http://iet.metastore.ingenta.com
1887

DDoS attacks in WSNs: detection and countermeasures

DDoS attacks in WSNs: detection and countermeasures

For access to this article, please select a purchase option:

Buy article PDF
£12.50
(plus tax if applicable)
Buy Knowledge Pack
10 articles for £75.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Name:*
Email:*
Your details
Name:*
Email:*
Department:*
Why are you recommending this title?
Select reason:
 
 
 
 
 
IET Wireless Sensor Systems — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

Wireless sensor networks (WSNs) have been widely applied in many areas for real-time event detection. They are designed using both mobile and static sensor nodes (SNs) for different applications such as smart parking, environmental monitoring, health care systems, automotive industries, sports, open space surveillance, and so on. WSNs communicate through wireless mediums and are accessible to anyone, which make SNs susceptible to different types of attacks. Distributed denial of service (DDoS) is one such attack. It wastes the limited energy of SNs and causes loss of data packets within a network. A DDoS attack launches a coordinated attack by flooding the target nodes with bogus requests, thus exhausting their resources, and forcing them to deny service to legitimate member nodes. In this study, the authors propose a message analyser scheme for WSNs. The method is capable of detecting compromised SNs vulnerable to a DDoS attack. In addition, it is able to detect all compromised messages transmitted by the attackers to the base station through the sender nodes. The proposed method is compared with other related protocols. The results show that their method can effectively detect and defend against DDoS attacks in WSNs.

References

    1. 1)
      • 1. Amgoth, T., Jana, P.K.: ‘Energy-aware routing algorithm for wireless sensor networks’, Comput. Electr. Eng., 2015, 41, pp. 357367.
    2. 2)
      • 2. Iyengar, S.S., Brooks, R.R.: ‘Distributed sensor networks: sensor networking and applications’ (CRC Press Taylor & Francis, Boca Raton, USA, 2016, 2nd edn.).
    3. 3)
      • 3. Messai, M.-L.: ‘Classification of attacks in wireless sensor networks’. Proc. Int. Conf. Telecommunication and Application, Bejaia, Algeria, 23-24 April 2014.
    4. 4)
      • 4. Chelli, K.: ‘Security issues in wireless sensor networks: attacks and countermeasures’. Proc. Int. Conf. World Congress on Engineering, London, UK, 1–3 July 2015.
    5. 5)
      • 5. Mazur, K., Ksiezopolski, B., Nielek, R.: ‘Multilevel modeling of distributed denial of service attacks in wireless sensor networks’, J. Sens., 2016, 2016, pp. 113.
    6. 6)
      • 6. Zargar, S.T., Joshi, J., Tipper, D.: ‘A survey of defense mechanisms against distributed denial of service (DDoS) flooding attacks’, IEEE Commun. Surv. Tutor., 2013, 15, (4), pp. 20462069.
    7. 7)
      • 7. Patel, M.M., Aggarwal, A.: ‘Security attacks in wireless sensor networks: a survey’. Proc. Int. Conf. Intelligent Systems and Signal Processing (ISSP), Gujarat, India, 1–2 March 2013, pp. 329333.
    8. 8)
      • 8. Kumar, G.: ‘Understanding denial of service (DoS) attacks using OSI reference model’, Int. J. Educ. Sci. Res. Rev., 2014, 1, (5), pp. 89103.
    9. 9)
      • 9. Gond, S., Nath, A.: ‘A mitigation model for DDoS attack in wireless sensor networks’, 2015, pp. 3543.
    10. 10)
      • 10. Dhar, M., Singh, R.: ‘A review of security issues and denial of service attacks in wireless sensor networks’, Int. J. Comput. Sci. Inf. Technol. Res., 2015, 3, (1), pp. 2733.
    11. 11)
      • 11. AlOmary, R.Y., Khan, S.A.: ‘Goal programming based multi-criteria decision-making for distributed denial of service attacks in wireless sensor networks’. Proc. Int. Conf. Computer, Control, Informatics and its Applications (IC3INA), Jakarta, Indonesia, 2013.
    12. 12)
      • 12. Chen, D., Zhang, Z., Tseng, F.-H., et al: ‘A novel method defends against the path-based DOS for wireless sensor network’, Int. J. Distrib. Sens. Netw., 10, (7), 2014, pp. 205216.
    13. 13)
      • 13. Han, G., Shen, W., Duong, T.Q., et al: ‘A proposed security scheme against denial of service attacks in cluster-based wireless sensor networks’, Secur. Commun. Netw., 2014, 7, pp. 25422554.
    14. 14)
      • 14. Mansouri, D., Mokddad, L., Ben-Othman, J., et al: ‘Preventing denial of service attacks in wireless sensor networks’. 2015 IEEE Int. Conf. Proc. Int. Conf. Communications (ICC), 2015, pp. 30143019.
    15. 15)
      • 15. Kannan, G., Raja, T.S.R.: ‘Energy efficient distributed cluster head scheduling scheme for two tiered wireless sensor network’, Egypt. Inform. J., 2015, 16, (2), pp. 167174.
    16. 16)
      • 16. Abidoye, A.P., Azeez, N.A., Adesina, A.O., et al: ‘ANCAEE: a novel clustering algorithm for energy efficiency in wireless sensor networks’, J. Wirel. Sens. Netw., 2011, 3, (9), pp. 307312.
    17. 17)
      • 17. Karlof, C., Sastry, N., Wagner, D.: ‘TinySec: a link layer security architecture for wireless sensor networks’. Proc. Int. Conf. Proc. Second Int. Conf. Embedded Networked Sensor Systems, 2004, pp. 162175.
    18. 18)
      • 18. Baig, Z.A., Khan, A.I.: ‘DDoS attack modeling and detection in wireless sensor networks’. In Zomaya, A. Y. (Ed.): ‘Mobile Intelligence’, (John Wiley and Sons, Hoboken, New Jersey, 2010), pp. 595626.
    19. 19)
      • 19. Karlof, C., Wagner, D.: ‘Secure routing in wireless sensor networks: attacks and countermeasures’, Ad Hoc Netw., 2003, 1, (2), pp. 293315.
    20. 20)
      • 20. Hsieh, W.B., Leu, J.S.: ‘Anonymous authentication protocol based on elliptic curve Diffie–Hellman for wireless access networks’, Wirel. Commun. Mob. Comput., 2014, 14, (10), pp. 9951006.
    21. 21)
      • 21. Heinzelman, W.R., Kulik, J., Balakrishnan, H.: ‘Adaptive protocols for information dissemination in wireless sensor networks’. Proc. Int. Conf. ACM MobiCom'99, Seattle, Washington, USA, 1999, pp. 174185.
    22. 22)
      • 22. Nam, J., Choo, K.-K.R., Han, S., et al: ‘Efficient and anonymous two-factor user authentication in wireless sensor networks: achieving user anonymity with lightweight sensor computation’, PLOS One, 2015, 10, (4), pp. 121.
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-wss.2017.0029
Loading

Related content

content/journals/10.1049/iet-wss.2017.0029
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address