Shielding Wireless Sensor Networks: Unveiling Denial-Of-Service Attacks Through Trust and Isolation Forest

Authors

  • K. Kathirvel Department of Computer Science, Karpagam Academy of Higher Education, Coimbatore-641 021
  • S. Hemalatha Department of Computer Science, Karpagam Academy of Higher Education, Coimbatore-641 021.

Keywords:

Wireless Sensor Network, Security, Trust, DoS attack, Isolation Forest

Abstract

Wireless Sensor Networks (WSNs) plays a pivotal role across various domains, such as environmental monitoring and industrial automation. Nevertheless, their decentralized and resource-constrained nature exposes them to security vulnerabilities, notably Denial of Service (DoS) attacks. Detecting and mitigating such threats in WSNs are imperative to uphold operational reliability. This study introduces an innovative methodology employing the Isolation Forest algorithm for DoS attack classification in WSNs. Trust metrics encompassing reliability, contact intimacy, cooperation, energy consumption, and throughput are gathered from sensor nodes to construct datasets. Through the application of the Isolation Forest algorithm on these datasets, anomalies indicative of DoS attacks are discerned. Leveraging the intrinsic characteristics of isolation trees, the algorithm effectively distinguishes between normal network behavior and malicious activities. The efficacy of the proposed approach is demonstrated through a mathematical model, substantiating its ability to detect and mitigate DoS attacks. Experimental findings further validate the effectiveness of our method in accurately identifying DoS attacks with minimal false positives. This method presents a promising avenue for bolstering WSN security and resilience against DoS attacks, ensuring uninterrupted operation and preserving data integrity in critical applications.

Downloads

Published

2024-05-27

How to Cite

K. Kathirvel, & S. Hemalatha. (2024). Shielding Wireless Sensor Networks: Unveiling Denial-Of-Service Attacks Through Trust and Isolation Forest. Journal of Computational Analysis and Applications (JoCAAA), 33(06), 680–695. Retrieved from http://eudoxuspress.com/index.php/pub/article/view/923

Issue

Section

Articles

Similar Articles

<< < 5 6 7 8 9 10 11 > >> 

You may also start an advanced similarity search for this article.