Open Access
ARTICLE
Novel DoS Attack Detection Based on Trust Mode Authentication for IoT
1 Department of Computer Science and Engineering, Cihan University, Duhok, Kurdistan Region, Iraq
2 Department of Computer Science and Engineering, M.I.E.T Engineering College, Trichy, Tamilnadu, India
3 School of Computer Science and Engineering, Vellore Institute of Technology, Chennai, India
4 Department Electronics and Communication Engineering, SACS MAVMM Engineering College, Madurai, Tamilnadu, India
5 School of Computer Science and Engineering, Vellore Institute of Technology, Chennai, India
6 Department of Electronics and Communications Engineering, Kuwait College of Science and Technology (KCST), Kuwait
7 Department of Information Technology, Qala University College, Erbil, Kurdistan Region, Iraq
8 Research Center, Labanese French University, Erbil, Iraq
* Corresponding Author: S. Shanmuga Priya. Email:
Intelligent Automation & Soft Computing 2022, 34(3), 1505-1522. https://doi.org/10.32604/iasc.2022.022151
Received 29 July 2021; Accepted 09 December 2021; Issue published 25 May 2022
Abstract
Wireless sensor networks are extensively utilized as a communication mechanism in the field of the Internet of Things (IoT). Along with these services, numerous IoT based applications need stabilized transmission or delivery over unbalanced wireless connections. To ensure the stability of data packets delivery, prevailing works exploit diverse geographical routing with multi-hop forwarders in WSNs. Furthermore, critical Denial of Service (DoS) attacks frequently has an impact on these techniques, where an enormous amount of invalid data starts replicating and transmitted to receivers to prevent Wireless Sensor Networks (WSN) communication. In this investigation, a novel adaptive endorsement method is designed by combining dimensionality reduction based Hilbert-Huang Transformation (DR-HHT) and authentication trust mode (ATM). DR-HHT and ATM defend against the severity of DoS attacks, by fulfilling trust, reliability, stability requirements. ATM also examines the state information (SI) of nodes in wireless links; this SI leverages the performance of ATM to enhance data delivery effectually. Dissimilar to existing routing protocols, DR-HHT and ATM guarantee data integrity by building Kolmogorov_Smirnov based authentication algorithms. Concerning the correlation coefficient, this model isolates DoS attacks and diminishes computational cost. This strategy also eliminates duplicate data transmission and redundant information, offering an effectual trust-based evaluation model from adaptive authentication. Extensive simulation demonstrates that the anticipated model shows a better trade-off than the prevailing techniques and the simulation is carried out in a MATLAB environment.Keywords
Cite This Article
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.