CFP last date
20 May 2024
Reseach Article

DoS Attacks on different Layers of WSN: A Review

by Kanchan Kaushal, Varsha Sahni
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 130 - Number 17
Year of Publication: 2015
Authors: Kanchan Kaushal, Varsha Sahni
10.5120/ijca2015907057

Kanchan Kaushal, Varsha Sahni . DoS Attacks on different Layers of WSN: A Review. International Journal of Computer Applications. 130, 17 ( November 2015), 8-11. DOI=10.5120/ijca2015907057

@article{ 10.5120/ijca2015907057,
author = { Kanchan Kaushal, Varsha Sahni },
title = { DoS Attacks on different Layers of WSN: A Review },
journal = { International Journal of Computer Applications },
issue_date = { November 2015 },
volume = { 130 },
number = { 17 },
month = { November },
year = { 2015 },
issn = { 0975-8887 },
pages = { 8-11 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume130/number17/23299-2015907057/ },
doi = { 10.5120/ijca2015907057 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:25:51.762108+05:30
%A Kanchan Kaushal
%A Varsha Sahni
%T DoS Attacks on different Layers of WSN: A Review
%J International Journal of Computer Applications
%@ 0975-8887
%V 130
%N 17
%P 8-11
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

WSNs plays an important role in many of the applications like patient health monitoring, battlefields surveillance, traffic control, environmental observation, home automation and building intrusion surveillance. WSNs are convenient, cost effective, and give ease of integration with other networks and their components. However, wireless technology also produces new threats. Since WSNs communicate by using radio frequencies therefore the risk of interference is more than with wired networks. If the message to be passed is not in an encrypted form, or is encrypted by using a feeble algorithm and the attacker can easily read it, and it is the compromise to the confidentiality. Security objectives include: protecting confidentiality, assuring integrity, providing authentication and supporting availability of the information and information systems. In this paper we describe the types of existing DoS attacks and how existing techniques can be used to prevent or mitigate these attacks in WSNs.

References
  1. Vikash Kumar, Anshu Jain and P N Barwal, “Wireless Sensor Networks: Security Issues, Challenges and Solutions”, International Journal of Information & Computation Technology, ISSN 0974-2239 Vol 4, No 8, pp. 859-868, 2014.
  2. Javad Afshar Jahanshahi, Seyed Ali Ghorash, MohammdEslami, “Fuzzy C-Means Clustering-Based Jamming Detection Algorithm at Base Station”, Research Article - Electrical Engineering, Arabian Journal for Science and Engineering, Volume 38, Issue 8, pp 2125-2133, springer, August 2013.
  3. Ahmad Abed, Alhameed Alkhatib, and Gurvinder Singh Baicher “Wireless Sensor Network Architecture,” International Conference on Computer Networks and Communication Systems, IPCSIT, vol. 35, 2012.
  4. Kalpana Sharma, M K Ghose, “Wireless Sensor Networks: An Overview on its Security Threats”, IJCA Special Issue on “Mobile Ad-hoc Networks” MANETs, 2010.
  5. Aristides Mpitziopoulos, Damianos Gavalas, Charalampos Konstantopoulos, And Grammati Pantziou, “A Survey On Jamming Attacks And Countermeasures In Wsns”, IEEE Communications Surveys & Tutorials, VOL. 11, No. 4, Fourth Quarter 2009.
  6. Jennifer Yick, Biswanath Mukherjee, and Deepak Ghosal, “Wireless sensor network survey,” Computer Networks, vol. 52, pp. 2292-2330, Elsevier, April 2008.
  7. Yong Wang, Garhan Attebury, And Byrav Ramamurthy, “A Survey Of Security Issues In Wireless Sensor Networks”, IEEE communication surveys, Vol 8, No. 2, 2nd quarter 2008.
  8. K. Kifayat, M. Merabti, Q. Shi, D. Llewellyn-Jones: Group-based secure communication for large scale wireless sensor networks, J. Information Assurance Security. Vol 2, 139–147, 2007.
  9. Al-Sakib Khan Pathan, Hyung-Woo Lee and Choong Seon Hong, “Security in Wireless Sensor Networks: Issues and Challenges”, Advanced communication technology, 8th international confference, vol. 2, IEEE, 2006.
  10. T. Roosta, S. Shieh, S. Sastry, “Taxonomy of Security Attacks in Sensor Networks”, 1st IEEE Int. Conference on System Integration and Reliability Improvements, , Hanoi (2006) pp. 13–15, 2006..
  11. J. Deng, R. Han, S. Mishra “Countermeasures Against Traffic Analysis Attacks in Wireless Sensor Networks”, First IEEE/Cerate Net Conference on Security and Privacy in Communication Networks (SecureComm), Athens (2005) pp. 113–124, 2005.
  12. A. Perrig, J. Newsome, E. Shi, D. Song , “The Sybil Attack in Sensor Networks: Analysis and Defences”, 3rd Int. Symposium on Information Processing in Sensor Networks , (ACM Press, New York, USA 2004) pp. 259–268, 2004.
  13. http://www.authorstream.com/Presentation/kudumulavishnu-2146270-security-wireless-sensor-networks
  14. Y.-C. Hu, A. Perrig, D.B. Johnson: Adriane: A Secure On-Demand Routing Protocol for Ad Hoc Networks, Annual ACM Int. Conference on Mobile Computing and Networking (MobiCom) 2002.
  15. K. Gandol, C. Mourtel, F. Olivier, “Electromagnetic Analysis: Concrete Results”, Published in C_ .K. Ko_c, D. Naccache, and C. Paar, Eds Cryptographic Hardware and Embedded Systems { CHES 2001, vol. 2162 of Lecture Notes in Computer Science, pp. 251{261, Springer-Verlag, 2001.
  16. Ju young Kim, Ronnie D. Caytiles, Kyung Jung Kim, “A Review of the Vulnerabilities and Attacks for Wireless Sensor Networks”, Journal of Security Engineering.
  17. Anthony D. Wood and John A. Stankovic, “A Taxonomy for Denial-of-Service Attacks in Wireless Sensor Networks”, Unpublished.
Index Terms

Computer Science
Information Sciences

Keywords

Security goals Security threats DoS Attack on different layers prevention of attacks.