Your browser does not support JavaScript!
http://iet.metastore.ingenta.com
1887

access icon free DDoS attacks in WSNs: detection and countermeasures

Wireless sensor networks (WSNs) have been widely applied in many areas for real-time event detection. They are designed using both mobile and static sensor nodes (SNs) for different applications such as smart parking, environmental monitoring, health care systems, automotive industries, sports, open space surveillance, and so on. WSNs communicate through wireless mediums and are accessible to anyone, which make SNs susceptible to different types of attacks. Distributed denial of service (DDoS) is one such attack. It wastes the limited energy of SNs and causes loss of data packets within a network. A DDoS attack launches a coordinated attack by flooding the target nodes with bogus requests, thus exhausting their resources, and forcing them to deny service to legitimate member nodes. In this study, the authors propose a message analyser scheme for WSNs. The method is capable of detecting compromised SNs vulnerable to a DDoS attack. In addition, it is able to detect all compromised messages transmitted by the attackers to the base station through the sender nodes. The proposed method is compared with other related protocols. The results show that their method can effectively detect and defend against DDoS attacks in WSNs.

References

    1. 1)
      • 18. Baig, Z.A., Khan, A.I.: ‘DDoS attack modeling and detection in wireless sensor networks’. In Zomaya, A. Y. (Ed.): ‘Mobile Intelligence’, (John Wiley and Sons, Hoboken, New Jersey, 2010), pp. 595626.
    2. 2)
      • 21. Heinzelman, W.R., Kulik, J., Balakrishnan, H.: ‘Adaptive protocols for information dissemination in wireless sensor networks’. Proc. Int. Conf. ACM MobiCom'99, Seattle, Washington, USA, 1999, pp. 174185.
    3. 3)
      • 4. Chelli, K.: ‘Security issues in wireless sensor networks: attacks and countermeasures’. Proc. Int. Conf. World Congress on Engineering, London, UK, 1–3 July 2015.
    4. 4)
      • 8. Kumar, G.: ‘Understanding denial of service (DoS) attacks using OSI reference model’, Int. J. Educ. Sci. Res. Rev., 2014, 1, (5), pp. 89103.
    5. 5)
      • 19. Karlof, C., Wagner, D.: ‘Secure routing in wireless sensor networks: attacks and countermeasures’, Ad Hoc Netw., 2003, 1, (2), pp. 293315.
    6. 6)
      • 15. Kannan, G., Raja, T.S.R.: ‘Energy efficient distributed cluster head scheduling scheme for two tiered wireless sensor network’, Egypt. Inform. J., 2015, 16, (2), pp. 167174.
    7. 7)
      • 17. Karlof, C., Sastry, N., Wagner, D.: ‘TinySec: a link layer security architecture for wireless sensor networks’. Proc. Int. Conf. Proc. Second Int. Conf. Embedded Networked Sensor Systems, 2004, pp. 162175.
    8. 8)
      • 11. AlOmary, R.Y., Khan, S.A.: ‘Goal programming based multi-criteria decision-making for distributed denial of service attacks in wireless sensor networks’. Proc. Int. Conf. Computer, Control, Informatics and its Applications (IC3INA), Jakarta, Indonesia, 2013.
    9. 9)
      • 1. Amgoth, T., Jana, P.K.: ‘Energy-aware routing algorithm for wireless sensor networks’, Comput. Electr. Eng., 2015, 41, pp. 357367.
    10. 10)
      • 22. Nam, J., Choo, K.-K.R., Han, S., et al: ‘Efficient and anonymous two-factor user authentication in wireless sensor networks: achieving user anonymity with lightweight sensor computation’, PLOS One, 2015, 10, (4), pp. 121.
    11. 11)
      • 16. Abidoye, A.P., Azeez, N.A., Adesina, A.O., et al: ‘ANCAEE: a novel clustering algorithm for energy efficiency in wireless sensor networks’, J. Wirel. Sens. Netw., 2011, 3, (9), pp. 307312.
    12. 12)
      • 20. Hsieh, W.B., Leu, J.S.: ‘Anonymous authentication protocol based on elliptic curve Diffie–Hellman for wireless access networks’, Wirel. Commun. Mob. Comput., 2014, 14, (10), pp. 9951006.
    13. 13)
      • 9. Gond, S., Nath, A.: ‘A mitigation model for DDoS attack in wireless sensor networks’, 2015, pp. 3543.
    14. 14)
      • 6. Zargar, S.T., Joshi, J., Tipper, D.: ‘A survey of defense mechanisms against distributed denial of service (DDoS) flooding attacks’, IEEE Commun. Surv. Tutor., 2013, 15, (4), pp. 20462069.
    15. 15)
      • 13. Han, G., Shen, W., Duong, T.Q., et al: ‘A proposed security scheme against denial of service attacks in cluster-based wireless sensor networks’, Secur. Commun. Netw., 2014, 7, pp. 25422554.
    16. 16)
      • 5. Mazur, K., Ksiezopolski, B., Nielek, R.: ‘Multilevel modeling of distributed denial of service attacks in wireless sensor networks’, J. Sens., 2016, 2016, pp. 113.
    17. 17)
      • 3. Messai, M.-L.: ‘Classification of attacks in wireless sensor networks’. Proc. Int. Conf. Telecommunication and Application, Bejaia, Algeria, 23-24 April 2014.
    18. 18)
      • 7. Patel, M.M., Aggarwal, A.: ‘Security attacks in wireless sensor networks: a survey’. Proc. Int. Conf. Intelligent Systems and Signal Processing (ISSP), Gujarat, India, 1–2 March 2013, pp. 329333.
    19. 19)
      • 2. Iyengar, S.S., Brooks, R.R.: ‘Distributed sensor networks: sensor networking and applications’ (CRC Press Taylor & Francis, Boca Raton, USA, 2016, 2nd edn.).
    20. 20)
      • 14. Mansouri, D., Mokddad, L., Ben-Othman, J., et al: ‘Preventing denial of service attacks in wireless sensor networks’. 2015 IEEE Int. Conf. Proc. Int. Conf. Communications (ICC), 2015, pp. 30143019.
    21. 21)
      • 10. Dhar, M., Singh, R.: ‘A review of security issues and denial of service attacks in wireless sensor networks’, Int. J. Comput. Sci. Inf. Technol. Res., 2015, 3, (1), pp. 2733.
    22. 22)
      • 12. Chen, D., Zhang, Z., Tseng, F.-H., et al: ‘A novel method defends against the path-based DOS for wireless sensor network’, Int. J. Distrib. Sens. Netw., 10, (7), 2014, pp. 205216.
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-wss.2017.0029
Loading

Related content

content/journals/10.1049/iet-wss.2017.0029
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address