Threshold Based Algorithm for the Detection of DDOS Attack in Wireless Sensor Networks
Poonam Sharma1, Megha Sharma2
1Poonam Sharma, Research Scholar, Sirda Group of Institutions Naulakha, Himachal Pradesh, India.
2Megha Sharma, Assistant Professor, Sirda Group of Institutions Naulakha, Himachal Pradesh, India.

Manuscript received on November 15, 2019. | Revised Manuscript received on November 23, 2019. | Manuscript published on November 30, 2019. | PP: 1879-1873 | Volume-8 Issue-4, November 2019. | Retrieval Number: C4158098319/2019©BEIESP | DOI: 10.35940/ijrte.C4158.118419

Open Access | Ethics and Policies | Cite  | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: The self-configuring type of network in which the sensor node are deployed in such a manner that they can join or leave the network when they want is known as wireless sensor network. The nodes start communicating with each other in order to transmit important information within the network. As this type of network is decentralized in nature there are numerous malicious nodes which might enter the network. There are so many attacks possible on WSN, in Distributed Denial of Service (DDOS) attacks, malicious nodes adapts many attacks such as flooding attack, black hole attack and warm hole attack, to halt the overall functioning of network. The risks are even more when we talk about military and industrial applications. The DDoS is an active type of attack. When the DDoS attack occurs in the network, it minimizes the lifetime of the network and also increases the overall energy consumption of the network. In order to detect the malicious nodes from the network which cause the DDoS attack, a novel approach is to be proposed in this research work.
Keywords: DdoS, WSN, Threshold.
Scope of the Article: Energy Harvesting and Transfer for Wireless Sensor Networks.