Denial-of-Service Attacks on Wireless Sensor Network and Defense Techniques

被引:21
|
作者
Ul Islam, Mohammad Nafis [1 ]
Fahmin, Ahmed [2 ]
Hossain, Md Shohrab [3 ]
Atiquzzaman, Mohammed [4 ]
机构
[1] Univ Melbourne, Sch Comp & Informat Syst, Melbourne, Vic, Australia
[2] United Int Univ, Dept Comp Sci & Engn, Dhaka, Bangladesh
[3] Bangladesh Univ Engn & Technol, Dept Comp Sci & Engn, Dhaka, Bangladesh
[4] Univ Oklahoma, Sch Comp Sci, Norman, OK 73019 USA
关键词
Denial-of-service; Wireless sensor network; Attacks; Defense; Analysis; ACCESS-CONTROL; SECURITY; INTERNET; AUTOMATION; PROTOCOLS; THINGS; WSN;
D O I
10.1007/s11277-020-07776-3
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
The basic characteristic of a wireless sensor network is to sense the environment and to gather different types of data. It is used in various vital sectors, such as military, health-care, traffic monitoring, and so on. This provides many helpful data about these fields, which is used in implementing new technologies for them. However, there are numerous challenges and risks, regarding the security vulnerability of a wireless sensor network. This is because the resources of a wireless sensor network are very low (for example, low power, low computational resources, low storage, etc.). These constraints make them susceptible to different kinds of security attacks, especially the denial of service attacks. In this survey, we have outlined different kinds of DoS attacks in different layers of the hybrid layering model. We have also presented different defense mechanisms to protect/mitigate these attacks at different layers. Layer by layer analysis makes it easy to distinguish among different types of attacks and their defense techniques, along with the characteristics of the layers. Analysis of the critical issues of these attacks and defenses are finally presented with possible measures. This survey work can be very beneficial for the researchers and engineers in designing WSN topology with ensured security.
引用
收藏
页码:1993 / 2021
页数:29
相关论文
共 50 条
  • [21] A Survey of Denial-of-Service Attacks and Solutions in the Smart Grid
    Huseinovic, Alvin
    Mrdovic, Sasa
    Bicakci, Kemal
    Uludag, Suleyman
    IEEE ACCESS, 2020, 8 : 177447 - 177470
  • [22] Detection and Mitigation of Low-Rate Denial-of-Service Attacks: A Survey
    Rios, Vinicius De Miranda
    Inacio, Pedro R. M.
    Magoni, Damien
    Freire, Mario M.
    IEEE ACCESS, 2022, 10 : 76648 - 76668
  • [23] A Queuing Analysis of Tolerating for Denial-of-Service (DoS) Attacks with a Proxy Network
    Aye, Myint Myint
    2009 INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING AND TECHNOLOGY, VOL II, PROCEEDINGS, 2009, : 366 - 368
  • [24] Impact of Denial-of-Service Attack on Directional Compact Geographic Forwarding Routing Protocol in Wireless Sensor Networks
    Samir, Nasrina M.
    Musni, Maisarah
    Hanapi, Zurina Mohd
    Radzuan, Mohamed Ridzal
    BAGHDAD SCIENCE JOURNAL, 2021, 18 (04) : 1371 - 1377
  • [25] Detection of Denial-of-Service Attack in Wireless Sensor Networks: A Lightweight Machine Learning Approach
    Elsadig, Muawia A.
    IEEE ACCESS, 2023, 11 : 83537 - 83552
  • [26] Denial-of-Service Attacks in OpenFlow SDN Networks
    Kandoi, Rajat
    Antikainen, Markku
    PROCEEDINGS OF THE 2015 IFIP/IEEE INTERNATIONAL SYMPOSIUM ON INTEGRATED NETWORK MANAGEMENT (IM), 2015, : 1322 - 1326
  • [27] Defense against low-rate TCP-targeted denial-of-service attacks
    Yang, G
    Gerla, M
    Sanadidi, MY
    ISCC2004: NINTH INTERNATIONAL SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS, VOLS 1 AND 2, PROCEEDINGS, 2004, : 345 - 350
  • [28] Estimates of success rates of Denial-of-Service attacks
    Sommestad, Teodor
    Holm, Hannes
    Ekstedt, Mathias
    TRUSTCOM 2011: 2011 INTERNATIONAL JOINT CONFERENCE OF IEEE TRUSTCOM-11/IEEE ICESS-11/FCST-11, 2011, : 21 - 28
  • [29] Vulnerabilities of underwater acoustic networks to denial-of-service jamming attacks
    Zuba, Michael
    Shi, Zhijie
    Peng, Zheng
    Cui, Jun-Hong
    Zhou, Shengli
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (16) : 2635 - 2645
  • [30] Mitigation Against Denial-of-Service Flooding and Malformed Packet Attacks
    Patil, Arvind R. Bhagat
    Thakur, Nileshsingh V.
    THIRD INTERNATIONAL CONGRESS ON INFORMATION AND COMMUNICATION TECHNOLOGY, 2019, 797 : 335 - 342