of 119898 hopFitness = (1198821 + 1198822) lowast af + (minus1198822) lowast 119877oc

(6)

Step 3 Execute reproduction

Initialize the new pop as an empty setselect the random member in the input populationbased on fitness functionFor (119894 = 1 119894 le maximum size of population 119894 + +)119883 larr Random selected member in population basedon fitness function119884 larr Random selected member in population basedon fitness functionFind the parent profiles of (119883119884)Len 119883 larr length (119883)Len 119884 larr length (119884)

119888 = Select random number between 1 and Len 119883new chromosome

= (substring (119883 1 119888) substring (119884 1 119888)) (7)

Set offspring as new chromosome

Step 4 Population Update

If (random probability to mutate ge threshold)

off spring larr997888 Mutates (off spring)Set new population

larr997888 Union (new population offspring)(8)

End doPopulation larr Union (new population new pop)Return Best (Population Fitness)

4 Performance Analysis

This section describes the performance results of the pro-posed GA-DoSLD algorithm for the following metrics

(i) Normalized energy consumption(ii) Effective packet number(iii) End-to-end delay(iv) Average energy consumption(v) Packet delivery ratio(vi) Throughput ratio versus packet rate

To prove the superiority of the proposed GA-DoSLD algo-rithm it is compared with the existing algorithms such aszero knowledge protocol (ZKP) [22] X-MAC and Two-TierEnergy-Efficient Secure (TE2S) scheme [23] and their resultsare discussed in the following sections

41 Normalized Energy Consumption Normalized energyconsumption is the amount of energy consumed for transfer-ring 3 packets per second The normalized energy consump-tion of the existing X-MAC algorithm ZKP TE2P schemeand the proposed GA-DoSLD algorithm is validated for mul-tiple intervals of attackThe comparison result represented inFigure 4 depicts that for all the attack intervals the suggestedGA-DoSLD algorithm consumes minimal energy

42 Effective Packet Number The effective packet number ofthe existing X-MAC algorithm ZKP TE2S scheme and theproposed GA-DoSLD algorithm is validated for the variableattack intervals The comparison considers the packet send-ing rate as 1 packet every 3 seconds The comparison resultrepresented in Figure 5 shows that the suggested GA-DoSLDalgorithm provides higher scores on effective packet numberthan the existing schemes

8 Security and Communication Networks

0

20

40

60

80

100

05 1 15 2 25 3 35 4

Ener

gy co

nsum

ptio

n (m

JSec

)

Attack interval

X-MACZKP

GA-DoSLDTE2S

Figure 4 Comparison of normalized energy consumption for theexisting and the proposed methods

0

200

400

600

800

1000

1200

1400

X-MACZKP

GA-DoSLD

05 1 15 2 25 3 35 4Attack interval

Effec

tive p

acke

t num

ber (

pack

et3

sec)

TE2S

Figure 5 Comparison of packet number versus attack interval

43 End-to-End Delay The end-to-end delay is defined asthe average time consumed for transmitting the packets Theanalysis of end-to-end delay with respect to the packet size isrepresented in Figure 6 From the figure it is clear that whencompared to existing X-MAC ZKP and TE2S algorithms thesuggested GA-DoSLD algorithm provides a minimal end-to-end delay for the variable packet sizes

44 Average Energy Consumption The average energy con-sumption is the amount of energy consumed by the algo-rithms for transmitting the data packets The comparison ofaverage energy consumption for the existing X-MAC ZKPTE2S schemes and the proposed GA-DoSLD algorithm isrepresented in Figure 7 From the figure it is clear that thesuggested GA-DoSLD algorithm provides minimal energyconsumption than the existing schemes

005

115

225

335

128 256 384 512 640Packet size

X-MACZKP

GA-DoSLD

End-

to-e

nd d

elay

(sec

onds

)

4

TE2S

Figure 6 Comparison of end-to-end delay versus packet size for theexisting and the proposed methods

0

05

1

15

2

25

10 20 30 40 50 60 70Simulation time (ms)

X-MACZKP

GA-DoSLD

Aver

age e

nerg

y co

nsum

ptio

n (J

S)

TE2S

Figure 7 Analysis of average energy consumption versus simula-tion time for the existing and the proposed methods

45 Packet Delivery Ratio The packet delivery ratio (PDR) isdefined as the ratio of the number of data packets successfullydelivered to the destination node to the number of datapackets transmitted from the source The estimation of thePDR is based on the following equation

PDR = 119875119877 lowast 100sum119899119886minus1

119875Gen119886

(9)

where 119875119877 represents the number of data packets received atthe destination node 119875Gen is the total number of data packetsgenerated by the source nodes and 119899 denotes the numberof sensor nodes The comparison of PDR with respect to thesimulation time is represented in Figure 8

From the figure it is analyzed that when compared to theexisting X-MAC ZKP and TE2S schemes the proposed GA-DoSLD algorithm provides higher PDR

Security and Communication Networks 9

0

20

40

60

80

100

5 10 15 20 25 30 35 40 45 50

Pack

et d

eliv

ery

ratio

()

Simulation time (ms)

X-MACZKP

GA-DoSLDTE2S

Figure 8 Comparison of packet delivery ratio versus simulationtime for the existing and proposed schemes

46 Throughput Performance for Various Packet SendingRates The effectiveness of the protocol depends on thesuccessful reception and transmission of data packets underthe various sending rates such as 1 packet3 seconds 1packet5 seconds and 1 packet7 seconds [22] In this paperthe packet sending rate of 1 packet3 seconds is taken tovalidate the performance of proposed work The estimationof the throughput ratio is based on the following equation

Throughput ratio = 119875NS119875NT (10)

where 119875NS denotes the packet number under simulation sce-nario and 119875NT represents the packet number delivered underthe theoretical scenarioThe superiority of the suggested GA-DoSLD algorithm is validated against the existing algorithmssuch as X-MAC ZKP and TE2P for a packer rate of 1 packetper 3 seconds Figure 9 represents the comparison of thethroughput ratio with respect to the variable attack interval

From the figure it is clear that the suggested GA-DoSLDalgorithm provides higher throughput than the existing algo-rithms under the packet sending rate of 1 packet3 seconds

5 Conclusion and Future Work

In this paper an efficient GA-DoSLD algorithm is proposedfor generating the DoSL attack profiles from multiple sensornodes such that the attacker nodes can be prevented from thecommunication process Initially a WSN is simulated with100 numbers of static sensor nodes then the BS performs theoperations such as key pair generation and behaviormonitor-ing in parallel The base station monitors the behavior of thesensor nodes and initializes every behavior as a chromosomeThe MRSA algorithm is implemented in the base stationfor generating and distributing the key pair among thesensor nodes Before initiating the communication betweenthe sensor nodes the AODV routing protocol estimates theoptimal route To validate the trustworthiness of the relaynodes in the route the fitness value is estimated for every

0

5000

10000

15000

20000

25000

30000

35000

40000

45000

50000

05 1 15 2 25 3 35 4Attack interval (secs)

X-MACZKP

GA-DoSLDTh

roug

hput

for t

he p

acke

t sen

ding

rate

of 1

pac

ket3

seco

nds

TE2P

Figure 9 Comparison of throughput under packet sending rate of1 packet3 seconds versus attack interval

chromosome If the chromosome is determined as unusualit is validated against the existing attack profiles If there doesnot exist a match the pair of chromosomes is subjected tothe crossover and mutation operations The resultant chro-mosomes are added to the existing chromosomes Finally theBS determines the attacker nodes broadcasting the blockedinformation to all the sensor nodes in the network To provethe superiority of the suggested GA-DoSLD algorithm itis compared against the existing X-MAC ZKP and TE2Sschemes for the metrics such as normalized energy con-sumption effective packet number end-to-end delay averageenergy consumption packet delivery ratio and throughputratio versus packet rate The validation results prove thatwhen compared to the existing schemes the proposedalgorithm provides optimal results for all the metrics Therepeated execution of the GA-DoSLD algorithm in the sensornodes consumes a considerable amount of energy Thus toachieve the energy optimization a different soft computingalgorithm other than GA can be used in future for detectingthe denial-of-sleep attack in the WSN environment

Notations

119873 Expected number of hops119867 Number of hops between the source anddestination119864 Number of neighbors at the higher tiers119877119888 Expected number of neighbors at 119888th hop119862119887 Additional coverage index of the nodewith 119887 neighbors119882ac Weight accuracy

10 Security and Communication Networks

119877ac Accuracy relative119882oc Occurrence119877oc Relative weight of occurrence

Competing Interests

The authors declare that there is no conflict of interestsregarding the publication of this paper

References

[1] V C Manju S L Senthil Lekha and M Sasi Kumar ldquoMech-anisms for detecting and preventing denial of sleep attacks onwireless sensor networksrdquo in Proceedings of the IEEE Conferenceon Information and Communication Technologies (ICT rsquo13) pp74ndash77 Tamil Nadu India April 2013

[2] D R Raymond R C Marchany M I Brownfield and S FMidkiff ldquoEffects of denial-of-sleep attacks on wireless sensornetworkMAC protocolsrdquo IEEE Transactions on Vehicular Tech-nology vol 58 no 1 pp 367ndash380 2009

[3] R P Manohar and E Baburaj ldquoDetection of Stealthy Denialof Service (S-DoS) attacks in wireless sensor networksrdquo Inter-national Journal of Computer Science and Information Security(IJCSIS) vol 14 pp 343ndash348 2016

[4] D Mansouri L Mokddad J Ben-Othman and M IoualalenldquoPreventing denial of service attacks in wireless sensor net-worksrdquo in Proceedings of the IEEE International Conference onCommunications (ICC rsquo15) pp 3014ndash3019 London UK June2015

[5] D Mansouri L Mokdad J Ben-Othman and M IoualalenldquoDetecting DoS attacks in WSN based on clustering tech-niquerdquo in Proceedings of the IEEEWireless Communications andNetworking Conference (WCNC rsquo13) pp 2214ndash2219 ShanghaiChina April 2013

[6] J-L Chen Y-W Ma X Wang Y-M Huang and Y-F LaildquoTime-division secret key protocol for wireless sensor network-ingrdquo Institution of Engineering andTechnology Communicationsvol 5 no 12 pp 1720ndash1726 2011

[7] D He C Chen S Chan and J Bu ldquoDiCode DoS-resistant anddistributed code dissemination in wireless sensor networksrdquoIEEE Transactions on Wireless Communications vol 11 no 5pp 1946ndash1956 2012

[8] G Han J Jiang W Shen L Shu and J Rodrigues ldquoIDSEP anovel intrusion detection scheme based on energy predictionin cluster-based wireless sensor networksrdquo IET InformationSecurity vol 7 no 2 pp 97ndash105 2013

[9] E B Ram Pradheep Manohar ldquoDetection of stealthy denialof service (S-DoS) attacks in wireless sensor networksrdquo Inter-national Journal of Computer Science and Information Security(IJCSIS) vol 14 2016

[10] H Tan D Ostry J Zic and S Jha ldquoA confidential and DoS-resistant multi-hop code dissemination protocol for wirelesssensor networksrdquoComputersamp Security vol 32 pp 36ndash55 2013

[11] S M Nam and T H Cho ldquoEnergy efficient method fordetection and prevention of false reports in wireless sensornetworksrdquo in Proceedings of the 8th International Conference onInformation Science and Digital Content Technology (ICIDT rsquo12)pp 766ndash769 Jeju Island South Korea June 2012

[12] S Naik and N Shekokar ldquoConservation of energy in wirelesssensor network by preventing denial of sleep attackrdquo ProcediaComputer Science vol 45 pp 370ndash379 2015

[13] C-T Hsueh C-Y Wen and Y-C Ouyang ldquoA secure schemeagainst power exhausting attacks in hierarchical wireless sensornetworksrdquo IEEE Sensors Journal vol 15 no 6 pp 3590ndash36022015

[14] S Kaur andM Ataullah ldquoSecuring the wireless sensor networkfrom denial of sleep attack by isolating the nodesrdquo InternationalJournal of Computer Applications vol 103 no 1 pp 29ndash33 2014

[15] S Shamshirband A Amini N B Anuar M L Mat Kiah Y WTeh and S Furnell ldquoD-FICCA a density-based fuzzy imperi-alist competitive clustering algorithm for intrusion detection inwireless sensor networksrdquo Measurement vol 55 pp 212ndash2262014

[16] S Shamshirband A Patel N B Anuar M L M Kiah andA Abraham ldquoCooperative game theoretic approach usingfuzzy Q-learning for detecting and preventing intrusions inwireless sensor networksrdquo Engineering Applications of ArtificialIntelligence vol 32 pp 228ndash241 2014

[17] N K Sreelaja and G A Vijayalakshmi Pai ldquoSwarm intelligencebased approach for sinkhole attack detection in wireless sensornetworksrdquo Applied Soft Computing Journal vol 19 pp 68ndash792014

[18] G Keerthana and G Padmavathi ldquoDetecting sinkhole attackin wireless sensor network using enhanced particle swarmoptimization techniquerdquo International Journal of Security andIts Applications vol 10 no 3 pp 41ndash54 2016

[19] A Saeed A Ahmadinia A Javed and H Larijani ldquoRandomneural network based intelligent intrusion detection forwirelesssensor networksrdquo Procedia Computer Science vol 80 pp 2372ndash2376 2016

[20] D Management ldquoRSA Algorithmrdquo 2016 httpwwwdi-mgtcomaursa alghtml

[21] M Zhao Y Li and W Wang ldquoModeling and analyticalstudy of link properties in multihop wireless networksrdquo IEEETransactions on Communications vol 60 no 2 pp 445ndash4552012

[22] C-T Hsueh C-Y Wen and Y-C Ouyang ldquoA secure schemeagainst power exhausting attacks in hierarchical wireless sensornetworksrdquo IEEE Sensors Journal vol 15 no 6 pp 3590ndash36022015

[23] D N S Swapna Naik ldquoConservation of energy in wireless sen-sor network by preventing denial of sleep attackrdquo in Proceedingsof the International Conference on Advanced Computing Tech-nologies and Applications (ICACTA rsquo15) pp 370ndash379 MumbaiIndia March 2015

International Journal of

AerospaceEngineeringHindawi Publishing Corporationhttpwwwhindawicom Volume 2014

RoboticsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Active and Passive Electronic Components

Control Scienceand Engineering

Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

International Journal of

RotatingMachinery

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporation httpwwwhindawicom

Journal ofEngineeringVolume 2014

Submit your manuscripts athttpswwwhindawicom

VLSI Design

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Shock and Vibration

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Civil EngineeringAdvances in

Acoustics and VibrationAdvances in

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Electrical and Computer Engineering

Journal of

Advances inOptoElectronics

Hindawi Publishing Corporation httpwwwhindawicom

Volume 2014

The Scientific World JournalHindawi Publishing Corporation httpwwwhindawicom Volume 2014

SensorsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Modelling amp Simulation in EngineeringHindawi Publishing Corporation httpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Chemical EngineeringInternational Journal of Antennas and

Propagation

International Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Navigation and Observation

International Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

DistributedSensor Networks

International Journal of

Page 5: GA-DoSLD: Genetic Algorithm Based Denial-of-Sleep Attack ...downloads.hindawi.com/journals/scn/2017/9863032.pdf · node can forward the fake data packets to the authorized nodes,

Security and Communication Networks 5

Table 1 System specifications

Simulation parameters ValuesPacket size 1024KbpsPacket rate Random packetssecRouting protocol AODVChannel bit rate 10MBsInitial power 25 JSensor node sensing power 5 times 10minus8 JTransmission range 150ndash250 metersDuty cycle 20-time slots

algorithm generates the population using population gen-eration algorithm The suggested algorithm initially loadsthe two-hop neighbor information to the base station thenfor every member in the neighbor list the next-of-neighboris initialized as the population The steps involved in thesuggested algorithm are illustrated as follows

Algorithm 1 (population generation algorithm)

Step 1 Load the two-hop neighbor information with the basestation

Step 2

for (member in the neighbor list)

Population larr Load Individual (newneighbor (next-of-neighbor))

During the implementation of the population generation

algorithm the BS configuration process is performed inparallel for analyzing the behavior of the nodes in the WSN

33 Generation and Distribution of Key Pair After the gener-ation of the population the BS deploys the MRSA algorithmfor generating a public key and private key pair Among thekeys the public key is used for the BS and the private key isused for the sensor nodes The main objective of this step isto prevent the attacker from implementing the DoSL attackBy deploying this step the attacker node is blocked at theinitial level before sending or receiving the packet thus savingthe energy of the sensor nodes The steps involved in thesuggested algorithm are illustrated as follows [20]

Algorithm 2 (MRSA algorithm)

Step 1 Choose the large prime numbers ldquo119899rdquo and ldquo119903rdquoStep 2 Compute the modulus totient using

Φ (119886) = (119899 minus 1) lowast (119903 minus 1) (1)

Step 3 Choose the public exponent ldquo119894rdquo such that 1 lt 119894 lt Φ(119899)and GCD(119894 Φ(119886)) = 1

Step 4 Estimate the private exponent ldquo119898rdquo such that 119898 =119894minus1modΦ(119886)Step 5 Estimate the private key as (119898 119886)Step 6 Estimate the public key as (119894 119886)

The suggested MRSA algorithm has a key size of 512 bitsAmong the total number of bits 256 bits are used as the publickey in the base station and the remaining 256 bits are usedas the private key in the sensor nodes The minimal key sizeprovides the following advantages

(i) Minimal computational complexity(ii) Achieving memory optimization

34 Route Discovery and Relay Node Validation Before ini-tiating the packet transmission the sensor nodes determinethe optimal route usingAdHocOn-DemandDistanceVector(AODV) routing protocol An example of the route discoveryprocess is represented in Figure 3 The suggested protocolhas two key operations such as route discovery and routemaintenance When the source node demands a route to thedestination node or when the lifetime of the existing route tothe destination node has expired the route discovery oper-ation is initiated with the broadcast of the RREQ messagesOn receiving the RREQ messages the intermediate nodesprovide an optimal route to the destination node When theintermediate node is the destination node the RREP packetsare directly transferred to the source node

The steps involved in the suggested AODV based routediscovery are described as follows

Algorithm 3 (AODV routing protocol)Step 1 When a sensor node seeks a route the RREQ packet ispropagated through the entire network till the packet reachesthe destination node

Step 2 When the source node and destination nodes areplaced at the corners of the network the RREQ packets haveto travel a maximum number of hops

Step 3 On receiving the RREQ packets the relay nodesbroadcast it ahead till it reaches the destination

Step 4 The overhead created due to the route request processis represented as follows

119877RREQ = 119873sum119886minus1

(119867) 119864119873minus1 119867sum119887=2

[(119886 minus 1 minus 119887) minus 119873minus1sum119888=1

119877119888]119875119862119887 (2)

Step 5 Once the RREQ packet reaches the destination nodeit replies back to the source node as RREP packet through thesame sequence for reaching the source node

Step 6 According to [21] the overhead created for the RREPpackets is represented as follows

119877RREP = 119873 + 1198732 (119886 minus ℎ minus 2) 119901 (3)

6 Security and Communication Networks

A

B

J

F YL

K

BSC P

D

E

H

I

T

Z

Base station

Destination

RREQRREP

Figure 3 Example for the route discovery process using AODV

Step 7 The overall overhead introduced for the route discov-ery process is

119877Overall = RREQ + RREP119877Overall = 119873sum

119886minus1

(119867) 119864119873minus1 119867sum119887=2

[(119886 minus 1 minus 119887) minus 119873minus1sum119888=1

119877119888]119875119862119887+ 119873 + 1198732 (119886 minus ℎ minus 2) 119901

(4)

The merits of using the AODV routing protocol for theroute discovery process are as follows

(i) Loop-free routes(ii) Faster response to link breakage(iii) Minimal demand for the broadcast

After establishing an optimal route the sensor nodesestimate the trustworthiness of the neighbor nodes usingfitness evaluation function

35 Behavior Monitoring After ensuring the trustworthinessof the neighbor nodes the sensor nodes forward the packetsDuring the transmission if the sensor node suspects any

malicious behaviors as follows it estimates the fitness valuebased on the information provided by the BS

(i) Flooding of data packets(ii) Transmission of large sized data packets that exceed

the data capacity of the sensor nodes

By estimating the fitness value based on attacker ID thechromosome of the already existing attacker is determinedAfter estimating the fitness value the sensor nodes providealert messages about the neighbor node behavior to the BSOn receiving the alertmessage the BS performs the crossoverandmutation operations on the chromosomes for identifyingand analyzing the method that is used by the attackerfor implementing the attack The resultant chromosomesobtained from the crossover and mutation operation areadded to the existing population Finally the BS confirmswhether the particular neighbor node is a normal node oran attacker node If the BS determines the neighbor nodeas an attacker node then the BS broadcasts the blockedinformation to all the other sensor nodes in the WSN Byexploiting the suggested GA-DoSLD algorithm the attackernodes that introduce the DoSL attacks are eliminated fromthe communication thus saving the energy of the sensornodes Notations describe the symbols used in Algorithm 4

Security and Communication Networks 7

for the proposed GA-DoSLD The steps involved in thesuggested GA-DoSLD algorithm are illustrated below

Algorithm 4 (GA-DoSLD algorithm)

Input Population

Output Optimal population with fitness value

Step 1 Compute the index of individuals

Individual larr Random member (population)Initialize the array of fittest as emptyFor (node in population)If (FittestgetFitness() = getIndividual(node)getFit-ness())

Fittest = getIndividual (node) (5)

Individuals [index] = Fittest

Step 2 Compute fitness function

Load member populationCompute the weight accuracy (119882ac) and relativeaccuracy (119877ac)Compute the occurrences of weight (119882oc) and relativeweight (119877oc)

Fitness = 119882ac lowast accuracy of 119898 hop + 119882oc

lowast occurrence of 119898 hopFitness = (1198821 + 1198822) lowast af + (minus1198822) lowast 119877oc

(6)

Step 3 Execute reproduction

Initialize the new pop as an empty setselect the random member in the input populationbased on fitness functionFor (119894 = 1 119894 le maximum size of population 119894 + +)119883 larr Random selected member in population basedon fitness function119884 larr Random selected member in population basedon fitness functionFind the parent profiles of (119883119884)Len 119883 larr length (119883)Len 119884 larr length (119884)

119888 = Select random number between 1 and Len 119883new chromosome

= (substring (119883 1 119888) substring (119884 1 119888)) (7)

Set offspring as new chromosome

Step 4 Population Update

If (random probability to mutate ge threshold)

off spring larr997888 Mutates (off spring)Set new population

larr997888 Union (new population offspring)(8)

End doPopulation larr Union (new population new pop)Return Best (Population Fitness)

4 Performance Analysis

This section describes the performance results of the pro-posed GA-DoSLD algorithm for the following metrics

(i) Normalized energy consumption(ii) Effective packet number(iii) End-to-end delay(iv) Average energy consumption(v) Packet delivery ratio(vi) Throughput ratio versus packet rate

To prove the superiority of the proposed GA-DoSLD algo-rithm it is compared with the existing algorithms such aszero knowledge protocol (ZKP) [22] X-MAC and Two-TierEnergy-Efficient Secure (TE2S) scheme [23] and their resultsare discussed in the following sections

41 Normalized Energy Consumption Normalized energyconsumption is the amount of energy consumed for transfer-ring 3 packets per second The normalized energy consump-tion of the existing X-MAC algorithm ZKP TE2P schemeand the proposed GA-DoSLD algorithm is validated for mul-tiple intervals of attackThe comparison result represented inFigure 4 depicts that for all the attack intervals the suggestedGA-DoSLD algorithm consumes minimal energy

42 Effective Packet Number The effective packet number ofthe existing X-MAC algorithm ZKP TE2S scheme and theproposed GA-DoSLD algorithm is validated for the variableattack intervals The comparison considers the packet send-ing rate as 1 packet every 3 seconds The comparison resultrepresented in Figure 5 shows that the suggested GA-DoSLDalgorithm provides higher scores on effective packet numberthan the existing schemes

8 Security and Communication Networks

0

20

40

60

80

100

05 1 15 2 25 3 35 4

Ener

gy co

nsum

ptio

n (m

JSec

)

Attack interval

X-MACZKP

GA-DoSLDTE2S

Figure 4 Comparison of normalized energy consumption for theexisting and the proposed methods

0

200

400

600

800

1000

1200

1400

X-MACZKP

GA-DoSLD

05 1 15 2 25 3 35 4Attack interval

Effec

tive p

acke

t num

ber (

pack

et3

sec)

TE2S

Figure 5 Comparison of packet number versus attack interval

43 End-to-End Delay The end-to-end delay is defined asthe average time consumed for transmitting the packets Theanalysis of end-to-end delay with respect to the packet size isrepresented in Figure 6 From the figure it is clear that whencompared to existing X-MAC ZKP and TE2S algorithms thesuggested GA-DoSLD algorithm provides a minimal end-to-end delay for the variable packet sizes

44 Average Energy Consumption The average energy con-sumption is the amount of energy consumed by the algo-rithms for transmitting the data packets The comparison ofaverage energy consumption for the existing X-MAC ZKPTE2S schemes and the proposed GA-DoSLD algorithm isrepresented in Figure 7 From the figure it is clear that thesuggested GA-DoSLD algorithm provides minimal energyconsumption than the existing schemes

005

115

225

335

128 256 384 512 640Packet size

X-MACZKP

GA-DoSLD

End-

to-e

nd d

elay

(sec

onds

)

4

TE2S

Figure 6 Comparison of end-to-end delay versus packet size for theexisting and the proposed methods

0

05

1

15

2

25

10 20 30 40 50 60 70Simulation time (ms)

X-MACZKP

GA-DoSLD

Aver

age e

nerg

y co

nsum

ptio

n (J

S)

TE2S

Figure 7 Analysis of average energy consumption versus simula-tion time for the existing and the proposed methods

45 Packet Delivery Ratio The packet delivery ratio (PDR) isdefined as the ratio of the number of data packets successfullydelivered to the destination node to the number of datapackets transmitted from the source The estimation of thePDR is based on the following equation

PDR = 119875119877 lowast 100sum119899119886minus1

119875Gen119886

(9)

where 119875119877 represents the number of data packets received atthe destination node 119875Gen is the total number of data packetsgenerated by the source nodes and 119899 denotes the numberof sensor nodes The comparison of PDR with respect to thesimulation time is represented in Figure 8

From the figure it is analyzed that when compared to theexisting X-MAC ZKP and TE2S schemes the proposed GA-DoSLD algorithm provides higher PDR

Security and Communication Networks 9

0

20

40

60

80

100

5 10 15 20 25 30 35 40 45 50

Pack

et d

eliv

ery

ratio

()

Simulation time (ms)

X-MACZKP

GA-DoSLDTE2S

Figure 8 Comparison of packet delivery ratio versus simulationtime for the existing and proposed schemes

46 Throughput Performance for Various Packet SendingRates The effectiveness of the protocol depends on thesuccessful reception and transmission of data packets underthe various sending rates such as 1 packet3 seconds 1packet5 seconds and 1 packet7 seconds [22] In this paperthe packet sending rate of 1 packet3 seconds is taken tovalidate the performance of proposed work The estimationof the throughput ratio is based on the following equation

Throughput ratio = 119875NS119875NT (10)

where 119875NS denotes the packet number under simulation sce-nario and 119875NT represents the packet number delivered underthe theoretical scenarioThe superiority of the suggested GA-DoSLD algorithm is validated against the existing algorithmssuch as X-MAC ZKP and TE2P for a packer rate of 1 packetper 3 seconds Figure 9 represents the comparison of thethroughput ratio with respect to the variable attack interval

From the figure it is clear that the suggested GA-DoSLDalgorithm provides higher throughput than the existing algo-rithms under the packet sending rate of 1 packet3 seconds

5 Conclusion and Future Work

In this paper an efficient GA-DoSLD algorithm is proposedfor generating the DoSL attack profiles from multiple sensornodes such that the attacker nodes can be prevented from thecommunication process Initially a WSN is simulated with100 numbers of static sensor nodes then the BS performs theoperations such as key pair generation and behaviormonitor-ing in parallel The base station monitors the behavior of thesensor nodes and initializes every behavior as a chromosomeThe MRSA algorithm is implemented in the base stationfor generating and distributing the key pair among thesensor nodes Before initiating the communication betweenthe sensor nodes the AODV routing protocol estimates theoptimal route To validate the trustworthiness of the relaynodes in the route the fitness value is estimated for every

0

5000

10000

15000

20000

25000

30000

35000

40000

45000

50000

05 1 15 2 25 3 35 4Attack interval (secs)

X-MACZKP

GA-DoSLDTh

roug

hput

for t

he p

acke

t sen

ding

rate

of 1

pac

ket3

seco

nds

TE2P

Figure 9 Comparison of throughput under packet sending rate of1 packet3 seconds versus attack interval

chromosome If the chromosome is determined as unusualit is validated against the existing attack profiles If there doesnot exist a match the pair of chromosomes is subjected tothe crossover and mutation operations The resultant chro-mosomes are added to the existing chromosomes Finally theBS determines the attacker nodes broadcasting the blockedinformation to all the sensor nodes in the network To provethe superiority of the suggested GA-DoSLD algorithm itis compared against the existing X-MAC ZKP and TE2Sschemes for the metrics such as normalized energy con-sumption effective packet number end-to-end delay averageenergy consumption packet delivery ratio and throughputratio versus packet rate The validation results prove thatwhen compared to the existing schemes the proposedalgorithm provides optimal results for all the metrics Therepeated execution of the GA-DoSLD algorithm in the sensornodes consumes a considerable amount of energy Thus toachieve the energy optimization a different soft computingalgorithm other than GA can be used in future for detectingthe denial-of-sleep attack in the WSN environment

Notations

119873 Expected number of hops119867 Number of hops between the source anddestination119864 Number of neighbors at the higher tiers119877119888 Expected number of neighbors at 119888th hop119862119887 Additional coverage index of the nodewith 119887 neighbors119882ac Weight accuracy

10 Security and Communication Networks

119877ac Accuracy relative119882oc Occurrence119877oc Relative weight of occurrence

Competing Interests

The authors declare that there is no conflict of interestsregarding the publication of this paper

References

[1] V C Manju S L Senthil Lekha and M Sasi Kumar ldquoMech-anisms for detecting and preventing denial of sleep attacks onwireless sensor networksrdquo in Proceedings of the IEEE Conferenceon Information and Communication Technologies (ICT rsquo13) pp74ndash77 Tamil Nadu India April 2013

[2] D R Raymond R C Marchany M I Brownfield and S FMidkiff ldquoEffects of denial-of-sleep attacks on wireless sensornetworkMAC protocolsrdquo IEEE Transactions on Vehicular Tech-nology vol 58 no 1 pp 367ndash380 2009

[3] R P Manohar and E Baburaj ldquoDetection of Stealthy Denialof Service (S-DoS) attacks in wireless sensor networksrdquo Inter-national Journal of Computer Science and Information Security(IJCSIS) vol 14 pp 343ndash348 2016

[4] D Mansouri L Mokddad J Ben-Othman and M IoualalenldquoPreventing denial of service attacks in wireless sensor net-worksrdquo in Proceedings of the IEEE International Conference onCommunications (ICC rsquo15) pp 3014ndash3019 London UK June2015

[5] D Mansouri L Mokdad J Ben-Othman and M IoualalenldquoDetecting DoS attacks in WSN based on clustering tech-niquerdquo in Proceedings of the IEEEWireless Communications andNetworking Conference (WCNC rsquo13) pp 2214ndash2219 ShanghaiChina April 2013

[6] J-L Chen Y-W Ma X Wang Y-M Huang and Y-F LaildquoTime-division secret key protocol for wireless sensor network-ingrdquo Institution of Engineering andTechnology Communicationsvol 5 no 12 pp 1720ndash1726 2011

[7] D He C Chen S Chan and J Bu ldquoDiCode DoS-resistant anddistributed code dissemination in wireless sensor networksrdquoIEEE Transactions on Wireless Communications vol 11 no 5pp 1946ndash1956 2012

[8] G Han J Jiang W Shen L Shu and J Rodrigues ldquoIDSEP anovel intrusion detection scheme based on energy predictionin cluster-based wireless sensor networksrdquo IET InformationSecurity vol 7 no 2 pp 97ndash105 2013

[9] E B Ram Pradheep Manohar ldquoDetection of stealthy denialof service (S-DoS) attacks in wireless sensor networksrdquo Inter-national Journal of Computer Science and Information Security(IJCSIS) vol 14 2016

[10] H Tan D Ostry J Zic and S Jha ldquoA confidential and DoS-resistant multi-hop code dissemination protocol for wirelesssensor networksrdquoComputersamp Security vol 32 pp 36ndash55 2013

[11] S M Nam and T H Cho ldquoEnergy efficient method fordetection and prevention of false reports in wireless sensornetworksrdquo in Proceedings of the 8th International Conference onInformation Science and Digital Content Technology (ICIDT rsquo12)pp 766ndash769 Jeju Island South Korea June 2012

[12] S Naik and N Shekokar ldquoConservation of energy in wirelesssensor network by preventing denial of sleep attackrdquo ProcediaComputer Science vol 45 pp 370ndash379 2015

[13] C-T Hsueh C-Y Wen and Y-C Ouyang ldquoA secure schemeagainst power exhausting attacks in hierarchical wireless sensornetworksrdquo IEEE Sensors Journal vol 15 no 6 pp 3590ndash36022015

[14] S Kaur andM Ataullah ldquoSecuring the wireless sensor networkfrom denial of sleep attack by isolating the nodesrdquo InternationalJournal of Computer Applications vol 103 no 1 pp 29ndash33 2014

[15] S Shamshirband A Amini N B Anuar M L Mat Kiah Y WTeh and S Furnell ldquoD-FICCA a density-based fuzzy imperi-alist competitive clustering algorithm for intrusion detection inwireless sensor networksrdquo Measurement vol 55 pp 212ndash2262014

[16] S Shamshirband A Patel N B Anuar M L M Kiah andA Abraham ldquoCooperative game theoretic approach usingfuzzy Q-learning for detecting and preventing intrusions inwireless sensor networksrdquo Engineering Applications of ArtificialIntelligence vol 32 pp 228ndash241 2014

[17] N K Sreelaja and G A Vijayalakshmi Pai ldquoSwarm intelligencebased approach for sinkhole attack detection in wireless sensornetworksrdquo Applied Soft Computing Journal vol 19 pp 68ndash792014

[18] G Keerthana and G Padmavathi ldquoDetecting sinkhole attackin wireless sensor network using enhanced particle swarmoptimization techniquerdquo International Journal of Security andIts Applications vol 10 no 3 pp 41ndash54 2016

[19] A Saeed A Ahmadinia A Javed and H Larijani ldquoRandomneural network based intelligent intrusion detection forwirelesssensor networksrdquo Procedia Computer Science vol 80 pp 2372ndash2376 2016

[20] D Management ldquoRSA Algorithmrdquo 2016 httpwwwdi-mgtcomaursa alghtml

[21] M Zhao Y Li and W Wang ldquoModeling and analyticalstudy of link properties in multihop wireless networksrdquo IEEETransactions on Communications vol 60 no 2 pp 445ndash4552012

[22] C-T Hsueh C-Y Wen and Y-C Ouyang ldquoA secure schemeagainst power exhausting attacks in hierarchical wireless sensornetworksrdquo IEEE Sensors Journal vol 15 no 6 pp 3590ndash36022015

[23] D N S Swapna Naik ldquoConservation of energy in wireless sen-sor network by preventing denial of sleep attackrdquo in Proceedingsof the International Conference on Advanced Computing Tech-nologies and Applications (ICACTA rsquo15) pp 370ndash379 MumbaiIndia March 2015

International Journal of

AerospaceEngineeringHindawi Publishing Corporationhttpwwwhindawicom Volume 2014

RoboticsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Active and Passive Electronic Components

Control Scienceand Engineering

Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

International Journal of

RotatingMachinery

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporation httpwwwhindawicom

Journal ofEngineeringVolume 2014

Submit your manuscripts athttpswwwhindawicom

VLSI Design

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Shock and Vibration

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Civil EngineeringAdvances in

Acoustics and VibrationAdvances in

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Electrical and Computer Engineering

Journal of

Advances inOptoElectronics

Hindawi Publishing Corporation httpwwwhindawicom

Volume 2014

The Scientific World JournalHindawi Publishing Corporation httpwwwhindawicom Volume 2014

SensorsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Modelling amp Simulation in EngineeringHindawi Publishing Corporation httpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Chemical EngineeringInternational Journal of Antennas and

Propagation

International Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Navigation and Observation

International Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

DistributedSensor Networks

International Journal of

Page 6: GA-DoSLD: Genetic Algorithm Based Denial-of-Sleep Attack ...downloads.hindawi.com/journals/scn/2017/9863032.pdf · node can forward the fake data packets to the authorized nodes,

6 Security and Communication Networks

A

B

J

F YL

K

BSC P

D

E

H

I

T

Z

Base station

Destination

RREQRREP

Figure 3 Example for the route discovery process using AODV

Step 7 The overall overhead introduced for the route discov-ery process is

119877Overall = RREQ + RREP119877Overall = 119873sum

119886minus1

(119867) 119864119873minus1 119867sum119887=2

[(119886 minus 1 minus 119887) minus 119873minus1sum119888=1

119877119888]119875119862119887+ 119873 + 1198732 (119886 minus ℎ minus 2) 119901

(4)

The merits of using the AODV routing protocol for theroute discovery process are as follows

(i) Loop-free routes(ii) Faster response to link breakage(iii) Minimal demand for the broadcast

After establishing an optimal route the sensor nodesestimate the trustworthiness of the neighbor nodes usingfitness evaluation function

35 Behavior Monitoring After ensuring the trustworthinessof the neighbor nodes the sensor nodes forward the packetsDuring the transmission if the sensor node suspects any

malicious behaviors as follows it estimates the fitness valuebased on the information provided by the BS

(i) Flooding of data packets(ii) Transmission of large sized data packets that exceed

the data capacity of the sensor nodes

By estimating the fitness value based on attacker ID thechromosome of the already existing attacker is determinedAfter estimating the fitness value the sensor nodes providealert messages about the neighbor node behavior to the BSOn receiving the alertmessage the BS performs the crossoverandmutation operations on the chromosomes for identifyingand analyzing the method that is used by the attackerfor implementing the attack The resultant chromosomesobtained from the crossover and mutation operation areadded to the existing population Finally the BS confirmswhether the particular neighbor node is a normal node oran attacker node If the BS determines the neighbor nodeas an attacker node then the BS broadcasts the blockedinformation to all the other sensor nodes in the WSN Byexploiting the suggested GA-DoSLD algorithm the attackernodes that introduce the DoSL attacks are eliminated fromthe communication thus saving the energy of the sensornodes Notations describe the symbols used in Algorithm 4

Security and Communication Networks 7

for the proposed GA-DoSLD The steps involved in thesuggested GA-DoSLD algorithm are illustrated below

Algorithm 4 (GA-DoSLD algorithm)

Input Population

Output Optimal population with fitness value

Step 1 Compute the index of individuals

Individual larr Random member (population)Initialize the array of fittest as emptyFor (node in population)If (FittestgetFitness() = getIndividual(node)getFit-ness())

Fittest = getIndividual (node) (5)

Individuals [index] = Fittest

Step 2 Compute fitness function

Load member populationCompute the weight accuracy (119882ac) and relativeaccuracy (119877ac)Compute the occurrences of weight (119882oc) and relativeweight (119877oc)

Fitness = 119882ac lowast accuracy of 119898 hop + 119882oc

lowast occurrence of 119898 hopFitness = (1198821 + 1198822) lowast af + (minus1198822) lowast 119877oc

(6)

Step 3 Execute reproduction

Initialize the new pop as an empty setselect the random member in the input populationbased on fitness functionFor (119894 = 1 119894 le maximum size of population 119894 + +)119883 larr Random selected member in population basedon fitness function119884 larr Random selected member in population basedon fitness functionFind the parent profiles of (119883119884)Len 119883 larr length (119883)Len 119884 larr length (119884)

119888 = Select random number between 1 and Len 119883new chromosome

= (substring (119883 1 119888) substring (119884 1 119888)) (7)

Set offspring as new chromosome

Step 4 Population Update

If (random probability to mutate ge threshold)

off spring larr997888 Mutates (off spring)Set new population

larr997888 Union (new population offspring)(8)

End doPopulation larr Union (new population new pop)Return Best (Population Fitness)

4 Performance Analysis

This section describes the performance results of the pro-posed GA-DoSLD algorithm for the following metrics

(i) Normalized energy consumption(ii) Effective packet number(iii) End-to-end delay(iv) Average energy consumption(v) Packet delivery ratio(vi) Throughput ratio versus packet rate

To prove the superiority of the proposed GA-DoSLD algo-rithm it is compared with the existing algorithms such aszero knowledge protocol (ZKP) [22] X-MAC and Two-TierEnergy-Efficient Secure (TE2S) scheme [23] and their resultsare discussed in the following sections

41 Normalized Energy Consumption Normalized energyconsumption is the amount of energy consumed for transfer-ring 3 packets per second The normalized energy consump-tion of the existing X-MAC algorithm ZKP TE2P schemeand the proposed GA-DoSLD algorithm is validated for mul-tiple intervals of attackThe comparison result represented inFigure 4 depicts that for all the attack intervals the suggestedGA-DoSLD algorithm consumes minimal energy

42 Effective Packet Number The effective packet number ofthe existing X-MAC algorithm ZKP TE2S scheme and theproposed GA-DoSLD algorithm is validated for the variableattack intervals The comparison considers the packet send-ing rate as 1 packet every 3 seconds The comparison resultrepresented in Figure 5 shows that the suggested GA-DoSLDalgorithm provides higher scores on effective packet numberthan the existing schemes

8 Security and Communication Networks

0

20

40

60

80

100

05 1 15 2 25 3 35 4

Ener

gy co

nsum

ptio

n (m

JSec

)

Attack interval

X-MACZKP

GA-DoSLDTE2S

Figure 4 Comparison of normalized energy consumption for theexisting and the proposed methods

0

200

400

600

800

1000

1200

1400

X-MACZKP

GA-DoSLD

05 1 15 2 25 3 35 4Attack interval

Effec

tive p

acke

t num

ber (

pack

et3

sec)

TE2S

Figure 5 Comparison of packet number versus attack interval

43 End-to-End Delay The end-to-end delay is defined asthe average time consumed for transmitting the packets Theanalysis of end-to-end delay with respect to the packet size isrepresented in Figure 6 From the figure it is clear that whencompared to existing X-MAC ZKP and TE2S algorithms thesuggested GA-DoSLD algorithm provides a minimal end-to-end delay for the variable packet sizes

44 Average Energy Consumption The average energy con-sumption is the amount of energy consumed by the algo-rithms for transmitting the data packets The comparison ofaverage energy consumption for the existing X-MAC ZKPTE2S schemes and the proposed GA-DoSLD algorithm isrepresented in Figure 7 From the figure it is clear that thesuggested GA-DoSLD algorithm provides minimal energyconsumption than the existing schemes

005

115

225

335

128 256 384 512 640Packet size

X-MACZKP

GA-DoSLD

End-

to-e

nd d

elay

(sec

onds

)

4

TE2S

Figure 6 Comparison of end-to-end delay versus packet size for theexisting and the proposed methods

0

05

1

15

2

25

10 20 30 40 50 60 70Simulation time (ms)

X-MACZKP

GA-DoSLD

Aver

age e

nerg

y co

nsum

ptio

n (J

S)

TE2S

Figure 7 Analysis of average energy consumption versus simula-tion time for the existing and the proposed methods

45 Packet Delivery Ratio The packet delivery ratio (PDR) isdefined as the ratio of the number of data packets successfullydelivered to the destination node to the number of datapackets transmitted from the source The estimation of thePDR is based on the following equation

PDR = 119875119877 lowast 100sum119899119886minus1

119875Gen119886

(9)

where 119875119877 represents the number of data packets received atthe destination node 119875Gen is the total number of data packetsgenerated by the source nodes and 119899 denotes the numberof sensor nodes The comparison of PDR with respect to thesimulation time is represented in Figure 8

From the figure it is analyzed that when compared to theexisting X-MAC ZKP and TE2S schemes the proposed GA-DoSLD algorithm provides higher PDR

Security and Communication Networks 9

0

20

40

60

80

100

5 10 15 20 25 30 35 40 45 50

Pack

et d

eliv

ery

ratio

()

Simulation time (ms)

X-MACZKP

GA-DoSLDTE2S

Figure 8 Comparison of packet delivery ratio versus simulationtime for the existing and proposed schemes

46 Throughput Performance for Various Packet SendingRates The effectiveness of the protocol depends on thesuccessful reception and transmission of data packets underthe various sending rates such as 1 packet3 seconds 1packet5 seconds and 1 packet7 seconds [22] In this paperthe packet sending rate of 1 packet3 seconds is taken tovalidate the performance of proposed work The estimationof the throughput ratio is based on the following equation

Throughput ratio = 119875NS119875NT (10)

where 119875NS denotes the packet number under simulation sce-nario and 119875NT represents the packet number delivered underthe theoretical scenarioThe superiority of the suggested GA-DoSLD algorithm is validated against the existing algorithmssuch as X-MAC ZKP and TE2P for a packer rate of 1 packetper 3 seconds Figure 9 represents the comparison of thethroughput ratio with respect to the variable attack interval

From the figure it is clear that the suggested GA-DoSLDalgorithm provides higher throughput than the existing algo-rithms under the packet sending rate of 1 packet3 seconds

5 Conclusion and Future Work

In this paper an efficient GA-DoSLD algorithm is proposedfor generating the DoSL attack profiles from multiple sensornodes such that the attacker nodes can be prevented from thecommunication process Initially a WSN is simulated with100 numbers of static sensor nodes then the BS performs theoperations such as key pair generation and behaviormonitor-ing in parallel The base station monitors the behavior of thesensor nodes and initializes every behavior as a chromosomeThe MRSA algorithm is implemented in the base stationfor generating and distributing the key pair among thesensor nodes Before initiating the communication betweenthe sensor nodes the AODV routing protocol estimates theoptimal route To validate the trustworthiness of the relaynodes in the route the fitness value is estimated for every

0

5000

10000

15000

20000

25000

30000

35000

40000

45000

50000

05 1 15 2 25 3 35 4Attack interval (secs)

X-MACZKP

GA-DoSLDTh

roug

hput

for t

he p

acke

t sen

ding

rate

of 1

pac

ket3

seco

nds

TE2P

Figure 9 Comparison of throughput under packet sending rate of1 packet3 seconds versus attack interval

chromosome If the chromosome is determined as unusualit is validated against the existing attack profiles If there doesnot exist a match the pair of chromosomes is subjected tothe crossover and mutation operations The resultant chro-mosomes are added to the existing chromosomes Finally theBS determines the attacker nodes broadcasting the blockedinformation to all the sensor nodes in the network To provethe superiority of the suggested GA-DoSLD algorithm itis compared against the existing X-MAC ZKP and TE2Sschemes for the metrics such as normalized energy con-sumption effective packet number end-to-end delay averageenergy consumption packet delivery ratio and throughputratio versus packet rate The validation results prove thatwhen compared to the existing schemes the proposedalgorithm provides optimal results for all the metrics Therepeated execution of the GA-DoSLD algorithm in the sensornodes consumes a considerable amount of energy Thus toachieve the energy optimization a different soft computingalgorithm other than GA can be used in future for detectingthe denial-of-sleep attack in the WSN environment

Notations

119873 Expected number of hops119867 Number of hops between the source anddestination119864 Number of neighbors at the higher tiers119877119888 Expected number of neighbors at 119888th hop119862119887 Additional coverage index of the nodewith 119887 neighbors119882ac Weight accuracy

10 Security and Communication Networks

119877ac Accuracy relative119882oc Occurrence119877oc Relative weight of occurrence

Competing Interests

The authors declare that there is no conflict of interestsregarding the publication of this paper

References

[1] V C Manju S L Senthil Lekha and M Sasi Kumar ldquoMech-anisms for detecting and preventing denial of sleep attacks onwireless sensor networksrdquo in Proceedings of the IEEE Conferenceon Information and Communication Technologies (ICT rsquo13) pp74ndash77 Tamil Nadu India April 2013

[2] D R Raymond R C Marchany M I Brownfield and S FMidkiff ldquoEffects of denial-of-sleep attacks on wireless sensornetworkMAC protocolsrdquo IEEE Transactions on Vehicular Tech-nology vol 58 no 1 pp 367ndash380 2009

[3] R P Manohar and E Baburaj ldquoDetection of Stealthy Denialof Service (S-DoS) attacks in wireless sensor networksrdquo Inter-national Journal of Computer Science and Information Security(IJCSIS) vol 14 pp 343ndash348 2016

[4] D Mansouri L Mokddad J Ben-Othman and M IoualalenldquoPreventing denial of service attacks in wireless sensor net-worksrdquo in Proceedings of the IEEE International Conference onCommunications (ICC rsquo15) pp 3014ndash3019 London UK June2015

[5] D Mansouri L Mokdad J Ben-Othman and M IoualalenldquoDetecting DoS attacks in WSN based on clustering tech-niquerdquo in Proceedings of the IEEEWireless Communications andNetworking Conference (WCNC rsquo13) pp 2214ndash2219 ShanghaiChina April 2013

[6] J-L Chen Y-W Ma X Wang Y-M Huang and Y-F LaildquoTime-division secret key protocol for wireless sensor network-ingrdquo Institution of Engineering andTechnology Communicationsvol 5 no 12 pp 1720ndash1726 2011

[7] D He C Chen S Chan and J Bu ldquoDiCode DoS-resistant anddistributed code dissemination in wireless sensor networksrdquoIEEE Transactions on Wireless Communications vol 11 no 5pp 1946ndash1956 2012

[8] G Han J Jiang W Shen L Shu and J Rodrigues ldquoIDSEP anovel intrusion detection scheme based on energy predictionin cluster-based wireless sensor networksrdquo IET InformationSecurity vol 7 no 2 pp 97ndash105 2013

[9] E B Ram Pradheep Manohar ldquoDetection of stealthy denialof service (S-DoS) attacks in wireless sensor networksrdquo Inter-national Journal of Computer Science and Information Security(IJCSIS) vol 14 2016

[10] H Tan D Ostry J Zic and S Jha ldquoA confidential and DoS-resistant multi-hop code dissemination protocol for wirelesssensor networksrdquoComputersamp Security vol 32 pp 36ndash55 2013

[11] S M Nam and T H Cho ldquoEnergy efficient method fordetection and prevention of false reports in wireless sensornetworksrdquo in Proceedings of the 8th International Conference onInformation Science and Digital Content Technology (ICIDT rsquo12)pp 766ndash769 Jeju Island South Korea June 2012

[12] S Naik and N Shekokar ldquoConservation of energy in wirelesssensor network by preventing denial of sleep attackrdquo ProcediaComputer Science vol 45 pp 370ndash379 2015

[13] C-T Hsueh C-Y Wen and Y-C Ouyang ldquoA secure schemeagainst power exhausting attacks in hierarchical wireless sensornetworksrdquo IEEE Sensors Journal vol 15 no 6 pp 3590ndash36022015

[14] S Kaur andM Ataullah ldquoSecuring the wireless sensor networkfrom denial of sleep attack by isolating the nodesrdquo InternationalJournal of Computer Applications vol 103 no 1 pp 29ndash33 2014

[15] S Shamshirband A Amini N B Anuar M L Mat Kiah Y WTeh and S Furnell ldquoD-FICCA a density-based fuzzy imperi-alist competitive clustering algorithm for intrusion detection inwireless sensor networksrdquo Measurement vol 55 pp 212ndash2262014

[16] S Shamshirband A Patel N B Anuar M L M Kiah andA Abraham ldquoCooperative game theoretic approach usingfuzzy Q-learning for detecting and preventing intrusions inwireless sensor networksrdquo Engineering Applications of ArtificialIntelligence vol 32 pp 228ndash241 2014

[17] N K Sreelaja and G A Vijayalakshmi Pai ldquoSwarm intelligencebased approach for sinkhole attack detection in wireless sensornetworksrdquo Applied Soft Computing Journal vol 19 pp 68ndash792014

[18] G Keerthana and G Padmavathi ldquoDetecting sinkhole attackin wireless sensor network using enhanced particle swarmoptimization techniquerdquo International Journal of Security andIts Applications vol 10 no 3 pp 41ndash54 2016

[19] A Saeed A Ahmadinia A Javed and H Larijani ldquoRandomneural network based intelligent intrusion detection forwirelesssensor networksrdquo Procedia Computer Science vol 80 pp 2372ndash2376 2016

[20] D Management ldquoRSA Algorithmrdquo 2016 httpwwwdi-mgtcomaursa alghtml

[21] M Zhao Y Li and W Wang ldquoModeling and analyticalstudy of link properties in multihop wireless networksrdquo IEEETransactions on Communications vol 60 no 2 pp 445ndash4552012

[22] C-T Hsueh C-Y Wen and Y-C Ouyang ldquoA secure schemeagainst power exhausting attacks in hierarchical wireless sensornetworksrdquo IEEE Sensors Journal vol 15 no 6 pp 3590ndash36022015

[23] D N S Swapna Naik ldquoConservation of energy in wireless sen-sor network by preventing denial of sleep attackrdquo in Proceedingsof the International Conference on Advanced Computing Tech-nologies and Applications (ICACTA rsquo15) pp 370ndash379 MumbaiIndia March 2015

International Journal of

AerospaceEngineeringHindawi Publishing Corporationhttpwwwhindawicom Volume 2014

RoboticsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Active and Passive Electronic Components

Control Scienceand Engineering

Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

International Journal of

RotatingMachinery

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporation httpwwwhindawicom

Journal ofEngineeringVolume 2014

Submit your manuscripts athttpswwwhindawicom

VLSI Design

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Shock and Vibration

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Civil EngineeringAdvances in

Acoustics and VibrationAdvances in

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Electrical and Computer Engineering

Journal of

Advances inOptoElectronics

Hindawi Publishing Corporation httpwwwhindawicom

Volume 2014

The Scientific World JournalHindawi Publishing Corporation httpwwwhindawicom Volume 2014

SensorsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Modelling amp Simulation in EngineeringHindawi Publishing Corporation httpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Chemical EngineeringInternational Journal of Antennas and

Propagation

International Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Navigation and Observation

International Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

DistributedSensor Networks

International Journal of

Page 7: GA-DoSLD: Genetic Algorithm Based Denial-of-Sleep Attack ...downloads.hindawi.com/journals/scn/2017/9863032.pdf · node can forward the fake data packets to the authorized nodes,

Security and Communication Networks 7

for the proposed GA-DoSLD The steps involved in thesuggested GA-DoSLD algorithm are illustrated below

Algorithm 4 (GA-DoSLD algorithm)

Input Population

Output Optimal population with fitness value

Step 1 Compute the index of individuals

Individual larr Random member (population)Initialize the array of fittest as emptyFor (node in population)If (FittestgetFitness() = getIndividual(node)getFit-ness())

Fittest = getIndividual (node) (5)

Individuals [index] = Fittest

Step 2 Compute fitness function

Load member populationCompute the weight accuracy (119882ac) and relativeaccuracy (119877ac)Compute the occurrences of weight (119882oc) and relativeweight (119877oc)

Fitness = 119882ac lowast accuracy of 119898 hop + 119882oc

lowast occurrence of 119898 hopFitness = (1198821 + 1198822) lowast af + (minus1198822) lowast 119877oc

(6)

Step 3 Execute reproduction

Initialize the new pop as an empty setselect the random member in the input populationbased on fitness functionFor (119894 = 1 119894 le maximum size of population 119894 + +)119883 larr Random selected member in population basedon fitness function119884 larr Random selected member in population basedon fitness functionFind the parent profiles of (119883119884)Len 119883 larr length (119883)Len 119884 larr length (119884)

119888 = Select random number between 1 and Len 119883new chromosome

= (substring (119883 1 119888) substring (119884 1 119888)) (7)

Set offspring as new chromosome

Step 4 Population Update

If (random probability to mutate ge threshold)

off spring larr997888 Mutates (off spring)Set new population

larr997888 Union (new population offspring)(8)

End doPopulation larr Union (new population new pop)Return Best (Population Fitness)

4 Performance Analysis

This section describes the performance results of the pro-posed GA-DoSLD algorithm for the following metrics

(i) Normalized energy consumption(ii) Effective packet number(iii) End-to-end delay(iv) Average energy consumption(v) Packet delivery ratio(vi) Throughput ratio versus packet rate

To prove the superiority of the proposed GA-DoSLD algo-rithm it is compared with the existing algorithms such aszero knowledge protocol (ZKP) [22] X-MAC and Two-TierEnergy-Efficient Secure (TE2S) scheme [23] and their resultsare discussed in the following sections

41 Normalized Energy Consumption Normalized energyconsumption is the amount of energy consumed for transfer-ring 3 packets per second The normalized energy consump-tion of the existing X-MAC algorithm ZKP TE2P schemeand the proposed GA-DoSLD algorithm is validated for mul-tiple intervals of attackThe comparison result represented inFigure 4 depicts that for all the attack intervals the suggestedGA-DoSLD algorithm consumes minimal energy

42 Effective Packet Number The effective packet number ofthe existing X-MAC algorithm ZKP TE2S scheme and theproposed GA-DoSLD algorithm is validated for the variableattack intervals The comparison considers the packet send-ing rate as 1 packet every 3 seconds The comparison resultrepresented in Figure 5 shows that the suggested GA-DoSLDalgorithm provides higher scores on effective packet numberthan the existing schemes

8 Security and Communication Networks

0

20

40

60

80

100

05 1 15 2 25 3 35 4

Ener

gy co

nsum

ptio

n (m

JSec

)

Attack interval

X-MACZKP

GA-DoSLDTE2S

Figure 4 Comparison of normalized energy consumption for theexisting and the proposed methods

0

200

400

600

800

1000

1200

1400

X-MACZKP

GA-DoSLD

05 1 15 2 25 3 35 4Attack interval

Effec

tive p

acke

t num

ber (

pack

et3

sec)

TE2S

Figure 5 Comparison of packet number versus attack interval

43 End-to-End Delay The end-to-end delay is defined asthe average time consumed for transmitting the packets Theanalysis of end-to-end delay with respect to the packet size isrepresented in Figure 6 From the figure it is clear that whencompared to existing X-MAC ZKP and TE2S algorithms thesuggested GA-DoSLD algorithm provides a minimal end-to-end delay for the variable packet sizes

44 Average Energy Consumption The average energy con-sumption is the amount of energy consumed by the algo-rithms for transmitting the data packets The comparison ofaverage energy consumption for the existing X-MAC ZKPTE2S schemes and the proposed GA-DoSLD algorithm isrepresented in Figure 7 From the figure it is clear that thesuggested GA-DoSLD algorithm provides minimal energyconsumption than the existing schemes

005

115

225

335

128 256 384 512 640Packet size

X-MACZKP

GA-DoSLD

End-

to-e

nd d

elay

(sec

onds

)

4

TE2S

Figure 6 Comparison of end-to-end delay versus packet size for theexisting and the proposed methods

0

05

1

15

2

25

10 20 30 40 50 60 70Simulation time (ms)

X-MACZKP

GA-DoSLD

Aver

age e

nerg

y co

nsum

ptio

n (J

S)

TE2S

Figure 7 Analysis of average energy consumption versus simula-tion time for the existing and the proposed methods

45 Packet Delivery Ratio The packet delivery ratio (PDR) isdefined as the ratio of the number of data packets successfullydelivered to the destination node to the number of datapackets transmitted from the source The estimation of thePDR is based on the following equation

PDR = 119875119877 lowast 100sum119899119886minus1

119875Gen119886

(9)

where 119875119877 represents the number of data packets received atthe destination node 119875Gen is the total number of data packetsgenerated by the source nodes and 119899 denotes the numberof sensor nodes The comparison of PDR with respect to thesimulation time is represented in Figure 8

From the figure it is analyzed that when compared to theexisting X-MAC ZKP and TE2S schemes the proposed GA-DoSLD algorithm provides higher PDR

Security and Communication Networks 9

0

20

40

60

80

100

5 10 15 20 25 30 35 40 45 50

Pack

et d

eliv

ery

ratio

()

Simulation time (ms)

X-MACZKP

GA-DoSLDTE2S

Figure 8 Comparison of packet delivery ratio versus simulationtime for the existing and proposed schemes

46 Throughput Performance for Various Packet SendingRates The effectiveness of the protocol depends on thesuccessful reception and transmission of data packets underthe various sending rates such as 1 packet3 seconds 1packet5 seconds and 1 packet7 seconds [22] In this paperthe packet sending rate of 1 packet3 seconds is taken tovalidate the performance of proposed work The estimationof the throughput ratio is based on the following equation

Throughput ratio = 119875NS119875NT (10)

where 119875NS denotes the packet number under simulation sce-nario and 119875NT represents the packet number delivered underthe theoretical scenarioThe superiority of the suggested GA-DoSLD algorithm is validated against the existing algorithmssuch as X-MAC ZKP and TE2P for a packer rate of 1 packetper 3 seconds Figure 9 represents the comparison of thethroughput ratio with respect to the variable attack interval

From the figure it is clear that the suggested GA-DoSLDalgorithm provides higher throughput than the existing algo-rithms under the packet sending rate of 1 packet3 seconds

5 Conclusion and Future Work

In this paper an efficient GA-DoSLD algorithm is proposedfor generating the DoSL attack profiles from multiple sensornodes such that the attacker nodes can be prevented from thecommunication process Initially a WSN is simulated with100 numbers of static sensor nodes then the BS performs theoperations such as key pair generation and behaviormonitor-ing in parallel The base station monitors the behavior of thesensor nodes and initializes every behavior as a chromosomeThe MRSA algorithm is implemented in the base stationfor generating and distributing the key pair among thesensor nodes Before initiating the communication betweenthe sensor nodes the AODV routing protocol estimates theoptimal route To validate the trustworthiness of the relaynodes in the route the fitness value is estimated for every

0

5000

10000

15000

20000

25000

30000

35000

40000

45000

50000

05 1 15 2 25 3 35 4Attack interval (secs)

X-MACZKP

GA-DoSLDTh

roug

hput

for t

he p

acke

t sen

ding

rate

of 1

pac

ket3

seco

nds

TE2P

Figure 9 Comparison of throughput under packet sending rate of1 packet3 seconds versus attack interval

chromosome If the chromosome is determined as unusualit is validated against the existing attack profiles If there doesnot exist a match the pair of chromosomes is subjected tothe crossover and mutation operations The resultant chro-mosomes are added to the existing chromosomes Finally theBS determines the attacker nodes broadcasting the blockedinformation to all the sensor nodes in the network To provethe superiority of the suggested GA-DoSLD algorithm itis compared against the existing X-MAC ZKP and TE2Sschemes for the metrics such as normalized energy con-sumption effective packet number end-to-end delay averageenergy consumption packet delivery ratio and throughputratio versus packet rate The validation results prove thatwhen compared to the existing schemes the proposedalgorithm provides optimal results for all the metrics Therepeated execution of the GA-DoSLD algorithm in the sensornodes consumes a considerable amount of energy Thus toachieve the energy optimization a different soft computingalgorithm other than GA can be used in future for detectingthe denial-of-sleep attack in the WSN environment

Notations

119873 Expected number of hops119867 Number of hops between the source anddestination119864 Number of neighbors at the higher tiers119877119888 Expected number of neighbors at 119888th hop119862119887 Additional coverage index of the nodewith 119887 neighbors119882ac Weight accuracy

10 Security and Communication Networks

119877ac Accuracy relative119882oc Occurrence119877oc Relative weight of occurrence

Competing Interests

The authors declare that there is no conflict of interestsregarding the publication of this paper

References

[1] V C Manju S L Senthil Lekha and M Sasi Kumar ldquoMech-anisms for detecting and preventing denial of sleep attacks onwireless sensor networksrdquo in Proceedings of the IEEE Conferenceon Information and Communication Technologies (ICT rsquo13) pp74ndash77 Tamil Nadu India April 2013

[2] D R Raymond R C Marchany M I Brownfield and S FMidkiff ldquoEffects of denial-of-sleep attacks on wireless sensornetworkMAC protocolsrdquo IEEE Transactions on Vehicular Tech-nology vol 58 no 1 pp 367ndash380 2009

[3] R P Manohar and E Baburaj ldquoDetection of Stealthy Denialof Service (S-DoS) attacks in wireless sensor networksrdquo Inter-national Journal of Computer Science and Information Security(IJCSIS) vol 14 pp 343ndash348 2016

[4] D Mansouri L Mokddad J Ben-Othman and M IoualalenldquoPreventing denial of service attacks in wireless sensor net-worksrdquo in Proceedings of the IEEE International Conference onCommunications (ICC rsquo15) pp 3014ndash3019 London UK June2015

[5] D Mansouri L Mokdad J Ben-Othman and M IoualalenldquoDetecting DoS attacks in WSN based on clustering tech-niquerdquo in Proceedings of the IEEEWireless Communications andNetworking Conference (WCNC rsquo13) pp 2214ndash2219 ShanghaiChina April 2013

[6] J-L Chen Y-W Ma X Wang Y-M Huang and Y-F LaildquoTime-division secret key protocol for wireless sensor network-ingrdquo Institution of Engineering andTechnology Communicationsvol 5 no 12 pp 1720ndash1726 2011

[7] D He C Chen S Chan and J Bu ldquoDiCode DoS-resistant anddistributed code dissemination in wireless sensor networksrdquoIEEE Transactions on Wireless Communications vol 11 no 5pp 1946ndash1956 2012

[8] G Han J Jiang W Shen L Shu and J Rodrigues ldquoIDSEP anovel intrusion detection scheme based on energy predictionin cluster-based wireless sensor networksrdquo IET InformationSecurity vol 7 no 2 pp 97ndash105 2013

[9] E B Ram Pradheep Manohar ldquoDetection of stealthy denialof service (S-DoS) attacks in wireless sensor networksrdquo Inter-national Journal of Computer Science and Information Security(IJCSIS) vol 14 2016

[10] H Tan D Ostry J Zic and S Jha ldquoA confidential and DoS-resistant multi-hop code dissemination protocol for wirelesssensor networksrdquoComputersamp Security vol 32 pp 36ndash55 2013

[11] S M Nam and T H Cho ldquoEnergy efficient method fordetection and prevention of false reports in wireless sensornetworksrdquo in Proceedings of the 8th International Conference onInformation Science and Digital Content Technology (ICIDT rsquo12)pp 766ndash769 Jeju Island South Korea June 2012

[12] S Naik and N Shekokar ldquoConservation of energy in wirelesssensor network by preventing denial of sleep attackrdquo ProcediaComputer Science vol 45 pp 370ndash379 2015

[13] C-T Hsueh C-Y Wen and Y-C Ouyang ldquoA secure schemeagainst power exhausting attacks in hierarchical wireless sensornetworksrdquo IEEE Sensors Journal vol 15 no 6 pp 3590ndash36022015

[14] S Kaur andM Ataullah ldquoSecuring the wireless sensor networkfrom denial of sleep attack by isolating the nodesrdquo InternationalJournal of Computer Applications vol 103 no 1 pp 29ndash33 2014

[15] S Shamshirband A Amini N B Anuar M L Mat Kiah Y WTeh and S Furnell ldquoD-FICCA a density-based fuzzy imperi-alist competitive clustering algorithm for intrusion detection inwireless sensor networksrdquo Measurement vol 55 pp 212ndash2262014

[16] S Shamshirband A Patel N B Anuar M L M Kiah andA Abraham ldquoCooperative game theoretic approach usingfuzzy Q-learning for detecting and preventing intrusions inwireless sensor networksrdquo Engineering Applications of ArtificialIntelligence vol 32 pp 228ndash241 2014

[17] N K Sreelaja and G A Vijayalakshmi Pai ldquoSwarm intelligencebased approach for sinkhole attack detection in wireless sensornetworksrdquo Applied Soft Computing Journal vol 19 pp 68ndash792014

[18] G Keerthana and G Padmavathi ldquoDetecting sinkhole attackin wireless sensor network using enhanced particle swarmoptimization techniquerdquo International Journal of Security andIts Applications vol 10 no 3 pp 41ndash54 2016

[19] A Saeed A Ahmadinia A Javed and H Larijani ldquoRandomneural network based intelligent intrusion detection forwirelesssensor networksrdquo Procedia Computer Science vol 80 pp 2372ndash2376 2016

[20] D Management ldquoRSA Algorithmrdquo 2016 httpwwwdi-mgtcomaursa alghtml

[21] M Zhao Y Li and W Wang ldquoModeling and analyticalstudy of link properties in multihop wireless networksrdquo IEEETransactions on Communications vol 60 no 2 pp 445ndash4552012

[22] C-T Hsueh C-Y Wen and Y-C Ouyang ldquoA secure schemeagainst power exhausting attacks in hierarchical wireless sensornetworksrdquo IEEE Sensors Journal vol 15 no 6 pp 3590ndash36022015

[23] D N S Swapna Naik ldquoConservation of energy in wireless sen-sor network by preventing denial of sleep attackrdquo in Proceedingsof the International Conference on Advanced Computing Tech-nologies and Applications (ICACTA rsquo15) pp 370ndash379 MumbaiIndia March 2015

International Journal of

AerospaceEngineeringHindawi Publishing Corporationhttpwwwhindawicom Volume 2014

RoboticsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Active and Passive Electronic Components

Control Scienceand Engineering

Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

International Journal of

RotatingMachinery

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporation httpwwwhindawicom

Journal ofEngineeringVolume 2014

Submit your manuscripts athttpswwwhindawicom

VLSI Design

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Shock and Vibration

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Civil EngineeringAdvances in

Acoustics and VibrationAdvances in

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Electrical and Computer Engineering

Journal of

Advances inOptoElectronics

Hindawi Publishing Corporation httpwwwhindawicom

Volume 2014

The Scientific World JournalHindawi Publishing Corporation httpwwwhindawicom Volume 2014

SensorsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Modelling amp Simulation in EngineeringHindawi Publishing Corporation httpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Chemical EngineeringInternational Journal of Antennas and

Propagation

International Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Navigation and Observation

International Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

DistributedSensor Networks

International Journal of

Page 8: GA-DoSLD: Genetic Algorithm Based Denial-of-Sleep Attack ...downloads.hindawi.com/journals/scn/2017/9863032.pdf · node can forward the fake data packets to the authorized nodes,

8 Security and Communication Networks

0

20

40

60

80

100

05 1 15 2 25 3 35 4

Ener

gy co

nsum

ptio

n (m

JSec

)

Attack interval

X-MACZKP

GA-DoSLDTE2S

Figure 4 Comparison of normalized energy consumption for theexisting and the proposed methods

0

200

400

600

800

1000

1200

1400

X-MACZKP

GA-DoSLD

05 1 15 2 25 3 35 4Attack interval

Effec

tive p

acke

t num

ber (

pack

et3

sec)

TE2S

Figure 5 Comparison of packet number versus attack interval

43 End-to-End Delay The end-to-end delay is defined asthe average time consumed for transmitting the packets Theanalysis of end-to-end delay with respect to the packet size isrepresented in Figure 6 From the figure it is clear that whencompared to existing X-MAC ZKP and TE2S algorithms thesuggested GA-DoSLD algorithm provides a minimal end-to-end delay for the variable packet sizes

44 Average Energy Consumption The average energy con-sumption is the amount of energy consumed by the algo-rithms for transmitting the data packets The comparison ofaverage energy consumption for the existing X-MAC ZKPTE2S schemes and the proposed GA-DoSLD algorithm isrepresented in Figure 7 From the figure it is clear that thesuggested GA-DoSLD algorithm provides minimal energyconsumption than the existing schemes

005

115

225

335

128 256 384 512 640Packet size

X-MACZKP

GA-DoSLD

End-

to-e

nd d

elay

(sec

onds

)

4

TE2S

Figure 6 Comparison of end-to-end delay versus packet size for theexisting and the proposed methods

0

05

1

15

2

25

10 20 30 40 50 60 70Simulation time (ms)

X-MACZKP

GA-DoSLD

Aver

age e

nerg

y co

nsum

ptio

n (J

S)

TE2S

Figure 7 Analysis of average energy consumption versus simula-tion time for the existing and the proposed methods

45 Packet Delivery Ratio The packet delivery ratio (PDR) isdefined as the ratio of the number of data packets successfullydelivered to the destination node to the number of datapackets transmitted from the source The estimation of thePDR is based on the following equation

PDR = 119875119877 lowast 100sum119899119886minus1

119875Gen119886

(9)

where 119875119877 represents the number of data packets received atthe destination node 119875Gen is the total number of data packetsgenerated by the source nodes and 119899 denotes the numberof sensor nodes The comparison of PDR with respect to thesimulation time is represented in Figure 8

From the figure it is analyzed that when compared to theexisting X-MAC ZKP and TE2S schemes the proposed GA-DoSLD algorithm provides higher PDR

Security and Communication Networks 9

0

20

40

60

80

100

5 10 15 20 25 30 35 40 45 50

Pack

et d

eliv

ery

ratio

()

Simulation time (ms)

X-MACZKP

GA-DoSLDTE2S

Figure 8 Comparison of packet delivery ratio versus simulationtime for the existing and proposed schemes

46 Throughput Performance for Various Packet SendingRates The effectiveness of the protocol depends on thesuccessful reception and transmission of data packets underthe various sending rates such as 1 packet3 seconds 1packet5 seconds and 1 packet7 seconds [22] In this paperthe packet sending rate of 1 packet3 seconds is taken tovalidate the performance of proposed work The estimationof the throughput ratio is based on the following equation

Throughput ratio = 119875NS119875NT (10)

where 119875NS denotes the packet number under simulation sce-nario and 119875NT represents the packet number delivered underthe theoretical scenarioThe superiority of the suggested GA-DoSLD algorithm is validated against the existing algorithmssuch as X-MAC ZKP and TE2P for a packer rate of 1 packetper 3 seconds Figure 9 represents the comparison of thethroughput ratio with respect to the variable attack interval

From the figure it is clear that the suggested GA-DoSLDalgorithm provides higher throughput than the existing algo-rithms under the packet sending rate of 1 packet3 seconds

5 Conclusion and Future Work

In this paper an efficient GA-DoSLD algorithm is proposedfor generating the DoSL attack profiles from multiple sensornodes such that the attacker nodes can be prevented from thecommunication process Initially a WSN is simulated with100 numbers of static sensor nodes then the BS performs theoperations such as key pair generation and behaviormonitor-ing in parallel The base station monitors the behavior of thesensor nodes and initializes every behavior as a chromosomeThe MRSA algorithm is implemented in the base stationfor generating and distributing the key pair among thesensor nodes Before initiating the communication betweenthe sensor nodes the AODV routing protocol estimates theoptimal route To validate the trustworthiness of the relaynodes in the route the fitness value is estimated for every

0

5000

10000

15000

20000

25000

30000

35000

40000

45000

50000

05 1 15 2 25 3 35 4Attack interval (secs)

X-MACZKP

GA-DoSLDTh

roug

hput

for t

he p

acke

t sen

ding

rate

of 1

pac

ket3

seco

nds

TE2P

Figure 9 Comparison of throughput under packet sending rate of1 packet3 seconds versus attack interval

chromosome If the chromosome is determined as unusualit is validated against the existing attack profiles If there doesnot exist a match the pair of chromosomes is subjected tothe crossover and mutation operations The resultant chro-mosomes are added to the existing chromosomes Finally theBS determines the attacker nodes broadcasting the blockedinformation to all the sensor nodes in the network To provethe superiority of the suggested GA-DoSLD algorithm itis compared against the existing X-MAC ZKP and TE2Sschemes for the metrics such as normalized energy con-sumption effective packet number end-to-end delay averageenergy consumption packet delivery ratio and throughputratio versus packet rate The validation results prove thatwhen compared to the existing schemes the proposedalgorithm provides optimal results for all the metrics Therepeated execution of the GA-DoSLD algorithm in the sensornodes consumes a considerable amount of energy Thus toachieve the energy optimization a different soft computingalgorithm other than GA can be used in future for detectingthe denial-of-sleep attack in the WSN environment

Notations

119873 Expected number of hops119867 Number of hops between the source anddestination119864 Number of neighbors at the higher tiers119877119888 Expected number of neighbors at 119888th hop119862119887 Additional coverage index of the nodewith 119887 neighbors119882ac Weight accuracy

10 Security and Communication Networks

119877ac Accuracy relative119882oc Occurrence119877oc Relative weight of occurrence

Competing Interests

The authors declare that there is no conflict of interestsregarding the publication of this paper

References

[1] V C Manju S L Senthil Lekha and M Sasi Kumar ldquoMech-anisms for detecting and preventing denial of sleep attacks onwireless sensor networksrdquo in Proceedings of the IEEE Conferenceon Information and Communication Technologies (ICT rsquo13) pp74ndash77 Tamil Nadu India April 2013

[2] D R Raymond R C Marchany M I Brownfield and S FMidkiff ldquoEffects of denial-of-sleep attacks on wireless sensornetworkMAC protocolsrdquo IEEE Transactions on Vehicular Tech-nology vol 58 no 1 pp 367ndash380 2009

[3] R P Manohar and E Baburaj ldquoDetection of Stealthy Denialof Service (S-DoS) attacks in wireless sensor networksrdquo Inter-national Journal of Computer Science and Information Security(IJCSIS) vol 14 pp 343ndash348 2016

[4] D Mansouri L Mokddad J Ben-Othman and M IoualalenldquoPreventing denial of service attacks in wireless sensor net-worksrdquo in Proceedings of the IEEE International Conference onCommunications (ICC rsquo15) pp 3014ndash3019 London UK June2015

[5] D Mansouri L Mokdad J Ben-Othman and M IoualalenldquoDetecting DoS attacks in WSN based on clustering tech-niquerdquo in Proceedings of the IEEEWireless Communications andNetworking Conference (WCNC rsquo13) pp 2214ndash2219 ShanghaiChina April 2013

[6] J-L Chen Y-W Ma X Wang Y-M Huang and Y-F LaildquoTime-division secret key protocol for wireless sensor network-ingrdquo Institution of Engineering andTechnology Communicationsvol 5 no 12 pp 1720ndash1726 2011

[7] D He C Chen S Chan and J Bu ldquoDiCode DoS-resistant anddistributed code dissemination in wireless sensor networksrdquoIEEE Transactions on Wireless Communications vol 11 no 5pp 1946ndash1956 2012

[8] G Han J Jiang W Shen L Shu and J Rodrigues ldquoIDSEP anovel intrusion detection scheme based on energy predictionin cluster-based wireless sensor networksrdquo IET InformationSecurity vol 7 no 2 pp 97ndash105 2013

[9] E B Ram Pradheep Manohar ldquoDetection of stealthy denialof service (S-DoS) attacks in wireless sensor networksrdquo Inter-national Journal of Computer Science and Information Security(IJCSIS) vol 14 2016

[10] H Tan D Ostry J Zic and S Jha ldquoA confidential and DoS-resistant multi-hop code dissemination protocol for wirelesssensor networksrdquoComputersamp Security vol 32 pp 36ndash55 2013

[11] S M Nam and T H Cho ldquoEnergy efficient method fordetection and prevention of false reports in wireless sensornetworksrdquo in Proceedings of the 8th International Conference onInformation Science and Digital Content Technology (ICIDT rsquo12)pp 766ndash769 Jeju Island South Korea June 2012

[12] S Naik and N Shekokar ldquoConservation of energy in wirelesssensor network by preventing denial of sleep attackrdquo ProcediaComputer Science vol 45 pp 370ndash379 2015

[13] C-T Hsueh C-Y Wen and Y-C Ouyang ldquoA secure schemeagainst power exhausting attacks in hierarchical wireless sensornetworksrdquo IEEE Sensors Journal vol 15 no 6 pp 3590ndash36022015

[14] S Kaur andM Ataullah ldquoSecuring the wireless sensor networkfrom denial of sleep attack by isolating the nodesrdquo InternationalJournal of Computer Applications vol 103 no 1 pp 29ndash33 2014

[15] S Shamshirband A Amini N B Anuar M L Mat Kiah Y WTeh and S Furnell ldquoD-FICCA a density-based fuzzy imperi-alist competitive clustering algorithm for intrusion detection inwireless sensor networksrdquo Measurement vol 55 pp 212ndash2262014

[16] S Shamshirband A Patel N B Anuar M L M Kiah andA Abraham ldquoCooperative game theoretic approach usingfuzzy Q-learning for detecting and preventing intrusions inwireless sensor networksrdquo Engineering Applications of ArtificialIntelligence vol 32 pp 228ndash241 2014

[17] N K Sreelaja and G A Vijayalakshmi Pai ldquoSwarm intelligencebased approach for sinkhole attack detection in wireless sensornetworksrdquo Applied Soft Computing Journal vol 19 pp 68ndash792014

[18] G Keerthana and G Padmavathi ldquoDetecting sinkhole attackin wireless sensor network using enhanced particle swarmoptimization techniquerdquo International Journal of Security andIts Applications vol 10 no 3 pp 41ndash54 2016

[19] A Saeed A Ahmadinia A Javed and H Larijani ldquoRandomneural network based intelligent intrusion detection forwirelesssensor networksrdquo Procedia Computer Science vol 80 pp 2372ndash2376 2016

[20] D Management ldquoRSA Algorithmrdquo 2016 httpwwwdi-mgtcomaursa alghtml

[21] M Zhao Y Li and W Wang ldquoModeling and analyticalstudy of link properties in multihop wireless networksrdquo IEEETransactions on Communications vol 60 no 2 pp 445ndash4552012

[22] C-T Hsueh C-Y Wen and Y-C Ouyang ldquoA secure schemeagainst power exhausting attacks in hierarchical wireless sensornetworksrdquo IEEE Sensors Journal vol 15 no 6 pp 3590ndash36022015

[23] D N S Swapna Naik ldquoConservation of energy in wireless sen-sor network by preventing denial of sleep attackrdquo in Proceedingsof the International Conference on Advanced Computing Tech-nologies and Applications (ICACTA rsquo15) pp 370ndash379 MumbaiIndia March 2015

International Journal of

AerospaceEngineeringHindawi Publishing Corporationhttpwwwhindawicom Volume 2014

RoboticsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Active and Passive Electronic Components

Control Scienceand Engineering

Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

International Journal of

RotatingMachinery

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporation httpwwwhindawicom

Journal ofEngineeringVolume 2014

Submit your manuscripts athttpswwwhindawicom

VLSI Design

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Shock and Vibration

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Civil EngineeringAdvances in

Acoustics and VibrationAdvances in

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Electrical and Computer Engineering

Journal of

Advances inOptoElectronics

Hindawi Publishing Corporation httpwwwhindawicom

Volume 2014

The Scientific World JournalHindawi Publishing Corporation httpwwwhindawicom Volume 2014

SensorsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Modelling amp Simulation in EngineeringHindawi Publishing Corporation httpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Chemical EngineeringInternational Journal of Antennas and

Propagation

International Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Navigation and Observation

International Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

DistributedSensor Networks

International Journal of

Page 9: GA-DoSLD: Genetic Algorithm Based Denial-of-Sleep Attack ...downloads.hindawi.com/journals/scn/2017/9863032.pdf · node can forward the fake data packets to the authorized nodes,

Security and Communication Networks 9

0

20

40

60

80

100

5 10 15 20 25 30 35 40 45 50

Pack

et d

eliv

ery

ratio

()

Simulation time (ms)

X-MACZKP

GA-DoSLDTE2S

Figure 8 Comparison of packet delivery ratio versus simulationtime for the existing and proposed schemes

46 Throughput Performance for Various Packet SendingRates The effectiveness of the protocol depends on thesuccessful reception and transmission of data packets underthe various sending rates such as 1 packet3 seconds 1packet5 seconds and 1 packet7 seconds [22] In this paperthe packet sending rate of 1 packet3 seconds is taken tovalidate the performance of proposed work The estimationof the throughput ratio is based on the following equation

Throughput ratio = 119875NS119875NT (10)

where 119875NS denotes the packet number under simulation sce-nario and 119875NT represents the packet number delivered underthe theoretical scenarioThe superiority of the suggested GA-DoSLD algorithm is validated against the existing algorithmssuch as X-MAC ZKP and TE2P for a packer rate of 1 packetper 3 seconds Figure 9 represents the comparison of thethroughput ratio with respect to the variable attack interval

From the figure it is clear that the suggested GA-DoSLDalgorithm provides higher throughput than the existing algo-rithms under the packet sending rate of 1 packet3 seconds

5 Conclusion and Future Work

In this paper an efficient GA-DoSLD algorithm is proposedfor generating the DoSL attack profiles from multiple sensornodes such that the attacker nodes can be prevented from thecommunication process Initially a WSN is simulated with100 numbers of static sensor nodes then the BS performs theoperations such as key pair generation and behaviormonitor-ing in parallel The base station monitors the behavior of thesensor nodes and initializes every behavior as a chromosomeThe MRSA algorithm is implemented in the base stationfor generating and distributing the key pair among thesensor nodes Before initiating the communication betweenthe sensor nodes the AODV routing protocol estimates theoptimal route To validate the trustworthiness of the relaynodes in the route the fitness value is estimated for every

0

5000

10000

15000

20000

25000

30000

35000

40000

45000

50000

05 1 15 2 25 3 35 4Attack interval (secs)

X-MACZKP

GA-DoSLDTh

roug

hput

for t

he p

acke

t sen

ding

rate

of 1

pac

ket3

seco

nds

TE2P

Figure 9 Comparison of throughput under packet sending rate of1 packet3 seconds versus attack interval

chromosome If the chromosome is determined as unusualit is validated against the existing attack profiles If there doesnot exist a match the pair of chromosomes is subjected tothe crossover and mutation operations The resultant chro-mosomes are added to the existing chromosomes Finally theBS determines the attacker nodes broadcasting the blockedinformation to all the sensor nodes in the network To provethe superiority of the suggested GA-DoSLD algorithm itis compared against the existing X-MAC ZKP and TE2Sschemes for the metrics such as normalized energy con-sumption effective packet number end-to-end delay averageenergy consumption packet delivery ratio and throughputratio versus packet rate The validation results prove thatwhen compared to the existing schemes the proposedalgorithm provides optimal results for all the metrics Therepeated execution of the GA-DoSLD algorithm in the sensornodes consumes a considerable amount of energy Thus toachieve the energy optimization a different soft computingalgorithm other than GA can be used in future for detectingthe denial-of-sleep attack in the WSN environment

Notations

119873 Expected number of hops119867 Number of hops between the source anddestination119864 Number of neighbors at the higher tiers119877119888 Expected number of neighbors at 119888th hop119862119887 Additional coverage index of the nodewith 119887 neighbors119882ac Weight accuracy

10 Security and Communication Networks

119877ac Accuracy relative119882oc Occurrence119877oc Relative weight of occurrence

Competing Interests

The authors declare that there is no conflict of interestsregarding the publication of this paper

References

[1] V C Manju S L Senthil Lekha and M Sasi Kumar ldquoMech-anisms for detecting and preventing denial of sleep attacks onwireless sensor networksrdquo in Proceedings of the IEEE Conferenceon Information and Communication Technologies (ICT rsquo13) pp74ndash77 Tamil Nadu India April 2013

[2] D R Raymond R C Marchany M I Brownfield and S FMidkiff ldquoEffects of denial-of-sleep attacks on wireless sensornetworkMAC protocolsrdquo IEEE Transactions on Vehicular Tech-nology vol 58 no 1 pp 367ndash380 2009

[3] R P Manohar and E Baburaj ldquoDetection of Stealthy Denialof Service (S-DoS) attacks in wireless sensor networksrdquo Inter-national Journal of Computer Science and Information Security(IJCSIS) vol 14 pp 343ndash348 2016

[4] D Mansouri L Mokddad J Ben-Othman and M IoualalenldquoPreventing denial of service attacks in wireless sensor net-worksrdquo in Proceedings of the IEEE International Conference onCommunications (ICC rsquo15) pp 3014ndash3019 London UK June2015

[5] D Mansouri L Mokdad J Ben-Othman and M IoualalenldquoDetecting DoS attacks in WSN based on clustering tech-niquerdquo in Proceedings of the IEEEWireless Communications andNetworking Conference (WCNC rsquo13) pp 2214ndash2219 ShanghaiChina April 2013

[6] J-L Chen Y-W Ma X Wang Y-M Huang and Y-F LaildquoTime-division secret key protocol for wireless sensor network-ingrdquo Institution of Engineering andTechnology Communicationsvol 5 no 12 pp 1720ndash1726 2011

[7] D He C Chen S Chan and J Bu ldquoDiCode DoS-resistant anddistributed code dissemination in wireless sensor networksrdquoIEEE Transactions on Wireless Communications vol 11 no 5pp 1946ndash1956 2012

[8] G Han J Jiang W Shen L Shu and J Rodrigues ldquoIDSEP anovel intrusion detection scheme based on energy predictionin cluster-based wireless sensor networksrdquo IET InformationSecurity vol 7 no 2 pp 97ndash105 2013

[9] E B Ram Pradheep Manohar ldquoDetection of stealthy denialof service (S-DoS) attacks in wireless sensor networksrdquo Inter-national Journal of Computer Science and Information Security(IJCSIS) vol 14 2016

[10] H Tan D Ostry J Zic and S Jha ldquoA confidential and DoS-resistant multi-hop code dissemination protocol for wirelesssensor networksrdquoComputersamp Security vol 32 pp 36ndash55 2013

[11] S M Nam and T H Cho ldquoEnergy efficient method fordetection and prevention of false reports in wireless sensornetworksrdquo in Proceedings of the 8th International Conference onInformation Science and Digital Content Technology (ICIDT rsquo12)pp 766ndash769 Jeju Island South Korea June 2012

[12] S Naik and N Shekokar ldquoConservation of energy in wirelesssensor network by preventing denial of sleep attackrdquo ProcediaComputer Science vol 45 pp 370ndash379 2015

[13] C-T Hsueh C-Y Wen and Y-C Ouyang ldquoA secure schemeagainst power exhausting attacks in hierarchical wireless sensornetworksrdquo IEEE Sensors Journal vol 15 no 6 pp 3590ndash36022015

[14] S Kaur andM Ataullah ldquoSecuring the wireless sensor networkfrom denial of sleep attack by isolating the nodesrdquo InternationalJournal of Computer Applications vol 103 no 1 pp 29ndash33 2014

[15] S Shamshirband A Amini N B Anuar M L Mat Kiah Y WTeh and S Furnell ldquoD-FICCA a density-based fuzzy imperi-alist competitive clustering algorithm for intrusion detection inwireless sensor networksrdquo Measurement vol 55 pp 212ndash2262014

[16] S Shamshirband A Patel N B Anuar M L M Kiah andA Abraham ldquoCooperative game theoretic approach usingfuzzy Q-learning for detecting and preventing intrusions inwireless sensor networksrdquo Engineering Applications of ArtificialIntelligence vol 32 pp 228ndash241 2014

[17] N K Sreelaja and G A Vijayalakshmi Pai ldquoSwarm intelligencebased approach for sinkhole attack detection in wireless sensornetworksrdquo Applied Soft Computing Journal vol 19 pp 68ndash792014

[18] G Keerthana and G Padmavathi ldquoDetecting sinkhole attackin wireless sensor network using enhanced particle swarmoptimization techniquerdquo International Journal of Security andIts Applications vol 10 no 3 pp 41ndash54 2016

[19] A Saeed A Ahmadinia A Javed and H Larijani ldquoRandomneural network based intelligent intrusion detection forwirelesssensor networksrdquo Procedia Computer Science vol 80 pp 2372ndash2376 2016

[20] D Management ldquoRSA Algorithmrdquo 2016 httpwwwdi-mgtcomaursa alghtml

[21] M Zhao Y Li and W Wang ldquoModeling and analyticalstudy of link properties in multihop wireless networksrdquo IEEETransactions on Communications vol 60 no 2 pp 445ndash4552012

[22] C-T Hsueh C-Y Wen and Y-C Ouyang ldquoA secure schemeagainst power exhausting attacks in hierarchical wireless sensornetworksrdquo IEEE Sensors Journal vol 15 no 6 pp 3590ndash36022015

[23] D N S Swapna Naik ldquoConservation of energy in wireless sen-sor network by preventing denial of sleep attackrdquo in Proceedingsof the International Conference on Advanced Computing Tech-nologies and Applications (ICACTA rsquo15) pp 370ndash379 MumbaiIndia March 2015

International Journal of

AerospaceEngineeringHindawi Publishing Corporationhttpwwwhindawicom Volume 2014

RoboticsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Active and Passive Electronic Components

Control Scienceand Engineering

Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

International Journal of

RotatingMachinery

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporation httpwwwhindawicom

Journal ofEngineeringVolume 2014

Submit your manuscripts athttpswwwhindawicom

VLSI Design

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Shock and Vibration

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Civil EngineeringAdvances in

Acoustics and VibrationAdvances in

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Electrical and Computer Engineering

Journal of

Advances inOptoElectronics

Hindawi Publishing Corporation httpwwwhindawicom

Volume 2014

The Scientific World JournalHindawi Publishing Corporation httpwwwhindawicom Volume 2014

SensorsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Modelling amp Simulation in EngineeringHindawi Publishing Corporation httpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Chemical EngineeringInternational Journal of Antennas and

Propagation

International Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Navigation and Observation

International Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

DistributedSensor Networks

International Journal of

Page 10: GA-DoSLD: Genetic Algorithm Based Denial-of-Sleep Attack ...downloads.hindawi.com/journals/scn/2017/9863032.pdf · node can forward the fake data packets to the authorized nodes,

10 Security and Communication Networks

119877ac Accuracy relative119882oc Occurrence119877oc Relative weight of occurrence

Competing Interests

The authors declare that there is no conflict of interestsregarding the publication of this paper

References

[1] V C Manju S L Senthil Lekha and M Sasi Kumar ldquoMech-anisms for detecting and preventing denial of sleep attacks onwireless sensor networksrdquo in Proceedings of the IEEE Conferenceon Information and Communication Technologies (ICT rsquo13) pp74ndash77 Tamil Nadu India April 2013

[2] D R Raymond R C Marchany M I Brownfield and S FMidkiff ldquoEffects of denial-of-sleep attacks on wireless sensornetworkMAC protocolsrdquo IEEE Transactions on Vehicular Tech-nology vol 58 no 1 pp 367ndash380 2009

[3] R P Manohar and E Baburaj ldquoDetection of Stealthy Denialof Service (S-DoS) attacks in wireless sensor networksrdquo Inter-national Journal of Computer Science and Information Security(IJCSIS) vol 14 pp 343ndash348 2016

[4] D Mansouri L Mokddad J Ben-Othman and M IoualalenldquoPreventing denial of service attacks in wireless sensor net-worksrdquo in Proceedings of the IEEE International Conference onCommunications (ICC rsquo15) pp 3014ndash3019 London UK June2015

[5] D Mansouri L Mokdad J Ben-Othman and M IoualalenldquoDetecting DoS attacks in WSN based on clustering tech-niquerdquo in Proceedings of the IEEEWireless Communications andNetworking Conference (WCNC rsquo13) pp 2214ndash2219 ShanghaiChina April 2013

[6] J-L Chen Y-W Ma X Wang Y-M Huang and Y-F LaildquoTime-division secret key protocol for wireless sensor network-ingrdquo Institution of Engineering andTechnology Communicationsvol 5 no 12 pp 1720ndash1726 2011

[7] D He C Chen S Chan and J Bu ldquoDiCode DoS-resistant anddistributed code dissemination in wireless sensor networksrdquoIEEE Transactions on Wireless Communications vol 11 no 5pp 1946ndash1956 2012

[8] G Han J Jiang W Shen L Shu and J Rodrigues ldquoIDSEP anovel intrusion detection scheme based on energy predictionin cluster-based wireless sensor networksrdquo IET InformationSecurity vol 7 no 2 pp 97ndash105 2013

[9] E B Ram Pradheep Manohar ldquoDetection of stealthy denialof service (S-DoS) attacks in wireless sensor networksrdquo Inter-national Journal of Computer Science and Information Security(IJCSIS) vol 14 2016

[10] H Tan D Ostry J Zic and S Jha ldquoA confidential and DoS-resistant multi-hop code dissemination protocol for wirelesssensor networksrdquoComputersamp Security vol 32 pp 36ndash55 2013

[11] S M Nam and T H Cho ldquoEnergy efficient method fordetection and prevention of false reports in wireless sensornetworksrdquo in Proceedings of the 8th International Conference onInformation Science and Digital Content Technology (ICIDT rsquo12)pp 766ndash769 Jeju Island South Korea June 2012

[12] S Naik and N Shekokar ldquoConservation of energy in wirelesssensor network by preventing denial of sleep attackrdquo ProcediaComputer Science vol 45 pp 370ndash379 2015

[13] C-T Hsueh C-Y Wen and Y-C Ouyang ldquoA secure schemeagainst power exhausting attacks in hierarchical wireless sensornetworksrdquo IEEE Sensors Journal vol 15 no 6 pp 3590ndash36022015

[14] S Kaur andM Ataullah ldquoSecuring the wireless sensor networkfrom denial of sleep attack by isolating the nodesrdquo InternationalJournal of Computer Applications vol 103 no 1 pp 29ndash33 2014

[15] S Shamshirband A Amini N B Anuar M L Mat Kiah Y WTeh and S Furnell ldquoD-FICCA a density-based fuzzy imperi-alist competitive clustering algorithm for intrusion detection inwireless sensor networksrdquo Measurement vol 55 pp 212ndash2262014

[16] S Shamshirband A Patel N B Anuar M L M Kiah andA Abraham ldquoCooperative game theoretic approach usingfuzzy Q-learning for detecting and preventing intrusions inwireless sensor networksrdquo Engineering Applications of ArtificialIntelligence vol 32 pp 228ndash241 2014

[17] N K Sreelaja and G A Vijayalakshmi Pai ldquoSwarm intelligencebased approach for sinkhole attack detection in wireless sensornetworksrdquo Applied Soft Computing Journal vol 19 pp 68ndash792014

[18] G Keerthana and G Padmavathi ldquoDetecting sinkhole attackin wireless sensor network using enhanced particle swarmoptimization techniquerdquo International Journal of Security andIts Applications vol 10 no 3 pp 41ndash54 2016

[19] A Saeed A Ahmadinia A Javed and H Larijani ldquoRandomneural network based intelligent intrusion detection forwirelesssensor networksrdquo Procedia Computer Science vol 80 pp 2372ndash2376 2016

[20] D Management ldquoRSA Algorithmrdquo 2016 httpwwwdi-mgtcomaursa alghtml

[21] M Zhao Y Li and W Wang ldquoModeling and analyticalstudy of link properties in multihop wireless networksrdquo IEEETransactions on Communications vol 60 no 2 pp 445ndash4552012

[22] C-T Hsueh C-Y Wen and Y-C Ouyang ldquoA secure schemeagainst power exhausting attacks in hierarchical wireless sensornetworksrdquo IEEE Sensors Journal vol 15 no 6 pp 3590ndash36022015

[23] D N S Swapna Naik ldquoConservation of energy in wireless sen-sor network by preventing denial of sleep attackrdquo in Proceedingsof the International Conference on Advanced Computing Tech-nologies and Applications (ICACTA rsquo15) pp 370ndash379 MumbaiIndia March 2015

International Journal of

AerospaceEngineeringHindawi Publishing Corporationhttpwwwhindawicom Volume 2014

RoboticsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Active and Passive Electronic Components

Control Scienceand Engineering

Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

International Journal of

RotatingMachinery

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporation httpwwwhindawicom

Journal ofEngineeringVolume 2014

Submit your manuscripts athttpswwwhindawicom

VLSI Design

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Shock and Vibration

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Civil EngineeringAdvances in

Acoustics and VibrationAdvances in

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Electrical and Computer Engineering

Journal of

Advances inOptoElectronics

Hindawi Publishing Corporation httpwwwhindawicom

Volume 2014

The Scientific World JournalHindawi Publishing Corporation httpwwwhindawicom Volume 2014

SensorsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Modelling amp Simulation in EngineeringHindawi Publishing Corporation httpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Chemical EngineeringInternational Journal of Antennas and

Propagation

International Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Navigation and Observation

International Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

DistributedSensor Networks

International Journal of

Page 11: GA-DoSLD: Genetic Algorithm Based Denial-of-Sleep Attack ...downloads.hindawi.com/journals/scn/2017/9863032.pdf · node can forward the fake data packets to the authorized nodes,

International Journal of

AerospaceEngineeringHindawi Publishing Corporationhttpwwwhindawicom Volume 2014

RoboticsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Active and Passive Electronic Components

Control Scienceand Engineering

Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

International Journal of

RotatingMachinery

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporation httpwwwhindawicom

Journal ofEngineeringVolume 2014

Submit your manuscripts athttpswwwhindawicom

VLSI Design

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Shock and Vibration

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Civil EngineeringAdvances in

Acoustics and VibrationAdvances in

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Electrical and Computer Engineering

Journal of

Advances inOptoElectronics

Hindawi Publishing Corporation httpwwwhindawicom

Volume 2014

The Scientific World JournalHindawi Publishing Corporation httpwwwhindawicom Volume 2014

SensorsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Modelling amp Simulation in EngineeringHindawi Publishing Corporation httpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Chemical EngineeringInternational Journal of Antennas and

Propagation

International Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Navigation and Observation

International Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

DistributedSensor Networks

International Journal of