Measuring the Impact of Denial-of-Service Attacks on Wireless Sensor Networks

被引:0
|
作者
Riecker, Michael [1 ]
Thies, Daniel [1 ]
Hollick, Matthias [1 ]
机构
[1] Tech Univ Darmstadt, Secure Mobile Networking Lab, D-64293 Darmstadt, Germany
关键词
Wireless Sensor Networks; Denial-of-Service; Measurements;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Wireless sensor networks (WSNs) are especially susceptible to denial-of-service attacks due to the resource-constrained nature of motes. We follow a systematic approach to analyze the impacts of these attacks on the network behavior; therefore, we first identify a large number of metrics easily obtained and calculated without incurring too much overhead. Next, we statistically test these metrics to assess whether they exhibit significantly different values under attack when compared to those of the baseline operation. The metrics look into different aspects of the motes and the network, for example, MCU and radio activities, network traffic statistics, and routing related information. Then, to show the applicability of the metrics to different WSNs, we vary several parameters, such as traffic intensity and transmission power. We consider the most common topologies in wireless sensor networks such as central data collection and meshed multi-hop networks by using the collection tree and the mesh protocol. Finally, the metrics are grouped according to their capability of distinction into different classes. In this work, we focus on jamming and blackhole attacks. Our experiments reveal that certain metrics are able to detect a jamming attack on all motes in the testbed, irrespective of the parameter combination, and at the highest significance value. To illustrate these facts, we use a standard testbed consisting of the widely-employed TelosB motes.
引用
收藏
页码:296 / 304
页数:9
相关论文
共 50 条
  • [1] Distributed Localization in Wireless Sensor Networks Under Denial-of-Service Attacks
    Shi, Lei
    Liu, Qingchen
    Shao, Jinliang
    Cheng, Yuhua
    [J]. IEEE CONTROL SYSTEMS LETTERS, 2021, 5 (02): : 493 - 498
  • [2] Lightweight Detection of Denial-of-Service Attacks on Wireless Sensor Networks Revisited
    Almon, Lars
    Riecker, Michael
    Hollick, Matthias
    [J]. 2017 IEEE 42ND CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN), 2017, : 444 - 452
  • [3] Denial-of-service in wireless sencsor networks: Attacks and defenses
    Raymond, David R.
    Midkiff, Scott F.
    [J]. IEEE PERVASIVE COMPUTING, 2008, 7 (01) : 74 - 81
  • [4] Denial-of-Service Attacks on Wireless Sensor Network and Defense Techniques
    Ul Islam, Mohammad Nafis
    Fahmin, Ahmed
    Hossain, Md Shohrab
    Atiquzzaman, Mohammed
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2021, 116 (03) : 1993 - 2021
  • [5] Denial-of-Service Attacks on Wireless Sensor Network and Defense Techniques
    Mohammad Nafis Ul Islam
    Ahmed Fahmin
    Md. Shohrab Hossain
    Mohammed Atiquzzaman
    [J]. Wireless Personal Communications, 2021, 116 : 1993 - 2021
  • [6] Denial-of-Service attacks and countermeasures in IEEE 802.11 wireless networks
    Bicakci, Kemal
    Tavli, Bulent
    [J]. COMPUTER STANDARDS & INTERFACES, 2009, 31 (05) : 931 - 941
  • [7] Quickest Detection of Denial-of-Service Attacks in Cognitive Wireless Networks
    Sorrells, CaLynna
    Qian, Lijun
    Li, Husheng
    [J]. 2012 IEEE INTERNATIONAL CONFERENCE ON TECHNOLOGIES FOR HOMELAND SECURITY, 2012, : 580 - 584
  • [8] Quickest detection of denial-of-service attacks in cognitive wireless networks
    Department of ECE, Prairie View A and M University, Prairie View, TX 77446, United States
    不详
    [J]. IEEE Int. Conf. Technol. Homeland Secur., HST, 2012, (580-584):
  • [9] Quickest detection of denial-of-service attacks in cognitive wireless networks
    Sorrells, CaLynna
    Qian, Lijun
    [J]. International Journal of Network Security, 2014, 16 (06) : 468 - 476
  • [10] Containing Denial-of-Service Attacks in Broadcast Authentication in Sensor Networks
    Wang, Ronghua
    Du, Wenliang
    Ning, Peng
    [J]. MOBIHOC'07: PROCEEDINGS OF THE EIGHTH ACM INTERNATIONAL SYMPOSIUM ON MOBILE AD HOC NETWORKING AND COMPUTING, 2007, : 71 - 79