Title: Enhancing dependability of wireless sensor network under flooding attack: a machine learning perspective

Authors: Jasminder Kaur Sandhu; Anil Kumar Verma; Prashant Singh Rana

Addresses: Computer Science and Engineering Department, Thapar Institute of Engineering and Technology, Patiala-147001, Punjab, India ' Computer Science and Engineering Department, Thapar Institute of Engineering and Technology, Patiala-147001, Punjab, India ' Computer Science and Engineering Department, Thapar Institute of Engineering and Technology, Patiala-147001, Punjab, India

Abstract: The wireless sensor network (WSN) is gaining paramount importance due to its application in real-time monitoring of vast geographical regions. The deployment paradigm shift is taking place from mobile computing to data science. Bridging the two technologies results in the development of dependable network in which security plays a pivotal role. This work considers the flooding attack which causes the communication failure. To detect this attack, an intrusion detection system (IDS) based on the randomised and the normalised deployment of nodes is proposed. Furthermore, machine learning techniques are implemented to enhance the dependability of network under flooding attack. The data flow is a significant parameter for governing the flooding effect on the network. It is found that machine learning models play a significant role in the prediction of the data flow. The experiments on simulated dataset underline the role of machine learning model for data flow prediction on the normalised dataset.

Keywords: machine learning; wireless sensor networks; WSNs; dependability; security; flooding attack; data flow; intrusion detection system; IDS; watchdog; packet delivery ratio; PDR; randomised deployment; normalised deployment.

DOI: 10.1504/IJAHUC.2020.105461

International Journal of Ad Hoc and Ubiquitous Computing, 2020 Vol.33 No.2, pp.73 - 89

Received: 20 Apr 2018
Accepted: 26 Sep 2018

Published online: 02 Mar 2020 *

Full-text access for editors Full-text access for subscribers Purchase this article Comment on this article