Research ArticleGA-DoSLD Genetic Algorithm Based Denial-of-SleepAttack Detection in WSN
Mahalakshmi Gunasekaran1 and Subathra Periakaruppan2
1Department of Computer Science and Engineering NPR College of Engineering and Technology Tamil Nadu 624001 India2Department of Information Technology Kamaraj College of Engineering amp Technology Tamil Nadu India
Correspondence should be addressed to Mahalakshmi Gunasekaran mahalakshmiit15hotmailcom
Received 23 July 2016 Accepted 17 November 2016 Published 17 January 2017
Academic Editor Qing Yang
Copyright copy 2017 Mahalakshmi Gunasekaran and Subathra Periakaruppan This is an open access article distributed under theCreative Commons Attribution License which permits unrestricted use distribution and reproduction in any medium providedthe original work is properly cited
Denial-of-sleep (DoSL) attack is a special category of denial-of-service attack that prevents the battery powered sensor nodes fromgoing into the sleep mode thus affecting the network performance The existing schemes used for the DoSL attack detectiondo not provide an optimal energy conservation and key pairing operation Hence in this paper an efficient Genetic Algorithm(GA) based denial-of-sleep attack detection (GA-DoSLD) algorithm is suggested for analyzing the misbehaviors of the nodes Thesuggested algorithm implements a Modified-RSA (MRSA) algorithm in the base station (BS) for generating and distributing thekey pair among the sensor nodes Before sendingreceiving the packets the sensor nodes determine the optimal route using AdHocOn-Demand Distance Vector Routing (AODV) protocol and then ensure the trustworthiness of the relay node using the fitnesscalculation The crossover and mutation operations detect and analyze the methods that the attackers use for implementing theattack On determining an attacker node the BS broadcasts the blocked information to all the other sensor nodes in the networkSimulation results prove that the suggested algorithm is optimal compared to the existing algorithms such as X-MAC ZKP andTE2P schemes
1 Introduction
Wireless Sensor Network (WSN) contains a collection ofself-governing sensors that monitors the conditions such assound temperature pressure and vibration [1] The sensornodes in the WSN are energized using the batteries But oneof the major issues of WSN is energy loss It is caused due tothe following reasons [2]
(i) Collisions(ii) Overhearing(iii) Idle listening(iv) Control packet overhead
In the collision loss the collision of data packets in the wire-less medium introduces the energy loss In the overhearingloss the maintenance of radios in the receiving mode duringdata packet transmission introduces the energy loss The idlelistening loss is created by a nodersquos radio in just monitoring
the channel As the control packets may have to be receivedby all the nodes in the transmission range the control packetoverhead is introduced Generally the WSN is prone totwo types of attacks such as invasive attack and noninvasiveattack The noninvasive attacks affect the power frequencyand timing of the channel whereas the invasive attacks affectthe information transmission routing process and serviceavailability [3] Among the attacks of WSN the denial-of-service attacks make the system or service inaccessible Theimportant properties of the DoSL attacks are
(i) malicious(ii) disruptive(iii) remote
When the denial-of-service attack is performed intentionallyit is termed as maliciousWhen the DoSL attack is successfulthe capability or service in WSN is affected Thus disruptingthe affected service is not the only goal of the attacker
HindawiSecurity and Communication NetworksVolume 2017 Article ID 9863032 10 pageshttpsdoiorg10115520179863032
2 Security and Communication Networks
Attacker node
Node 1Cluster head
Node 2 Node 3 Node 4
Figure 1 Denial-of-sleep attack [2]
As the physical presence of the attacker is uncomfortablefor launching multiple types of DoSL attacks the attack isperformed from a remote place One of the special categoriesof denial-of-service attack is DoSL attack
An example of the DoSL attack is represented in Figure 1In this attack the energy consumption of the sensor nodesis increased by preventing them from sleeping The attackernode can forward the fake data packets to the authorizednodes thus resulting in unnecessary transmissions Onreceiving the data packets if the receiver could not identifythe source it will process the data obtained from the attackernodes
This makes the receiver node to be awake till the datatransmission gets completed thus exhausting the batterypower of the nodes Further the attacker nodes can transmit afalse acknowledgment andmake the source node transmit allthe services thus maximizing the power consumption Theexisting components used for defending the DoSL attack areas follows [2]
(i) Strong link-layer authentication(ii) Antireplay protection(iii) Jamming identification(iv) Broadcast attack protection
The strong layer authentication is a key component ofthe DoSL defense On integrating this component to theWSN the DoSL attacks can be prevented efficiently Theantireplay protection component is used for preventing thereplay attacks that force the nodes to forward the old trafficinformation The jamming identification component is usedfor preventing the jamming attack that prevents the sensornodes from accessing the wireless medium This compo-nent integrates the sensor nodes with the simple radiosGenerally the MAC protocols are prone to unauthenticatedbroadcast attacks The broadcast attack protection technique
differentiates the legitimate traffic from the malicious trafficfor minimizing the energy consumption But the demeritsof the existing DoSL defense mechanisms are nonoptimalenergy conservation and lack of key pairing operations forpreventing the attacker from implementing the attack Thusto address the issues in the existing DoSL defense schemesan efficient GA-DoSLD algorithm is suggested
ObjectivesThe key objectives of the suggestedGA-DoSLDareas follows
(i) To analyze the neighbor information for creating thepopulation
(ii) To perform the key pairing using MRSA algorithm(iii) To deploy the AODV protocol for determining the
optimal route(iv) To determine the behavior of the already existing
attacker by estimating the fitness value(v) To provide an alert message to the base station
regarding the behavior of the neighbor node(vi) To broadcast the blocked information to other sensor
nodes in the network
The rest of the paper is organized as follows Section 2discusses the existing techniques used for detecting the DoSLattacks energy draining attacks and soft computing algo-rithms exploited for addressing the energy draining attacksSection 3 provides a detailed description of the proposedGA-DoSLD algorithm Section 4 discusses the experimentalanalysis of the proposed method and the study is concludedin Section 5
2 Related Works
This section illustrates the existing techniques used for DoSattack detection energy draining attacks and soft computingalgorithms used for addressing the energy draining attacks
21 Detection of DoS Attacks in WSN Mansouri et al [4]proposed a clustering technique for addressing the DoSattacks The suggested technique exploited the energy con-sumption of the nodes Mansouri et al [5] detected thecompromised nodes in WSN using energy-preserving solu-tion The suggested algorithm detected the controlled nodes(Cnode) using a hierarchical clustering technique Experi-mental results proved that the suggested technique achievedoptimal energy balance throughput detection coverage anddelay between the packet transmissions Chen et al [6]proposed a time-division secret key protocol for detectingthe DoS attack The simulation results proved that thecipher function was optimal for WSN Further the detectionjamming scheme increased the network lifetime of theWSNHe et al [7] suggested a distributed code disseminationprotocol namely DiCode for detecting the DoS attacks Thedemerits of the suggested protocol were nonoptimal securityproperties and consequences on the network availability Hanet al [8] proposed an Intrusion Detection System basedEnergy Prediction (IDSEP) for the cluster-based WSN The
Security and Communication Networks 3
suggested scheme exploited the energy consumption of thesensor nodes for detecting the malicious nodes Furtherbased on the energy consumption thresholds the categoriesof the DoS attacks were determined Simulation resultsproved that the suggested IDSEP efficiently detected themalicious nodes Ram Pradheep Manohar [9] proposed theSlowly Increasing and Decreasing under Constraint DoSAttack Strategy (SIDCAS) for detecting the Stealthy DoS (S-DoS) attacks in WSN In addition to providing security thesuggested approach also decreased the resource maintenancecost Tan et al [10] suggested a Deluge based multihop codedissemination protocol for enhancing the confidentiality ofthe WSN Experimental results proved that the suggestedapproach provided optimal latency dissemination rate andenergy consumption
22 Energy Draining Attacks Nam and Cho [11] suggesteda Statistical En-Route Filtering (SEF) scheme for detectingthe false reports in the intermediate nodes Further thefalse report injection attack was defended using three typesof keys such as individual key pairwise key and clusterkey The comparison of SEF with the suggested methodproved that the proposed method enhanced the energysavings than the SEF in sensor networks Manju et al [1]suggested three steps such as network organizationmaliciousnode detection and selective authentication for detecting thedenial-of-sleep attack in WSN Experimental results provedthat the suggested method was optimal for defending theattacker from performing the task Naik and Shekokar [12]addressed the denial-of-sleep attack using zero knowledgeprotocol and interlock protocol Experimental results provedthat the suggested protocols prevented the replay attack andman-in-the-middle attack and also minimized the resourceconsumption Hsueh et al [13] suggested a cross-layer designof secure scheme with MAC protocol for minimizing theenergy consumption of the sensor nodes Analysis resultsproved that the suggested protocol efficiently defended thereplay attacks and forge attacks Further the security require-ments and energy conservation were coordinated Kaurand Ataullah [14] suggested a hierarchical clustering basedisolation of nodes for addressing the denial-of-sleep attackThe suggested approach enhanced the network lifetime butthe idle listening problem was unaddressed Hsueh et al[13] proposed a cross-layer design of secure scheme inte-grated with MAC protocol for defending against the replayattack and forge attack Experimental results proved that thesuggested protocol coordinated the energy conservation andsecurity requirements
23 Soft Computing Algorithms Used for Addressing theEnergy Draining Attack Shamshirband et al [15] proposeda Density-Based Fuzzy Imperialist Competitive ClusteringAlgorithm (D-FICCA) for detecting the intruders in WSNWhen compared to the existing algorithms the proposedalgorithm produced 87 detection accuracy and 099 clus-tering quality Shamshirband et al [16] suggested a cooper-ative Game-Based Fuzzy Q-Learning (G-FQL) approach fordetecting the intrusions in the WSN The suggested modeldeployed the cooperative defense counterattack scenario for
the sink node and game theory strategy for the base stationnodes When compared to the Low Energy Adaptive Cluster-ingHierarchy (LEACH) the suggestedmodel produced opti-mal detection accuracy counterdefense energy consump-tion and network lifetime Further when compared to theexistingmachine learningmethods the suggestedmodel pro-vided enhanced detection and defense accuracy Sreelaja andVijayalakshmi Pai [17] suggested an Ant Colony Optimiza-tion Attack Detection (ACO-AD) algorithm for detecting thesinkhole attacks in WSN The keys were distributed amongthe alerted nodes using Ant Colony Optimization BooleanExpression Evolver Sign Generation (ABXES) algorithmExperimental results proved that when compared to theexisting LIDeA architecture the suggested architecture min-imized the false positives and also minimized the storage inthe sensor nodes Keerthana and Padmavathi [18] suggestedanEnhancedParticle SwarmOptimization (EPSO) techniquefor detecting the sinkhole attacks in WSN When comparedto the existing ACO and PSO algorithms the suggestedalgorithm provided optimal packet delivery ratio messagedrop average delay and false alarm rate Saeed et al [19]suggested a RandomNeural Network based IDS for detectingthe attackers Experimental results proved that the suggestedIDS provided higher accuracy and reduced performanceoverhead
From the analysis of the existing techniques it is clearthat they do not address the idle listening problem Furtherthe solutions suggested for preventing the DoSL attacksare unrealistic Thus to address the issues in the existingtechniques an efficient GA-DoSLD algorithm is proposed
3 Proposed Method
This section describes the proposed GA-DoSLD algorithmfor analyzing the misbehaviors of the sensor nodes in WSNThe overall flow of the suggested algorithm is represented inFigure 2
From the figure it is clear that the key steps involved inthe suggested algorithm are as follows
(i) WSN initialization(ii) Population generation(iii) Generation and distribution of key pair(iv) Route discovery(v) Behavior monitoring
A detailed description of every step is provided in thefollowing sections
31 WSN Initialization The initial step involved in thesuggested approach is WSN initialization By exploiting theNS2 tool the WSN is initialized with 100 numbers of sensornodes that have random waypoint mobility model Thetransmission range of the WSN is 250 meters Further theinitialized WSN poses the specifications listed in Table 1
32 Population Generation and BS Configuration Once theWSN environment is initialized the suggested GA-DoSLD
4 Security and Communication Networks
Initialization of WSN
Population generation
Route discovery
Verify the relay node
Behaviour monitoring
Update populations N
Evaluate fitnessObjective function
Rule set matching
Decision making (attacknormal)
Generate the key pair and distributeBS configuration process
Calculate personal fitness value
Estimate the fitness value for every
Select pair of chromosome for mating
Include the resulting chromosome
The probability of cross gt random
value
valueThe probability of mutation gt random
chromosome
Pc
Pm
rrarr Op_cross
rrarr Op_Mutant
Figure 2 Overall flow of the proposed GA-DoSLD algorithm
Security and Communication Networks 5
Table 1 System specifications
Simulation parameters ValuesPacket size 1024KbpsPacket rate Random packetssecRouting protocol AODVChannel bit rate 10MBsInitial power 25 JSensor node sensing power 5 times 10minus8 JTransmission range 150ndash250 metersDuty cycle 20-time slots
algorithm generates the population using population gen-eration algorithm The suggested algorithm initially loadsthe two-hop neighbor information to the base station thenfor every member in the neighbor list the next-of-neighboris initialized as the population The steps involved in thesuggested algorithm are illustrated as follows
Algorithm 1 (population generation algorithm)
Step 1 Load the two-hop neighbor information with the basestation
Step 2
for (member in the neighbor list)
Population larr Load Individual (newneighbor (next-of-neighbor))
During the implementation of the population generation
algorithm the BS configuration process is performed inparallel for analyzing the behavior of the nodes in the WSN
33 Generation and Distribution of Key Pair After the gener-ation of the population the BS deploys the MRSA algorithmfor generating a public key and private key pair Among thekeys the public key is used for the BS and the private key isused for the sensor nodes The main objective of this step isto prevent the attacker from implementing the DoSL attackBy deploying this step the attacker node is blocked at theinitial level before sending or receiving the packet thus savingthe energy of the sensor nodes The steps involved in thesuggested algorithm are illustrated as follows [20]
Algorithm 2 (MRSA algorithm)
Step 1 Choose the large prime numbers ldquo119899rdquo and ldquo119903rdquoStep 2 Compute the modulus totient using
Φ (119886) = (119899 minus 1) lowast (119903 minus 1) (1)
Step 3 Choose the public exponent ldquo119894rdquo such that 1 lt 119894 lt Φ(119899)and GCD(119894 Φ(119886)) = 1
Step 4 Estimate the private exponent ldquo119898rdquo such that 119898 =119894minus1modΦ(119886)Step 5 Estimate the private key as (119898 119886)Step 6 Estimate the public key as (119894 119886)
The suggested MRSA algorithm has a key size of 512 bitsAmong the total number of bits 256 bits are used as the publickey in the base station and the remaining 256 bits are usedas the private key in the sensor nodes The minimal key sizeprovides the following advantages
(i) Minimal computational complexity(ii) Achieving memory optimization
34 Route Discovery and Relay Node Validation Before ini-tiating the packet transmission the sensor nodes determinethe optimal route usingAdHocOn-DemandDistanceVector(AODV) routing protocol An example of the route discoveryprocess is represented in Figure 3 The suggested protocolhas two key operations such as route discovery and routemaintenance When the source node demands a route to thedestination node or when the lifetime of the existing route tothe destination node has expired the route discovery oper-ation is initiated with the broadcast of the RREQ messagesOn receiving the RREQ messages the intermediate nodesprovide an optimal route to the destination node When theintermediate node is the destination node the RREP packetsare directly transferred to the source node
The steps involved in the suggested AODV based routediscovery are described as follows
Algorithm 3 (AODV routing protocol)Step 1 When a sensor node seeks a route the RREQ packet ispropagated through the entire network till the packet reachesthe destination node
Step 2 When the source node and destination nodes areplaced at the corners of the network the RREQ packets haveto travel a maximum number of hops
Step 3 On receiving the RREQ packets the relay nodesbroadcast it ahead till it reaches the destination
Step 4 The overhead created due to the route request processis represented as follows
119877RREQ = 119873sum119886minus1
(119867) 119864119873minus1 119867sum119887=2
[(119886 minus 1 minus 119887) minus 119873minus1sum119888=1
119877119888]119875119862119887 (2)
Step 5 Once the RREQ packet reaches the destination nodeit replies back to the source node as RREP packet through thesame sequence for reaching the source node
Step 6 According to [21] the overhead created for the RREPpackets is represented as follows
119877RREP = 119873 + 1198732 (119886 minus ℎ minus 2) 119901 (3)
6 Security and Communication Networks
A
B
J
F YL
K
BSC P
D
E
H
I
T
Z
Base station
Destination
RREQRREP
Figure 3 Example for the route discovery process using AODV
Step 7 The overall overhead introduced for the route discov-ery process is
119877Overall = RREQ + RREP119877Overall = 119873sum
119886minus1
(119867) 119864119873minus1 119867sum119887=2
[(119886 minus 1 minus 119887) minus 119873minus1sum119888=1
119877119888]119875119862119887+ 119873 + 1198732 (119886 minus ℎ minus 2) 119901
(4)
The merits of using the AODV routing protocol for theroute discovery process are as follows
(i) Loop-free routes(ii) Faster response to link breakage(iii) Minimal demand for the broadcast
After establishing an optimal route the sensor nodesestimate the trustworthiness of the neighbor nodes usingfitness evaluation function
35 Behavior Monitoring After ensuring the trustworthinessof the neighbor nodes the sensor nodes forward the packetsDuring the transmission if the sensor node suspects any
malicious behaviors as follows it estimates the fitness valuebased on the information provided by the BS
(i) Flooding of data packets(ii) Transmission of large sized data packets that exceed
the data capacity of the sensor nodes
By estimating the fitness value based on attacker ID thechromosome of the already existing attacker is determinedAfter estimating the fitness value the sensor nodes providealert messages about the neighbor node behavior to the BSOn receiving the alertmessage the BS performs the crossoverandmutation operations on the chromosomes for identifyingand analyzing the method that is used by the attackerfor implementing the attack The resultant chromosomesobtained from the crossover and mutation operation areadded to the existing population Finally the BS confirmswhether the particular neighbor node is a normal node oran attacker node If the BS determines the neighbor nodeas an attacker node then the BS broadcasts the blockedinformation to all the other sensor nodes in the WSN Byexploiting the suggested GA-DoSLD algorithm the attackernodes that introduce the DoSL attacks are eliminated fromthe communication thus saving the energy of the sensornodes Notations describe the symbols used in Algorithm 4
Security and Communication Networks 7
for the proposed GA-DoSLD The steps involved in thesuggested GA-DoSLD algorithm are illustrated below
Algorithm 4 (GA-DoSLD algorithm)
Input Population
Output Optimal population with fitness value
Step 1 Compute the index of individuals
Individual larr Random member (population)Initialize the array of fittest as emptyFor (node in population)If (FittestgetFitness() = getIndividual(node)getFit-ness())
Fittest = getIndividual (node) (5)
Individuals [index] = Fittest
Step 2 Compute fitness function
Load member populationCompute the weight accuracy (119882ac) and relativeaccuracy (119877ac)Compute the occurrences of weight (119882oc) and relativeweight (119877oc)
Fitness = 119882ac lowast accuracy of 119898 hop + 119882oc
lowast occurrence of 119898 hopFitness = (1198821 + 1198822) lowast af + (minus1198822) lowast 119877oc
(6)
Step 3 Execute reproduction
Initialize the new pop as an empty setselect the random member in the input populationbased on fitness functionFor (119894 = 1 119894 le maximum size of population 119894 + +)119883 larr Random selected member in population basedon fitness function119884 larr Random selected member in population basedon fitness functionFind the parent profiles of (119883119884)Len 119883 larr length (119883)Len 119884 larr length (119884)
119888 = Select random number between 1 and Len 119883new chromosome
= (substring (119883 1 119888) substring (119884 1 119888)) (7)
Set offspring as new chromosome
Step 4 Population Update
If (random probability to mutate ge threshold)
off spring larr997888 Mutates (off spring)Set new population
larr997888 Union (new population offspring)(8)
End doPopulation larr Union (new population new pop)Return Best (Population Fitness)
4 Performance Analysis
This section describes the performance results of the pro-posed GA-DoSLD algorithm for the following metrics
(i) Normalized energy consumption(ii) Effective packet number(iii) End-to-end delay(iv) Average energy consumption(v) Packet delivery ratio(vi) Throughput ratio versus packet rate
To prove the superiority of the proposed GA-DoSLD algo-rithm it is compared with the existing algorithms such aszero knowledge protocol (ZKP) [22] X-MAC and Two-TierEnergy-Efficient Secure (TE2S) scheme [23] and their resultsare discussed in the following sections
41 Normalized Energy Consumption Normalized energyconsumption is the amount of energy consumed for transfer-ring 3 packets per second The normalized energy consump-tion of the existing X-MAC algorithm ZKP TE2P schemeand the proposed GA-DoSLD algorithm is validated for mul-tiple intervals of attackThe comparison result represented inFigure 4 depicts that for all the attack intervals the suggestedGA-DoSLD algorithm consumes minimal energy
42 Effective Packet Number The effective packet number ofthe existing X-MAC algorithm ZKP TE2S scheme and theproposed GA-DoSLD algorithm is validated for the variableattack intervals The comparison considers the packet send-ing rate as 1 packet every 3 seconds The comparison resultrepresented in Figure 5 shows that the suggested GA-DoSLDalgorithm provides higher scores on effective packet numberthan the existing schemes
8 Security and Communication Networks
0
20
40
60
80
100
05 1 15 2 25 3 35 4
Ener
gy co
nsum
ptio
n (m
JSec
)
Attack interval
X-MACZKP
GA-DoSLDTE2S
Figure 4 Comparison of normalized energy consumption for theexisting and the proposed methods
0
200
400
600
800
1000
1200
1400
X-MACZKP
GA-DoSLD
05 1 15 2 25 3 35 4Attack interval
Effec
tive p
acke
t num
ber (
pack
et3
sec)
TE2S
Figure 5 Comparison of packet number versus attack interval
43 End-to-End Delay The end-to-end delay is defined asthe average time consumed for transmitting the packets Theanalysis of end-to-end delay with respect to the packet size isrepresented in Figure 6 From the figure it is clear that whencompared to existing X-MAC ZKP and TE2S algorithms thesuggested GA-DoSLD algorithm provides a minimal end-to-end delay for the variable packet sizes
44 Average Energy Consumption The average energy con-sumption is the amount of energy consumed by the algo-rithms for transmitting the data packets The comparison ofaverage energy consumption for the existing X-MAC ZKPTE2S schemes and the proposed GA-DoSLD algorithm isrepresented in Figure 7 From the figure it is clear that thesuggested GA-DoSLD algorithm provides minimal energyconsumption than the existing schemes
005
115
225
335
128 256 384 512 640Packet size
X-MACZKP
GA-DoSLD
End-
to-e
nd d
elay
(sec
onds
)
4
TE2S
Figure 6 Comparison of end-to-end delay versus packet size for theexisting and the proposed methods
0
05
1
15
2
25
10 20 30 40 50 60 70Simulation time (ms)
X-MACZKP
GA-DoSLD
Aver
age e
nerg
y co
nsum
ptio
n (J
S)
TE2S
Figure 7 Analysis of average energy consumption versus simula-tion time for the existing and the proposed methods
45 Packet Delivery Ratio The packet delivery ratio (PDR) isdefined as the ratio of the number of data packets successfullydelivered to the destination node to the number of datapackets transmitted from the source The estimation of thePDR is based on the following equation
PDR = 119875119877 lowast 100sum119899119886minus1
119875Gen119886
(9)
where 119875119877 represents the number of data packets received atthe destination node 119875Gen is the total number of data packetsgenerated by the source nodes and 119899 denotes the numberof sensor nodes The comparison of PDR with respect to thesimulation time is represented in Figure 8
From the figure it is analyzed that when compared to theexisting X-MAC ZKP and TE2S schemes the proposed GA-DoSLD algorithm provides higher PDR
Security and Communication Networks 9
0
20
40
60
80
100
5 10 15 20 25 30 35 40 45 50
Pack
et d
eliv
ery
ratio
()
Simulation time (ms)
X-MACZKP
GA-DoSLDTE2S
Figure 8 Comparison of packet delivery ratio versus simulationtime for the existing and proposed schemes
46 Throughput Performance for Various Packet SendingRates The effectiveness of the protocol depends on thesuccessful reception and transmission of data packets underthe various sending rates such as 1 packet3 seconds 1packet5 seconds and 1 packet7 seconds [22] In this paperthe packet sending rate of 1 packet3 seconds is taken tovalidate the performance of proposed work The estimationof the throughput ratio is based on the following equation
Throughput ratio = 119875NS119875NT (10)
where 119875NS denotes the packet number under simulation sce-nario and 119875NT represents the packet number delivered underthe theoretical scenarioThe superiority of the suggested GA-DoSLD algorithm is validated against the existing algorithmssuch as X-MAC ZKP and TE2P for a packer rate of 1 packetper 3 seconds Figure 9 represents the comparison of thethroughput ratio with respect to the variable attack interval
From the figure it is clear that the suggested GA-DoSLDalgorithm provides higher throughput than the existing algo-rithms under the packet sending rate of 1 packet3 seconds
5 Conclusion and Future Work
In this paper an efficient GA-DoSLD algorithm is proposedfor generating the DoSL attack profiles from multiple sensornodes such that the attacker nodes can be prevented from thecommunication process Initially a WSN is simulated with100 numbers of static sensor nodes then the BS performs theoperations such as key pair generation and behaviormonitor-ing in parallel The base station monitors the behavior of thesensor nodes and initializes every behavior as a chromosomeThe MRSA algorithm is implemented in the base stationfor generating and distributing the key pair among thesensor nodes Before initiating the communication betweenthe sensor nodes the AODV routing protocol estimates theoptimal route To validate the trustworthiness of the relaynodes in the route the fitness value is estimated for every
0
5000
10000
15000
20000
25000
30000
35000
40000
45000
50000
05 1 15 2 25 3 35 4Attack interval (secs)
X-MACZKP
GA-DoSLDTh
roug
hput
for t
he p
acke
t sen
ding
rate
of 1
pac
ket3
seco
nds
TE2P
Figure 9 Comparison of throughput under packet sending rate of1 packet3 seconds versus attack interval
chromosome If the chromosome is determined as unusualit is validated against the existing attack profiles If there doesnot exist a match the pair of chromosomes is subjected tothe crossover and mutation operations The resultant chro-mosomes are added to the existing chromosomes Finally theBS determines the attacker nodes broadcasting the blockedinformation to all the sensor nodes in the network To provethe superiority of the suggested GA-DoSLD algorithm itis compared against the existing X-MAC ZKP and TE2Sschemes for the metrics such as normalized energy con-sumption effective packet number end-to-end delay averageenergy consumption packet delivery ratio and throughputratio versus packet rate The validation results prove thatwhen compared to the existing schemes the proposedalgorithm provides optimal results for all the metrics Therepeated execution of the GA-DoSLD algorithm in the sensornodes consumes a considerable amount of energy Thus toachieve the energy optimization a different soft computingalgorithm other than GA can be used in future for detectingthe denial-of-sleep attack in the WSN environment
Notations
119873 Expected number of hops119867 Number of hops between the source anddestination119864 Number of neighbors at the higher tiers119877119888 Expected number of neighbors at 119888th hop119862119887 Additional coverage index of the nodewith 119887 neighbors119882ac Weight accuracy
10 Security and Communication Networks
119877ac Accuracy relative119882oc Occurrence119877oc Relative weight of occurrence
Competing Interests
The authors declare that there is no conflict of interestsregarding the publication of this paper
References
[1] V C Manju S L Senthil Lekha and M Sasi Kumar ldquoMech-anisms for detecting and preventing denial of sleep attacks onwireless sensor networksrdquo in Proceedings of the IEEE Conferenceon Information and Communication Technologies (ICT rsquo13) pp74ndash77 Tamil Nadu India April 2013
[2] D R Raymond R C Marchany M I Brownfield and S FMidkiff ldquoEffects of denial-of-sleep attacks on wireless sensornetworkMAC protocolsrdquo IEEE Transactions on Vehicular Tech-nology vol 58 no 1 pp 367ndash380 2009
[3] R P Manohar and E Baburaj ldquoDetection of Stealthy Denialof Service (S-DoS) attacks in wireless sensor networksrdquo Inter-national Journal of Computer Science and Information Security(IJCSIS) vol 14 pp 343ndash348 2016
[4] D Mansouri L Mokddad J Ben-Othman and M IoualalenldquoPreventing denial of service attacks in wireless sensor net-worksrdquo in Proceedings of the IEEE International Conference onCommunications (ICC rsquo15) pp 3014ndash3019 London UK June2015
[5] D Mansouri L Mokdad J Ben-Othman and M IoualalenldquoDetecting DoS attacks in WSN based on clustering tech-niquerdquo in Proceedings of the IEEEWireless Communications andNetworking Conference (WCNC rsquo13) pp 2214ndash2219 ShanghaiChina April 2013
[6] J-L Chen Y-W Ma X Wang Y-M Huang and Y-F LaildquoTime-division secret key protocol for wireless sensor network-ingrdquo Institution of Engineering andTechnology Communicationsvol 5 no 12 pp 1720ndash1726 2011
[7] D He C Chen S Chan and J Bu ldquoDiCode DoS-resistant anddistributed code dissemination in wireless sensor networksrdquoIEEE Transactions on Wireless Communications vol 11 no 5pp 1946ndash1956 2012
[8] G Han J Jiang W Shen L Shu and J Rodrigues ldquoIDSEP anovel intrusion detection scheme based on energy predictionin cluster-based wireless sensor networksrdquo IET InformationSecurity vol 7 no 2 pp 97ndash105 2013
[9] E B Ram Pradheep Manohar ldquoDetection of stealthy denialof service (S-DoS) attacks in wireless sensor networksrdquo Inter-national Journal of Computer Science and Information Security(IJCSIS) vol 14 2016
[10] H Tan D Ostry J Zic and S Jha ldquoA confidential and DoS-resistant multi-hop code dissemination protocol for wirelesssensor networksrdquoComputersamp Security vol 32 pp 36ndash55 2013
[11] S M Nam and T H Cho ldquoEnergy efficient method fordetection and prevention of false reports in wireless sensornetworksrdquo in Proceedings of the 8th International Conference onInformation Science and Digital Content Technology (ICIDT rsquo12)pp 766ndash769 Jeju Island South Korea June 2012
[12] S Naik and N Shekokar ldquoConservation of energy in wirelesssensor network by preventing denial of sleep attackrdquo ProcediaComputer Science vol 45 pp 370ndash379 2015
[13] C-T Hsueh C-Y Wen and Y-C Ouyang ldquoA secure schemeagainst power exhausting attacks in hierarchical wireless sensornetworksrdquo IEEE Sensors Journal vol 15 no 6 pp 3590ndash36022015
[14] S Kaur andM Ataullah ldquoSecuring the wireless sensor networkfrom denial of sleep attack by isolating the nodesrdquo InternationalJournal of Computer Applications vol 103 no 1 pp 29ndash33 2014
[15] S Shamshirband A Amini N B Anuar M L Mat Kiah Y WTeh and S Furnell ldquoD-FICCA a density-based fuzzy imperi-alist competitive clustering algorithm for intrusion detection inwireless sensor networksrdquo Measurement vol 55 pp 212ndash2262014
[16] S Shamshirband A Patel N B Anuar M L M Kiah andA Abraham ldquoCooperative game theoretic approach usingfuzzy Q-learning for detecting and preventing intrusions inwireless sensor networksrdquo Engineering Applications of ArtificialIntelligence vol 32 pp 228ndash241 2014
[17] N K Sreelaja and G A Vijayalakshmi Pai ldquoSwarm intelligencebased approach for sinkhole attack detection in wireless sensornetworksrdquo Applied Soft Computing Journal vol 19 pp 68ndash792014
[18] G Keerthana and G Padmavathi ldquoDetecting sinkhole attackin wireless sensor network using enhanced particle swarmoptimization techniquerdquo International Journal of Security andIts Applications vol 10 no 3 pp 41ndash54 2016
[19] A Saeed A Ahmadinia A Javed and H Larijani ldquoRandomneural network based intelligent intrusion detection forwirelesssensor networksrdquo Procedia Computer Science vol 80 pp 2372ndash2376 2016
[20] D Management ldquoRSA Algorithmrdquo 2016 httpwwwdi-mgtcomaursa alghtml
[21] M Zhao Y Li and W Wang ldquoModeling and analyticalstudy of link properties in multihop wireless networksrdquo IEEETransactions on Communications vol 60 no 2 pp 445ndash4552012
[22] C-T Hsueh C-Y Wen and Y-C Ouyang ldquoA secure schemeagainst power exhausting attacks in hierarchical wireless sensornetworksrdquo IEEE Sensors Journal vol 15 no 6 pp 3590ndash36022015
[23] D N S Swapna Naik ldquoConservation of energy in wireless sen-sor network by preventing denial of sleep attackrdquo in Proceedingsof the International Conference on Advanced Computing Tech-nologies and Applications (ICACTA rsquo15) pp 370ndash379 MumbaiIndia March 2015
International Journal of
AerospaceEngineeringHindawi Publishing Corporationhttpwwwhindawicom Volume 2014
RoboticsJournal of
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Active and Passive Electronic Components
Control Scienceand Engineering
Journal of
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
International Journal of
RotatingMachinery
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Hindawi Publishing Corporation httpwwwhindawicom
Journal ofEngineeringVolume 2014
Submit your manuscripts athttpswwwhindawicom
VLSI Design
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Shock and Vibration
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Civil EngineeringAdvances in
Acoustics and VibrationAdvances in
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Electrical and Computer Engineering
Journal of
Advances inOptoElectronics
Hindawi Publishing Corporation httpwwwhindawicom
Volume 2014
The Scientific World JournalHindawi Publishing Corporation httpwwwhindawicom Volume 2014
SensorsJournal of
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Modelling amp Simulation in EngineeringHindawi Publishing Corporation httpwwwhindawicom Volume 2014
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Chemical EngineeringInternational Journal of Antennas and
Propagation
International Journal of
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Navigation and Observation
International Journal of
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
DistributedSensor Networks
International Journal of
2 Security and Communication Networks
Attacker node
Node 1Cluster head
Node 2 Node 3 Node 4
Figure 1 Denial-of-sleep attack [2]
As the physical presence of the attacker is uncomfortablefor launching multiple types of DoSL attacks the attack isperformed from a remote place One of the special categoriesof denial-of-service attack is DoSL attack
An example of the DoSL attack is represented in Figure 1In this attack the energy consumption of the sensor nodesis increased by preventing them from sleeping The attackernode can forward the fake data packets to the authorizednodes thus resulting in unnecessary transmissions Onreceiving the data packets if the receiver could not identifythe source it will process the data obtained from the attackernodes
This makes the receiver node to be awake till the datatransmission gets completed thus exhausting the batterypower of the nodes Further the attacker nodes can transmit afalse acknowledgment andmake the source node transmit allthe services thus maximizing the power consumption Theexisting components used for defending the DoSL attack areas follows [2]
(i) Strong link-layer authentication(ii) Antireplay protection(iii) Jamming identification(iv) Broadcast attack protection
The strong layer authentication is a key component ofthe DoSL defense On integrating this component to theWSN the DoSL attacks can be prevented efficiently Theantireplay protection component is used for preventing thereplay attacks that force the nodes to forward the old trafficinformation The jamming identification component is usedfor preventing the jamming attack that prevents the sensornodes from accessing the wireless medium This compo-nent integrates the sensor nodes with the simple radiosGenerally the MAC protocols are prone to unauthenticatedbroadcast attacks The broadcast attack protection technique
differentiates the legitimate traffic from the malicious trafficfor minimizing the energy consumption But the demeritsof the existing DoSL defense mechanisms are nonoptimalenergy conservation and lack of key pairing operations forpreventing the attacker from implementing the attack Thusto address the issues in the existing DoSL defense schemesan efficient GA-DoSLD algorithm is suggested
ObjectivesThe key objectives of the suggestedGA-DoSLDareas follows
(i) To analyze the neighbor information for creating thepopulation
(ii) To perform the key pairing using MRSA algorithm(iii) To deploy the AODV protocol for determining the
optimal route(iv) To determine the behavior of the already existing
attacker by estimating the fitness value(v) To provide an alert message to the base station
regarding the behavior of the neighbor node(vi) To broadcast the blocked information to other sensor
nodes in the network
The rest of the paper is organized as follows Section 2discusses the existing techniques used for detecting the DoSLattacks energy draining attacks and soft computing algo-rithms exploited for addressing the energy draining attacksSection 3 provides a detailed description of the proposedGA-DoSLD algorithm Section 4 discusses the experimentalanalysis of the proposed method and the study is concludedin Section 5
2 Related Works
This section illustrates the existing techniques used for DoSattack detection energy draining attacks and soft computingalgorithms used for addressing the energy draining attacks
21 Detection of DoS Attacks in WSN Mansouri et al [4]proposed a clustering technique for addressing the DoSattacks The suggested technique exploited the energy con-sumption of the nodes Mansouri et al [5] detected thecompromised nodes in WSN using energy-preserving solu-tion The suggested algorithm detected the controlled nodes(Cnode) using a hierarchical clustering technique Experi-mental results proved that the suggested technique achievedoptimal energy balance throughput detection coverage anddelay between the packet transmissions Chen et al [6]proposed a time-division secret key protocol for detectingthe DoS attack The simulation results proved that thecipher function was optimal for WSN Further the detectionjamming scheme increased the network lifetime of theWSNHe et al [7] suggested a distributed code disseminationprotocol namely DiCode for detecting the DoS attacks Thedemerits of the suggested protocol were nonoptimal securityproperties and consequences on the network availability Hanet al [8] proposed an Intrusion Detection System basedEnergy Prediction (IDSEP) for the cluster-based WSN The
Security and Communication Networks 3
suggested scheme exploited the energy consumption of thesensor nodes for detecting the malicious nodes Furtherbased on the energy consumption thresholds the categoriesof the DoS attacks were determined Simulation resultsproved that the suggested IDSEP efficiently detected themalicious nodes Ram Pradheep Manohar [9] proposed theSlowly Increasing and Decreasing under Constraint DoSAttack Strategy (SIDCAS) for detecting the Stealthy DoS (S-DoS) attacks in WSN In addition to providing security thesuggested approach also decreased the resource maintenancecost Tan et al [10] suggested a Deluge based multihop codedissemination protocol for enhancing the confidentiality ofthe WSN Experimental results proved that the suggestedapproach provided optimal latency dissemination rate andenergy consumption
22 Energy Draining Attacks Nam and Cho [11] suggesteda Statistical En-Route Filtering (SEF) scheme for detectingthe false reports in the intermediate nodes Further thefalse report injection attack was defended using three typesof keys such as individual key pairwise key and clusterkey The comparison of SEF with the suggested methodproved that the proposed method enhanced the energysavings than the SEF in sensor networks Manju et al [1]suggested three steps such as network organizationmaliciousnode detection and selective authentication for detecting thedenial-of-sleep attack in WSN Experimental results provedthat the suggested method was optimal for defending theattacker from performing the task Naik and Shekokar [12]addressed the denial-of-sleep attack using zero knowledgeprotocol and interlock protocol Experimental results provedthat the suggested protocols prevented the replay attack andman-in-the-middle attack and also minimized the resourceconsumption Hsueh et al [13] suggested a cross-layer designof secure scheme with MAC protocol for minimizing theenergy consumption of the sensor nodes Analysis resultsproved that the suggested protocol efficiently defended thereplay attacks and forge attacks Further the security require-ments and energy conservation were coordinated Kaurand Ataullah [14] suggested a hierarchical clustering basedisolation of nodes for addressing the denial-of-sleep attackThe suggested approach enhanced the network lifetime butthe idle listening problem was unaddressed Hsueh et al[13] proposed a cross-layer design of secure scheme inte-grated with MAC protocol for defending against the replayattack and forge attack Experimental results proved that thesuggested protocol coordinated the energy conservation andsecurity requirements
23 Soft Computing Algorithms Used for Addressing theEnergy Draining Attack Shamshirband et al [15] proposeda Density-Based Fuzzy Imperialist Competitive ClusteringAlgorithm (D-FICCA) for detecting the intruders in WSNWhen compared to the existing algorithms the proposedalgorithm produced 87 detection accuracy and 099 clus-tering quality Shamshirband et al [16] suggested a cooper-ative Game-Based Fuzzy Q-Learning (G-FQL) approach fordetecting the intrusions in the WSN The suggested modeldeployed the cooperative defense counterattack scenario for
the sink node and game theory strategy for the base stationnodes When compared to the Low Energy Adaptive Cluster-ingHierarchy (LEACH) the suggestedmodel produced opti-mal detection accuracy counterdefense energy consump-tion and network lifetime Further when compared to theexistingmachine learningmethods the suggestedmodel pro-vided enhanced detection and defense accuracy Sreelaja andVijayalakshmi Pai [17] suggested an Ant Colony Optimiza-tion Attack Detection (ACO-AD) algorithm for detecting thesinkhole attacks in WSN The keys were distributed amongthe alerted nodes using Ant Colony Optimization BooleanExpression Evolver Sign Generation (ABXES) algorithmExperimental results proved that when compared to theexisting LIDeA architecture the suggested architecture min-imized the false positives and also minimized the storage inthe sensor nodes Keerthana and Padmavathi [18] suggestedanEnhancedParticle SwarmOptimization (EPSO) techniquefor detecting the sinkhole attacks in WSN When comparedto the existing ACO and PSO algorithms the suggestedalgorithm provided optimal packet delivery ratio messagedrop average delay and false alarm rate Saeed et al [19]suggested a RandomNeural Network based IDS for detectingthe attackers Experimental results proved that the suggestedIDS provided higher accuracy and reduced performanceoverhead
From the analysis of the existing techniques it is clearthat they do not address the idle listening problem Furtherthe solutions suggested for preventing the DoSL attacksare unrealistic Thus to address the issues in the existingtechniques an efficient GA-DoSLD algorithm is proposed
3 Proposed Method
This section describes the proposed GA-DoSLD algorithmfor analyzing the misbehaviors of the sensor nodes in WSNThe overall flow of the suggested algorithm is represented inFigure 2
From the figure it is clear that the key steps involved inthe suggested algorithm are as follows
(i) WSN initialization(ii) Population generation(iii) Generation and distribution of key pair(iv) Route discovery(v) Behavior monitoring
A detailed description of every step is provided in thefollowing sections
31 WSN Initialization The initial step involved in thesuggested approach is WSN initialization By exploiting theNS2 tool the WSN is initialized with 100 numbers of sensornodes that have random waypoint mobility model Thetransmission range of the WSN is 250 meters Further theinitialized WSN poses the specifications listed in Table 1
32 Population Generation and BS Configuration Once theWSN environment is initialized the suggested GA-DoSLD
4 Security and Communication Networks
Initialization of WSN
Population generation
Route discovery
Verify the relay node
Behaviour monitoring
Update populations N
Evaluate fitnessObjective function
Rule set matching
Decision making (attacknormal)
Generate the key pair and distributeBS configuration process
Calculate personal fitness value
Estimate the fitness value for every
Select pair of chromosome for mating
Include the resulting chromosome
The probability of cross gt random
value
valueThe probability of mutation gt random
chromosome
Pc
Pm
rrarr Op_cross
rrarr Op_Mutant
Figure 2 Overall flow of the proposed GA-DoSLD algorithm
Security and Communication Networks 5
Table 1 System specifications
Simulation parameters ValuesPacket size 1024KbpsPacket rate Random packetssecRouting protocol AODVChannel bit rate 10MBsInitial power 25 JSensor node sensing power 5 times 10minus8 JTransmission range 150ndash250 metersDuty cycle 20-time slots
algorithm generates the population using population gen-eration algorithm The suggested algorithm initially loadsthe two-hop neighbor information to the base station thenfor every member in the neighbor list the next-of-neighboris initialized as the population The steps involved in thesuggested algorithm are illustrated as follows
Algorithm 1 (population generation algorithm)
Step 1 Load the two-hop neighbor information with the basestation
Step 2
for (member in the neighbor list)
Population larr Load Individual (newneighbor (next-of-neighbor))
During the implementation of the population generation
algorithm the BS configuration process is performed inparallel for analyzing the behavior of the nodes in the WSN
33 Generation and Distribution of Key Pair After the gener-ation of the population the BS deploys the MRSA algorithmfor generating a public key and private key pair Among thekeys the public key is used for the BS and the private key isused for the sensor nodes The main objective of this step isto prevent the attacker from implementing the DoSL attackBy deploying this step the attacker node is blocked at theinitial level before sending or receiving the packet thus savingthe energy of the sensor nodes The steps involved in thesuggested algorithm are illustrated as follows [20]
Algorithm 2 (MRSA algorithm)
Step 1 Choose the large prime numbers ldquo119899rdquo and ldquo119903rdquoStep 2 Compute the modulus totient using
Φ (119886) = (119899 minus 1) lowast (119903 minus 1) (1)
Step 3 Choose the public exponent ldquo119894rdquo such that 1 lt 119894 lt Φ(119899)and GCD(119894 Φ(119886)) = 1
Step 4 Estimate the private exponent ldquo119898rdquo such that 119898 =119894minus1modΦ(119886)Step 5 Estimate the private key as (119898 119886)Step 6 Estimate the public key as (119894 119886)
The suggested MRSA algorithm has a key size of 512 bitsAmong the total number of bits 256 bits are used as the publickey in the base station and the remaining 256 bits are usedas the private key in the sensor nodes The minimal key sizeprovides the following advantages
(i) Minimal computational complexity(ii) Achieving memory optimization
34 Route Discovery and Relay Node Validation Before ini-tiating the packet transmission the sensor nodes determinethe optimal route usingAdHocOn-DemandDistanceVector(AODV) routing protocol An example of the route discoveryprocess is represented in Figure 3 The suggested protocolhas two key operations such as route discovery and routemaintenance When the source node demands a route to thedestination node or when the lifetime of the existing route tothe destination node has expired the route discovery oper-ation is initiated with the broadcast of the RREQ messagesOn receiving the RREQ messages the intermediate nodesprovide an optimal route to the destination node When theintermediate node is the destination node the RREP packetsare directly transferred to the source node
The steps involved in the suggested AODV based routediscovery are described as follows
Algorithm 3 (AODV routing protocol)Step 1 When a sensor node seeks a route the RREQ packet ispropagated through the entire network till the packet reachesthe destination node
Step 2 When the source node and destination nodes areplaced at the corners of the network the RREQ packets haveto travel a maximum number of hops
Step 3 On receiving the RREQ packets the relay nodesbroadcast it ahead till it reaches the destination
Step 4 The overhead created due to the route request processis represented as follows
119877RREQ = 119873sum119886minus1
(119867) 119864119873minus1 119867sum119887=2
[(119886 minus 1 minus 119887) minus 119873minus1sum119888=1
119877119888]119875119862119887 (2)
Step 5 Once the RREQ packet reaches the destination nodeit replies back to the source node as RREP packet through thesame sequence for reaching the source node
Step 6 According to [21] the overhead created for the RREPpackets is represented as follows
119877RREP = 119873 + 1198732 (119886 minus ℎ minus 2) 119901 (3)
6 Security and Communication Networks
A
B
J
F YL
K
BSC P
D
E
H
I
T
Z
Base station
Destination
RREQRREP
Figure 3 Example for the route discovery process using AODV
Step 7 The overall overhead introduced for the route discov-ery process is
119877Overall = RREQ + RREP119877Overall = 119873sum
119886minus1
(119867) 119864119873minus1 119867sum119887=2
[(119886 minus 1 minus 119887) minus 119873minus1sum119888=1
119877119888]119875119862119887+ 119873 + 1198732 (119886 minus ℎ minus 2) 119901
(4)
The merits of using the AODV routing protocol for theroute discovery process are as follows
(i) Loop-free routes(ii) Faster response to link breakage(iii) Minimal demand for the broadcast
After establishing an optimal route the sensor nodesestimate the trustworthiness of the neighbor nodes usingfitness evaluation function
35 Behavior Monitoring After ensuring the trustworthinessof the neighbor nodes the sensor nodes forward the packetsDuring the transmission if the sensor node suspects any
malicious behaviors as follows it estimates the fitness valuebased on the information provided by the BS
(i) Flooding of data packets(ii) Transmission of large sized data packets that exceed
the data capacity of the sensor nodes
By estimating the fitness value based on attacker ID thechromosome of the already existing attacker is determinedAfter estimating the fitness value the sensor nodes providealert messages about the neighbor node behavior to the BSOn receiving the alertmessage the BS performs the crossoverandmutation operations on the chromosomes for identifyingand analyzing the method that is used by the attackerfor implementing the attack The resultant chromosomesobtained from the crossover and mutation operation areadded to the existing population Finally the BS confirmswhether the particular neighbor node is a normal node oran attacker node If the BS determines the neighbor nodeas an attacker node then the BS broadcasts the blockedinformation to all the other sensor nodes in the WSN Byexploiting the suggested GA-DoSLD algorithm the attackernodes that introduce the DoSL attacks are eliminated fromthe communication thus saving the energy of the sensornodes Notations describe the symbols used in Algorithm 4
Security and Communication Networks 7
for the proposed GA-DoSLD The steps involved in thesuggested GA-DoSLD algorithm are illustrated below
Algorithm 4 (GA-DoSLD algorithm)
Input Population
Output Optimal population with fitness value
Step 1 Compute the index of individuals
Individual larr Random member (population)Initialize the array of fittest as emptyFor (node in population)If (FittestgetFitness() = getIndividual(node)getFit-ness())
Fittest = getIndividual (node) (5)
Individuals [index] = Fittest
Step 2 Compute fitness function
Load member populationCompute the weight accuracy (119882ac) and relativeaccuracy (119877ac)Compute the occurrences of weight (119882oc) and relativeweight (119877oc)
Fitness = 119882ac lowast accuracy of 119898 hop + 119882oc
lowast occurrence of 119898 hopFitness = (1198821 + 1198822) lowast af + (minus1198822) lowast 119877oc
(6)
Step 3 Execute reproduction
Initialize the new pop as an empty setselect the random member in the input populationbased on fitness functionFor (119894 = 1 119894 le maximum size of population 119894 + +)119883 larr Random selected member in population basedon fitness function119884 larr Random selected member in population basedon fitness functionFind the parent profiles of (119883119884)Len 119883 larr length (119883)Len 119884 larr length (119884)
119888 = Select random number between 1 and Len 119883new chromosome
= (substring (119883 1 119888) substring (119884 1 119888)) (7)
Set offspring as new chromosome
Step 4 Population Update
If (random probability to mutate ge threshold)
off spring larr997888 Mutates (off spring)Set new population
larr997888 Union (new population offspring)(8)
End doPopulation larr Union (new population new pop)Return Best (Population Fitness)
4 Performance Analysis
This section describes the performance results of the pro-posed GA-DoSLD algorithm for the following metrics
(i) Normalized energy consumption(ii) Effective packet number(iii) End-to-end delay(iv) Average energy consumption(v) Packet delivery ratio(vi) Throughput ratio versus packet rate
To prove the superiority of the proposed GA-DoSLD algo-rithm it is compared with the existing algorithms such aszero knowledge protocol (ZKP) [22] X-MAC and Two-TierEnergy-Efficient Secure (TE2S) scheme [23] and their resultsare discussed in the following sections
41 Normalized Energy Consumption Normalized energyconsumption is the amount of energy consumed for transfer-ring 3 packets per second The normalized energy consump-tion of the existing X-MAC algorithm ZKP TE2P schemeand the proposed GA-DoSLD algorithm is validated for mul-tiple intervals of attackThe comparison result represented inFigure 4 depicts that for all the attack intervals the suggestedGA-DoSLD algorithm consumes minimal energy
42 Effective Packet Number The effective packet number ofthe existing X-MAC algorithm ZKP TE2S scheme and theproposed GA-DoSLD algorithm is validated for the variableattack intervals The comparison considers the packet send-ing rate as 1 packet every 3 seconds The comparison resultrepresented in Figure 5 shows that the suggested GA-DoSLDalgorithm provides higher scores on effective packet numberthan the existing schemes
8 Security and Communication Networks
0
20
40
60
80
100
05 1 15 2 25 3 35 4
Ener
gy co
nsum
ptio
n (m
JSec
)
Attack interval
X-MACZKP
GA-DoSLDTE2S
Figure 4 Comparison of normalized energy consumption for theexisting and the proposed methods
0
200
400
600
800
1000
1200
1400
X-MACZKP
GA-DoSLD
05 1 15 2 25 3 35 4Attack interval
Effec
tive p
acke
t num
ber (
pack
et3
sec)
TE2S
Figure 5 Comparison of packet number versus attack interval
43 End-to-End Delay The end-to-end delay is defined asthe average time consumed for transmitting the packets Theanalysis of end-to-end delay with respect to the packet size isrepresented in Figure 6 From the figure it is clear that whencompared to existing X-MAC ZKP and TE2S algorithms thesuggested GA-DoSLD algorithm provides a minimal end-to-end delay for the variable packet sizes
44 Average Energy Consumption The average energy con-sumption is the amount of energy consumed by the algo-rithms for transmitting the data packets The comparison ofaverage energy consumption for the existing X-MAC ZKPTE2S schemes and the proposed GA-DoSLD algorithm isrepresented in Figure 7 From the figure it is clear that thesuggested GA-DoSLD algorithm provides minimal energyconsumption than the existing schemes
005
115
225
335
128 256 384 512 640Packet size
X-MACZKP
GA-DoSLD
End-
to-e
nd d
elay
(sec
onds
)
4
TE2S
Figure 6 Comparison of end-to-end delay versus packet size for theexisting and the proposed methods
0
05
1
15
2
25
10 20 30 40 50 60 70Simulation time (ms)
X-MACZKP
GA-DoSLD
Aver
age e
nerg
y co
nsum
ptio
n (J
S)
TE2S
Figure 7 Analysis of average energy consumption versus simula-tion time for the existing and the proposed methods
45 Packet Delivery Ratio The packet delivery ratio (PDR) isdefined as the ratio of the number of data packets successfullydelivered to the destination node to the number of datapackets transmitted from the source The estimation of thePDR is based on the following equation
PDR = 119875119877 lowast 100sum119899119886minus1
119875Gen119886
(9)
where 119875119877 represents the number of data packets received atthe destination node 119875Gen is the total number of data packetsgenerated by the source nodes and 119899 denotes the numberof sensor nodes The comparison of PDR with respect to thesimulation time is represented in Figure 8
From the figure it is analyzed that when compared to theexisting X-MAC ZKP and TE2S schemes the proposed GA-DoSLD algorithm provides higher PDR
Security and Communication Networks 9
0
20
40
60
80
100
5 10 15 20 25 30 35 40 45 50
Pack
et d
eliv
ery
ratio
()
Simulation time (ms)
X-MACZKP
GA-DoSLDTE2S
Figure 8 Comparison of packet delivery ratio versus simulationtime for the existing and proposed schemes
46 Throughput Performance for Various Packet SendingRates The effectiveness of the protocol depends on thesuccessful reception and transmission of data packets underthe various sending rates such as 1 packet3 seconds 1packet5 seconds and 1 packet7 seconds [22] In this paperthe packet sending rate of 1 packet3 seconds is taken tovalidate the performance of proposed work The estimationof the throughput ratio is based on the following equation
Throughput ratio = 119875NS119875NT (10)
where 119875NS denotes the packet number under simulation sce-nario and 119875NT represents the packet number delivered underthe theoretical scenarioThe superiority of the suggested GA-DoSLD algorithm is validated against the existing algorithmssuch as X-MAC ZKP and TE2P for a packer rate of 1 packetper 3 seconds Figure 9 represents the comparison of thethroughput ratio with respect to the variable attack interval
From the figure it is clear that the suggested GA-DoSLDalgorithm provides higher throughput than the existing algo-rithms under the packet sending rate of 1 packet3 seconds
5 Conclusion and Future Work
In this paper an efficient GA-DoSLD algorithm is proposedfor generating the DoSL attack profiles from multiple sensornodes such that the attacker nodes can be prevented from thecommunication process Initially a WSN is simulated with100 numbers of static sensor nodes then the BS performs theoperations such as key pair generation and behaviormonitor-ing in parallel The base station monitors the behavior of thesensor nodes and initializes every behavior as a chromosomeThe MRSA algorithm is implemented in the base stationfor generating and distributing the key pair among thesensor nodes Before initiating the communication betweenthe sensor nodes the AODV routing protocol estimates theoptimal route To validate the trustworthiness of the relaynodes in the route the fitness value is estimated for every
0
5000
10000
15000
20000
25000
30000
35000
40000
45000
50000
05 1 15 2 25 3 35 4Attack interval (secs)
X-MACZKP
GA-DoSLDTh
roug
hput
for t
he p
acke
t sen
ding
rate
of 1
pac
ket3
seco
nds
TE2P
Figure 9 Comparison of throughput under packet sending rate of1 packet3 seconds versus attack interval
chromosome If the chromosome is determined as unusualit is validated against the existing attack profiles If there doesnot exist a match the pair of chromosomes is subjected tothe crossover and mutation operations The resultant chro-mosomes are added to the existing chromosomes Finally theBS determines the attacker nodes broadcasting the blockedinformation to all the sensor nodes in the network To provethe superiority of the suggested GA-DoSLD algorithm itis compared against the existing X-MAC ZKP and TE2Sschemes for the metrics such as normalized energy con-sumption effective packet number end-to-end delay averageenergy consumption packet delivery ratio and throughputratio versus packet rate The validation results prove thatwhen compared to the existing schemes the proposedalgorithm provides optimal results for all the metrics Therepeated execution of the GA-DoSLD algorithm in the sensornodes consumes a considerable amount of energy Thus toachieve the energy optimization a different soft computingalgorithm other than GA can be used in future for detectingthe denial-of-sleep attack in the WSN environment
Notations
119873 Expected number of hops119867 Number of hops between the source anddestination119864 Number of neighbors at the higher tiers119877119888 Expected number of neighbors at 119888th hop119862119887 Additional coverage index of the nodewith 119887 neighbors119882ac Weight accuracy
10 Security and Communication Networks
119877ac Accuracy relative119882oc Occurrence119877oc Relative weight of occurrence
Competing Interests
The authors declare that there is no conflict of interestsregarding the publication of this paper
References
[1] V C Manju S L Senthil Lekha and M Sasi Kumar ldquoMech-anisms for detecting and preventing denial of sleep attacks onwireless sensor networksrdquo in Proceedings of the IEEE Conferenceon Information and Communication Technologies (ICT rsquo13) pp74ndash77 Tamil Nadu India April 2013
[2] D R Raymond R C Marchany M I Brownfield and S FMidkiff ldquoEffects of denial-of-sleep attacks on wireless sensornetworkMAC protocolsrdquo IEEE Transactions on Vehicular Tech-nology vol 58 no 1 pp 367ndash380 2009
[3] R P Manohar and E Baburaj ldquoDetection of Stealthy Denialof Service (S-DoS) attacks in wireless sensor networksrdquo Inter-national Journal of Computer Science and Information Security(IJCSIS) vol 14 pp 343ndash348 2016
[4] D Mansouri L Mokddad J Ben-Othman and M IoualalenldquoPreventing denial of service attacks in wireless sensor net-worksrdquo in Proceedings of the IEEE International Conference onCommunications (ICC rsquo15) pp 3014ndash3019 London UK June2015
[5] D Mansouri L Mokdad J Ben-Othman and M IoualalenldquoDetecting DoS attacks in WSN based on clustering tech-niquerdquo in Proceedings of the IEEEWireless Communications andNetworking Conference (WCNC rsquo13) pp 2214ndash2219 ShanghaiChina April 2013
[6] J-L Chen Y-W Ma X Wang Y-M Huang and Y-F LaildquoTime-division secret key protocol for wireless sensor network-ingrdquo Institution of Engineering andTechnology Communicationsvol 5 no 12 pp 1720ndash1726 2011
[7] D He C Chen S Chan and J Bu ldquoDiCode DoS-resistant anddistributed code dissemination in wireless sensor networksrdquoIEEE Transactions on Wireless Communications vol 11 no 5pp 1946ndash1956 2012
[8] G Han J Jiang W Shen L Shu and J Rodrigues ldquoIDSEP anovel intrusion detection scheme based on energy predictionin cluster-based wireless sensor networksrdquo IET InformationSecurity vol 7 no 2 pp 97ndash105 2013
[9] E B Ram Pradheep Manohar ldquoDetection of stealthy denialof service (S-DoS) attacks in wireless sensor networksrdquo Inter-national Journal of Computer Science and Information Security(IJCSIS) vol 14 2016
[10] H Tan D Ostry J Zic and S Jha ldquoA confidential and DoS-resistant multi-hop code dissemination protocol for wirelesssensor networksrdquoComputersamp Security vol 32 pp 36ndash55 2013
[11] S M Nam and T H Cho ldquoEnergy efficient method fordetection and prevention of false reports in wireless sensornetworksrdquo in Proceedings of the 8th International Conference onInformation Science and Digital Content Technology (ICIDT rsquo12)pp 766ndash769 Jeju Island South Korea June 2012
[12] S Naik and N Shekokar ldquoConservation of energy in wirelesssensor network by preventing denial of sleep attackrdquo ProcediaComputer Science vol 45 pp 370ndash379 2015
[13] C-T Hsueh C-Y Wen and Y-C Ouyang ldquoA secure schemeagainst power exhausting attacks in hierarchical wireless sensornetworksrdquo IEEE Sensors Journal vol 15 no 6 pp 3590ndash36022015
[14] S Kaur andM Ataullah ldquoSecuring the wireless sensor networkfrom denial of sleep attack by isolating the nodesrdquo InternationalJournal of Computer Applications vol 103 no 1 pp 29ndash33 2014
[15] S Shamshirband A Amini N B Anuar M L Mat Kiah Y WTeh and S Furnell ldquoD-FICCA a density-based fuzzy imperi-alist competitive clustering algorithm for intrusion detection inwireless sensor networksrdquo Measurement vol 55 pp 212ndash2262014
[16] S Shamshirband A Patel N B Anuar M L M Kiah andA Abraham ldquoCooperative game theoretic approach usingfuzzy Q-learning for detecting and preventing intrusions inwireless sensor networksrdquo Engineering Applications of ArtificialIntelligence vol 32 pp 228ndash241 2014
[17] N K Sreelaja and G A Vijayalakshmi Pai ldquoSwarm intelligencebased approach for sinkhole attack detection in wireless sensornetworksrdquo Applied Soft Computing Journal vol 19 pp 68ndash792014
[18] G Keerthana and G Padmavathi ldquoDetecting sinkhole attackin wireless sensor network using enhanced particle swarmoptimization techniquerdquo International Journal of Security andIts Applications vol 10 no 3 pp 41ndash54 2016
[19] A Saeed A Ahmadinia A Javed and H Larijani ldquoRandomneural network based intelligent intrusion detection forwirelesssensor networksrdquo Procedia Computer Science vol 80 pp 2372ndash2376 2016
[20] D Management ldquoRSA Algorithmrdquo 2016 httpwwwdi-mgtcomaursa alghtml
[21] M Zhao Y Li and W Wang ldquoModeling and analyticalstudy of link properties in multihop wireless networksrdquo IEEETransactions on Communications vol 60 no 2 pp 445ndash4552012
[22] C-T Hsueh C-Y Wen and Y-C Ouyang ldquoA secure schemeagainst power exhausting attacks in hierarchical wireless sensornetworksrdquo IEEE Sensors Journal vol 15 no 6 pp 3590ndash36022015
[23] D N S Swapna Naik ldquoConservation of energy in wireless sen-sor network by preventing denial of sleep attackrdquo in Proceedingsof the International Conference on Advanced Computing Tech-nologies and Applications (ICACTA rsquo15) pp 370ndash379 MumbaiIndia March 2015
International Journal of
AerospaceEngineeringHindawi Publishing Corporationhttpwwwhindawicom Volume 2014
RoboticsJournal of
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Active and Passive Electronic Components
Control Scienceand Engineering
Journal of
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
International Journal of
RotatingMachinery
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Hindawi Publishing Corporation httpwwwhindawicom
Journal ofEngineeringVolume 2014
Submit your manuscripts athttpswwwhindawicom
VLSI Design
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Shock and Vibration
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Civil EngineeringAdvances in
Acoustics and VibrationAdvances in
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Electrical and Computer Engineering
Journal of
Advances inOptoElectronics
Hindawi Publishing Corporation httpwwwhindawicom
Volume 2014
The Scientific World JournalHindawi Publishing Corporation httpwwwhindawicom Volume 2014
SensorsJournal of
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Modelling amp Simulation in EngineeringHindawi Publishing Corporation httpwwwhindawicom Volume 2014
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Chemical EngineeringInternational Journal of Antennas and
Propagation
International Journal of
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Navigation and Observation
International Journal of
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
DistributedSensor Networks
International Journal of
Security and Communication Networks 3
suggested scheme exploited the energy consumption of thesensor nodes for detecting the malicious nodes Furtherbased on the energy consumption thresholds the categoriesof the DoS attacks were determined Simulation resultsproved that the suggested IDSEP efficiently detected themalicious nodes Ram Pradheep Manohar [9] proposed theSlowly Increasing and Decreasing under Constraint DoSAttack Strategy (SIDCAS) for detecting the Stealthy DoS (S-DoS) attacks in WSN In addition to providing security thesuggested approach also decreased the resource maintenancecost Tan et al [10] suggested a Deluge based multihop codedissemination protocol for enhancing the confidentiality ofthe WSN Experimental results proved that the suggestedapproach provided optimal latency dissemination rate andenergy consumption
22 Energy Draining Attacks Nam and Cho [11] suggesteda Statistical En-Route Filtering (SEF) scheme for detectingthe false reports in the intermediate nodes Further thefalse report injection attack was defended using three typesof keys such as individual key pairwise key and clusterkey The comparison of SEF with the suggested methodproved that the proposed method enhanced the energysavings than the SEF in sensor networks Manju et al [1]suggested three steps such as network organizationmaliciousnode detection and selective authentication for detecting thedenial-of-sleep attack in WSN Experimental results provedthat the suggested method was optimal for defending theattacker from performing the task Naik and Shekokar [12]addressed the denial-of-sleep attack using zero knowledgeprotocol and interlock protocol Experimental results provedthat the suggested protocols prevented the replay attack andman-in-the-middle attack and also minimized the resourceconsumption Hsueh et al [13] suggested a cross-layer designof secure scheme with MAC protocol for minimizing theenergy consumption of the sensor nodes Analysis resultsproved that the suggested protocol efficiently defended thereplay attacks and forge attacks Further the security require-ments and energy conservation were coordinated Kaurand Ataullah [14] suggested a hierarchical clustering basedisolation of nodes for addressing the denial-of-sleep attackThe suggested approach enhanced the network lifetime butthe idle listening problem was unaddressed Hsueh et al[13] proposed a cross-layer design of secure scheme inte-grated with MAC protocol for defending against the replayattack and forge attack Experimental results proved that thesuggested protocol coordinated the energy conservation andsecurity requirements
23 Soft Computing Algorithms Used for Addressing theEnergy Draining Attack Shamshirband et al [15] proposeda Density-Based Fuzzy Imperialist Competitive ClusteringAlgorithm (D-FICCA) for detecting the intruders in WSNWhen compared to the existing algorithms the proposedalgorithm produced 87 detection accuracy and 099 clus-tering quality Shamshirband et al [16] suggested a cooper-ative Game-Based Fuzzy Q-Learning (G-FQL) approach fordetecting the intrusions in the WSN The suggested modeldeployed the cooperative defense counterattack scenario for
the sink node and game theory strategy for the base stationnodes When compared to the Low Energy Adaptive Cluster-ingHierarchy (LEACH) the suggestedmodel produced opti-mal detection accuracy counterdefense energy consump-tion and network lifetime Further when compared to theexistingmachine learningmethods the suggestedmodel pro-vided enhanced detection and defense accuracy Sreelaja andVijayalakshmi Pai [17] suggested an Ant Colony Optimiza-tion Attack Detection (ACO-AD) algorithm for detecting thesinkhole attacks in WSN The keys were distributed amongthe alerted nodes using Ant Colony Optimization BooleanExpression Evolver Sign Generation (ABXES) algorithmExperimental results proved that when compared to theexisting LIDeA architecture the suggested architecture min-imized the false positives and also minimized the storage inthe sensor nodes Keerthana and Padmavathi [18] suggestedanEnhancedParticle SwarmOptimization (EPSO) techniquefor detecting the sinkhole attacks in WSN When comparedto the existing ACO and PSO algorithms the suggestedalgorithm provided optimal packet delivery ratio messagedrop average delay and false alarm rate Saeed et al [19]suggested a RandomNeural Network based IDS for detectingthe attackers Experimental results proved that the suggestedIDS provided higher accuracy and reduced performanceoverhead
From the analysis of the existing techniques it is clearthat they do not address the idle listening problem Furtherthe solutions suggested for preventing the DoSL attacksare unrealistic Thus to address the issues in the existingtechniques an efficient GA-DoSLD algorithm is proposed
3 Proposed Method
This section describes the proposed GA-DoSLD algorithmfor analyzing the misbehaviors of the sensor nodes in WSNThe overall flow of the suggested algorithm is represented inFigure 2
From the figure it is clear that the key steps involved inthe suggested algorithm are as follows
(i) WSN initialization(ii) Population generation(iii) Generation and distribution of key pair(iv) Route discovery(v) Behavior monitoring
A detailed description of every step is provided in thefollowing sections
31 WSN Initialization The initial step involved in thesuggested approach is WSN initialization By exploiting theNS2 tool the WSN is initialized with 100 numbers of sensornodes that have random waypoint mobility model Thetransmission range of the WSN is 250 meters Further theinitialized WSN poses the specifications listed in Table 1
32 Population Generation and BS Configuration Once theWSN environment is initialized the suggested GA-DoSLD
4 Security and Communication Networks
Initialization of WSN
Population generation
Route discovery
Verify the relay node
Behaviour monitoring
Update populations N
Evaluate fitnessObjective function
Rule set matching
Decision making (attacknormal)
Generate the key pair and distributeBS configuration process
Calculate personal fitness value
Estimate the fitness value for every
Select pair of chromosome for mating
Include the resulting chromosome
The probability of cross gt random
value
valueThe probability of mutation gt random
chromosome
Pc
Pm
rrarr Op_cross
rrarr Op_Mutant
Figure 2 Overall flow of the proposed GA-DoSLD algorithm
Security and Communication Networks 5
Table 1 System specifications
Simulation parameters ValuesPacket size 1024KbpsPacket rate Random packetssecRouting protocol AODVChannel bit rate 10MBsInitial power 25 JSensor node sensing power 5 times 10minus8 JTransmission range 150ndash250 metersDuty cycle 20-time slots
algorithm generates the population using population gen-eration algorithm The suggested algorithm initially loadsthe two-hop neighbor information to the base station thenfor every member in the neighbor list the next-of-neighboris initialized as the population The steps involved in thesuggested algorithm are illustrated as follows
Algorithm 1 (population generation algorithm)
Step 1 Load the two-hop neighbor information with the basestation
Step 2
for (member in the neighbor list)
Population larr Load Individual (newneighbor (next-of-neighbor))
During the implementation of the population generation
algorithm the BS configuration process is performed inparallel for analyzing the behavior of the nodes in the WSN
33 Generation and Distribution of Key Pair After the gener-ation of the population the BS deploys the MRSA algorithmfor generating a public key and private key pair Among thekeys the public key is used for the BS and the private key isused for the sensor nodes The main objective of this step isto prevent the attacker from implementing the DoSL attackBy deploying this step the attacker node is blocked at theinitial level before sending or receiving the packet thus savingthe energy of the sensor nodes The steps involved in thesuggested algorithm are illustrated as follows [20]
Algorithm 2 (MRSA algorithm)
Step 1 Choose the large prime numbers ldquo119899rdquo and ldquo119903rdquoStep 2 Compute the modulus totient using
Φ (119886) = (119899 minus 1) lowast (119903 minus 1) (1)
Step 3 Choose the public exponent ldquo119894rdquo such that 1 lt 119894 lt Φ(119899)and GCD(119894 Φ(119886)) = 1
Step 4 Estimate the private exponent ldquo119898rdquo such that 119898 =119894minus1modΦ(119886)Step 5 Estimate the private key as (119898 119886)Step 6 Estimate the public key as (119894 119886)
The suggested MRSA algorithm has a key size of 512 bitsAmong the total number of bits 256 bits are used as the publickey in the base station and the remaining 256 bits are usedas the private key in the sensor nodes The minimal key sizeprovides the following advantages
(i) Minimal computational complexity(ii) Achieving memory optimization
34 Route Discovery and Relay Node Validation Before ini-tiating the packet transmission the sensor nodes determinethe optimal route usingAdHocOn-DemandDistanceVector(AODV) routing protocol An example of the route discoveryprocess is represented in Figure 3 The suggested protocolhas two key operations such as route discovery and routemaintenance When the source node demands a route to thedestination node or when the lifetime of the existing route tothe destination node has expired the route discovery oper-ation is initiated with the broadcast of the RREQ messagesOn receiving the RREQ messages the intermediate nodesprovide an optimal route to the destination node When theintermediate node is the destination node the RREP packetsare directly transferred to the source node
The steps involved in the suggested AODV based routediscovery are described as follows
Algorithm 3 (AODV routing protocol)Step 1 When a sensor node seeks a route the RREQ packet ispropagated through the entire network till the packet reachesthe destination node
Step 2 When the source node and destination nodes areplaced at the corners of the network the RREQ packets haveto travel a maximum number of hops
Step 3 On receiving the RREQ packets the relay nodesbroadcast it ahead till it reaches the destination
Step 4 The overhead created due to the route request processis represented as follows
119877RREQ = 119873sum119886minus1
(119867) 119864119873minus1 119867sum119887=2
[(119886 minus 1 minus 119887) minus 119873minus1sum119888=1
119877119888]119875119862119887 (2)
Step 5 Once the RREQ packet reaches the destination nodeit replies back to the source node as RREP packet through thesame sequence for reaching the source node
Step 6 According to [21] the overhead created for the RREPpackets is represented as follows
119877RREP = 119873 + 1198732 (119886 minus ℎ minus 2) 119901 (3)
6 Security and Communication Networks
A
B
J
F YL
K
BSC P
D
E
H
I
T
Z
Base station
Destination
RREQRREP
Figure 3 Example for the route discovery process using AODV
Step 7 The overall overhead introduced for the route discov-ery process is
119877Overall = RREQ + RREP119877Overall = 119873sum
119886minus1
(119867) 119864119873minus1 119867sum119887=2
[(119886 minus 1 minus 119887) minus 119873minus1sum119888=1
119877119888]119875119862119887+ 119873 + 1198732 (119886 minus ℎ minus 2) 119901
(4)
The merits of using the AODV routing protocol for theroute discovery process are as follows
(i) Loop-free routes(ii) Faster response to link breakage(iii) Minimal demand for the broadcast
After establishing an optimal route the sensor nodesestimate the trustworthiness of the neighbor nodes usingfitness evaluation function
35 Behavior Monitoring After ensuring the trustworthinessof the neighbor nodes the sensor nodes forward the packetsDuring the transmission if the sensor node suspects any
malicious behaviors as follows it estimates the fitness valuebased on the information provided by the BS
(i) Flooding of data packets(ii) Transmission of large sized data packets that exceed
the data capacity of the sensor nodes
By estimating the fitness value based on attacker ID thechromosome of the already existing attacker is determinedAfter estimating the fitness value the sensor nodes providealert messages about the neighbor node behavior to the BSOn receiving the alertmessage the BS performs the crossoverandmutation operations on the chromosomes for identifyingand analyzing the method that is used by the attackerfor implementing the attack The resultant chromosomesobtained from the crossover and mutation operation areadded to the existing population Finally the BS confirmswhether the particular neighbor node is a normal node oran attacker node If the BS determines the neighbor nodeas an attacker node then the BS broadcasts the blockedinformation to all the other sensor nodes in the WSN Byexploiting the suggested GA-DoSLD algorithm the attackernodes that introduce the DoSL attacks are eliminated fromthe communication thus saving the energy of the sensornodes Notations describe the symbols used in Algorithm 4
Security and Communication Networks 7
for the proposed GA-DoSLD The steps involved in thesuggested GA-DoSLD algorithm are illustrated below
Algorithm 4 (GA-DoSLD algorithm)
Input Population
Output Optimal population with fitness value
Step 1 Compute the index of individuals
Individual larr Random member (population)Initialize the array of fittest as emptyFor (node in population)If (FittestgetFitness() = getIndividual(node)getFit-ness())
Fittest = getIndividual (node) (5)
Individuals [index] = Fittest
Step 2 Compute fitness function
Load member populationCompute the weight accuracy (119882ac) and relativeaccuracy (119877ac)Compute the occurrences of weight (119882oc) and relativeweight (119877oc)
Fitness = 119882ac lowast accuracy of 119898 hop + 119882oc
lowast occurrence of 119898 hopFitness = (1198821 + 1198822) lowast af + (minus1198822) lowast 119877oc
(6)
Step 3 Execute reproduction
Initialize the new pop as an empty setselect the random member in the input populationbased on fitness functionFor (119894 = 1 119894 le maximum size of population 119894 + +)119883 larr Random selected member in population basedon fitness function119884 larr Random selected member in population basedon fitness functionFind the parent profiles of (119883119884)Len 119883 larr length (119883)Len 119884 larr length (119884)
119888 = Select random number between 1 and Len 119883new chromosome
= (substring (119883 1 119888) substring (119884 1 119888)) (7)
Set offspring as new chromosome
Step 4 Population Update
If (random probability to mutate ge threshold)
off spring larr997888 Mutates (off spring)Set new population
larr997888 Union (new population offspring)(8)
End doPopulation larr Union (new population new pop)Return Best (Population Fitness)
4 Performance Analysis
This section describes the performance results of the pro-posed GA-DoSLD algorithm for the following metrics
(i) Normalized energy consumption(ii) Effective packet number(iii) End-to-end delay(iv) Average energy consumption(v) Packet delivery ratio(vi) Throughput ratio versus packet rate
To prove the superiority of the proposed GA-DoSLD algo-rithm it is compared with the existing algorithms such aszero knowledge protocol (ZKP) [22] X-MAC and Two-TierEnergy-Efficient Secure (TE2S) scheme [23] and their resultsare discussed in the following sections
41 Normalized Energy Consumption Normalized energyconsumption is the amount of energy consumed for transfer-ring 3 packets per second The normalized energy consump-tion of the existing X-MAC algorithm ZKP TE2P schemeand the proposed GA-DoSLD algorithm is validated for mul-tiple intervals of attackThe comparison result represented inFigure 4 depicts that for all the attack intervals the suggestedGA-DoSLD algorithm consumes minimal energy
42 Effective Packet Number The effective packet number ofthe existing X-MAC algorithm ZKP TE2S scheme and theproposed GA-DoSLD algorithm is validated for the variableattack intervals The comparison considers the packet send-ing rate as 1 packet every 3 seconds The comparison resultrepresented in Figure 5 shows that the suggested GA-DoSLDalgorithm provides higher scores on effective packet numberthan the existing schemes
8 Security and Communication Networks
0
20
40
60
80
100
05 1 15 2 25 3 35 4
Ener
gy co
nsum
ptio
n (m
JSec
)
Attack interval
X-MACZKP
GA-DoSLDTE2S
Figure 4 Comparison of normalized energy consumption for theexisting and the proposed methods
0
200
400
600
800
1000
1200
1400
X-MACZKP
GA-DoSLD
05 1 15 2 25 3 35 4Attack interval
Effec
tive p
acke
t num
ber (
pack
et3
sec)
TE2S
Figure 5 Comparison of packet number versus attack interval
43 End-to-End Delay The end-to-end delay is defined asthe average time consumed for transmitting the packets Theanalysis of end-to-end delay with respect to the packet size isrepresented in Figure 6 From the figure it is clear that whencompared to existing X-MAC ZKP and TE2S algorithms thesuggested GA-DoSLD algorithm provides a minimal end-to-end delay for the variable packet sizes
44 Average Energy Consumption The average energy con-sumption is the amount of energy consumed by the algo-rithms for transmitting the data packets The comparison ofaverage energy consumption for the existing X-MAC ZKPTE2S schemes and the proposed GA-DoSLD algorithm isrepresented in Figure 7 From the figure it is clear that thesuggested GA-DoSLD algorithm provides minimal energyconsumption than the existing schemes
005
115
225
335
128 256 384 512 640Packet size
X-MACZKP
GA-DoSLD
End-
to-e
nd d
elay
(sec
onds
)
4
TE2S
Figure 6 Comparison of end-to-end delay versus packet size for theexisting and the proposed methods
0
05
1
15
2
25
10 20 30 40 50 60 70Simulation time (ms)
X-MACZKP
GA-DoSLD
Aver
age e
nerg
y co
nsum
ptio
n (J
S)
TE2S
Figure 7 Analysis of average energy consumption versus simula-tion time for the existing and the proposed methods
45 Packet Delivery Ratio The packet delivery ratio (PDR) isdefined as the ratio of the number of data packets successfullydelivered to the destination node to the number of datapackets transmitted from the source The estimation of thePDR is based on the following equation
PDR = 119875119877 lowast 100sum119899119886minus1
119875Gen119886
(9)
where 119875119877 represents the number of data packets received atthe destination node 119875Gen is the total number of data packetsgenerated by the source nodes and 119899 denotes the numberof sensor nodes The comparison of PDR with respect to thesimulation time is represented in Figure 8
From the figure it is analyzed that when compared to theexisting X-MAC ZKP and TE2S schemes the proposed GA-DoSLD algorithm provides higher PDR
Security and Communication Networks 9
0
20
40
60
80
100
5 10 15 20 25 30 35 40 45 50
Pack
et d
eliv
ery
ratio
()
Simulation time (ms)
X-MACZKP
GA-DoSLDTE2S
Figure 8 Comparison of packet delivery ratio versus simulationtime for the existing and proposed schemes
46 Throughput Performance for Various Packet SendingRates The effectiveness of the protocol depends on thesuccessful reception and transmission of data packets underthe various sending rates such as 1 packet3 seconds 1packet5 seconds and 1 packet7 seconds [22] In this paperthe packet sending rate of 1 packet3 seconds is taken tovalidate the performance of proposed work The estimationof the throughput ratio is based on the following equation
Throughput ratio = 119875NS119875NT (10)
where 119875NS denotes the packet number under simulation sce-nario and 119875NT represents the packet number delivered underthe theoretical scenarioThe superiority of the suggested GA-DoSLD algorithm is validated against the existing algorithmssuch as X-MAC ZKP and TE2P for a packer rate of 1 packetper 3 seconds Figure 9 represents the comparison of thethroughput ratio with respect to the variable attack interval
From the figure it is clear that the suggested GA-DoSLDalgorithm provides higher throughput than the existing algo-rithms under the packet sending rate of 1 packet3 seconds
5 Conclusion and Future Work
In this paper an efficient GA-DoSLD algorithm is proposedfor generating the DoSL attack profiles from multiple sensornodes such that the attacker nodes can be prevented from thecommunication process Initially a WSN is simulated with100 numbers of static sensor nodes then the BS performs theoperations such as key pair generation and behaviormonitor-ing in parallel The base station monitors the behavior of thesensor nodes and initializes every behavior as a chromosomeThe MRSA algorithm is implemented in the base stationfor generating and distributing the key pair among thesensor nodes Before initiating the communication betweenthe sensor nodes the AODV routing protocol estimates theoptimal route To validate the trustworthiness of the relaynodes in the route the fitness value is estimated for every
0
5000
10000
15000
20000
25000
30000
35000
40000
45000
50000
05 1 15 2 25 3 35 4Attack interval (secs)
X-MACZKP
GA-DoSLDTh
roug
hput
for t
he p
acke
t sen
ding
rate
of 1
pac
ket3
seco
nds
TE2P
Figure 9 Comparison of throughput under packet sending rate of1 packet3 seconds versus attack interval
chromosome If the chromosome is determined as unusualit is validated against the existing attack profiles If there doesnot exist a match the pair of chromosomes is subjected tothe crossover and mutation operations The resultant chro-mosomes are added to the existing chromosomes Finally theBS determines the attacker nodes broadcasting the blockedinformation to all the sensor nodes in the network To provethe superiority of the suggested GA-DoSLD algorithm itis compared against the existing X-MAC ZKP and TE2Sschemes for the metrics such as normalized energy con-sumption effective packet number end-to-end delay averageenergy consumption packet delivery ratio and throughputratio versus packet rate The validation results prove thatwhen compared to the existing schemes the proposedalgorithm provides optimal results for all the metrics Therepeated execution of the GA-DoSLD algorithm in the sensornodes consumes a considerable amount of energy Thus toachieve the energy optimization a different soft computingalgorithm other than GA can be used in future for detectingthe denial-of-sleep attack in the WSN environment
Notations
119873 Expected number of hops119867 Number of hops between the source anddestination119864 Number of neighbors at the higher tiers119877119888 Expected number of neighbors at 119888th hop119862119887 Additional coverage index of the nodewith 119887 neighbors119882ac Weight accuracy
10 Security and Communication Networks
119877ac Accuracy relative119882oc Occurrence119877oc Relative weight of occurrence
Competing Interests
The authors declare that there is no conflict of interestsregarding the publication of this paper
References
[1] V C Manju S L Senthil Lekha and M Sasi Kumar ldquoMech-anisms for detecting and preventing denial of sleep attacks onwireless sensor networksrdquo in Proceedings of the IEEE Conferenceon Information and Communication Technologies (ICT rsquo13) pp74ndash77 Tamil Nadu India April 2013
[2] D R Raymond R C Marchany M I Brownfield and S FMidkiff ldquoEffects of denial-of-sleep attacks on wireless sensornetworkMAC protocolsrdquo IEEE Transactions on Vehicular Tech-nology vol 58 no 1 pp 367ndash380 2009
[3] R P Manohar and E Baburaj ldquoDetection of Stealthy Denialof Service (S-DoS) attacks in wireless sensor networksrdquo Inter-national Journal of Computer Science and Information Security(IJCSIS) vol 14 pp 343ndash348 2016
[4] D Mansouri L Mokddad J Ben-Othman and M IoualalenldquoPreventing denial of service attacks in wireless sensor net-worksrdquo in Proceedings of the IEEE International Conference onCommunications (ICC rsquo15) pp 3014ndash3019 London UK June2015
[5] D Mansouri L Mokdad J Ben-Othman and M IoualalenldquoDetecting DoS attacks in WSN based on clustering tech-niquerdquo in Proceedings of the IEEEWireless Communications andNetworking Conference (WCNC rsquo13) pp 2214ndash2219 ShanghaiChina April 2013
[6] J-L Chen Y-W Ma X Wang Y-M Huang and Y-F LaildquoTime-division secret key protocol for wireless sensor network-ingrdquo Institution of Engineering andTechnology Communicationsvol 5 no 12 pp 1720ndash1726 2011
[7] D He C Chen S Chan and J Bu ldquoDiCode DoS-resistant anddistributed code dissemination in wireless sensor networksrdquoIEEE Transactions on Wireless Communications vol 11 no 5pp 1946ndash1956 2012
[8] G Han J Jiang W Shen L Shu and J Rodrigues ldquoIDSEP anovel intrusion detection scheme based on energy predictionin cluster-based wireless sensor networksrdquo IET InformationSecurity vol 7 no 2 pp 97ndash105 2013
[9] E B Ram Pradheep Manohar ldquoDetection of stealthy denialof service (S-DoS) attacks in wireless sensor networksrdquo Inter-national Journal of Computer Science and Information Security(IJCSIS) vol 14 2016
[10] H Tan D Ostry J Zic and S Jha ldquoA confidential and DoS-resistant multi-hop code dissemination protocol for wirelesssensor networksrdquoComputersamp Security vol 32 pp 36ndash55 2013
[11] S M Nam and T H Cho ldquoEnergy efficient method fordetection and prevention of false reports in wireless sensornetworksrdquo in Proceedings of the 8th International Conference onInformation Science and Digital Content Technology (ICIDT rsquo12)pp 766ndash769 Jeju Island South Korea June 2012
[12] S Naik and N Shekokar ldquoConservation of energy in wirelesssensor network by preventing denial of sleep attackrdquo ProcediaComputer Science vol 45 pp 370ndash379 2015
[13] C-T Hsueh C-Y Wen and Y-C Ouyang ldquoA secure schemeagainst power exhausting attacks in hierarchical wireless sensornetworksrdquo IEEE Sensors Journal vol 15 no 6 pp 3590ndash36022015
[14] S Kaur andM Ataullah ldquoSecuring the wireless sensor networkfrom denial of sleep attack by isolating the nodesrdquo InternationalJournal of Computer Applications vol 103 no 1 pp 29ndash33 2014
[15] S Shamshirband A Amini N B Anuar M L Mat Kiah Y WTeh and S Furnell ldquoD-FICCA a density-based fuzzy imperi-alist competitive clustering algorithm for intrusion detection inwireless sensor networksrdquo Measurement vol 55 pp 212ndash2262014
[16] S Shamshirband A Patel N B Anuar M L M Kiah andA Abraham ldquoCooperative game theoretic approach usingfuzzy Q-learning for detecting and preventing intrusions inwireless sensor networksrdquo Engineering Applications of ArtificialIntelligence vol 32 pp 228ndash241 2014
[17] N K Sreelaja and G A Vijayalakshmi Pai ldquoSwarm intelligencebased approach for sinkhole attack detection in wireless sensornetworksrdquo Applied Soft Computing Journal vol 19 pp 68ndash792014
[18] G Keerthana and G Padmavathi ldquoDetecting sinkhole attackin wireless sensor network using enhanced particle swarmoptimization techniquerdquo International Journal of Security andIts Applications vol 10 no 3 pp 41ndash54 2016
[19] A Saeed A Ahmadinia A Javed and H Larijani ldquoRandomneural network based intelligent intrusion detection forwirelesssensor networksrdquo Procedia Computer Science vol 80 pp 2372ndash2376 2016
[20] D Management ldquoRSA Algorithmrdquo 2016 httpwwwdi-mgtcomaursa alghtml
[21] M Zhao Y Li and W Wang ldquoModeling and analyticalstudy of link properties in multihop wireless networksrdquo IEEETransactions on Communications vol 60 no 2 pp 445ndash4552012
[22] C-T Hsueh C-Y Wen and Y-C Ouyang ldquoA secure schemeagainst power exhausting attacks in hierarchical wireless sensornetworksrdquo IEEE Sensors Journal vol 15 no 6 pp 3590ndash36022015
[23] D N S Swapna Naik ldquoConservation of energy in wireless sen-sor network by preventing denial of sleep attackrdquo in Proceedingsof the International Conference on Advanced Computing Tech-nologies and Applications (ICACTA rsquo15) pp 370ndash379 MumbaiIndia March 2015
International Journal of
AerospaceEngineeringHindawi Publishing Corporationhttpwwwhindawicom Volume 2014
RoboticsJournal of
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Active and Passive Electronic Components
Control Scienceand Engineering
Journal of
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
International Journal of
RotatingMachinery
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Hindawi Publishing Corporation httpwwwhindawicom
Journal ofEngineeringVolume 2014
Submit your manuscripts athttpswwwhindawicom
VLSI Design
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Shock and Vibration
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Civil EngineeringAdvances in
Acoustics and VibrationAdvances in
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Electrical and Computer Engineering
Journal of
Advances inOptoElectronics
Hindawi Publishing Corporation httpwwwhindawicom
Volume 2014
The Scientific World JournalHindawi Publishing Corporation httpwwwhindawicom Volume 2014
SensorsJournal of
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Modelling amp Simulation in EngineeringHindawi Publishing Corporation httpwwwhindawicom Volume 2014
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Chemical EngineeringInternational Journal of Antennas and
Propagation
International Journal of
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Navigation and Observation
International Journal of
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
DistributedSensor Networks
International Journal of
4 Security and Communication Networks
Initialization of WSN
Population generation
Route discovery
Verify the relay node
Behaviour monitoring
Update populations N
Evaluate fitnessObjective function
Rule set matching
Decision making (attacknormal)
Generate the key pair and distributeBS configuration process
Calculate personal fitness value
Estimate the fitness value for every
Select pair of chromosome for mating
Include the resulting chromosome
The probability of cross gt random
value
valueThe probability of mutation gt random
chromosome
Pc
Pm
rrarr Op_cross
rrarr Op_Mutant
Figure 2 Overall flow of the proposed GA-DoSLD algorithm
Security and Communication Networks 5
Table 1 System specifications
Simulation parameters ValuesPacket size 1024KbpsPacket rate Random packetssecRouting protocol AODVChannel bit rate 10MBsInitial power 25 JSensor node sensing power 5 times 10minus8 JTransmission range 150ndash250 metersDuty cycle 20-time slots
algorithm generates the population using population gen-eration algorithm The suggested algorithm initially loadsthe two-hop neighbor information to the base station thenfor every member in the neighbor list the next-of-neighboris initialized as the population The steps involved in thesuggested algorithm are illustrated as follows
Algorithm 1 (population generation algorithm)
Step 1 Load the two-hop neighbor information with the basestation
Step 2
for (member in the neighbor list)
Population larr Load Individual (newneighbor (next-of-neighbor))
During the implementation of the population generation
algorithm the BS configuration process is performed inparallel for analyzing the behavior of the nodes in the WSN
33 Generation and Distribution of Key Pair After the gener-ation of the population the BS deploys the MRSA algorithmfor generating a public key and private key pair Among thekeys the public key is used for the BS and the private key isused for the sensor nodes The main objective of this step isto prevent the attacker from implementing the DoSL attackBy deploying this step the attacker node is blocked at theinitial level before sending or receiving the packet thus savingthe energy of the sensor nodes The steps involved in thesuggested algorithm are illustrated as follows [20]
Algorithm 2 (MRSA algorithm)
Step 1 Choose the large prime numbers ldquo119899rdquo and ldquo119903rdquoStep 2 Compute the modulus totient using
Φ (119886) = (119899 minus 1) lowast (119903 minus 1) (1)
Step 3 Choose the public exponent ldquo119894rdquo such that 1 lt 119894 lt Φ(119899)and GCD(119894 Φ(119886)) = 1
Step 4 Estimate the private exponent ldquo119898rdquo such that 119898 =119894minus1modΦ(119886)Step 5 Estimate the private key as (119898 119886)Step 6 Estimate the public key as (119894 119886)
The suggested MRSA algorithm has a key size of 512 bitsAmong the total number of bits 256 bits are used as the publickey in the base station and the remaining 256 bits are usedas the private key in the sensor nodes The minimal key sizeprovides the following advantages
(i) Minimal computational complexity(ii) Achieving memory optimization
34 Route Discovery and Relay Node Validation Before ini-tiating the packet transmission the sensor nodes determinethe optimal route usingAdHocOn-DemandDistanceVector(AODV) routing protocol An example of the route discoveryprocess is represented in Figure 3 The suggested protocolhas two key operations such as route discovery and routemaintenance When the source node demands a route to thedestination node or when the lifetime of the existing route tothe destination node has expired the route discovery oper-ation is initiated with the broadcast of the RREQ messagesOn receiving the RREQ messages the intermediate nodesprovide an optimal route to the destination node When theintermediate node is the destination node the RREP packetsare directly transferred to the source node
The steps involved in the suggested AODV based routediscovery are described as follows
Algorithm 3 (AODV routing protocol)Step 1 When a sensor node seeks a route the RREQ packet ispropagated through the entire network till the packet reachesthe destination node
Step 2 When the source node and destination nodes areplaced at the corners of the network the RREQ packets haveto travel a maximum number of hops
Step 3 On receiving the RREQ packets the relay nodesbroadcast it ahead till it reaches the destination
Step 4 The overhead created due to the route request processis represented as follows
119877RREQ = 119873sum119886minus1
(119867) 119864119873minus1 119867sum119887=2
[(119886 minus 1 minus 119887) minus 119873minus1sum119888=1
119877119888]119875119862119887 (2)
Step 5 Once the RREQ packet reaches the destination nodeit replies back to the source node as RREP packet through thesame sequence for reaching the source node
Step 6 According to [21] the overhead created for the RREPpackets is represented as follows
119877RREP = 119873 + 1198732 (119886 minus ℎ minus 2) 119901 (3)
6 Security and Communication Networks
A
B
J
F YL
K
BSC P
D
E
H
I
T
Z
Base station
Destination
RREQRREP
Figure 3 Example for the route discovery process using AODV
Step 7 The overall overhead introduced for the route discov-ery process is
119877Overall = RREQ + RREP119877Overall = 119873sum
119886minus1
(119867) 119864119873minus1 119867sum119887=2
[(119886 minus 1 minus 119887) minus 119873minus1sum119888=1
119877119888]119875119862119887+ 119873 + 1198732 (119886 minus ℎ minus 2) 119901
(4)
The merits of using the AODV routing protocol for theroute discovery process are as follows
(i) Loop-free routes(ii) Faster response to link breakage(iii) Minimal demand for the broadcast
After establishing an optimal route the sensor nodesestimate the trustworthiness of the neighbor nodes usingfitness evaluation function
35 Behavior Monitoring After ensuring the trustworthinessof the neighbor nodes the sensor nodes forward the packetsDuring the transmission if the sensor node suspects any
malicious behaviors as follows it estimates the fitness valuebased on the information provided by the BS
(i) Flooding of data packets(ii) Transmission of large sized data packets that exceed
the data capacity of the sensor nodes
By estimating the fitness value based on attacker ID thechromosome of the already existing attacker is determinedAfter estimating the fitness value the sensor nodes providealert messages about the neighbor node behavior to the BSOn receiving the alertmessage the BS performs the crossoverandmutation operations on the chromosomes for identifyingand analyzing the method that is used by the attackerfor implementing the attack The resultant chromosomesobtained from the crossover and mutation operation areadded to the existing population Finally the BS confirmswhether the particular neighbor node is a normal node oran attacker node If the BS determines the neighbor nodeas an attacker node then the BS broadcasts the blockedinformation to all the other sensor nodes in the WSN Byexploiting the suggested GA-DoSLD algorithm the attackernodes that introduce the DoSL attacks are eliminated fromthe communication thus saving the energy of the sensornodes Notations describe the symbols used in Algorithm 4
Security and Communication Networks 7
for the proposed GA-DoSLD The steps involved in thesuggested GA-DoSLD algorithm are illustrated below
Algorithm 4 (GA-DoSLD algorithm)
Input Population
Output Optimal population with fitness value
Step 1 Compute the index of individuals
Individual larr Random member (population)Initialize the array of fittest as emptyFor (node in population)If (FittestgetFitness() = getIndividual(node)getFit-ness())
Fittest = getIndividual (node) (5)
Individuals [index] = Fittest
Step 2 Compute fitness function
Load member populationCompute the weight accuracy (119882ac) and relativeaccuracy (119877ac)Compute the occurrences of weight (119882oc) and relativeweight (119877oc)
Fitness = 119882ac lowast accuracy of 119898 hop + 119882oc
lowast occurrence of 119898 hopFitness = (1198821 + 1198822) lowast af + (minus1198822) lowast 119877oc
(6)
Step 3 Execute reproduction
Initialize the new pop as an empty setselect the random member in the input populationbased on fitness functionFor (119894 = 1 119894 le maximum size of population 119894 + +)119883 larr Random selected member in population basedon fitness function119884 larr Random selected member in population basedon fitness functionFind the parent profiles of (119883119884)Len 119883 larr length (119883)Len 119884 larr length (119884)
119888 = Select random number between 1 and Len 119883new chromosome
= (substring (119883 1 119888) substring (119884 1 119888)) (7)
Set offspring as new chromosome
Step 4 Population Update
If (random probability to mutate ge threshold)
off spring larr997888 Mutates (off spring)Set new population
larr997888 Union (new population offspring)(8)
End doPopulation larr Union (new population new pop)Return Best (Population Fitness)
4 Performance Analysis
This section describes the performance results of the pro-posed GA-DoSLD algorithm for the following metrics
(i) Normalized energy consumption(ii) Effective packet number(iii) End-to-end delay(iv) Average energy consumption(v) Packet delivery ratio(vi) Throughput ratio versus packet rate
To prove the superiority of the proposed GA-DoSLD algo-rithm it is compared with the existing algorithms such aszero knowledge protocol (ZKP) [22] X-MAC and Two-TierEnergy-Efficient Secure (TE2S) scheme [23] and their resultsare discussed in the following sections
41 Normalized Energy Consumption Normalized energyconsumption is the amount of energy consumed for transfer-ring 3 packets per second The normalized energy consump-tion of the existing X-MAC algorithm ZKP TE2P schemeand the proposed GA-DoSLD algorithm is validated for mul-tiple intervals of attackThe comparison result represented inFigure 4 depicts that for all the attack intervals the suggestedGA-DoSLD algorithm consumes minimal energy
42 Effective Packet Number The effective packet number ofthe existing X-MAC algorithm ZKP TE2S scheme and theproposed GA-DoSLD algorithm is validated for the variableattack intervals The comparison considers the packet send-ing rate as 1 packet every 3 seconds The comparison resultrepresented in Figure 5 shows that the suggested GA-DoSLDalgorithm provides higher scores on effective packet numberthan the existing schemes
8 Security and Communication Networks
0
20
40
60
80
100
05 1 15 2 25 3 35 4
Ener
gy co
nsum
ptio
n (m
JSec
)
Attack interval
X-MACZKP
GA-DoSLDTE2S
Figure 4 Comparison of normalized energy consumption for theexisting and the proposed methods
0
200
400
600
800
1000
1200
1400
X-MACZKP
GA-DoSLD
05 1 15 2 25 3 35 4Attack interval
Effec
tive p
acke
t num
ber (
pack
et3
sec)
TE2S
Figure 5 Comparison of packet number versus attack interval
43 End-to-End Delay The end-to-end delay is defined asthe average time consumed for transmitting the packets Theanalysis of end-to-end delay with respect to the packet size isrepresented in Figure 6 From the figure it is clear that whencompared to existing X-MAC ZKP and TE2S algorithms thesuggested GA-DoSLD algorithm provides a minimal end-to-end delay for the variable packet sizes
44 Average Energy Consumption The average energy con-sumption is the amount of energy consumed by the algo-rithms for transmitting the data packets The comparison ofaverage energy consumption for the existing X-MAC ZKPTE2S schemes and the proposed GA-DoSLD algorithm isrepresented in Figure 7 From the figure it is clear that thesuggested GA-DoSLD algorithm provides minimal energyconsumption than the existing schemes
005
115
225
335
128 256 384 512 640Packet size
X-MACZKP
GA-DoSLD
End-
to-e
nd d
elay
(sec
onds
)
4
TE2S
Figure 6 Comparison of end-to-end delay versus packet size for theexisting and the proposed methods
0
05
1
15
2
25
10 20 30 40 50 60 70Simulation time (ms)
X-MACZKP
GA-DoSLD
Aver
age e
nerg
y co
nsum
ptio
n (J
S)
TE2S
Figure 7 Analysis of average energy consumption versus simula-tion time for the existing and the proposed methods
45 Packet Delivery Ratio The packet delivery ratio (PDR) isdefined as the ratio of the number of data packets successfullydelivered to the destination node to the number of datapackets transmitted from the source The estimation of thePDR is based on the following equation
PDR = 119875119877 lowast 100sum119899119886minus1
119875Gen119886
(9)
where 119875119877 represents the number of data packets received atthe destination node 119875Gen is the total number of data packetsgenerated by the source nodes and 119899 denotes the numberof sensor nodes The comparison of PDR with respect to thesimulation time is represented in Figure 8
From the figure it is analyzed that when compared to theexisting X-MAC ZKP and TE2S schemes the proposed GA-DoSLD algorithm provides higher PDR
Security and Communication Networks 9
0
20
40
60
80
100
5 10 15 20 25 30 35 40 45 50
Pack
et d
eliv
ery
ratio
()
Simulation time (ms)
X-MACZKP
GA-DoSLDTE2S
Figure 8 Comparison of packet delivery ratio versus simulationtime for the existing and proposed schemes
46 Throughput Performance for Various Packet SendingRates The effectiveness of the protocol depends on thesuccessful reception and transmission of data packets underthe various sending rates such as 1 packet3 seconds 1packet5 seconds and 1 packet7 seconds [22] In this paperthe packet sending rate of 1 packet3 seconds is taken tovalidate the performance of proposed work The estimationof the throughput ratio is based on the following equation
Throughput ratio = 119875NS119875NT (10)
where 119875NS denotes the packet number under simulation sce-nario and 119875NT represents the packet number delivered underthe theoretical scenarioThe superiority of the suggested GA-DoSLD algorithm is validated against the existing algorithmssuch as X-MAC ZKP and TE2P for a packer rate of 1 packetper 3 seconds Figure 9 represents the comparison of thethroughput ratio with respect to the variable attack interval
From the figure it is clear that the suggested GA-DoSLDalgorithm provides higher throughput than the existing algo-rithms under the packet sending rate of 1 packet3 seconds
5 Conclusion and Future Work
In this paper an efficient GA-DoSLD algorithm is proposedfor generating the DoSL attack profiles from multiple sensornodes such that the attacker nodes can be prevented from thecommunication process Initially a WSN is simulated with100 numbers of static sensor nodes then the BS performs theoperations such as key pair generation and behaviormonitor-ing in parallel The base station monitors the behavior of thesensor nodes and initializes every behavior as a chromosomeThe MRSA algorithm is implemented in the base stationfor generating and distributing the key pair among thesensor nodes Before initiating the communication betweenthe sensor nodes the AODV routing protocol estimates theoptimal route To validate the trustworthiness of the relaynodes in the route the fitness value is estimated for every
0
5000
10000
15000
20000
25000
30000
35000
40000
45000
50000
05 1 15 2 25 3 35 4Attack interval (secs)
X-MACZKP
GA-DoSLDTh
roug
hput
for t
he p
acke
t sen
ding
rate
of 1
pac
ket3
seco
nds
TE2P
Figure 9 Comparison of throughput under packet sending rate of1 packet3 seconds versus attack interval
chromosome If the chromosome is determined as unusualit is validated against the existing attack profiles If there doesnot exist a match the pair of chromosomes is subjected tothe crossover and mutation operations The resultant chro-mosomes are added to the existing chromosomes Finally theBS determines the attacker nodes broadcasting the blockedinformation to all the sensor nodes in the network To provethe superiority of the suggested GA-DoSLD algorithm itis compared against the existing X-MAC ZKP and TE2Sschemes for the metrics such as normalized energy con-sumption effective packet number end-to-end delay averageenergy consumption packet delivery ratio and throughputratio versus packet rate The validation results prove thatwhen compared to the existing schemes the proposedalgorithm provides optimal results for all the metrics Therepeated execution of the GA-DoSLD algorithm in the sensornodes consumes a considerable amount of energy Thus toachieve the energy optimization a different soft computingalgorithm other than GA can be used in future for detectingthe denial-of-sleep attack in the WSN environment
Notations
119873 Expected number of hops119867 Number of hops between the source anddestination119864 Number of neighbors at the higher tiers119877119888 Expected number of neighbors at 119888th hop119862119887 Additional coverage index of the nodewith 119887 neighbors119882ac Weight accuracy
10 Security and Communication Networks
119877ac Accuracy relative119882oc Occurrence119877oc Relative weight of occurrence
Competing Interests
The authors declare that there is no conflict of interestsregarding the publication of this paper
References
[1] V C Manju S L Senthil Lekha and M Sasi Kumar ldquoMech-anisms for detecting and preventing denial of sleep attacks onwireless sensor networksrdquo in Proceedings of the IEEE Conferenceon Information and Communication Technologies (ICT rsquo13) pp74ndash77 Tamil Nadu India April 2013
[2] D R Raymond R C Marchany M I Brownfield and S FMidkiff ldquoEffects of denial-of-sleep attacks on wireless sensornetworkMAC protocolsrdquo IEEE Transactions on Vehicular Tech-nology vol 58 no 1 pp 367ndash380 2009
[3] R P Manohar and E Baburaj ldquoDetection of Stealthy Denialof Service (S-DoS) attacks in wireless sensor networksrdquo Inter-national Journal of Computer Science and Information Security(IJCSIS) vol 14 pp 343ndash348 2016
[4] D Mansouri L Mokddad J Ben-Othman and M IoualalenldquoPreventing denial of service attacks in wireless sensor net-worksrdquo in Proceedings of the IEEE International Conference onCommunications (ICC rsquo15) pp 3014ndash3019 London UK June2015
[5] D Mansouri L Mokdad J Ben-Othman and M IoualalenldquoDetecting DoS attacks in WSN based on clustering tech-niquerdquo in Proceedings of the IEEEWireless Communications andNetworking Conference (WCNC rsquo13) pp 2214ndash2219 ShanghaiChina April 2013
[6] J-L Chen Y-W Ma X Wang Y-M Huang and Y-F LaildquoTime-division secret key protocol for wireless sensor network-ingrdquo Institution of Engineering andTechnology Communicationsvol 5 no 12 pp 1720ndash1726 2011
[7] D He C Chen S Chan and J Bu ldquoDiCode DoS-resistant anddistributed code dissemination in wireless sensor networksrdquoIEEE Transactions on Wireless Communications vol 11 no 5pp 1946ndash1956 2012
[8] G Han J Jiang W Shen L Shu and J Rodrigues ldquoIDSEP anovel intrusion detection scheme based on energy predictionin cluster-based wireless sensor networksrdquo IET InformationSecurity vol 7 no 2 pp 97ndash105 2013
[9] E B Ram Pradheep Manohar ldquoDetection of stealthy denialof service (S-DoS) attacks in wireless sensor networksrdquo Inter-national Journal of Computer Science and Information Security(IJCSIS) vol 14 2016
[10] H Tan D Ostry J Zic and S Jha ldquoA confidential and DoS-resistant multi-hop code dissemination protocol for wirelesssensor networksrdquoComputersamp Security vol 32 pp 36ndash55 2013
[11] S M Nam and T H Cho ldquoEnergy efficient method fordetection and prevention of false reports in wireless sensornetworksrdquo in Proceedings of the 8th International Conference onInformation Science and Digital Content Technology (ICIDT rsquo12)pp 766ndash769 Jeju Island South Korea June 2012
[12] S Naik and N Shekokar ldquoConservation of energy in wirelesssensor network by preventing denial of sleep attackrdquo ProcediaComputer Science vol 45 pp 370ndash379 2015
[13] C-T Hsueh C-Y Wen and Y-C Ouyang ldquoA secure schemeagainst power exhausting attacks in hierarchical wireless sensornetworksrdquo IEEE Sensors Journal vol 15 no 6 pp 3590ndash36022015
[14] S Kaur andM Ataullah ldquoSecuring the wireless sensor networkfrom denial of sleep attack by isolating the nodesrdquo InternationalJournal of Computer Applications vol 103 no 1 pp 29ndash33 2014
[15] S Shamshirband A Amini N B Anuar M L Mat Kiah Y WTeh and S Furnell ldquoD-FICCA a density-based fuzzy imperi-alist competitive clustering algorithm for intrusion detection inwireless sensor networksrdquo Measurement vol 55 pp 212ndash2262014
[16] S Shamshirband A Patel N B Anuar M L M Kiah andA Abraham ldquoCooperative game theoretic approach usingfuzzy Q-learning for detecting and preventing intrusions inwireless sensor networksrdquo Engineering Applications of ArtificialIntelligence vol 32 pp 228ndash241 2014
[17] N K Sreelaja and G A Vijayalakshmi Pai ldquoSwarm intelligencebased approach for sinkhole attack detection in wireless sensornetworksrdquo Applied Soft Computing Journal vol 19 pp 68ndash792014
[18] G Keerthana and G Padmavathi ldquoDetecting sinkhole attackin wireless sensor network using enhanced particle swarmoptimization techniquerdquo International Journal of Security andIts Applications vol 10 no 3 pp 41ndash54 2016
[19] A Saeed A Ahmadinia A Javed and H Larijani ldquoRandomneural network based intelligent intrusion detection forwirelesssensor networksrdquo Procedia Computer Science vol 80 pp 2372ndash2376 2016
[20] D Management ldquoRSA Algorithmrdquo 2016 httpwwwdi-mgtcomaursa alghtml
[21] M Zhao Y Li and W Wang ldquoModeling and analyticalstudy of link properties in multihop wireless networksrdquo IEEETransactions on Communications vol 60 no 2 pp 445ndash4552012
[22] C-T Hsueh C-Y Wen and Y-C Ouyang ldquoA secure schemeagainst power exhausting attacks in hierarchical wireless sensornetworksrdquo IEEE Sensors Journal vol 15 no 6 pp 3590ndash36022015
[23] D N S Swapna Naik ldquoConservation of energy in wireless sen-sor network by preventing denial of sleep attackrdquo in Proceedingsof the International Conference on Advanced Computing Tech-nologies and Applications (ICACTA rsquo15) pp 370ndash379 MumbaiIndia March 2015
International Journal of
AerospaceEngineeringHindawi Publishing Corporationhttpwwwhindawicom Volume 2014
RoboticsJournal of
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Active and Passive Electronic Components
Control Scienceand Engineering
Journal of
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
International Journal of
RotatingMachinery
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Hindawi Publishing Corporation httpwwwhindawicom
Journal ofEngineeringVolume 2014
Submit your manuscripts athttpswwwhindawicom
VLSI Design
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Shock and Vibration
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Civil EngineeringAdvances in
Acoustics and VibrationAdvances in
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Electrical and Computer Engineering
Journal of
Advances inOptoElectronics
Hindawi Publishing Corporation httpwwwhindawicom
Volume 2014
The Scientific World JournalHindawi Publishing Corporation httpwwwhindawicom Volume 2014
SensorsJournal of
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Modelling amp Simulation in EngineeringHindawi Publishing Corporation httpwwwhindawicom Volume 2014
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Chemical EngineeringInternational Journal of Antennas and
Propagation
International Journal of
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Navigation and Observation
International Journal of
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
DistributedSensor Networks
International Journal of
Security and Communication Networks 5
Table 1 System specifications
Simulation parameters ValuesPacket size 1024KbpsPacket rate Random packetssecRouting protocol AODVChannel bit rate 10MBsInitial power 25 JSensor node sensing power 5 times 10minus8 JTransmission range 150ndash250 metersDuty cycle 20-time slots
algorithm generates the population using population gen-eration algorithm The suggested algorithm initially loadsthe two-hop neighbor information to the base station thenfor every member in the neighbor list the next-of-neighboris initialized as the population The steps involved in thesuggested algorithm are illustrated as follows
Algorithm 1 (population generation algorithm)
Step 1 Load the two-hop neighbor information with the basestation
Step 2
for (member in the neighbor list)
Population larr Load Individual (newneighbor (next-of-neighbor))
During the implementation of the population generation
algorithm the BS configuration process is performed inparallel for analyzing the behavior of the nodes in the WSN
33 Generation and Distribution of Key Pair After the gener-ation of the population the BS deploys the MRSA algorithmfor generating a public key and private key pair Among thekeys the public key is used for the BS and the private key isused for the sensor nodes The main objective of this step isto prevent the attacker from implementing the DoSL attackBy deploying this step the attacker node is blocked at theinitial level before sending or receiving the packet thus savingthe energy of the sensor nodes The steps involved in thesuggested algorithm are illustrated as follows [20]
Algorithm 2 (MRSA algorithm)
Step 1 Choose the large prime numbers ldquo119899rdquo and ldquo119903rdquoStep 2 Compute the modulus totient using
Φ (119886) = (119899 minus 1) lowast (119903 minus 1) (1)
Step 3 Choose the public exponent ldquo119894rdquo such that 1 lt 119894 lt Φ(119899)and GCD(119894 Φ(119886)) = 1
Step 4 Estimate the private exponent ldquo119898rdquo such that 119898 =119894minus1modΦ(119886)Step 5 Estimate the private key as (119898 119886)Step 6 Estimate the public key as (119894 119886)
The suggested MRSA algorithm has a key size of 512 bitsAmong the total number of bits 256 bits are used as the publickey in the base station and the remaining 256 bits are usedas the private key in the sensor nodes The minimal key sizeprovides the following advantages
(i) Minimal computational complexity(ii) Achieving memory optimization
34 Route Discovery and Relay Node Validation Before ini-tiating the packet transmission the sensor nodes determinethe optimal route usingAdHocOn-DemandDistanceVector(AODV) routing protocol An example of the route discoveryprocess is represented in Figure 3 The suggested protocolhas two key operations such as route discovery and routemaintenance When the source node demands a route to thedestination node or when the lifetime of the existing route tothe destination node has expired the route discovery oper-ation is initiated with the broadcast of the RREQ messagesOn receiving the RREQ messages the intermediate nodesprovide an optimal route to the destination node When theintermediate node is the destination node the RREP packetsare directly transferred to the source node
The steps involved in the suggested AODV based routediscovery are described as follows
Algorithm 3 (AODV routing protocol)Step 1 When a sensor node seeks a route the RREQ packet ispropagated through the entire network till the packet reachesthe destination node
Step 2 When the source node and destination nodes areplaced at the corners of the network the RREQ packets haveto travel a maximum number of hops
Step 3 On receiving the RREQ packets the relay nodesbroadcast it ahead till it reaches the destination
Step 4 The overhead created due to the route request processis represented as follows
119877RREQ = 119873sum119886minus1
(119867) 119864119873minus1 119867sum119887=2
[(119886 minus 1 minus 119887) minus 119873minus1sum119888=1
119877119888]119875119862119887 (2)
Step 5 Once the RREQ packet reaches the destination nodeit replies back to the source node as RREP packet through thesame sequence for reaching the source node
Step 6 According to [21] the overhead created for the RREPpackets is represented as follows
119877RREP = 119873 + 1198732 (119886 minus ℎ minus 2) 119901 (3)
6 Security and Communication Networks
A
B
J
F YL
K
BSC P
D
E
H
I
T
Z
Base station
Destination
RREQRREP
Figure 3 Example for the route discovery process using AODV
Step 7 The overall overhead introduced for the route discov-ery process is
119877Overall = RREQ + RREP119877Overall = 119873sum
119886minus1
(119867) 119864119873minus1 119867sum119887=2
[(119886 minus 1 minus 119887) minus 119873minus1sum119888=1
119877119888]119875119862119887+ 119873 + 1198732 (119886 minus ℎ minus 2) 119901
(4)
The merits of using the AODV routing protocol for theroute discovery process are as follows
(i) Loop-free routes(ii) Faster response to link breakage(iii) Minimal demand for the broadcast
After establishing an optimal route the sensor nodesestimate the trustworthiness of the neighbor nodes usingfitness evaluation function
35 Behavior Monitoring After ensuring the trustworthinessof the neighbor nodes the sensor nodes forward the packetsDuring the transmission if the sensor node suspects any
malicious behaviors as follows it estimates the fitness valuebased on the information provided by the BS
(i) Flooding of data packets(ii) Transmission of large sized data packets that exceed
the data capacity of the sensor nodes
By estimating the fitness value based on attacker ID thechromosome of the already existing attacker is determinedAfter estimating the fitness value the sensor nodes providealert messages about the neighbor node behavior to the BSOn receiving the alertmessage the BS performs the crossoverandmutation operations on the chromosomes for identifyingand analyzing the method that is used by the attackerfor implementing the attack The resultant chromosomesobtained from the crossover and mutation operation areadded to the existing population Finally the BS confirmswhether the particular neighbor node is a normal node oran attacker node If the BS determines the neighbor nodeas an attacker node then the BS broadcasts the blockedinformation to all the other sensor nodes in the WSN Byexploiting the suggested GA-DoSLD algorithm the attackernodes that introduce the DoSL attacks are eliminated fromthe communication thus saving the energy of the sensornodes Notations describe the symbols used in Algorithm 4
Security and Communication Networks 7
for the proposed GA-DoSLD The steps involved in thesuggested GA-DoSLD algorithm are illustrated below
Algorithm 4 (GA-DoSLD algorithm)
Input Population
Output Optimal population with fitness value
Step 1 Compute the index of individuals
Individual larr Random member (population)Initialize the array of fittest as emptyFor (node in population)If (FittestgetFitness() = getIndividual(node)getFit-ness())
Fittest = getIndividual (node) (5)
Individuals [index] = Fittest
Step 2 Compute fitness function
Load member populationCompute the weight accuracy (119882ac) and relativeaccuracy (119877ac)Compute the occurrences of weight (119882oc) and relativeweight (119877oc)
Fitness = 119882ac lowast accuracy of 119898 hop + 119882oc
lowast occurrence of 119898 hopFitness = (1198821 + 1198822) lowast af + (minus1198822) lowast 119877oc
(6)
Step 3 Execute reproduction
Initialize the new pop as an empty setselect the random member in the input populationbased on fitness functionFor (119894 = 1 119894 le maximum size of population 119894 + +)119883 larr Random selected member in population basedon fitness function119884 larr Random selected member in population basedon fitness functionFind the parent profiles of (119883119884)Len 119883 larr length (119883)Len 119884 larr length (119884)
119888 = Select random number between 1 and Len 119883new chromosome
= (substring (119883 1 119888) substring (119884 1 119888)) (7)
Set offspring as new chromosome
Step 4 Population Update
If (random probability to mutate ge threshold)
off spring larr997888 Mutates (off spring)Set new population
larr997888 Union (new population offspring)(8)
End doPopulation larr Union (new population new pop)Return Best (Population Fitness)
4 Performance Analysis
This section describes the performance results of the pro-posed GA-DoSLD algorithm for the following metrics
(i) Normalized energy consumption(ii) Effective packet number(iii) End-to-end delay(iv) Average energy consumption(v) Packet delivery ratio(vi) Throughput ratio versus packet rate
To prove the superiority of the proposed GA-DoSLD algo-rithm it is compared with the existing algorithms such aszero knowledge protocol (ZKP) [22] X-MAC and Two-TierEnergy-Efficient Secure (TE2S) scheme [23] and their resultsare discussed in the following sections
41 Normalized Energy Consumption Normalized energyconsumption is the amount of energy consumed for transfer-ring 3 packets per second The normalized energy consump-tion of the existing X-MAC algorithm ZKP TE2P schemeand the proposed GA-DoSLD algorithm is validated for mul-tiple intervals of attackThe comparison result represented inFigure 4 depicts that for all the attack intervals the suggestedGA-DoSLD algorithm consumes minimal energy
42 Effective Packet Number The effective packet number ofthe existing X-MAC algorithm ZKP TE2S scheme and theproposed GA-DoSLD algorithm is validated for the variableattack intervals The comparison considers the packet send-ing rate as 1 packet every 3 seconds The comparison resultrepresented in Figure 5 shows that the suggested GA-DoSLDalgorithm provides higher scores on effective packet numberthan the existing schemes
8 Security and Communication Networks
0
20
40
60
80
100
05 1 15 2 25 3 35 4
Ener
gy co
nsum
ptio
n (m
JSec
)
Attack interval
X-MACZKP
GA-DoSLDTE2S
Figure 4 Comparison of normalized energy consumption for theexisting and the proposed methods
0
200
400
600
800
1000
1200
1400
X-MACZKP
GA-DoSLD
05 1 15 2 25 3 35 4Attack interval
Effec
tive p
acke
t num
ber (
pack
et3
sec)
TE2S
Figure 5 Comparison of packet number versus attack interval
43 End-to-End Delay The end-to-end delay is defined asthe average time consumed for transmitting the packets Theanalysis of end-to-end delay with respect to the packet size isrepresented in Figure 6 From the figure it is clear that whencompared to existing X-MAC ZKP and TE2S algorithms thesuggested GA-DoSLD algorithm provides a minimal end-to-end delay for the variable packet sizes
44 Average Energy Consumption The average energy con-sumption is the amount of energy consumed by the algo-rithms for transmitting the data packets The comparison ofaverage energy consumption for the existing X-MAC ZKPTE2S schemes and the proposed GA-DoSLD algorithm isrepresented in Figure 7 From the figure it is clear that thesuggested GA-DoSLD algorithm provides minimal energyconsumption than the existing schemes
005
115
225
335
128 256 384 512 640Packet size
X-MACZKP
GA-DoSLD
End-
to-e
nd d
elay
(sec
onds
)
4
TE2S
Figure 6 Comparison of end-to-end delay versus packet size for theexisting and the proposed methods
0
05
1
15
2
25
10 20 30 40 50 60 70Simulation time (ms)
X-MACZKP
GA-DoSLD
Aver
age e
nerg
y co
nsum
ptio
n (J
S)
TE2S
Figure 7 Analysis of average energy consumption versus simula-tion time for the existing and the proposed methods
45 Packet Delivery Ratio The packet delivery ratio (PDR) isdefined as the ratio of the number of data packets successfullydelivered to the destination node to the number of datapackets transmitted from the source The estimation of thePDR is based on the following equation
PDR = 119875119877 lowast 100sum119899119886minus1
119875Gen119886
(9)
where 119875119877 represents the number of data packets received atthe destination node 119875Gen is the total number of data packetsgenerated by the source nodes and 119899 denotes the numberof sensor nodes The comparison of PDR with respect to thesimulation time is represented in Figure 8
From the figure it is analyzed that when compared to theexisting X-MAC ZKP and TE2S schemes the proposed GA-DoSLD algorithm provides higher PDR
Security and Communication Networks 9
0
20
40
60
80
100
5 10 15 20 25 30 35 40 45 50
Pack
et d
eliv
ery
ratio
()
Simulation time (ms)
X-MACZKP
GA-DoSLDTE2S
Figure 8 Comparison of packet delivery ratio versus simulationtime for the existing and proposed schemes
46 Throughput Performance for Various Packet SendingRates The effectiveness of the protocol depends on thesuccessful reception and transmission of data packets underthe various sending rates such as 1 packet3 seconds 1packet5 seconds and 1 packet7 seconds [22] In this paperthe packet sending rate of 1 packet3 seconds is taken tovalidate the performance of proposed work The estimationof the throughput ratio is based on the following equation
Throughput ratio = 119875NS119875NT (10)
where 119875NS denotes the packet number under simulation sce-nario and 119875NT represents the packet number delivered underthe theoretical scenarioThe superiority of the suggested GA-DoSLD algorithm is validated against the existing algorithmssuch as X-MAC ZKP and TE2P for a packer rate of 1 packetper 3 seconds Figure 9 represents the comparison of thethroughput ratio with respect to the variable attack interval
From the figure it is clear that the suggested GA-DoSLDalgorithm provides higher throughput than the existing algo-rithms under the packet sending rate of 1 packet3 seconds
5 Conclusion and Future Work
In this paper an efficient GA-DoSLD algorithm is proposedfor generating the DoSL attack profiles from multiple sensornodes such that the attacker nodes can be prevented from thecommunication process Initially a WSN is simulated with100 numbers of static sensor nodes then the BS performs theoperations such as key pair generation and behaviormonitor-ing in parallel The base station monitors the behavior of thesensor nodes and initializes every behavior as a chromosomeThe MRSA algorithm is implemented in the base stationfor generating and distributing the key pair among thesensor nodes Before initiating the communication betweenthe sensor nodes the AODV routing protocol estimates theoptimal route To validate the trustworthiness of the relaynodes in the route the fitness value is estimated for every
0
5000
10000
15000
20000
25000
30000
35000
40000
45000
50000
05 1 15 2 25 3 35 4Attack interval (secs)
X-MACZKP
GA-DoSLDTh
roug
hput
for t
he p
acke
t sen
ding
rate
of 1
pac
ket3
seco
nds
TE2P
Figure 9 Comparison of throughput under packet sending rate of1 packet3 seconds versus attack interval
chromosome If the chromosome is determined as unusualit is validated against the existing attack profiles If there doesnot exist a match the pair of chromosomes is subjected tothe crossover and mutation operations The resultant chro-mosomes are added to the existing chromosomes Finally theBS determines the attacker nodes broadcasting the blockedinformation to all the sensor nodes in the network To provethe superiority of the suggested GA-DoSLD algorithm itis compared against the existing X-MAC ZKP and TE2Sschemes for the metrics such as normalized energy con-sumption effective packet number end-to-end delay averageenergy consumption packet delivery ratio and throughputratio versus packet rate The validation results prove thatwhen compared to the existing schemes the proposedalgorithm provides optimal results for all the metrics Therepeated execution of the GA-DoSLD algorithm in the sensornodes consumes a considerable amount of energy Thus toachieve the energy optimization a different soft computingalgorithm other than GA can be used in future for detectingthe denial-of-sleep attack in the WSN environment
Notations
119873 Expected number of hops119867 Number of hops between the source anddestination119864 Number of neighbors at the higher tiers119877119888 Expected number of neighbors at 119888th hop119862119887 Additional coverage index of the nodewith 119887 neighbors119882ac Weight accuracy
10 Security and Communication Networks
119877ac Accuracy relative119882oc Occurrence119877oc Relative weight of occurrence
Competing Interests
The authors declare that there is no conflict of interestsregarding the publication of this paper
References
[1] V C Manju S L Senthil Lekha and M Sasi Kumar ldquoMech-anisms for detecting and preventing denial of sleep attacks onwireless sensor networksrdquo in Proceedings of the IEEE Conferenceon Information and Communication Technologies (ICT rsquo13) pp74ndash77 Tamil Nadu India April 2013
[2] D R Raymond R C Marchany M I Brownfield and S FMidkiff ldquoEffects of denial-of-sleep attacks on wireless sensornetworkMAC protocolsrdquo IEEE Transactions on Vehicular Tech-nology vol 58 no 1 pp 367ndash380 2009
[3] R P Manohar and E Baburaj ldquoDetection of Stealthy Denialof Service (S-DoS) attacks in wireless sensor networksrdquo Inter-national Journal of Computer Science and Information Security(IJCSIS) vol 14 pp 343ndash348 2016
[4] D Mansouri L Mokddad J Ben-Othman and M IoualalenldquoPreventing denial of service attacks in wireless sensor net-worksrdquo in Proceedings of the IEEE International Conference onCommunications (ICC rsquo15) pp 3014ndash3019 London UK June2015
[5] D Mansouri L Mokdad J Ben-Othman and M IoualalenldquoDetecting DoS attacks in WSN based on clustering tech-niquerdquo in Proceedings of the IEEEWireless Communications andNetworking Conference (WCNC rsquo13) pp 2214ndash2219 ShanghaiChina April 2013
[6] J-L Chen Y-W Ma X Wang Y-M Huang and Y-F LaildquoTime-division secret key protocol for wireless sensor network-ingrdquo Institution of Engineering andTechnology Communicationsvol 5 no 12 pp 1720ndash1726 2011
[7] D He C Chen S Chan and J Bu ldquoDiCode DoS-resistant anddistributed code dissemination in wireless sensor networksrdquoIEEE Transactions on Wireless Communications vol 11 no 5pp 1946ndash1956 2012
[8] G Han J Jiang W Shen L Shu and J Rodrigues ldquoIDSEP anovel intrusion detection scheme based on energy predictionin cluster-based wireless sensor networksrdquo IET InformationSecurity vol 7 no 2 pp 97ndash105 2013
[9] E B Ram Pradheep Manohar ldquoDetection of stealthy denialof service (S-DoS) attacks in wireless sensor networksrdquo Inter-national Journal of Computer Science and Information Security(IJCSIS) vol 14 2016
[10] H Tan D Ostry J Zic and S Jha ldquoA confidential and DoS-resistant multi-hop code dissemination protocol for wirelesssensor networksrdquoComputersamp Security vol 32 pp 36ndash55 2013
[11] S M Nam and T H Cho ldquoEnergy efficient method fordetection and prevention of false reports in wireless sensornetworksrdquo in Proceedings of the 8th International Conference onInformation Science and Digital Content Technology (ICIDT rsquo12)pp 766ndash769 Jeju Island South Korea June 2012
[12] S Naik and N Shekokar ldquoConservation of energy in wirelesssensor network by preventing denial of sleep attackrdquo ProcediaComputer Science vol 45 pp 370ndash379 2015
[13] C-T Hsueh C-Y Wen and Y-C Ouyang ldquoA secure schemeagainst power exhausting attacks in hierarchical wireless sensornetworksrdquo IEEE Sensors Journal vol 15 no 6 pp 3590ndash36022015
[14] S Kaur andM Ataullah ldquoSecuring the wireless sensor networkfrom denial of sleep attack by isolating the nodesrdquo InternationalJournal of Computer Applications vol 103 no 1 pp 29ndash33 2014
[15] S Shamshirband A Amini N B Anuar M L Mat Kiah Y WTeh and S Furnell ldquoD-FICCA a density-based fuzzy imperi-alist competitive clustering algorithm for intrusion detection inwireless sensor networksrdquo Measurement vol 55 pp 212ndash2262014
[16] S Shamshirband A Patel N B Anuar M L M Kiah andA Abraham ldquoCooperative game theoretic approach usingfuzzy Q-learning for detecting and preventing intrusions inwireless sensor networksrdquo Engineering Applications of ArtificialIntelligence vol 32 pp 228ndash241 2014
[17] N K Sreelaja and G A Vijayalakshmi Pai ldquoSwarm intelligencebased approach for sinkhole attack detection in wireless sensornetworksrdquo Applied Soft Computing Journal vol 19 pp 68ndash792014
[18] G Keerthana and G Padmavathi ldquoDetecting sinkhole attackin wireless sensor network using enhanced particle swarmoptimization techniquerdquo International Journal of Security andIts Applications vol 10 no 3 pp 41ndash54 2016
[19] A Saeed A Ahmadinia A Javed and H Larijani ldquoRandomneural network based intelligent intrusion detection forwirelesssensor networksrdquo Procedia Computer Science vol 80 pp 2372ndash2376 2016
[20] D Management ldquoRSA Algorithmrdquo 2016 httpwwwdi-mgtcomaursa alghtml
[21] M Zhao Y Li and W Wang ldquoModeling and analyticalstudy of link properties in multihop wireless networksrdquo IEEETransactions on Communications vol 60 no 2 pp 445ndash4552012
[22] C-T Hsueh C-Y Wen and Y-C Ouyang ldquoA secure schemeagainst power exhausting attacks in hierarchical wireless sensornetworksrdquo IEEE Sensors Journal vol 15 no 6 pp 3590ndash36022015
[23] D N S Swapna Naik ldquoConservation of energy in wireless sen-sor network by preventing denial of sleep attackrdquo in Proceedingsof the International Conference on Advanced Computing Tech-nologies and Applications (ICACTA rsquo15) pp 370ndash379 MumbaiIndia March 2015
International Journal of
AerospaceEngineeringHindawi Publishing Corporationhttpwwwhindawicom Volume 2014
RoboticsJournal of
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Active and Passive Electronic Components
Control Scienceand Engineering
Journal of
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
International Journal of
RotatingMachinery
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Hindawi Publishing Corporation httpwwwhindawicom
Journal ofEngineeringVolume 2014
Submit your manuscripts athttpswwwhindawicom
VLSI Design
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Shock and Vibration
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Civil EngineeringAdvances in
Acoustics and VibrationAdvances in
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Electrical and Computer Engineering
Journal of
Advances inOptoElectronics
Hindawi Publishing Corporation httpwwwhindawicom
Volume 2014
The Scientific World JournalHindawi Publishing Corporation httpwwwhindawicom Volume 2014
SensorsJournal of
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Modelling amp Simulation in EngineeringHindawi Publishing Corporation httpwwwhindawicom Volume 2014
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Chemical EngineeringInternational Journal of Antennas and
Propagation
International Journal of
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Navigation and Observation
International Journal of
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
DistributedSensor Networks
International Journal of
6 Security and Communication Networks
A
B
J
F YL
K
BSC P
D
E
H
I
T
Z
Base station
Destination
RREQRREP
Figure 3 Example for the route discovery process using AODV
Step 7 The overall overhead introduced for the route discov-ery process is
119877Overall = RREQ + RREP119877Overall = 119873sum
119886minus1
(119867) 119864119873minus1 119867sum119887=2
[(119886 minus 1 minus 119887) minus 119873minus1sum119888=1
119877119888]119875119862119887+ 119873 + 1198732 (119886 minus ℎ minus 2) 119901
(4)
The merits of using the AODV routing protocol for theroute discovery process are as follows
(i) Loop-free routes(ii) Faster response to link breakage(iii) Minimal demand for the broadcast
After establishing an optimal route the sensor nodesestimate the trustworthiness of the neighbor nodes usingfitness evaluation function
35 Behavior Monitoring After ensuring the trustworthinessof the neighbor nodes the sensor nodes forward the packetsDuring the transmission if the sensor node suspects any
malicious behaviors as follows it estimates the fitness valuebased on the information provided by the BS
(i) Flooding of data packets(ii) Transmission of large sized data packets that exceed
the data capacity of the sensor nodes
By estimating the fitness value based on attacker ID thechromosome of the already existing attacker is determinedAfter estimating the fitness value the sensor nodes providealert messages about the neighbor node behavior to the BSOn receiving the alertmessage the BS performs the crossoverandmutation operations on the chromosomes for identifyingand analyzing the method that is used by the attackerfor implementing the attack The resultant chromosomesobtained from the crossover and mutation operation areadded to the existing population Finally the BS confirmswhether the particular neighbor node is a normal node oran attacker node If the BS determines the neighbor nodeas an attacker node then the BS broadcasts the blockedinformation to all the other sensor nodes in the WSN Byexploiting the suggested GA-DoSLD algorithm the attackernodes that introduce the DoSL attacks are eliminated fromthe communication thus saving the energy of the sensornodes Notations describe the symbols used in Algorithm 4
Security and Communication Networks 7
for the proposed GA-DoSLD The steps involved in thesuggested GA-DoSLD algorithm are illustrated below
Algorithm 4 (GA-DoSLD algorithm)
Input Population
Output Optimal population with fitness value
Step 1 Compute the index of individuals
Individual larr Random member (population)Initialize the array of fittest as emptyFor (node in population)If (FittestgetFitness() = getIndividual(node)getFit-ness())
Fittest = getIndividual (node) (5)
Individuals [index] = Fittest
Step 2 Compute fitness function
Load member populationCompute the weight accuracy (119882ac) and relativeaccuracy (119877ac)Compute the occurrences of weight (119882oc) and relativeweight (119877oc)
Fitness = 119882ac lowast accuracy of 119898 hop + 119882oc
lowast occurrence of 119898 hopFitness = (1198821 + 1198822) lowast af + (minus1198822) lowast 119877oc
(6)
Step 3 Execute reproduction
Initialize the new pop as an empty setselect the random member in the input populationbased on fitness functionFor (119894 = 1 119894 le maximum size of population 119894 + +)119883 larr Random selected member in population basedon fitness function119884 larr Random selected member in population basedon fitness functionFind the parent profiles of (119883119884)Len 119883 larr length (119883)Len 119884 larr length (119884)
119888 = Select random number between 1 and Len 119883new chromosome
= (substring (119883 1 119888) substring (119884 1 119888)) (7)
Set offspring as new chromosome
Step 4 Population Update
If (random probability to mutate ge threshold)
off spring larr997888 Mutates (off spring)Set new population
larr997888 Union (new population offspring)(8)
End doPopulation larr Union (new population new pop)Return Best (Population Fitness)
4 Performance Analysis
This section describes the performance results of the pro-posed GA-DoSLD algorithm for the following metrics
(i) Normalized energy consumption(ii) Effective packet number(iii) End-to-end delay(iv) Average energy consumption(v) Packet delivery ratio(vi) Throughput ratio versus packet rate
To prove the superiority of the proposed GA-DoSLD algo-rithm it is compared with the existing algorithms such aszero knowledge protocol (ZKP) [22] X-MAC and Two-TierEnergy-Efficient Secure (TE2S) scheme [23] and their resultsare discussed in the following sections
41 Normalized Energy Consumption Normalized energyconsumption is the amount of energy consumed for transfer-ring 3 packets per second The normalized energy consump-tion of the existing X-MAC algorithm ZKP TE2P schemeand the proposed GA-DoSLD algorithm is validated for mul-tiple intervals of attackThe comparison result represented inFigure 4 depicts that for all the attack intervals the suggestedGA-DoSLD algorithm consumes minimal energy
42 Effective Packet Number The effective packet number ofthe existing X-MAC algorithm ZKP TE2S scheme and theproposed GA-DoSLD algorithm is validated for the variableattack intervals The comparison considers the packet send-ing rate as 1 packet every 3 seconds The comparison resultrepresented in Figure 5 shows that the suggested GA-DoSLDalgorithm provides higher scores on effective packet numberthan the existing schemes
8 Security and Communication Networks
0
20
40
60
80
100
05 1 15 2 25 3 35 4
Ener
gy co
nsum
ptio
n (m
JSec
)
Attack interval
X-MACZKP
GA-DoSLDTE2S
Figure 4 Comparison of normalized energy consumption for theexisting and the proposed methods
0
200
400
600
800
1000
1200
1400
X-MACZKP
GA-DoSLD
05 1 15 2 25 3 35 4Attack interval
Effec
tive p
acke
t num
ber (
pack
et3
sec)
TE2S
Figure 5 Comparison of packet number versus attack interval
43 End-to-End Delay The end-to-end delay is defined asthe average time consumed for transmitting the packets Theanalysis of end-to-end delay with respect to the packet size isrepresented in Figure 6 From the figure it is clear that whencompared to existing X-MAC ZKP and TE2S algorithms thesuggested GA-DoSLD algorithm provides a minimal end-to-end delay for the variable packet sizes
44 Average Energy Consumption The average energy con-sumption is the amount of energy consumed by the algo-rithms for transmitting the data packets The comparison ofaverage energy consumption for the existing X-MAC ZKPTE2S schemes and the proposed GA-DoSLD algorithm isrepresented in Figure 7 From the figure it is clear that thesuggested GA-DoSLD algorithm provides minimal energyconsumption than the existing schemes
005
115
225
335
128 256 384 512 640Packet size
X-MACZKP
GA-DoSLD
End-
to-e
nd d
elay
(sec
onds
)
4
TE2S
Figure 6 Comparison of end-to-end delay versus packet size for theexisting and the proposed methods
0
05
1
15
2
25
10 20 30 40 50 60 70Simulation time (ms)
X-MACZKP
GA-DoSLD
Aver
age e
nerg
y co
nsum
ptio
n (J
S)
TE2S
Figure 7 Analysis of average energy consumption versus simula-tion time for the existing and the proposed methods
45 Packet Delivery Ratio The packet delivery ratio (PDR) isdefined as the ratio of the number of data packets successfullydelivered to the destination node to the number of datapackets transmitted from the source The estimation of thePDR is based on the following equation
PDR = 119875119877 lowast 100sum119899119886minus1
119875Gen119886
(9)
where 119875119877 represents the number of data packets received atthe destination node 119875Gen is the total number of data packetsgenerated by the source nodes and 119899 denotes the numberof sensor nodes The comparison of PDR with respect to thesimulation time is represented in Figure 8
From the figure it is analyzed that when compared to theexisting X-MAC ZKP and TE2S schemes the proposed GA-DoSLD algorithm provides higher PDR
Security and Communication Networks 9
0
20
40
60
80
100
5 10 15 20 25 30 35 40 45 50
Pack
et d
eliv
ery
ratio
()
Simulation time (ms)
X-MACZKP
GA-DoSLDTE2S
Figure 8 Comparison of packet delivery ratio versus simulationtime for the existing and proposed schemes
46 Throughput Performance for Various Packet SendingRates The effectiveness of the protocol depends on thesuccessful reception and transmission of data packets underthe various sending rates such as 1 packet3 seconds 1packet5 seconds and 1 packet7 seconds [22] In this paperthe packet sending rate of 1 packet3 seconds is taken tovalidate the performance of proposed work The estimationof the throughput ratio is based on the following equation
Throughput ratio = 119875NS119875NT (10)
where 119875NS denotes the packet number under simulation sce-nario and 119875NT represents the packet number delivered underthe theoretical scenarioThe superiority of the suggested GA-DoSLD algorithm is validated against the existing algorithmssuch as X-MAC ZKP and TE2P for a packer rate of 1 packetper 3 seconds Figure 9 represents the comparison of thethroughput ratio with respect to the variable attack interval
From the figure it is clear that the suggested GA-DoSLDalgorithm provides higher throughput than the existing algo-rithms under the packet sending rate of 1 packet3 seconds
5 Conclusion and Future Work
In this paper an efficient GA-DoSLD algorithm is proposedfor generating the DoSL attack profiles from multiple sensornodes such that the attacker nodes can be prevented from thecommunication process Initially a WSN is simulated with100 numbers of static sensor nodes then the BS performs theoperations such as key pair generation and behaviormonitor-ing in parallel The base station monitors the behavior of thesensor nodes and initializes every behavior as a chromosomeThe MRSA algorithm is implemented in the base stationfor generating and distributing the key pair among thesensor nodes Before initiating the communication betweenthe sensor nodes the AODV routing protocol estimates theoptimal route To validate the trustworthiness of the relaynodes in the route the fitness value is estimated for every
0
5000
10000
15000
20000
25000
30000
35000
40000
45000
50000
05 1 15 2 25 3 35 4Attack interval (secs)
X-MACZKP
GA-DoSLDTh
roug
hput
for t
he p
acke
t sen
ding
rate
of 1
pac
ket3
seco
nds
TE2P
Figure 9 Comparison of throughput under packet sending rate of1 packet3 seconds versus attack interval
chromosome If the chromosome is determined as unusualit is validated against the existing attack profiles If there doesnot exist a match the pair of chromosomes is subjected tothe crossover and mutation operations The resultant chro-mosomes are added to the existing chromosomes Finally theBS determines the attacker nodes broadcasting the blockedinformation to all the sensor nodes in the network To provethe superiority of the suggested GA-DoSLD algorithm itis compared against the existing X-MAC ZKP and TE2Sschemes for the metrics such as normalized energy con-sumption effective packet number end-to-end delay averageenergy consumption packet delivery ratio and throughputratio versus packet rate The validation results prove thatwhen compared to the existing schemes the proposedalgorithm provides optimal results for all the metrics Therepeated execution of the GA-DoSLD algorithm in the sensornodes consumes a considerable amount of energy Thus toachieve the energy optimization a different soft computingalgorithm other than GA can be used in future for detectingthe denial-of-sleep attack in the WSN environment
Notations
119873 Expected number of hops119867 Number of hops between the source anddestination119864 Number of neighbors at the higher tiers119877119888 Expected number of neighbors at 119888th hop119862119887 Additional coverage index of the nodewith 119887 neighbors119882ac Weight accuracy
10 Security and Communication Networks
119877ac Accuracy relative119882oc Occurrence119877oc Relative weight of occurrence
Competing Interests
The authors declare that there is no conflict of interestsregarding the publication of this paper
References
[1] V C Manju S L Senthil Lekha and M Sasi Kumar ldquoMech-anisms for detecting and preventing denial of sleep attacks onwireless sensor networksrdquo in Proceedings of the IEEE Conferenceon Information and Communication Technologies (ICT rsquo13) pp74ndash77 Tamil Nadu India April 2013
[2] D R Raymond R C Marchany M I Brownfield and S FMidkiff ldquoEffects of denial-of-sleep attacks on wireless sensornetworkMAC protocolsrdquo IEEE Transactions on Vehicular Tech-nology vol 58 no 1 pp 367ndash380 2009
[3] R P Manohar and E Baburaj ldquoDetection of Stealthy Denialof Service (S-DoS) attacks in wireless sensor networksrdquo Inter-national Journal of Computer Science and Information Security(IJCSIS) vol 14 pp 343ndash348 2016
[4] D Mansouri L Mokddad J Ben-Othman and M IoualalenldquoPreventing denial of service attacks in wireless sensor net-worksrdquo in Proceedings of the IEEE International Conference onCommunications (ICC rsquo15) pp 3014ndash3019 London UK June2015
[5] D Mansouri L Mokdad J Ben-Othman and M IoualalenldquoDetecting DoS attacks in WSN based on clustering tech-niquerdquo in Proceedings of the IEEEWireless Communications andNetworking Conference (WCNC rsquo13) pp 2214ndash2219 ShanghaiChina April 2013
[6] J-L Chen Y-W Ma X Wang Y-M Huang and Y-F LaildquoTime-division secret key protocol for wireless sensor network-ingrdquo Institution of Engineering andTechnology Communicationsvol 5 no 12 pp 1720ndash1726 2011
[7] D He C Chen S Chan and J Bu ldquoDiCode DoS-resistant anddistributed code dissemination in wireless sensor networksrdquoIEEE Transactions on Wireless Communications vol 11 no 5pp 1946ndash1956 2012
[8] G Han J Jiang W Shen L Shu and J Rodrigues ldquoIDSEP anovel intrusion detection scheme based on energy predictionin cluster-based wireless sensor networksrdquo IET InformationSecurity vol 7 no 2 pp 97ndash105 2013
[9] E B Ram Pradheep Manohar ldquoDetection of stealthy denialof service (S-DoS) attacks in wireless sensor networksrdquo Inter-national Journal of Computer Science and Information Security(IJCSIS) vol 14 2016
[10] H Tan D Ostry J Zic and S Jha ldquoA confidential and DoS-resistant multi-hop code dissemination protocol for wirelesssensor networksrdquoComputersamp Security vol 32 pp 36ndash55 2013
[11] S M Nam and T H Cho ldquoEnergy efficient method fordetection and prevention of false reports in wireless sensornetworksrdquo in Proceedings of the 8th International Conference onInformation Science and Digital Content Technology (ICIDT rsquo12)pp 766ndash769 Jeju Island South Korea June 2012
[12] S Naik and N Shekokar ldquoConservation of energy in wirelesssensor network by preventing denial of sleep attackrdquo ProcediaComputer Science vol 45 pp 370ndash379 2015
[13] C-T Hsueh C-Y Wen and Y-C Ouyang ldquoA secure schemeagainst power exhausting attacks in hierarchical wireless sensornetworksrdquo IEEE Sensors Journal vol 15 no 6 pp 3590ndash36022015
[14] S Kaur andM Ataullah ldquoSecuring the wireless sensor networkfrom denial of sleep attack by isolating the nodesrdquo InternationalJournal of Computer Applications vol 103 no 1 pp 29ndash33 2014
[15] S Shamshirband A Amini N B Anuar M L Mat Kiah Y WTeh and S Furnell ldquoD-FICCA a density-based fuzzy imperi-alist competitive clustering algorithm for intrusion detection inwireless sensor networksrdquo Measurement vol 55 pp 212ndash2262014
[16] S Shamshirband A Patel N B Anuar M L M Kiah andA Abraham ldquoCooperative game theoretic approach usingfuzzy Q-learning for detecting and preventing intrusions inwireless sensor networksrdquo Engineering Applications of ArtificialIntelligence vol 32 pp 228ndash241 2014
[17] N K Sreelaja and G A Vijayalakshmi Pai ldquoSwarm intelligencebased approach for sinkhole attack detection in wireless sensornetworksrdquo Applied Soft Computing Journal vol 19 pp 68ndash792014
[18] G Keerthana and G Padmavathi ldquoDetecting sinkhole attackin wireless sensor network using enhanced particle swarmoptimization techniquerdquo International Journal of Security andIts Applications vol 10 no 3 pp 41ndash54 2016
[19] A Saeed A Ahmadinia A Javed and H Larijani ldquoRandomneural network based intelligent intrusion detection forwirelesssensor networksrdquo Procedia Computer Science vol 80 pp 2372ndash2376 2016
[20] D Management ldquoRSA Algorithmrdquo 2016 httpwwwdi-mgtcomaursa alghtml
[21] M Zhao Y Li and W Wang ldquoModeling and analyticalstudy of link properties in multihop wireless networksrdquo IEEETransactions on Communications vol 60 no 2 pp 445ndash4552012
[22] C-T Hsueh C-Y Wen and Y-C Ouyang ldquoA secure schemeagainst power exhausting attacks in hierarchical wireless sensornetworksrdquo IEEE Sensors Journal vol 15 no 6 pp 3590ndash36022015
[23] D N S Swapna Naik ldquoConservation of energy in wireless sen-sor network by preventing denial of sleep attackrdquo in Proceedingsof the International Conference on Advanced Computing Tech-nologies and Applications (ICACTA rsquo15) pp 370ndash379 MumbaiIndia March 2015
International Journal of
AerospaceEngineeringHindawi Publishing Corporationhttpwwwhindawicom Volume 2014
RoboticsJournal of
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Active and Passive Electronic Components
Control Scienceand Engineering
Journal of
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
International Journal of
RotatingMachinery
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Hindawi Publishing Corporation httpwwwhindawicom
Journal ofEngineeringVolume 2014
Submit your manuscripts athttpswwwhindawicom
VLSI Design
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Shock and Vibration
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Civil EngineeringAdvances in
Acoustics and VibrationAdvances in
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Electrical and Computer Engineering
Journal of
Advances inOptoElectronics
Hindawi Publishing Corporation httpwwwhindawicom
Volume 2014
The Scientific World JournalHindawi Publishing Corporation httpwwwhindawicom Volume 2014
SensorsJournal of
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Modelling amp Simulation in EngineeringHindawi Publishing Corporation httpwwwhindawicom Volume 2014
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Chemical EngineeringInternational Journal of Antennas and
Propagation
International Journal of
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Navigation and Observation
International Journal of
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
DistributedSensor Networks
International Journal of
Security and Communication Networks 7
for the proposed GA-DoSLD The steps involved in thesuggested GA-DoSLD algorithm are illustrated below
Algorithm 4 (GA-DoSLD algorithm)
Input Population
Output Optimal population with fitness value
Step 1 Compute the index of individuals
Individual larr Random member (population)Initialize the array of fittest as emptyFor (node in population)If (FittestgetFitness() = getIndividual(node)getFit-ness())
Fittest = getIndividual (node) (5)
Individuals [index] = Fittest
Step 2 Compute fitness function
Load member populationCompute the weight accuracy (119882ac) and relativeaccuracy (119877ac)Compute the occurrences of weight (119882oc) and relativeweight (119877oc)
Fitness = 119882ac lowast accuracy of 119898 hop + 119882oc
lowast occurrence of 119898 hopFitness = (1198821 + 1198822) lowast af + (minus1198822) lowast 119877oc
(6)
Step 3 Execute reproduction
Initialize the new pop as an empty setselect the random member in the input populationbased on fitness functionFor (119894 = 1 119894 le maximum size of population 119894 + +)119883 larr Random selected member in population basedon fitness function119884 larr Random selected member in population basedon fitness functionFind the parent profiles of (119883119884)Len 119883 larr length (119883)Len 119884 larr length (119884)
119888 = Select random number between 1 and Len 119883new chromosome
= (substring (119883 1 119888) substring (119884 1 119888)) (7)
Set offspring as new chromosome
Step 4 Population Update
If (random probability to mutate ge threshold)
off spring larr997888 Mutates (off spring)Set new population
larr997888 Union (new population offspring)(8)
End doPopulation larr Union (new population new pop)Return Best (Population Fitness)
4 Performance Analysis
This section describes the performance results of the pro-posed GA-DoSLD algorithm for the following metrics
(i) Normalized energy consumption(ii) Effective packet number(iii) End-to-end delay(iv) Average energy consumption(v) Packet delivery ratio(vi) Throughput ratio versus packet rate
To prove the superiority of the proposed GA-DoSLD algo-rithm it is compared with the existing algorithms such aszero knowledge protocol (ZKP) [22] X-MAC and Two-TierEnergy-Efficient Secure (TE2S) scheme [23] and their resultsare discussed in the following sections
41 Normalized Energy Consumption Normalized energyconsumption is the amount of energy consumed for transfer-ring 3 packets per second The normalized energy consump-tion of the existing X-MAC algorithm ZKP TE2P schemeand the proposed GA-DoSLD algorithm is validated for mul-tiple intervals of attackThe comparison result represented inFigure 4 depicts that for all the attack intervals the suggestedGA-DoSLD algorithm consumes minimal energy
42 Effective Packet Number The effective packet number ofthe existing X-MAC algorithm ZKP TE2S scheme and theproposed GA-DoSLD algorithm is validated for the variableattack intervals The comparison considers the packet send-ing rate as 1 packet every 3 seconds The comparison resultrepresented in Figure 5 shows that the suggested GA-DoSLDalgorithm provides higher scores on effective packet numberthan the existing schemes
8 Security and Communication Networks
0
20
40
60
80
100
05 1 15 2 25 3 35 4
Ener
gy co
nsum
ptio
n (m
JSec
)
Attack interval
X-MACZKP
GA-DoSLDTE2S
Figure 4 Comparison of normalized energy consumption for theexisting and the proposed methods
0
200
400
600
800
1000
1200
1400
X-MACZKP
GA-DoSLD
05 1 15 2 25 3 35 4Attack interval
Effec
tive p
acke
t num
ber (
pack
et3
sec)
TE2S
Figure 5 Comparison of packet number versus attack interval
43 End-to-End Delay The end-to-end delay is defined asthe average time consumed for transmitting the packets Theanalysis of end-to-end delay with respect to the packet size isrepresented in Figure 6 From the figure it is clear that whencompared to existing X-MAC ZKP and TE2S algorithms thesuggested GA-DoSLD algorithm provides a minimal end-to-end delay for the variable packet sizes
44 Average Energy Consumption The average energy con-sumption is the amount of energy consumed by the algo-rithms for transmitting the data packets The comparison ofaverage energy consumption for the existing X-MAC ZKPTE2S schemes and the proposed GA-DoSLD algorithm isrepresented in Figure 7 From the figure it is clear that thesuggested GA-DoSLD algorithm provides minimal energyconsumption than the existing schemes
005
115
225
335
128 256 384 512 640Packet size
X-MACZKP
GA-DoSLD
End-
to-e
nd d
elay
(sec
onds
)
4
TE2S
Figure 6 Comparison of end-to-end delay versus packet size for theexisting and the proposed methods
0
05
1
15
2
25
10 20 30 40 50 60 70Simulation time (ms)
X-MACZKP
GA-DoSLD
Aver
age e
nerg
y co
nsum
ptio
n (J
S)
TE2S
Figure 7 Analysis of average energy consumption versus simula-tion time for the existing and the proposed methods
45 Packet Delivery Ratio The packet delivery ratio (PDR) isdefined as the ratio of the number of data packets successfullydelivered to the destination node to the number of datapackets transmitted from the source The estimation of thePDR is based on the following equation
PDR = 119875119877 lowast 100sum119899119886minus1
119875Gen119886
(9)
where 119875119877 represents the number of data packets received atthe destination node 119875Gen is the total number of data packetsgenerated by the source nodes and 119899 denotes the numberof sensor nodes The comparison of PDR with respect to thesimulation time is represented in Figure 8
From the figure it is analyzed that when compared to theexisting X-MAC ZKP and TE2S schemes the proposed GA-DoSLD algorithm provides higher PDR
Security and Communication Networks 9
0
20
40
60
80
100
5 10 15 20 25 30 35 40 45 50
Pack
et d
eliv
ery
ratio
()
Simulation time (ms)
X-MACZKP
GA-DoSLDTE2S
Figure 8 Comparison of packet delivery ratio versus simulationtime for the existing and proposed schemes
46 Throughput Performance for Various Packet SendingRates The effectiveness of the protocol depends on thesuccessful reception and transmission of data packets underthe various sending rates such as 1 packet3 seconds 1packet5 seconds and 1 packet7 seconds [22] In this paperthe packet sending rate of 1 packet3 seconds is taken tovalidate the performance of proposed work The estimationof the throughput ratio is based on the following equation
Throughput ratio = 119875NS119875NT (10)
where 119875NS denotes the packet number under simulation sce-nario and 119875NT represents the packet number delivered underthe theoretical scenarioThe superiority of the suggested GA-DoSLD algorithm is validated against the existing algorithmssuch as X-MAC ZKP and TE2P for a packer rate of 1 packetper 3 seconds Figure 9 represents the comparison of thethroughput ratio with respect to the variable attack interval
From the figure it is clear that the suggested GA-DoSLDalgorithm provides higher throughput than the existing algo-rithms under the packet sending rate of 1 packet3 seconds
5 Conclusion and Future Work
In this paper an efficient GA-DoSLD algorithm is proposedfor generating the DoSL attack profiles from multiple sensornodes such that the attacker nodes can be prevented from thecommunication process Initially a WSN is simulated with100 numbers of static sensor nodes then the BS performs theoperations such as key pair generation and behaviormonitor-ing in parallel The base station monitors the behavior of thesensor nodes and initializes every behavior as a chromosomeThe MRSA algorithm is implemented in the base stationfor generating and distributing the key pair among thesensor nodes Before initiating the communication betweenthe sensor nodes the AODV routing protocol estimates theoptimal route To validate the trustworthiness of the relaynodes in the route the fitness value is estimated for every
0
5000
10000
15000
20000
25000
30000
35000
40000
45000
50000
05 1 15 2 25 3 35 4Attack interval (secs)
X-MACZKP
GA-DoSLDTh
roug
hput
for t
he p
acke
t sen
ding
rate
of 1
pac
ket3
seco
nds
TE2P
Figure 9 Comparison of throughput under packet sending rate of1 packet3 seconds versus attack interval
chromosome If the chromosome is determined as unusualit is validated against the existing attack profiles If there doesnot exist a match the pair of chromosomes is subjected tothe crossover and mutation operations The resultant chro-mosomes are added to the existing chromosomes Finally theBS determines the attacker nodes broadcasting the blockedinformation to all the sensor nodes in the network To provethe superiority of the suggested GA-DoSLD algorithm itis compared against the existing X-MAC ZKP and TE2Sschemes for the metrics such as normalized energy con-sumption effective packet number end-to-end delay averageenergy consumption packet delivery ratio and throughputratio versus packet rate The validation results prove thatwhen compared to the existing schemes the proposedalgorithm provides optimal results for all the metrics Therepeated execution of the GA-DoSLD algorithm in the sensornodes consumes a considerable amount of energy Thus toachieve the energy optimization a different soft computingalgorithm other than GA can be used in future for detectingthe denial-of-sleep attack in the WSN environment
Notations
119873 Expected number of hops119867 Number of hops between the source anddestination119864 Number of neighbors at the higher tiers119877119888 Expected number of neighbors at 119888th hop119862119887 Additional coverage index of the nodewith 119887 neighbors119882ac Weight accuracy
10 Security and Communication Networks
119877ac Accuracy relative119882oc Occurrence119877oc Relative weight of occurrence
Competing Interests
The authors declare that there is no conflict of interestsregarding the publication of this paper
References
[1] V C Manju S L Senthil Lekha and M Sasi Kumar ldquoMech-anisms for detecting and preventing denial of sleep attacks onwireless sensor networksrdquo in Proceedings of the IEEE Conferenceon Information and Communication Technologies (ICT rsquo13) pp74ndash77 Tamil Nadu India April 2013
[2] D R Raymond R C Marchany M I Brownfield and S FMidkiff ldquoEffects of denial-of-sleep attacks on wireless sensornetworkMAC protocolsrdquo IEEE Transactions on Vehicular Tech-nology vol 58 no 1 pp 367ndash380 2009
[3] R P Manohar and E Baburaj ldquoDetection of Stealthy Denialof Service (S-DoS) attacks in wireless sensor networksrdquo Inter-national Journal of Computer Science and Information Security(IJCSIS) vol 14 pp 343ndash348 2016
[4] D Mansouri L Mokddad J Ben-Othman and M IoualalenldquoPreventing denial of service attacks in wireless sensor net-worksrdquo in Proceedings of the IEEE International Conference onCommunications (ICC rsquo15) pp 3014ndash3019 London UK June2015
[5] D Mansouri L Mokdad J Ben-Othman and M IoualalenldquoDetecting DoS attacks in WSN based on clustering tech-niquerdquo in Proceedings of the IEEEWireless Communications andNetworking Conference (WCNC rsquo13) pp 2214ndash2219 ShanghaiChina April 2013
[6] J-L Chen Y-W Ma X Wang Y-M Huang and Y-F LaildquoTime-division secret key protocol for wireless sensor network-ingrdquo Institution of Engineering andTechnology Communicationsvol 5 no 12 pp 1720ndash1726 2011
[7] D He C Chen S Chan and J Bu ldquoDiCode DoS-resistant anddistributed code dissemination in wireless sensor networksrdquoIEEE Transactions on Wireless Communications vol 11 no 5pp 1946ndash1956 2012
[8] G Han J Jiang W Shen L Shu and J Rodrigues ldquoIDSEP anovel intrusion detection scheme based on energy predictionin cluster-based wireless sensor networksrdquo IET InformationSecurity vol 7 no 2 pp 97ndash105 2013
[9] E B Ram Pradheep Manohar ldquoDetection of stealthy denialof service (S-DoS) attacks in wireless sensor networksrdquo Inter-national Journal of Computer Science and Information Security(IJCSIS) vol 14 2016
[10] H Tan D Ostry J Zic and S Jha ldquoA confidential and DoS-resistant multi-hop code dissemination protocol for wirelesssensor networksrdquoComputersamp Security vol 32 pp 36ndash55 2013
[11] S M Nam and T H Cho ldquoEnergy efficient method fordetection and prevention of false reports in wireless sensornetworksrdquo in Proceedings of the 8th International Conference onInformation Science and Digital Content Technology (ICIDT rsquo12)pp 766ndash769 Jeju Island South Korea June 2012
[12] S Naik and N Shekokar ldquoConservation of energy in wirelesssensor network by preventing denial of sleep attackrdquo ProcediaComputer Science vol 45 pp 370ndash379 2015
[13] C-T Hsueh C-Y Wen and Y-C Ouyang ldquoA secure schemeagainst power exhausting attacks in hierarchical wireless sensornetworksrdquo IEEE Sensors Journal vol 15 no 6 pp 3590ndash36022015
[14] S Kaur andM Ataullah ldquoSecuring the wireless sensor networkfrom denial of sleep attack by isolating the nodesrdquo InternationalJournal of Computer Applications vol 103 no 1 pp 29ndash33 2014
[15] S Shamshirband A Amini N B Anuar M L Mat Kiah Y WTeh and S Furnell ldquoD-FICCA a density-based fuzzy imperi-alist competitive clustering algorithm for intrusion detection inwireless sensor networksrdquo Measurement vol 55 pp 212ndash2262014
[16] S Shamshirband A Patel N B Anuar M L M Kiah andA Abraham ldquoCooperative game theoretic approach usingfuzzy Q-learning for detecting and preventing intrusions inwireless sensor networksrdquo Engineering Applications of ArtificialIntelligence vol 32 pp 228ndash241 2014
[17] N K Sreelaja and G A Vijayalakshmi Pai ldquoSwarm intelligencebased approach for sinkhole attack detection in wireless sensornetworksrdquo Applied Soft Computing Journal vol 19 pp 68ndash792014
[18] G Keerthana and G Padmavathi ldquoDetecting sinkhole attackin wireless sensor network using enhanced particle swarmoptimization techniquerdquo International Journal of Security andIts Applications vol 10 no 3 pp 41ndash54 2016
[19] A Saeed A Ahmadinia A Javed and H Larijani ldquoRandomneural network based intelligent intrusion detection forwirelesssensor networksrdquo Procedia Computer Science vol 80 pp 2372ndash2376 2016
[20] D Management ldquoRSA Algorithmrdquo 2016 httpwwwdi-mgtcomaursa alghtml
[21] M Zhao Y Li and W Wang ldquoModeling and analyticalstudy of link properties in multihop wireless networksrdquo IEEETransactions on Communications vol 60 no 2 pp 445ndash4552012
[22] C-T Hsueh C-Y Wen and Y-C Ouyang ldquoA secure schemeagainst power exhausting attacks in hierarchical wireless sensornetworksrdquo IEEE Sensors Journal vol 15 no 6 pp 3590ndash36022015
[23] D N S Swapna Naik ldquoConservation of energy in wireless sen-sor network by preventing denial of sleep attackrdquo in Proceedingsof the International Conference on Advanced Computing Tech-nologies and Applications (ICACTA rsquo15) pp 370ndash379 MumbaiIndia March 2015
International Journal of
AerospaceEngineeringHindawi Publishing Corporationhttpwwwhindawicom Volume 2014
RoboticsJournal of
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Active and Passive Electronic Components
Control Scienceand Engineering
Journal of
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
International Journal of
RotatingMachinery
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Hindawi Publishing Corporation httpwwwhindawicom
Journal ofEngineeringVolume 2014
Submit your manuscripts athttpswwwhindawicom
VLSI Design
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Shock and Vibration
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Civil EngineeringAdvances in
Acoustics and VibrationAdvances in
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Electrical and Computer Engineering
Journal of
Advances inOptoElectronics
Hindawi Publishing Corporation httpwwwhindawicom
Volume 2014
The Scientific World JournalHindawi Publishing Corporation httpwwwhindawicom Volume 2014
SensorsJournal of
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Modelling amp Simulation in EngineeringHindawi Publishing Corporation httpwwwhindawicom Volume 2014
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Chemical EngineeringInternational Journal of Antennas and
Propagation
International Journal of
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Navigation and Observation
International Journal of
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
DistributedSensor Networks
International Journal of
8 Security and Communication Networks
0
20
40
60
80
100
05 1 15 2 25 3 35 4
Ener
gy co
nsum
ptio
n (m
JSec
)
Attack interval
X-MACZKP
GA-DoSLDTE2S
Figure 4 Comparison of normalized energy consumption for theexisting and the proposed methods
0
200
400
600
800
1000
1200
1400
X-MACZKP
GA-DoSLD
05 1 15 2 25 3 35 4Attack interval
Effec
tive p
acke
t num
ber (
pack
et3
sec)
TE2S
Figure 5 Comparison of packet number versus attack interval
43 End-to-End Delay The end-to-end delay is defined asthe average time consumed for transmitting the packets Theanalysis of end-to-end delay with respect to the packet size isrepresented in Figure 6 From the figure it is clear that whencompared to existing X-MAC ZKP and TE2S algorithms thesuggested GA-DoSLD algorithm provides a minimal end-to-end delay for the variable packet sizes
44 Average Energy Consumption The average energy con-sumption is the amount of energy consumed by the algo-rithms for transmitting the data packets The comparison ofaverage energy consumption for the existing X-MAC ZKPTE2S schemes and the proposed GA-DoSLD algorithm isrepresented in Figure 7 From the figure it is clear that thesuggested GA-DoSLD algorithm provides minimal energyconsumption than the existing schemes
005
115
225
335
128 256 384 512 640Packet size
X-MACZKP
GA-DoSLD
End-
to-e
nd d
elay
(sec
onds
)
4
TE2S
Figure 6 Comparison of end-to-end delay versus packet size for theexisting and the proposed methods
0
05
1
15
2
25
10 20 30 40 50 60 70Simulation time (ms)
X-MACZKP
GA-DoSLD
Aver
age e
nerg
y co
nsum
ptio
n (J
S)
TE2S
Figure 7 Analysis of average energy consumption versus simula-tion time for the existing and the proposed methods
45 Packet Delivery Ratio The packet delivery ratio (PDR) isdefined as the ratio of the number of data packets successfullydelivered to the destination node to the number of datapackets transmitted from the source The estimation of thePDR is based on the following equation
PDR = 119875119877 lowast 100sum119899119886minus1
119875Gen119886
(9)
where 119875119877 represents the number of data packets received atthe destination node 119875Gen is the total number of data packetsgenerated by the source nodes and 119899 denotes the numberof sensor nodes The comparison of PDR with respect to thesimulation time is represented in Figure 8
From the figure it is analyzed that when compared to theexisting X-MAC ZKP and TE2S schemes the proposed GA-DoSLD algorithm provides higher PDR
Security and Communication Networks 9
0
20
40
60
80
100
5 10 15 20 25 30 35 40 45 50
Pack
et d
eliv
ery
ratio
()
Simulation time (ms)
X-MACZKP
GA-DoSLDTE2S
Figure 8 Comparison of packet delivery ratio versus simulationtime for the existing and proposed schemes
46 Throughput Performance for Various Packet SendingRates The effectiveness of the protocol depends on thesuccessful reception and transmission of data packets underthe various sending rates such as 1 packet3 seconds 1packet5 seconds and 1 packet7 seconds [22] In this paperthe packet sending rate of 1 packet3 seconds is taken tovalidate the performance of proposed work The estimationof the throughput ratio is based on the following equation
Throughput ratio = 119875NS119875NT (10)
where 119875NS denotes the packet number under simulation sce-nario and 119875NT represents the packet number delivered underthe theoretical scenarioThe superiority of the suggested GA-DoSLD algorithm is validated against the existing algorithmssuch as X-MAC ZKP and TE2P for a packer rate of 1 packetper 3 seconds Figure 9 represents the comparison of thethroughput ratio with respect to the variable attack interval
From the figure it is clear that the suggested GA-DoSLDalgorithm provides higher throughput than the existing algo-rithms under the packet sending rate of 1 packet3 seconds
5 Conclusion and Future Work
In this paper an efficient GA-DoSLD algorithm is proposedfor generating the DoSL attack profiles from multiple sensornodes such that the attacker nodes can be prevented from thecommunication process Initially a WSN is simulated with100 numbers of static sensor nodes then the BS performs theoperations such as key pair generation and behaviormonitor-ing in parallel The base station monitors the behavior of thesensor nodes and initializes every behavior as a chromosomeThe MRSA algorithm is implemented in the base stationfor generating and distributing the key pair among thesensor nodes Before initiating the communication betweenthe sensor nodes the AODV routing protocol estimates theoptimal route To validate the trustworthiness of the relaynodes in the route the fitness value is estimated for every
0
5000
10000
15000
20000
25000
30000
35000
40000
45000
50000
05 1 15 2 25 3 35 4Attack interval (secs)
X-MACZKP
GA-DoSLDTh
roug
hput
for t
he p
acke
t sen
ding
rate
of 1
pac
ket3
seco
nds
TE2P
Figure 9 Comparison of throughput under packet sending rate of1 packet3 seconds versus attack interval
chromosome If the chromosome is determined as unusualit is validated against the existing attack profiles If there doesnot exist a match the pair of chromosomes is subjected tothe crossover and mutation operations The resultant chro-mosomes are added to the existing chromosomes Finally theBS determines the attacker nodes broadcasting the blockedinformation to all the sensor nodes in the network To provethe superiority of the suggested GA-DoSLD algorithm itis compared against the existing X-MAC ZKP and TE2Sschemes for the metrics such as normalized energy con-sumption effective packet number end-to-end delay averageenergy consumption packet delivery ratio and throughputratio versus packet rate The validation results prove thatwhen compared to the existing schemes the proposedalgorithm provides optimal results for all the metrics Therepeated execution of the GA-DoSLD algorithm in the sensornodes consumes a considerable amount of energy Thus toachieve the energy optimization a different soft computingalgorithm other than GA can be used in future for detectingthe denial-of-sleep attack in the WSN environment
Notations
119873 Expected number of hops119867 Number of hops between the source anddestination119864 Number of neighbors at the higher tiers119877119888 Expected number of neighbors at 119888th hop119862119887 Additional coverage index of the nodewith 119887 neighbors119882ac Weight accuracy
10 Security and Communication Networks
119877ac Accuracy relative119882oc Occurrence119877oc Relative weight of occurrence
Competing Interests
The authors declare that there is no conflict of interestsregarding the publication of this paper
References
[1] V C Manju S L Senthil Lekha and M Sasi Kumar ldquoMech-anisms for detecting and preventing denial of sleep attacks onwireless sensor networksrdquo in Proceedings of the IEEE Conferenceon Information and Communication Technologies (ICT rsquo13) pp74ndash77 Tamil Nadu India April 2013
[2] D R Raymond R C Marchany M I Brownfield and S FMidkiff ldquoEffects of denial-of-sleep attacks on wireless sensornetworkMAC protocolsrdquo IEEE Transactions on Vehicular Tech-nology vol 58 no 1 pp 367ndash380 2009
[3] R P Manohar and E Baburaj ldquoDetection of Stealthy Denialof Service (S-DoS) attacks in wireless sensor networksrdquo Inter-national Journal of Computer Science and Information Security(IJCSIS) vol 14 pp 343ndash348 2016
[4] D Mansouri L Mokddad J Ben-Othman and M IoualalenldquoPreventing denial of service attacks in wireless sensor net-worksrdquo in Proceedings of the IEEE International Conference onCommunications (ICC rsquo15) pp 3014ndash3019 London UK June2015
[5] D Mansouri L Mokdad J Ben-Othman and M IoualalenldquoDetecting DoS attacks in WSN based on clustering tech-niquerdquo in Proceedings of the IEEEWireless Communications andNetworking Conference (WCNC rsquo13) pp 2214ndash2219 ShanghaiChina April 2013
[6] J-L Chen Y-W Ma X Wang Y-M Huang and Y-F LaildquoTime-division secret key protocol for wireless sensor network-ingrdquo Institution of Engineering andTechnology Communicationsvol 5 no 12 pp 1720ndash1726 2011
[7] D He C Chen S Chan and J Bu ldquoDiCode DoS-resistant anddistributed code dissemination in wireless sensor networksrdquoIEEE Transactions on Wireless Communications vol 11 no 5pp 1946ndash1956 2012
[8] G Han J Jiang W Shen L Shu and J Rodrigues ldquoIDSEP anovel intrusion detection scheme based on energy predictionin cluster-based wireless sensor networksrdquo IET InformationSecurity vol 7 no 2 pp 97ndash105 2013
[9] E B Ram Pradheep Manohar ldquoDetection of stealthy denialof service (S-DoS) attacks in wireless sensor networksrdquo Inter-national Journal of Computer Science and Information Security(IJCSIS) vol 14 2016
[10] H Tan D Ostry J Zic and S Jha ldquoA confidential and DoS-resistant multi-hop code dissemination protocol for wirelesssensor networksrdquoComputersamp Security vol 32 pp 36ndash55 2013
[11] S M Nam and T H Cho ldquoEnergy efficient method fordetection and prevention of false reports in wireless sensornetworksrdquo in Proceedings of the 8th International Conference onInformation Science and Digital Content Technology (ICIDT rsquo12)pp 766ndash769 Jeju Island South Korea June 2012
[12] S Naik and N Shekokar ldquoConservation of energy in wirelesssensor network by preventing denial of sleep attackrdquo ProcediaComputer Science vol 45 pp 370ndash379 2015
[13] C-T Hsueh C-Y Wen and Y-C Ouyang ldquoA secure schemeagainst power exhausting attacks in hierarchical wireless sensornetworksrdquo IEEE Sensors Journal vol 15 no 6 pp 3590ndash36022015
[14] S Kaur andM Ataullah ldquoSecuring the wireless sensor networkfrom denial of sleep attack by isolating the nodesrdquo InternationalJournal of Computer Applications vol 103 no 1 pp 29ndash33 2014
[15] S Shamshirband A Amini N B Anuar M L Mat Kiah Y WTeh and S Furnell ldquoD-FICCA a density-based fuzzy imperi-alist competitive clustering algorithm for intrusion detection inwireless sensor networksrdquo Measurement vol 55 pp 212ndash2262014
[16] S Shamshirband A Patel N B Anuar M L M Kiah andA Abraham ldquoCooperative game theoretic approach usingfuzzy Q-learning for detecting and preventing intrusions inwireless sensor networksrdquo Engineering Applications of ArtificialIntelligence vol 32 pp 228ndash241 2014
[17] N K Sreelaja and G A Vijayalakshmi Pai ldquoSwarm intelligencebased approach for sinkhole attack detection in wireless sensornetworksrdquo Applied Soft Computing Journal vol 19 pp 68ndash792014
[18] G Keerthana and G Padmavathi ldquoDetecting sinkhole attackin wireless sensor network using enhanced particle swarmoptimization techniquerdquo International Journal of Security andIts Applications vol 10 no 3 pp 41ndash54 2016
[19] A Saeed A Ahmadinia A Javed and H Larijani ldquoRandomneural network based intelligent intrusion detection forwirelesssensor networksrdquo Procedia Computer Science vol 80 pp 2372ndash2376 2016
[20] D Management ldquoRSA Algorithmrdquo 2016 httpwwwdi-mgtcomaursa alghtml
[21] M Zhao Y Li and W Wang ldquoModeling and analyticalstudy of link properties in multihop wireless networksrdquo IEEETransactions on Communications vol 60 no 2 pp 445ndash4552012
[22] C-T Hsueh C-Y Wen and Y-C Ouyang ldquoA secure schemeagainst power exhausting attacks in hierarchical wireless sensornetworksrdquo IEEE Sensors Journal vol 15 no 6 pp 3590ndash36022015
[23] D N S Swapna Naik ldquoConservation of energy in wireless sen-sor network by preventing denial of sleep attackrdquo in Proceedingsof the International Conference on Advanced Computing Tech-nologies and Applications (ICACTA rsquo15) pp 370ndash379 MumbaiIndia March 2015
International Journal of
AerospaceEngineeringHindawi Publishing Corporationhttpwwwhindawicom Volume 2014
RoboticsJournal of
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Active and Passive Electronic Components
Control Scienceand Engineering
Journal of
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
International Journal of
RotatingMachinery
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Hindawi Publishing Corporation httpwwwhindawicom
Journal ofEngineeringVolume 2014
Submit your manuscripts athttpswwwhindawicom
VLSI Design
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Shock and Vibration
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Civil EngineeringAdvances in
Acoustics and VibrationAdvances in
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Electrical and Computer Engineering
Journal of
Advances inOptoElectronics
Hindawi Publishing Corporation httpwwwhindawicom
Volume 2014
The Scientific World JournalHindawi Publishing Corporation httpwwwhindawicom Volume 2014
SensorsJournal of
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Modelling amp Simulation in EngineeringHindawi Publishing Corporation httpwwwhindawicom Volume 2014
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Chemical EngineeringInternational Journal of Antennas and
Propagation
International Journal of
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Navigation and Observation
International Journal of
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
DistributedSensor Networks
International Journal of
Security and Communication Networks 9
0
20
40
60
80
100
5 10 15 20 25 30 35 40 45 50
Pack
et d
eliv
ery
ratio
()
Simulation time (ms)
X-MACZKP
GA-DoSLDTE2S
Figure 8 Comparison of packet delivery ratio versus simulationtime for the existing and proposed schemes
46 Throughput Performance for Various Packet SendingRates The effectiveness of the protocol depends on thesuccessful reception and transmission of data packets underthe various sending rates such as 1 packet3 seconds 1packet5 seconds and 1 packet7 seconds [22] In this paperthe packet sending rate of 1 packet3 seconds is taken tovalidate the performance of proposed work The estimationof the throughput ratio is based on the following equation
Throughput ratio = 119875NS119875NT (10)
where 119875NS denotes the packet number under simulation sce-nario and 119875NT represents the packet number delivered underthe theoretical scenarioThe superiority of the suggested GA-DoSLD algorithm is validated against the existing algorithmssuch as X-MAC ZKP and TE2P for a packer rate of 1 packetper 3 seconds Figure 9 represents the comparison of thethroughput ratio with respect to the variable attack interval
From the figure it is clear that the suggested GA-DoSLDalgorithm provides higher throughput than the existing algo-rithms under the packet sending rate of 1 packet3 seconds
5 Conclusion and Future Work
In this paper an efficient GA-DoSLD algorithm is proposedfor generating the DoSL attack profiles from multiple sensornodes such that the attacker nodes can be prevented from thecommunication process Initially a WSN is simulated with100 numbers of static sensor nodes then the BS performs theoperations such as key pair generation and behaviormonitor-ing in parallel The base station monitors the behavior of thesensor nodes and initializes every behavior as a chromosomeThe MRSA algorithm is implemented in the base stationfor generating and distributing the key pair among thesensor nodes Before initiating the communication betweenthe sensor nodes the AODV routing protocol estimates theoptimal route To validate the trustworthiness of the relaynodes in the route the fitness value is estimated for every
0
5000
10000
15000
20000
25000
30000
35000
40000
45000
50000
05 1 15 2 25 3 35 4Attack interval (secs)
X-MACZKP
GA-DoSLDTh
roug
hput
for t
he p
acke
t sen
ding
rate
of 1
pac
ket3
seco
nds
TE2P
Figure 9 Comparison of throughput under packet sending rate of1 packet3 seconds versus attack interval
chromosome If the chromosome is determined as unusualit is validated against the existing attack profiles If there doesnot exist a match the pair of chromosomes is subjected tothe crossover and mutation operations The resultant chro-mosomes are added to the existing chromosomes Finally theBS determines the attacker nodes broadcasting the blockedinformation to all the sensor nodes in the network To provethe superiority of the suggested GA-DoSLD algorithm itis compared against the existing X-MAC ZKP and TE2Sschemes for the metrics such as normalized energy con-sumption effective packet number end-to-end delay averageenergy consumption packet delivery ratio and throughputratio versus packet rate The validation results prove thatwhen compared to the existing schemes the proposedalgorithm provides optimal results for all the metrics Therepeated execution of the GA-DoSLD algorithm in the sensornodes consumes a considerable amount of energy Thus toachieve the energy optimization a different soft computingalgorithm other than GA can be used in future for detectingthe denial-of-sleep attack in the WSN environment
Notations
119873 Expected number of hops119867 Number of hops between the source anddestination119864 Number of neighbors at the higher tiers119877119888 Expected number of neighbors at 119888th hop119862119887 Additional coverage index of the nodewith 119887 neighbors119882ac Weight accuracy
10 Security and Communication Networks
119877ac Accuracy relative119882oc Occurrence119877oc Relative weight of occurrence
Competing Interests
The authors declare that there is no conflict of interestsregarding the publication of this paper
References
[1] V C Manju S L Senthil Lekha and M Sasi Kumar ldquoMech-anisms for detecting and preventing denial of sleep attacks onwireless sensor networksrdquo in Proceedings of the IEEE Conferenceon Information and Communication Technologies (ICT rsquo13) pp74ndash77 Tamil Nadu India April 2013
[2] D R Raymond R C Marchany M I Brownfield and S FMidkiff ldquoEffects of denial-of-sleep attacks on wireless sensornetworkMAC protocolsrdquo IEEE Transactions on Vehicular Tech-nology vol 58 no 1 pp 367ndash380 2009
[3] R P Manohar and E Baburaj ldquoDetection of Stealthy Denialof Service (S-DoS) attacks in wireless sensor networksrdquo Inter-national Journal of Computer Science and Information Security(IJCSIS) vol 14 pp 343ndash348 2016
[4] D Mansouri L Mokddad J Ben-Othman and M IoualalenldquoPreventing denial of service attacks in wireless sensor net-worksrdquo in Proceedings of the IEEE International Conference onCommunications (ICC rsquo15) pp 3014ndash3019 London UK June2015
[5] D Mansouri L Mokdad J Ben-Othman and M IoualalenldquoDetecting DoS attacks in WSN based on clustering tech-niquerdquo in Proceedings of the IEEEWireless Communications andNetworking Conference (WCNC rsquo13) pp 2214ndash2219 ShanghaiChina April 2013
[6] J-L Chen Y-W Ma X Wang Y-M Huang and Y-F LaildquoTime-division secret key protocol for wireless sensor network-ingrdquo Institution of Engineering andTechnology Communicationsvol 5 no 12 pp 1720ndash1726 2011
[7] D He C Chen S Chan and J Bu ldquoDiCode DoS-resistant anddistributed code dissemination in wireless sensor networksrdquoIEEE Transactions on Wireless Communications vol 11 no 5pp 1946ndash1956 2012
[8] G Han J Jiang W Shen L Shu and J Rodrigues ldquoIDSEP anovel intrusion detection scheme based on energy predictionin cluster-based wireless sensor networksrdquo IET InformationSecurity vol 7 no 2 pp 97ndash105 2013
[9] E B Ram Pradheep Manohar ldquoDetection of stealthy denialof service (S-DoS) attacks in wireless sensor networksrdquo Inter-national Journal of Computer Science and Information Security(IJCSIS) vol 14 2016
[10] H Tan D Ostry J Zic and S Jha ldquoA confidential and DoS-resistant multi-hop code dissemination protocol for wirelesssensor networksrdquoComputersamp Security vol 32 pp 36ndash55 2013
[11] S M Nam and T H Cho ldquoEnergy efficient method fordetection and prevention of false reports in wireless sensornetworksrdquo in Proceedings of the 8th International Conference onInformation Science and Digital Content Technology (ICIDT rsquo12)pp 766ndash769 Jeju Island South Korea June 2012
[12] S Naik and N Shekokar ldquoConservation of energy in wirelesssensor network by preventing denial of sleep attackrdquo ProcediaComputer Science vol 45 pp 370ndash379 2015
[13] C-T Hsueh C-Y Wen and Y-C Ouyang ldquoA secure schemeagainst power exhausting attacks in hierarchical wireless sensornetworksrdquo IEEE Sensors Journal vol 15 no 6 pp 3590ndash36022015
[14] S Kaur andM Ataullah ldquoSecuring the wireless sensor networkfrom denial of sleep attack by isolating the nodesrdquo InternationalJournal of Computer Applications vol 103 no 1 pp 29ndash33 2014
[15] S Shamshirband A Amini N B Anuar M L Mat Kiah Y WTeh and S Furnell ldquoD-FICCA a density-based fuzzy imperi-alist competitive clustering algorithm for intrusion detection inwireless sensor networksrdquo Measurement vol 55 pp 212ndash2262014
[16] S Shamshirband A Patel N B Anuar M L M Kiah andA Abraham ldquoCooperative game theoretic approach usingfuzzy Q-learning for detecting and preventing intrusions inwireless sensor networksrdquo Engineering Applications of ArtificialIntelligence vol 32 pp 228ndash241 2014
[17] N K Sreelaja and G A Vijayalakshmi Pai ldquoSwarm intelligencebased approach for sinkhole attack detection in wireless sensornetworksrdquo Applied Soft Computing Journal vol 19 pp 68ndash792014
[18] G Keerthana and G Padmavathi ldquoDetecting sinkhole attackin wireless sensor network using enhanced particle swarmoptimization techniquerdquo International Journal of Security andIts Applications vol 10 no 3 pp 41ndash54 2016
[19] A Saeed A Ahmadinia A Javed and H Larijani ldquoRandomneural network based intelligent intrusion detection forwirelesssensor networksrdquo Procedia Computer Science vol 80 pp 2372ndash2376 2016
[20] D Management ldquoRSA Algorithmrdquo 2016 httpwwwdi-mgtcomaursa alghtml
[21] M Zhao Y Li and W Wang ldquoModeling and analyticalstudy of link properties in multihop wireless networksrdquo IEEETransactions on Communications vol 60 no 2 pp 445ndash4552012
[22] C-T Hsueh C-Y Wen and Y-C Ouyang ldquoA secure schemeagainst power exhausting attacks in hierarchical wireless sensornetworksrdquo IEEE Sensors Journal vol 15 no 6 pp 3590ndash36022015
[23] D N S Swapna Naik ldquoConservation of energy in wireless sen-sor network by preventing denial of sleep attackrdquo in Proceedingsof the International Conference on Advanced Computing Tech-nologies and Applications (ICACTA rsquo15) pp 370ndash379 MumbaiIndia March 2015
International Journal of
AerospaceEngineeringHindawi Publishing Corporationhttpwwwhindawicom Volume 2014
RoboticsJournal of
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Active and Passive Electronic Components
Control Scienceand Engineering
Journal of
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
International Journal of
RotatingMachinery
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Hindawi Publishing Corporation httpwwwhindawicom
Journal ofEngineeringVolume 2014
Submit your manuscripts athttpswwwhindawicom
VLSI Design
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Shock and Vibration
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Civil EngineeringAdvances in
Acoustics and VibrationAdvances in
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Electrical and Computer Engineering
Journal of
Advances inOptoElectronics
Hindawi Publishing Corporation httpwwwhindawicom
Volume 2014
The Scientific World JournalHindawi Publishing Corporation httpwwwhindawicom Volume 2014
SensorsJournal of
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Modelling amp Simulation in EngineeringHindawi Publishing Corporation httpwwwhindawicom Volume 2014
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Chemical EngineeringInternational Journal of Antennas and
Propagation
International Journal of
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Navigation and Observation
International Journal of
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
DistributedSensor Networks
International Journal of
10 Security and Communication Networks
119877ac Accuracy relative119882oc Occurrence119877oc Relative weight of occurrence
Competing Interests
The authors declare that there is no conflict of interestsregarding the publication of this paper
References
[1] V C Manju S L Senthil Lekha and M Sasi Kumar ldquoMech-anisms for detecting and preventing denial of sleep attacks onwireless sensor networksrdquo in Proceedings of the IEEE Conferenceon Information and Communication Technologies (ICT rsquo13) pp74ndash77 Tamil Nadu India April 2013
[2] D R Raymond R C Marchany M I Brownfield and S FMidkiff ldquoEffects of denial-of-sleep attacks on wireless sensornetworkMAC protocolsrdquo IEEE Transactions on Vehicular Tech-nology vol 58 no 1 pp 367ndash380 2009
[3] R P Manohar and E Baburaj ldquoDetection of Stealthy Denialof Service (S-DoS) attacks in wireless sensor networksrdquo Inter-national Journal of Computer Science and Information Security(IJCSIS) vol 14 pp 343ndash348 2016
[4] D Mansouri L Mokddad J Ben-Othman and M IoualalenldquoPreventing denial of service attacks in wireless sensor net-worksrdquo in Proceedings of the IEEE International Conference onCommunications (ICC rsquo15) pp 3014ndash3019 London UK June2015
[5] D Mansouri L Mokdad J Ben-Othman and M IoualalenldquoDetecting DoS attacks in WSN based on clustering tech-niquerdquo in Proceedings of the IEEEWireless Communications andNetworking Conference (WCNC rsquo13) pp 2214ndash2219 ShanghaiChina April 2013
[6] J-L Chen Y-W Ma X Wang Y-M Huang and Y-F LaildquoTime-division secret key protocol for wireless sensor network-ingrdquo Institution of Engineering andTechnology Communicationsvol 5 no 12 pp 1720ndash1726 2011
[7] D He C Chen S Chan and J Bu ldquoDiCode DoS-resistant anddistributed code dissemination in wireless sensor networksrdquoIEEE Transactions on Wireless Communications vol 11 no 5pp 1946ndash1956 2012
[8] G Han J Jiang W Shen L Shu and J Rodrigues ldquoIDSEP anovel intrusion detection scheme based on energy predictionin cluster-based wireless sensor networksrdquo IET InformationSecurity vol 7 no 2 pp 97ndash105 2013
[9] E B Ram Pradheep Manohar ldquoDetection of stealthy denialof service (S-DoS) attacks in wireless sensor networksrdquo Inter-national Journal of Computer Science and Information Security(IJCSIS) vol 14 2016
[10] H Tan D Ostry J Zic and S Jha ldquoA confidential and DoS-resistant multi-hop code dissemination protocol for wirelesssensor networksrdquoComputersamp Security vol 32 pp 36ndash55 2013
[11] S M Nam and T H Cho ldquoEnergy efficient method fordetection and prevention of false reports in wireless sensornetworksrdquo in Proceedings of the 8th International Conference onInformation Science and Digital Content Technology (ICIDT rsquo12)pp 766ndash769 Jeju Island South Korea June 2012
[12] S Naik and N Shekokar ldquoConservation of energy in wirelesssensor network by preventing denial of sleep attackrdquo ProcediaComputer Science vol 45 pp 370ndash379 2015
[13] C-T Hsueh C-Y Wen and Y-C Ouyang ldquoA secure schemeagainst power exhausting attacks in hierarchical wireless sensornetworksrdquo IEEE Sensors Journal vol 15 no 6 pp 3590ndash36022015
[14] S Kaur andM Ataullah ldquoSecuring the wireless sensor networkfrom denial of sleep attack by isolating the nodesrdquo InternationalJournal of Computer Applications vol 103 no 1 pp 29ndash33 2014
[15] S Shamshirband A Amini N B Anuar M L Mat Kiah Y WTeh and S Furnell ldquoD-FICCA a density-based fuzzy imperi-alist competitive clustering algorithm for intrusion detection inwireless sensor networksrdquo Measurement vol 55 pp 212ndash2262014
[16] S Shamshirband A Patel N B Anuar M L M Kiah andA Abraham ldquoCooperative game theoretic approach usingfuzzy Q-learning for detecting and preventing intrusions inwireless sensor networksrdquo Engineering Applications of ArtificialIntelligence vol 32 pp 228ndash241 2014
[17] N K Sreelaja and G A Vijayalakshmi Pai ldquoSwarm intelligencebased approach for sinkhole attack detection in wireless sensornetworksrdquo Applied Soft Computing Journal vol 19 pp 68ndash792014
[18] G Keerthana and G Padmavathi ldquoDetecting sinkhole attackin wireless sensor network using enhanced particle swarmoptimization techniquerdquo International Journal of Security andIts Applications vol 10 no 3 pp 41ndash54 2016
[19] A Saeed A Ahmadinia A Javed and H Larijani ldquoRandomneural network based intelligent intrusion detection forwirelesssensor networksrdquo Procedia Computer Science vol 80 pp 2372ndash2376 2016
[20] D Management ldquoRSA Algorithmrdquo 2016 httpwwwdi-mgtcomaursa alghtml
[21] M Zhao Y Li and W Wang ldquoModeling and analyticalstudy of link properties in multihop wireless networksrdquo IEEETransactions on Communications vol 60 no 2 pp 445ndash4552012
[22] C-T Hsueh C-Y Wen and Y-C Ouyang ldquoA secure schemeagainst power exhausting attacks in hierarchical wireless sensornetworksrdquo IEEE Sensors Journal vol 15 no 6 pp 3590ndash36022015
[23] D N S Swapna Naik ldquoConservation of energy in wireless sen-sor network by preventing denial of sleep attackrdquo in Proceedingsof the International Conference on Advanced Computing Tech-nologies and Applications (ICACTA rsquo15) pp 370ndash379 MumbaiIndia March 2015
International Journal of
AerospaceEngineeringHindawi Publishing Corporationhttpwwwhindawicom Volume 2014
RoboticsJournal of
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Active and Passive Electronic Components
Control Scienceand Engineering
Journal of
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
International Journal of
RotatingMachinery
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Hindawi Publishing Corporation httpwwwhindawicom
Journal ofEngineeringVolume 2014
Submit your manuscripts athttpswwwhindawicom
VLSI Design
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Shock and Vibration
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Civil EngineeringAdvances in
Acoustics and VibrationAdvances in
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Electrical and Computer Engineering
Journal of
Advances inOptoElectronics
Hindawi Publishing Corporation httpwwwhindawicom
Volume 2014
The Scientific World JournalHindawi Publishing Corporation httpwwwhindawicom Volume 2014
SensorsJournal of
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Modelling amp Simulation in EngineeringHindawi Publishing Corporation httpwwwhindawicom Volume 2014
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Chemical EngineeringInternational Journal of Antennas and
Propagation
International Journal of
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Navigation and Observation
International Journal of
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
DistributedSensor Networks
International Journal of
International Journal of
AerospaceEngineeringHindawi Publishing Corporationhttpwwwhindawicom Volume 2014
RoboticsJournal of
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Active and Passive Electronic Components
Control Scienceand Engineering
Journal of
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
International Journal of
RotatingMachinery
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Hindawi Publishing Corporation httpwwwhindawicom
Journal ofEngineeringVolume 2014
Submit your manuscripts athttpswwwhindawicom
VLSI Design
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Shock and Vibration
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Civil EngineeringAdvances in
Acoustics and VibrationAdvances in
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Electrical and Computer Engineering
Journal of
Advances inOptoElectronics
Hindawi Publishing Corporation httpwwwhindawicom
Volume 2014
The Scientific World JournalHindawi Publishing Corporation httpwwwhindawicom Volume 2014
SensorsJournal of
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Modelling amp Simulation in EngineeringHindawi Publishing Corporation httpwwwhindawicom Volume 2014
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Chemical EngineeringInternational Journal of Antennas and
Propagation
International Journal of
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
Navigation and Observation
International Journal of
Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014
DistributedSensor Networks
International Journal of
Top Related