DoS attack prevention technique in Wireless Sensor Networks

被引:32
|
作者
Patil, Shital [1 ]
Chaudhari, Sangita [1 ]
机构
[1] Mumbai Univ, AC Patil Coll Engn, Kharghar 410210, Navi Mumbai, India
来源
PROCEEDINGS OF INTERNATIONAL CONFERENCE ON COMMUNICATION, COMPUTING AND VIRTUALIZATION (ICCCV) 2016 | 2016年 / 79卷
关键词
Dos attack; attack prevention; prevention in WSN;
D O I
10.1016/j.procs.2016.03.094
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Wireless Sensor Networks (WSN) has wide applications in data gathering and data transmission via wireless networks. Due to the weaknesses in the WSN, the sensor nodes are vulnerable to most of the security threats. Denial-of-Service (DoS) attack is most popular attack on these sensor nodes. Some attack prevention techniques must be used against DoS attacks. There are different techniques to prevent DoS attack in wireless sensor network. In this paper, an immune system is proposed for the DoS attack on WSN which will improve the accuracy rate of attack prevention, reduce the false alarm rate and able to recognize different Dos attack. (c) 2016 The Authors. Published by Elsevier B.V.
引用
收藏
页码:715 / 721
页数:7
相关论文
共 50 条
  • [31] An Analysis of DoS Attack on Robot Operating System
    Degirmenci, Elif
    Kirca, Yunus Sabri
    Yolacan, Esra Nergis
    Yazici, Ahmet
    GAZI UNIVERSITY JOURNAL OF SCIENCE, 2023, 36 (03): : 1050 - 1069
  • [32] Research about DoS Attack against ICPS
    Gao, Jianlei
    Chai, Senchun
    Zhang, Baihai
    Xia, Yuanqing
    SENSORS, 2019, 19 (07)
  • [33] Analysis of Blended-mode DoS Attack
    Ou, Xin-Yang
    Zhang, Hua
    PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON MECHATRONICS, MATERIALS, CHEMISTRY AND COMPUTER ENGINEERING 2015 (ICMMCCE 2015), 2015, 39 : 2627 - 2631
  • [34] Energy scheduling for DoS attack over multi-hop networks: Deep reinforcement learning approach
    Yang, Lixin
    Tao, Jie
    Liu, Yong-Hua
    Xu, Yong
    Su, Chun-Yi
    NEURAL NETWORKS, 2023, 161 : 735 - 745
  • [35] Anomaly detection in wireless sensor networks: A proposed framework
    Ibrahim D.M.
    Alruhaily N.M.
    Ibrahim, Dina M. (d.hussein@qu.edu.sa), 1600, International Association of Online Engineering (14): : 150 - 158
  • [36] Injection attack estimation of networked control systems subject to hidden DoS attack
    Shao, Jie
    Ye, Zehua
    Zhang, Dan
    Yan, Huaicheng
    Zhu, Junwei
    ISA TRANSACTIONS, 2022, 129 : 1 - 14
  • [37] Resilient control of networked switched systems subject to deception attack and DoS attack
    Zhao, Rui
    Zuo, Zhiqiang
    Tan, Ying
    Wang, Yijing
    Zhang, Wentao
    AUTOMATICA, 2024, 169
  • [38] Recursive-clustering-based approach for denial of service (DoS) attacks in wireless sensors networks
    Fouchal, S.
    Mansouri, D.
    Mokdad, L.
    Iouallalen, M.
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2015, 28 (02) : 309 - 324
  • [39] Event-based fixed-time synchronization of neural networks under DoS attack and its applications
    Xing, Mengping
    Lu, Jianquan
    Lou, Jungang
    Zhang, Lingzhong
    NEURAL NETWORKS, 2023, 166 : 622 - 633
  • [40] Wormhole attack mitigation strategies and their impact on wireless sensor network performance: A literature survey
    Shahid, Hafsa
    Ashraf, Humaira
    Ullah, Ata
    Band, Shahab S.
    Elnaffar, Said
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2022, 35 (16)