Denial-of-Service Attacks on Wireless Sensor Network and Defense Techniques

被引:21
|
作者
Ul Islam, Mohammad Nafis [1 ]
Fahmin, Ahmed [2 ]
Hossain, Md Shohrab [3 ]
Atiquzzaman, Mohammed [4 ]
机构
[1] Univ Melbourne, Sch Comp & Informat Syst, Melbourne, Vic, Australia
[2] United Int Univ, Dept Comp Sci & Engn, Dhaka, Bangladesh
[3] Bangladesh Univ Engn & Technol, Dept Comp Sci & Engn, Dhaka, Bangladesh
[4] Univ Oklahoma, Sch Comp Sci, Norman, OK 73019 USA
关键词
Denial-of-service; Wireless sensor network; Attacks; Defense; Analysis; ACCESS-CONTROL; SECURITY; INTERNET; AUTOMATION; PROTOCOLS; THINGS; WSN;
D O I
10.1007/s11277-020-07776-3
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
The basic characteristic of a wireless sensor network is to sense the environment and to gather different types of data. It is used in various vital sectors, such as military, health-care, traffic monitoring, and so on. This provides many helpful data about these fields, which is used in implementing new technologies for them. However, there are numerous challenges and risks, regarding the security vulnerability of a wireless sensor network. This is because the resources of a wireless sensor network are very low (for example, low power, low computational resources, low storage, etc.). These constraints make them susceptible to different kinds of security attacks, especially the denial of service attacks. In this survey, we have outlined different kinds of DoS attacks in different layers of the hybrid layering model. We have also presented different defense mechanisms to protect/mitigate these attacks at different layers. Layer by layer analysis makes it easy to distinguish among different types of attacks and their defense techniques, along with the characteristics of the layers. Analysis of the critical issues of these attacks and defenses are finally presented with possible measures. This survey work can be very beneficial for the researchers and engineers in designing WSN topology with ensured security.
引用
收藏
页码:1993 / 2021
页数:29
相关论文
共 50 条
  • [21] Containing Denial-of-Service Attacks in Broadcast Authentication in Sensor Networks
    Wang, Ronghua
    Du, Wenliang
    Ning, Peng
    MOBIHOC'07: PROCEEDINGS OF THE EIGHTH ACM INTERNATIONAL SYMPOSIUM ON MOBILE AD HOC NETWORKING AND COMPUTING, 2007, : 71 - 79
  • [22] Synergetic Denial-of-Service Attacks and Defense in Underwater Named Data Networking
    Li, Yue
    Liu, Yingjian
    Wang, Yu
    Guo, Zhongwen
    Yin, Haoyu
    Teng, Hao
    IEEE INFOCOM 2020 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS, 2020, : 1569 - 1578
  • [23] An extended evaluation on machine learning techniques for Denial-of-Service detection in Wireless Sensor Networks
    Quincozes, Silvio E.
    Kazienko, Juliano F.
    Quincozes, Vagner E.
    INTERNET OF THINGS, 2023, 22
  • [24] Defense Denial-of Service Attacks on IPv6 Wireless Sensor Networks
    Chen, Chia-Mei
    Hsu, Sung-Chien
    Lai, Gu-Hsin
    GENETIC AND EVOLUTIONARY COMPUTING, VOL I, 2016, 387 : 319 - 326
  • [25] Empirical study of tolerating Denial-of-Service attacks with a proxy network
    Wang, J
    Liu, X
    Chien, AA
    USENIX Association Proceedings of the 14th USENIX Security Symposium, 2005, : 51 - 64
  • [26] Investigation of Simple Denial-of-Service Attacks
    Voitovych, Olesya
    Baryshev, Yurii
    Kolibabchuk, Eduard
    Kupershtein, Leonid
    2016 THIRD INTERNATIONAL SCIENTIFIC-PRACTICAL CONFERENCE PROBLEMS OF INFOCOMMUNICATIONS SCIENCE AND TECHNOLOGY (PIC S&T), 2016, : 145 - 148
  • [27] Prevention of Denial-of-Service Attacks in Garbled Routing (GR) Network
    Madani, Shaahin
    Khalil, Ibrahim
    2013 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATION, NETWORKS AND SATELLITE (COMNETSAT), 2013, : 105 - 109
  • [28] Denial-of-service attacks and countermeasures on BitTorrent
    Lehmann, Matheus Brenner
    Santos, Flavio Roberto
    Gaspary, Luciano Paschoal
    Barcellos, Marinho Pilla
    COMPUTER NETWORKS, 2012, 56 (15) : 3479 - 3498
  • [29] Optimizing the pulsing denial-of-service attacks
    Luo, XP
    Chang, RKC
    2005 INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, PROCEEDINGS, 2005, : 582 - 591
  • [30] Denial-of-service attacks rip the Internet
    Garber, L
    COMPUTER, 2000, 33 (04) : 12 - 17