Denial-of-Service Attacks on Wireless Sensor Network and Defense Techniques

被引:21
|
作者
Ul Islam, Mohammad Nafis [1 ]
Fahmin, Ahmed [2 ]
Hossain, Md Shohrab [3 ]
Atiquzzaman, Mohammed [4 ]
机构
[1] Univ Melbourne, Sch Comp & Informat Syst, Melbourne, Vic, Australia
[2] United Int Univ, Dept Comp Sci & Engn, Dhaka, Bangladesh
[3] Bangladesh Univ Engn & Technol, Dept Comp Sci & Engn, Dhaka, Bangladesh
[4] Univ Oklahoma, Sch Comp Sci, Norman, OK 73019 USA
关键词
Denial-of-service; Wireless sensor network; Attacks; Defense; Analysis; ACCESS-CONTROL; SECURITY; INTERNET; AUTOMATION; PROTOCOLS; THINGS; WSN;
D O I
10.1007/s11277-020-07776-3
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
The basic characteristic of a wireless sensor network is to sense the environment and to gather different types of data. It is used in various vital sectors, such as military, health-care, traffic monitoring, and so on. This provides many helpful data about these fields, which is used in implementing new technologies for them. However, there are numerous challenges and risks, regarding the security vulnerability of a wireless sensor network. This is because the resources of a wireless sensor network are very low (for example, low power, low computational resources, low storage, etc.). These constraints make them susceptible to different kinds of security attacks, especially the denial of service attacks. In this survey, we have outlined different kinds of DoS attacks in different layers of the hybrid layering model. We have also presented different defense mechanisms to protect/mitigate these attacks at different layers. Layer by layer analysis makes it easy to distinguish among different types of attacks and their defense techniques, along with the characteristics of the layers. Analysis of the critical issues of these attacks and defenses are finally presented with possible measures. This survey work can be very beneficial for the researchers and engineers in designing WSN topology with ensured security.
引用
收藏
页码:1993 / 2021
页数:29
相关论文
共 50 条
  • [31] Scheme for preventing low-level denial-of-service attacks on wireless sensor network-based home automation systems
    Gill, K.
    Yang, S. -H.
    Wang, W.
    IET WIRELESS SENSOR SYSTEMS, 2012, 2 (04) : 361 - 368
  • [32] Securing wireless mobile nodes from distributed denial-of-service attacks
    Varadharajan, Vijay
    Tupakula, Udaya
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2015, 27 (15): : 3794 - 3815
  • [33] Handling Distributed Denial-of-Service Attacks
    Janczewski, Lech J.
    Information Security Technical Report, 2001, 6 (03): : 37 - 44
  • [34] Speculative Denial-of-Service Attacks in Ethereum
    Yaish, Aviv
    Qin, Kaihua
    Zhou, Liyi
    Zohar, Aviv
    Gervais, Arthur
    PROCEEDINGS OF THE 33RD USENIX SECURITY SYMPOSIUM, SECURITY 2024, 2024, : 3531 - 3548
  • [35] Detecting denial of service attacks by analysing network traffic in wireless sensor networks
    Ragupathy, R. (cse_raghu@yahoo.com), 1600, International Hellenic University - School of Science (07):
  • [36] Design and Development of Proactive Models for Mitigating Denial-of-Service and Distributed Denial-of-Service Attacks
    Nagesh, H. R.
    Sekaran, K. Chandra
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2007, 7 (07): : 168 - 176
  • [37] Machine Learning-Based Detection and Selective Mitigation of Denial-of-Service Attacks in Wireless Sensor Networks
    Joo, Soyoung
    Park, So-Hyun
    Shim, Hye-Yeon
    Oh, Ye-Sol
    Lee, Il-Gu
    CMC-COMPUTERS MATERIALS & CONTINUA, 2025, 82 (02): : 2475 - 2494
  • [38] Machine learning approach for secure communication in wireless video sensor networks against denial-of-service attacks
    Ramesh, Swaminathan
    Yaashuwanth, Calpakkam
    Muthukrishnan, Bala Anand
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2020, 33 (12)
  • [39] Modern Machine Learning for Cyber-Defense and Distributed Denial-of-Service Attacks
    Paffenroth R.C.
    Zhou C.
    IEEE Engineering Management Review, 2019, 47 (04): : 80 - 85
  • [40] Rule-based Defense mechanism against distributed denial-of-service attacks
    Kim, Sung-ju
    Kim, Byung-chul
    Lee, Jae-yong
    Hwang, Chan-kyou
    Lee, Jae-jin
    WORLD CONGRESS ON ENGINEERING 2008, VOLS I-II, 2008, : 543 - +