Overview of DOS attacks on wireless sensor networks and experimental results for simulation of interference attacks

被引:7
|
作者
Gavric, Zeljko [1 ]
Simic, Dejan [2 ]
机构
[1] Slobomir P Univ, Fac Informat Technol, Doboj, Bosnia & Herceg
[2] Univ Belgrade, Fac Org Sci, Belgrade, Serbia
来源
INGENIERIA E INVESTIGACION | 2018年 / 38卷 / 01期
关键词
Wireless Sensor Networks; Intrusion detection; Wireless communication; Communication system security; Radiofrequency interference; SERVICE;
D O I
10.15446/ing.investig.v38n1.65453
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Wireless sensor networks are now used in various fields. The information transmitted in the wireless sensor networks is very sensitive, so the security issue is very important. DOS (denial of service) attacks are a fundamental threat to the functioning of wireless sensor networks. This paper describes some of the most common DOS attacks and potential methods of protection against them. The case study shows one of the most frequent attacks on wireless sensor networks - the interference attack. In the introduction of this paper authors assume that the attack interference can cause significant obstruction of wireless sensor networks. This assumption has been proved in the case study through simulation scenario and simulation results.
引用
收藏
页码:130 / 138
页数:9
相关论文
共 50 条
  • [31] Detection of masquerade attacks on wireless sensor networks
    Bhuse, Vijay
    Gupta, Ajay
    Al-Fuqaha, Ala
    2007 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-14, 2007, : 1142 - 1147
  • [32] Analysis of Wormhole Attacks in Wireless Sensor Networks
    Patel, Manish
    Aggarwal, Akshai
    Chaubey, Nirbhay
    RECENT FINDINGS IN INTELLIGENT COMPUTING TECHNIQUES, VOL 2, 2018, 708 : 33 - 42
  • [33] Security Attacks in Wireless Sensor Networks: A Survey
    Patel, Manish M.
    Aggarwal, Akshai
    2013 INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS AND SIGNAL PROCESSING (ISSP), 2013, : 329 - 333
  • [34] Wireless Sensor Network Attacks: An Overview and Critical Analysis
    Tayebi, Arash
    Berber, Setevan
    Swain, Akshya
    2013 SEVENTH INTERNATIONAL CONFERENCE ON SENSING TECHNOLOGY (ICST), 2013, : 97 - 102
  • [35] A Comparison of Routing Attacks on Wireless Sensor Networks
    Mohammadi, Shahriar
    Atani, Reza Ebrahimi
    Jadidoleslamy, Hossein
    JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2011, 6 (03): : 195 - 215
  • [36] Sinkhole Attacks in Wireless Sensor Networks: A Survey
    Rehman, Aqeel-ur
    Rehman, Sadiq Ur
    Raheem, Haris
    WIRELESS PERSONAL COMMUNICATIONS, 2019, 106 (04) : 2291 - 2313
  • [37] Prevention of Wormhole Attacks in Wireless Sensor Networks
    Aldhobaiban, Dema
    Elleithy, Khaled
    Almazaydeh, Laiali
    2014 2ND INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE, MODELLING AND SIMULATION, 2014, : 287 - 291
  • [38] Sinkhole Attacks in Wireless Sensor Networks: A Survey
    Aqeel-ur Rehman
    Sadiq Ur Rehman
    Haris Raheem
    Wireless Personal Communications, 2019, 106 : 2291 - 2313
  • [39] An analysis of DoS attacks on Wireless LAN
    Liu, Chibiao
    Yu, James T.
    PROCEEDINGS OF THE SIXTH IASTED INTERNATIONAL MULTI-CONFERENCE ON WIRELESS AND OPTICAL COMMUNICATIONS, 2006, : 346 - 351
  • [40] An Experimental Study of the Performance Impact of Path-Based DoS Attacks in Wireless Mesh Networks
    Avesh K. Agarwal
    Wenye Wang
    Mobile Networks and Applications, 2010, 15 : 693 - 709