Denial-of-Service Attacks on Wireless Sensor Network and Defense Techniques

被引:21
|
作者
Ul Islam, Mohammad Nafis [1 ]
Fahmin, Ahmed [2 ]
Hossain, Md Shohrab [3 ]
Atiquzzaman, Mohammed [4 ]
机构
[1] Univ Melbourne, Sch Comp & Informat Syst, Melbourne, Vic, Australia
[2] United Int Univ, Dept Comp Sci & Engn, Dhaka, Bangladesh
[3] Bangladesh Univ Engn & Technol, Dept Comp Sci & Engn, Dhaka, Bangladesh
[4] Univ Oklahoma, Sch Comp Sci, Norman, OK 73019 USA
关键词
Denial-of-service; Wireless sensor network; Attacks; Defense; Analysis; ACCESS-CONTROL; SECURITY; INTERNET; AUTOMATION; PROTOCOLS; THINGS; WSN;
D O I
10.1007/s11277-020-07776-3
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
The basic characteristic of a wireless sensor network is to sense the environment and to gather different types of data. It is used in various vital sectors, such as military, health-care, traffic monitoring, and so on. This provides many helpful data about these fields, which is used in implementing new technologies for them. However, there are numerous challenges and risks, regarding the security vulnerability of a wireless sensor network. This is because the resources of a wireless sensor network are very low (for example, low power, low computational resources, low storage, etc.). These constraints make them susceptible to different kinds of security attacks, especially the denial of service attacks. In this survey, we have outlined different kinds of DoS attacks in different layers of the hybrid layering model. We have also presented different defense mechanisms to protect/mitigate these attacks at different layers. Layer by layer analysis makes it easy to distinguish among different types of attacks and their defense techniques, along with the characteristics of the layers. Analysis of the critical issues of these attacks and defenses are finally presented with possible measures. This survey work can be very beneficial for the researchers and engineers in designing WSN topology with ensured security.
引用
收藏
页码:1993 / 2021
页数:29
相关论文
共 50 条
  • [1] Denial-of-Service Attacks on Wireless Sensor Network and Defense Techniques
    Mohammad Nafis Ul Islam
    Ahmed Fahmin
    Md. Shohrab Hossain
    Mohammed Atiquzzaman
    Wireless Personal Communications, 2021, 116 : 1993 - 2021
  • [2] Measuring the Impact of Denial-of-Service Attacks on Wireless Sensor Networks
    Riecker, Michael
    Thies, Daniel
    Hollick, Matthias
    2014 IEEE 39TH CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN), 2014, : 296 - 304
  • [3] Lightweight Detection of Denial-of-Service Attacks on Wireless Sensor Networks Revisited
    Almon, Lars
    Riecker, Michael
    Hollick, Matthias
    2017 IEEE 42ND CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN), 2017, : 444 - 452
  • [4] Comparative analysis of the Prevention Techniques of Denial of Service Attacks in Wireless Sensor Network
    Patil, Ashish
    Gaikwad, Rahul
    INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATION AND CONVERGENCE (ICCC 2015), 2015, 48 : 387 - 393
  • [5] Denial-of-Service attacks and countermeasures in IEEE 802.11 wireless networks
    Bicakci, Kemal
    Tavli, Bulent
    COMPUTER STANDARDS & INTERFACES, 2009, 31 (05) : 931 - 941
  • [6] Synergetic Denial-of-Service Attacks and Defense in Underwater Named Data Networking
    Li, Yue
    Liu, Yingjian
    Wang, Yu
    Guo, Zhongwen
    Yin, Haoyu
    Teng, Hao
    IEEE INFOCOM 2020 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS, 2020, : 1569 - 1578
  • [7] An extended evaluation on machine learning techniques for Denial-of-Service detection in Wireless Sensor Networks
    Quincozes, Silvio E.
    Kazienko, Juliano F.
    Quincozes, Vagner E.
    INTERNET OF THINGS, 2023, 22
  • [8] Denial-of-service attacks and countermeasures on BitTorrent
    Lehmann, Matheus Brenner
    Santos, Flavio Roberto
    Gaspary, Luciano Paschoal
    Barcellos, Marinho Pilla
    COMPUTER NETWORKS, 2012, 56 (15) : 3479 - 3498
  • [9] Securing wireless mobile nodes from distributed denial-of-service attacks
    Varadharajan, Vijay
    Tupakula, Udaya
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2015, 27 (15) : 3794 - 3815
  • [10] Denial-of-Service Attacks on LoRaWAN
    van Es, Eef
    Vranken, Harald
    Hommersom, Arjen
    13TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2018), 2019,