Denial of Service Defence for Resource Availability in Wireless Sensor Networks

被引:88
作者
Osanaiye, Opeyemi A. [1 ]
Alfa, Attahiru S. [1 ,2 ]
Hancke, Gerhard P. [1 ]
机构
[1] Univ Pretoria, Dept Elect Elect & Comp Engn, ZA-0002 Pretoria, South Africa
[2] Univ Manitoba, Dept Elect & Comp Engn, Winnipeg, MB R3T 2N2, Canada
关键词
Denial of service (DoS); detection techniques; intrusion detection system (IDS); resource availability; resource depletion; wireless sensor networks (WSNs); INTRUSION DETECTION SYSTEM; DOS ATTACKS; ANOMALY DETECTION; EXHAUSTION ATTACKS; JAMMING ATTACKS; OF-SERVICE; MITIGATION; ALGORITHM; CLOUD;
D O I
10.1109/ACCESS.2018.2793841
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Wireless sensor networks (WSN) over the years have become one of the most promising networking solutions with exciting new applications for the near future. Its deployment has been enhanced by its small, inexpensive, and smart sensor nodes, which are easily deployed, depending on its application and coverage area. Common applications include its use for military operations, monitoring environmental conditions (such as volcano detection, agriculture, and management), distributed control systems, healthcare, and the detection of radioactive sources. Notwithstanding its promising attributes, security in WSN is a big challenge and remains an ongoing research trend. Deployed sensor nodes are vulnerable to various security attacks due to its architecture, hostile deployment location, and insecure routing protocol. Furthermore, the sensor nodes in WSNs are characterized by their resource constraints, such as, limited energy, low bandwidth, short communication range, limited processing, and storage capacity, which have made the sensor nodes an easy target. Therefore, in this paper, we present a review of denial of service attacks that affect resource availability in WSN and their countermeasure by presenting a taxonomy. Future research directions and open research issues are also discussed.
引用
收藏
页码:6975 / 7004
页数:30
相关论文
共 121 条
[1]   On the Vital Areas of Intrusion Detection Systems in Wireless Sensor Networks [J].
Abduvaliyev, Abror ;
Pathan, Al-Sakib Khan ;
Zhou, Jianying ;
Roman, Rodrigo ;
Wong, Wai-Choong .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2013, 15 (03) :1223-1237
[2]   Wireless underground sensor networks: Research challenges [J].
Akyildiz, Ian F. ;
Stuntebeck, Erich P. .
Ad Hoc Networks, 2006, 4 (06) :669-686
[3]   A survey on wireless multimedia sensor networks [J].
Akyildiz, Ian F. ;
Melodia, Tommaso ;
Chowdhury, Kaushik R. .
COMPUTER NETWORKS, 2007, 51 (04) :921-960
[4]   A survey on sensor networks [J].
Akyildiz, IF ;
Su, WL ;
Sankarasubramaniam, Y ;
Cayirci, E .
IEEE COMMUNICATIONS MAGAZINE, 2002, 40 (08) :102-114
[5]  
Al Ameen M., 2012, WIRELESS TECHNOLOGIE, P1811
[6]   WSN-DS: A Dataset for Intrusion Detection Systems in Wireless Sensor Networks [J].
Almomani, Iman ;
Al-Kasasbeh, Bassam ;
AL-Akhras, Mousa .
JOURNAL OF SENSORS, 2016, 2016
[7]  
Alrajeh NA, 2014, AD HOC SENS WIREL NE, V22, P109
[8]   On optimal placement of intrusion detection modules in sensor networks [J].
Anjum, F ;
Subhadrabandhu, D ;
Sarkar, S ;
Shetty, R .
FIRST INTERNATIONAL CONFERENCE ON BROADBAND NETWORKS, PROCEEDINGS, 2004, :690-699
[9]  
[Anonymous], 2007, P INT S ALG EXP SENS
[10]  
[Anonymous], THESIS