CFP last date
22 April 2024
Reseach Article

On Denial of Service Attacks for Wireless Sensor Networks

by Nischay Bahl, Ajay K. Sharma, Harsh K. Verma
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 43 - Number 6
Year of Publication: 2012
Authors: Nischay Bahl, Ajay K. Sharma, Harsh K. Verma
10.5120/6111-8348

Nischay Bahl, Ajay K. Sharma, Harsh K. Verma . On Denial of Service Attacks for Wireless Sensor Networks. International Journal of Computer Applications. 43, 6 ( April 2012), 43-47. DOI=10.5120/6111-8348

@article{ 10.5120/6111-8348,
author = { Nischay Bahl, Ajay K. Sharma, Harsh K. Verma },
title = { On Denial of Service Attacks for Wireless Sensor Networks },
journal = { International Journal of Computer Applications },
issue_date = { April 2012 },
volume = { 43 },
number = { 6 },
month = { April },
year = { 2012 },
issn = { 0975-8887 },
pages = { 43-47 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume43/number6/6111-8348/ },
doi = { 10.5120/6111-8348 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:32:45.409109+05:30
%A Nischay Bahl
%A Ajay K. Sharma
%A Harsh K. Verma
%T On Denial of Service Attacks for Wireless Sensor Networks
%J International Journal of Computer Applications
%@ 0975-8887
%V 43
%N 6
%P 43-47
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

On denial-of-service (DoS) attacks for wireless sensor networks (WSNs), we investigated the security aspects of the physical layer. We conducted the simulative performance analysis of jamming attacks for signal-to-noise ratio (SNR), bit error rate (BER), network throughput and packet delivery ratio (PDR) using IEEE 802. 15. 4 based OPNET simulative model for WSN under constant and varying intensity of jamming attacks. Under constant jamming attack, simulations revealed that average sink node PDR degrades from 79. 01% in a normal scenario, to 59. 22% in jammed scenario. Also, normal scenario shows maximum PDR of 89. 68% and minimum PDR of 70. 02% while jammed scenario shows a maximum PDR of 64. 93% and minimum PDR of 49. 90%. Under varying intensity of jamming attack, simulations revealed that average sink node PDR decreases, from 79. 01% in a normal scenario, by 5. 54%, 4. 53%, 6. 36% and 3. 35% with the introduction of one, two, three and four jammers respectively. Further, the average SNR decreases, from 73. 59%, in a normal scenario, by 5. 43%, 5. 63%, 10. 44% and 20. 39% with the introduction of one, two, three and four jammers respectively.

References
  1. Konstantinos Pelechrinis, Marios Iliofotou and Srikanth V. Krishnamurthy (2010): "Denial of Service Attacks in Wireless Networks: The Case of Jammers". In: IEEE Communications surveys & tutorials 2010.
  2. Vassilaras Spyridon and Yovanof Gregory: "Wireless Innovations as Enablers for Complex & Dynamic Artificial Systems". In: Wireless Personal Communications, Volume 53, Number 3, pp. 365-393 (2010).
  3. Robert Szewczyk, Joseph Polastre, Alan Mainwaring and David Culler: "Lessons from a sensor network expedition". In: Wireless Sensor Networks Lecture Notes in Computer Science, Vol. 2920, pp. 307-322 (2004).
  4. Adrian Perrig, John Stankovic, David Wagner: "Security in Wireless Sensor Networks". In: Communications of the ACM, Vol. 47, No. 6 (2004).
  5. JP Walters, Z Liang, W Shi, V Chaudhary: Chapter 17 Wireless Sensor Network Security: A Survey, In: Security in Distributed, Grid, and Pervasive Computing Yang Xiao, (Eds. ), Auerbach (2006).
  6. Anthony D. Wood, John A. Stankovic: "Denial of Service in Sensor Networks". In: IEEE Computer, Vol. 35, No. 10, pp. 54-62 (2002).
  7. Sherif Khattab, Daniel Mosse, and Rami Melhem: "Honeybees: Combining Replication and Evasion for mitigating Base station Jamming in Sensor Networks". In: Proceedings of the 20th international conference on Parallel and distributed processing, p. 174-174, April 25-29, Rhodes Island, Greece (2006).
  8. Wenyuan Xu, Timothy Wood, Wade Trappe, and Yanyong Zhang: "Channel surfing and spatial retreats: Defenses against wireless denial of service". In: Proceedings of ACM workshop on Wireless security, pp. 80 - 89 (2004).
  9. Hung-Min Sun, Shih-Pu Hsu, and Chien-Ming Chen: "Mobile Jamming Attack and its Countermeasure in Wireless Sensor Networks". In: Proceedings of the 21st International Conference on Advanced Information Networking and Applications Workshops, Vol. 1, pp. 457-462 (2007).
  10. Jing Deng, Richard Han, and Shivakant Mishra: "Enhancing base station security in wireless sensor networks". In: Technical Report CU-CS 951-03, Department of Computer Science, University of Colorado, Boulder, CO (2003).
  11. Jing Deng, Richard Han, Shivakant Mishra: "Intrusion tolerance and anti-traffic analysis strategies for wireless sensor networks". In: Proceedings of International Conference on Dependable Systems and Networks, p. 637 (2004).
  12. A. D. Wood, J. A. Stankovic and S. H. Son: "JAM: A Jammed-Area Mapping Service for Sensor Networks". In: 24th IEEE International Real-Time Systems Symposium (RTSS) Cancun, Mexico (2003).
  13. C. Karlof and D. Wagner: "Secure Routing in Sensor Networks: Attacks and Countermeasures". In: Elsevier Ad Hoc Networks, Vol. 1, pp. 293–315 (2003).
  14. Sushil Kumar Jain and Kumkum Garg: "A Hybrid Model of Defense Techniques against Base Station Jamming Attack in Wireless Sensor Networks". In: Proceedings of First International Conference on Computational Intelligence, Communication Systems and Networks, pp. 102-107 (2009).
  15. W. Xu, W. Trappe, Y. Zhang, and T. Wood (2005) "The Feasibility of Launching and Detecting Jamming Attacks in Wireless Networks", in MobiHoc, Urbana- Champaign, Illinois, USA, pp 46-57 , May 25-27, 2005.
  16. M. Acharya and D. Thuente, "Intelligent Jamming Attacks, Counterattacks and (Counter) 2 Attacks in 802. 11bWireless Networks", in Proceedings of the OPNETWORK-2005 Conference, Washington DC, USA, August 2005.
  17. Xu W, Ma K, Trappe W, Zhang Y. : "Jamming sensor networks: attack and defense strategies". In: IEEE Networks 20(3), pp. 41–47 (2006).
  18. Ghada Alnifie, Robert Simon: "A multi-channel defense against jamming attacks in wireless sensor networks". In: Proceedings of the 3rd ACM Workshop on QoS and Security for Wireless and Mobile Networks, Chania, Crete Island, Greece (2007).
  19. P. Jurcik, A. Koubaa, (2009): "The IEEE 802. 15. 4 OPNET Simulation Model: Reference Guide v2", Technical report HURRAY-TR-070509.
  20. Boris Mihajlov and Mitko Bogdanoski: "Overview and Analysis of the Performances of ZigBee based Wireless Sensor Networks". In: International Journal of Computer Applications (0975 – 8887) Volume 29– No. 12, September 2011.
Index Terms

Computer Science
Information Sciences

Keywords

Wireless Sensor Network (wsn) Zigbee Security Denial Of Service (dos) Jamming Attack