DoS attack prevention technique in Wireless Sensor Networks

被引:32
|
作者
Patil, Shital [1 ]
Chaudhari, Sangita [1 ]
机构
[1] Mumbai Univ, AC Patil Coll Engn, Kharghar 410210, Navi Mumbai, India
来源
PROCEEDINGS OF INTERNATIONAL CONFERENCE ON COMMUNICATION, COMPUTING AND VIRTUALIZATION (ICCCV) 2016 | 2016年 / 79卷
关键词
Dos attack; attack prevention; prevention in WSN;
D O I
10.1016/j.procs.2016.03.094
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Wireless Sensor Networks (WSN) has wide applications in data gathering and data transmission via wireless networks. Due to the weaknesses in the WSN, the sensor nodes are vulnerable to most of the security threats. Denial-of-Service (DoS) attack is most popular attack on these sensor nodes. Some attack prevention techniques must be used against DoS attacks. There are different techniques to prevent DoS attack in wireless sensor network. In this paper, an immune system is proposed for the DoS attack on WSN which will improve the accuracy rate of attack prevention, reduce the false alarm rate and able to recognize different Dos attack. (c) 2016 The Authors. Published by Elsevier B.V.
引用
收藏
页码:715 / 721
页数:7
相关论文
共 50 条
  • [21] LoRaWan Sensitivity Analysis and Prevention Strategies Against Wireless DoS Attacks
    Prasad, N.
    Lynggaard, P.
    WIRELESS PERSONAL COMMUNICATIONS, 2022, 126 (04) : 3663 - 3675
  • [22] LoRaWan Sensitivity Analysis and Prevention Strategies Against Wireless DoS Attacks
    N. Prasad
    P. Lynggaard
    Wireless Personal Communications, 2022, 126 : 3663 - 3675
  • [23] Enhanced ECC Based Authentication Protocol in Wireless Sensor Network with DoS Mitigation
    Pushpa, Sobini X.
    Raja, S. Kanaga Suba
    CYBERNETICS AND SYSTEMS, 2022, 53 (08) : 734 - 755
  • [24] Optimal DoS Attack Strategy against Remote State Estimation Over Lossy Networks
    Li, Menglin
    Qin, Jiahu
    Shi, Ling
    Yu, Xinghuo
    Gao, Huijun
    2017 29TH CHINESE CONTROL AND DECISION CONFERENCE (CCDC), 2017, : 909 - 914
  • [25] Research on DoS atomic attack oriented to Attack Resistance Test
    Xin, Siyuan
    Chen, Xingyuan
    Tang, Huilin
    Zhu, Ning
    PROCEEDINGS OF 2008 IEEE INTERNATIONAL CONFERENCE ON NETWORKING, SENSING AND CONTROL, VOLS 1 AND 2, 2008, : 1747 - 1752
  • [26] On securing Wireless Sensor Network-Novel authentication scheme against DOS attacks
    Raja, K. Nirmal
    Beno, M. Marsaline
    JOURNAL OF MEDICAL SYSTEMS, 2014, 38 (10)
  • [27] On securing Wireless Sensor Network-Novel authentication scheme against DOS attacks
    K. Nirmal Raja
    M. Marsaline Beno
    Journal of Medical Systems, 2014, 38
  • [28] An Approach for DDoS Attack Prevention in Mobile ad hoc Networks
    Timcenko, V. V.
    ELEKTRONIKA IR ELEKTROTECHNIKA, 2014, 20 (06) : 150 - 153
  • [29] DoS Attack Allocation Against Remote State Estimation Over Packet-Dropping Networks
    Ye, Dan
    Mei, Mengyao
    Wei, Jiang
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II-EXPRESS BRIEFS, 2022, 69 (03) : 1507 - 1511
  • [30] DoS Attack Analysis for H-HIPS
    Sato, Tomoaki
    Kikuchi, Kazuhira
    Imaruoka, Shuya
    Fukase, Masa-aki
    IMETI 2008: INTERNATIONAL MULTI-CONFERENCE ON ENGINEERING AND TECHNOLOGICAL INNOVATION, VOL II, PROCEEDINGS, 2008, : 110 - +