International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 109 | Views: 240

Research Paper | Electronics & Communication Engineering | India | Volume 3 Issue 9, September 2014 | Popularity: 6.2 / 10


     

Secure Code Marking in Internet Protocol Header to Mitigate Distributed Denial of Service Attacks in Wireless Sensor Network

Shivati Mahajan, Khushneet Kaur


Abstract: Wireless sensors are manufactured with small energy efficient microcontrollers to enhance their battery life. The small microcontrollers are equipped with smaller memory for embedded Operating System and smaller random access memory, which hinders them from installing effective and heavy security solutions. Taking this problem into account, we have proposed a new security model for wireless sensors, which equips less memory and does not affect their battery life. The proposed model is using distributed secure code marking examination in the IP packet header on all individual Wireless Sensor Nodes to mitigate the Distributed Denial Of Service (DDoS) attack by block the traffic coming from the comprimised sources within the network or outside of the network. The new technique has been proved effective as it adds less amount of computational load on the host WSN node and lowers the delay caused by the DDoS attack mitigation computations on each packet received. The proposed model scan the ingress traffic and mitigate the DDoS attack by matching the secure code markings on the IP packet headers.


Keywords: DDoS Distributed Denial Of Services, WSN Wireless Sensor Network, TTL Time To Live, IP Internet Protocol, OS Operating System


Edition: Volume 3 Issue 9, September 2014


Pages: 929 - 933



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Shivati Mahajan, Khushneet Kaur, "Secure Code Marking in Internet Protocol Header to Mitigate Distributed Denial of Service Attacks in Wireless Sensor Network", International Journal of Science and Research (IJSR), Volume 3 Issue 9, September 2014, pp. 929-933, https://www.ijsr.net/getabstract.php?paperid=SEP14185, DOI: https://www.doi.org/10.21275/SEP14185