Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

Denial-of-Service Attacks on Wireless Sensor Network and Defense Techniques

Published: 01 February 2021 Publication History

Abstract

The basic characteristic of a wireless sensor network is to sense the environment and to gather different types of data. It is used in various vital sectors, such as military, health-care, traffic monitoring, and so on. This provides many helpful data about these fields, which is used in implementing new technologies for them. However, there are numerous challenges and risks, regarding the security vulnerability of a wireless sensor network. This is because the resources of a wireless sensor network are very low (for example, low power, low computational resources, low storage, etc.). These constraints make them susceptible to different kinds of security attacks, especially the denial of service attacks. In this survey, we have outlined different kinds of DoS attacks in different layers of the hybrid layering model. We have also presented different defense mechanisms to protect/mitigate these attacks at different layers. Layer by layer analysis makes it easy to distinguish among different types of attacks and their defense techniques, along with the characteristics of the layers. Analysis of the critical issues of these attacks and defenses are finally presented with possible measures. This survey work can be very beneficial for the researchers and engineers in designing WSN topology with ensured security.

References

[1]
Dargie W and Poellabauer C Fundamentals of wireless sensor networks: Theory and practice 2010 Hoboken Wiley
[2]
Alaba FA, Othman M, Hashem IAT, and Alotaibi F Internet of things security: A survey Journal of Network and Computer Applications 2017 88 10-28
[3]
Akyildiz IF, Su W, Sankarasubramaniam Y, and Cayirci E Wireless sensor networks: A survey Computer Networks 2002 38 4 393-422
[4]
Lewis FL et al. Wireless sensor networks Smart Environments: Technologies, Protocols, and Applications 2004 11 46
[5]
Raghavendra CS, Sivalingam KM, and Znati T Wireless sensor networks 2006 Berlin Springer
[6]
Akyildiz IF and Vuran MC Wireless sensor networks 2010 Hoboken Wiley
[7]
Yick J, Mukherjee B, and Ghosal D Wireless sensor network survey Computer Networks 2008 52 12 2292-2330
[8]
Sicari S, Rizzardi A, Grieco LA, and Coen-Porisini A Security, privacy and trust in internet of things: The road ahead Computer Networks 2015 76 146-164
[9]
Ozdemir S and Xiao Y Secure data aggregation in wireless sensor networks: A comprehensive overview Computer Networks 2009 53 12 2022-2037
[10]
Hasan MZ, Al-Rizzo H, and Al-Turjman F A survey on multipath routing protocols for QOS assurances in real-time wireless multimedia sensor networks IEEE Communications Surveys & Tutorials 2017 19 3 1424-1456
[11]
Tanenbaum AS and Wetherall DJ Computer networks 2011 London Pearson
[12]
Sun B, Gui C, Song Y, and Chen H A novel network coding and multi-path routing approach for wireless sensor network Wireless Personal Communications 2014 77 1 87-99
[13]
Anand C and Gnanamurthy R Localized dos attack detection architecture for reliable data transmission over wireless sensor network Wireless Personal Communications 2016 90 2 847-859
[14]
Buschmann C, Pfisterer D, Fischer S, Fekete SP, and Kröller A Spyglass: A wireless sensor network visualizer ACM Sigbed Review 2005 2 1 1-6
[15]
Bhushan B and Sahoo G Recent advances in attacks, technical challenges, vulnerabilities and their countermeasures in wireless sensor networks Wireless Personal Communications 2018 98 2 2037-2077
[16]
Kim D, Jung S, Hwang DJ, and Kim S Mobile-based dos attack security agent in sensor networking Wireless Personal Communications 2016 86 1 91-107
[17]
Wood AD and Stankovic JA Denial of service in sensor networks Computer 2002 35 10 54-62
[18]
Raymond DR and Midkiff SF Denial-of-service in wireless sensor networks: Attacks and defenses IEEE Pervasive Computing 2008 7 1 74-81
[19]
Wang Y, Attebury G, and Ramamurthy B A survey of security issues in wireless sensor networks IEEE Communications Surveys & Tutorials 2006 8 2 2-23
[20]
Zhou Y, Fang Y, and Zhang Y Securing wireless sensor networks: A survey IEEE Communications Surveys & Tutorials 2008 10 3 6-28
[21]
Padmavathi, D.G., & Shanmugapriya, M., et al. (2009). A survey of attacks, security mechanisms and challenges in wireless sensor networks. arXiv preprint arXiv:0909.0576.
[22]
Kavitha T and Sridharan D Security vulnerabilities in wireless sensor networks: A survey Journal of Information Assurance and Security 2010 5 1 31-44
[23]
Sharma, K., & Ghose, M. (2010). Wireless sensor networks: An overview on its security threats. IJCA, Special Issue on “Mobile Ad-hoc Networks” MANETs (pp. 42–45).
[24]
Xing, K., Srinivasan, S.S.R., Jose, M., Li, J., & Cheng, X., et al. (2010). Attacks and countermeasures in sensor networks: A survey. In Network security (pp. 251–272). Boston, MA: Springer.
[25]
Singh SK, Singh M, and Singh D A survey on network security and attack defense mechanism for wireless sensor networks International Journal of Computer Trends and Technology 2011 1 2 9-17
[26]
Zhao G Wireless sensor networks for industrial process monitoring and control: A survey Network Protocols and Algorithms 2011 3 1 46-63
[27]
Islam K, Shen W, and Wang X Wireless sensor network reliability and security in factory automation: A survey IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews) 2012 42 6 1243-1256
[28]
ĐJurišić, M.P., Tafa, Z., Dimić, G., & Milutinović, V. (2012). A survey of military applications of wireless sensor networks. In Mediterranean conference on embedded computing (MECO) (pp. 196–199). IEEE, Bar, Montenegro.
[29]
Alemdar H and Ersoy C Wireless sensor networks for healthcare: A survey Computer Networks 2010 54 15 2688-2710
[30]
Kumar P and Lee HJ Security issues in healthcare applications using wireless medical sensor networks: A survey Sensors 2011 12 1 55-91
[31]
Christin D, Mogre PS, and Hollick M Survey on wireless sensor network technologies for industrial automation: The security and quality of service perspectives Future Internet 2010 2 2 96-125
[32]
Kulkarni RV, Forster A, and Venayagamoorthy GK Computational intelligence in wireless sensor networks: A survey IEEE Communications Surveys & Tutorials 2011 13 1 68-96
[33]
Bi S and Zhang YJ Computation rate maximization for wireless powered mobile-edge computing with binary computation offloading IEEE Transactions on Wireless Communications 2018 17 6 4177-4190
[34]
Ayyildiz C, Erdem HE, Dirikgil T, Dugenci O, Kocak T, Altun F, and Gungor VC Structure health monitoring using wireless sensor networks on structural elements Ad Hoc Networks 2019 82 68-76
[35]
Tolani M, Singh RK, et al. Lifetime improvement of wireless sensor network by information sensitive aggregation method for railway condition monitoring Ad Hoc Networks 2019 87 128-145
[36]
Boukerche A and Sun P Connectivity and coverage based protocols for wireless sensor networks Ad Hoc Networks 2018 80 54-69
[37]
Zhou Y, Yang B, Mu Y, and Xia Z Continuous leakage-resilient access control for wireless sensor networks Ad Hoc Networks 2018 80 41-53
[38]
Swain RR, Khilar PM, and Bhoi SK Heterogeneous fault diagnosis for wireless sensor networks Ad Hoc Networks 2018 69 15-37
[39]
Granjal J, Monteiro E, and Silva JS Security in the integration of low-power wireless sensor networks with the internet: A survey Ad Hoc Networks 2015 24 264-287
[40]
Pesko M, Smolnikar M, Vučnik M, Javornik T, Pejanović-Djurišić M, and Mohorčič M Smartphone with augmented gateway functionality as opportunistic wsn gateway device Wireless Personal Communications 2014 78 3 1811-1826
[41]
Singh VK, Singh VK, and Kumar M In-network data processing based on compressed sensing in WSN: A survey Wireless Personal Communications 2017 96 2 2087-2124
[42]
Akyildiz IF, Su W, Sankarasubramaniam Y, and Cayirci E A survey on sensor networks IEEE Communications Magazine 2002 40 8 102-114
[43]
Sohrabi K, Gao J, Ailawadhi V, and Pottie GJ Protocols for self-organization of a wireless sensor network IEEE Personal Communications 2000 7 5 16-27
[44]
Xu W, Ma K, Trappe W, and Zhang Y Jamming sensor networks: Attack and defense strategies IEEE Network 2006 20 3 41-47
[45]
Xu, W., Trappe, W., Zhang, Y., & Wood, T. (2005). The feasibility of launching and detecting jamming attacks in wireless networks. In Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing (pp. 46–57). ACM, Urbana-Champaign, IL, USA.
[46]
Hamamreh JM, Furqan HM, and Arslan H Classifications and applications of physical layer security techniques for confidentiality: A comprehensive survey IEEE Communications Surveys & Tutorials 2018 21 2 1773-1828
[47]
Raymond DR, Marchany RC, Brownfield MI, and Midkiff SF Effects of denial-of-sleep attacks on wireless sensor network MAC protocols IEEE Transactions on Vehicular Technology 2009 58 1 367-380
[48]
Ye W, Heidemann J, and Estrin D Medium access control with coordinated adaptive sleeping for wireless sensor networks IEEE/ACM Transactions on Networking (ToN) 2004 12 3 493-506
[49]
Song, W. M., Liu, Y. M., & Zhang, S. E. (2008). Research on SMAC protocol for WSN. In International conference on wireless communications, networking and mobile computing (pp. 1–4). IEEE, Dalian, China.
[50]
Polastre, J., Hill, J., & Culler, D. (2004). Versatile low power media access for wireless sensor networks. In Proceedings of the 2nd international conference on Embedded networked sensor systems (pp. 95–107). ACM, Baltimore, MD, USA.
[51]
Raza U, Kulkarni P, and Sooriyabandara M Low power wide area networks: An overview IEEE Communications Surveys & Tutorials 2017 19 2 855-873
[52]
Van Dam, T., Langendoen, K. (2003). An adaptive energy-efficient mac protocol for wireless sensor networks. In Proceedings of the 1st international conference on embedded networked sensor systems (pp. 171–180). ACM, Los Angeles, California, USA.
[53]
Srinivas VB and Umar S Spoofing attacks in wireless sensor networks International Journal of Science, Engineering and Computer Technology 2013 3 6 201
[54]
Karlof C and Wagner D Secure routing in wireless sensor networks: Attacks and countermeasures Ad Hoc Networks 2003 1 2 293-315
[55]
Mao Y, You C, Zhang J, Huang K, and Letaief KB A survey on mobile edge computing: The communication perspective IEEE Communications Surveys & Tutorials 2017 19 4 2322-2358
[56]
Singh VP, Jain S, and Singhai J Hello flood attack and its countermeasures in wireless sensor networks IJCSI International Journal of Computer Science Issues 2010 7 11 23-27
[57]
Deng, J., Han, R., & Mishra, S. (2005). Defending against path-based dos attacks in wireless sensor networks. In Proceedings of the 3rd ACM workshop on security of ad hoc and sensor networks (pp. 89–96). ACM, Alexandria, VA, USA.
[58]
Woo, A., Tong, T., & Culler, D. (2003). Taming the underlying challenges of reliable multihop routing in sensor networks. In Proceedings of the 1st international conference on embedded networked sensor systems (pp. 14–27). ACM, Los Angeles, California, USA.
[59]
Anderson, R., & Kuhn, M. (1996). Tamper resistance-a cautionary note. In Proceedings of the second Usenix workshop on electronic commerce (vol. 2, pp. 1–11). Oakland, California.
[60]
Zou Y, Zhu J, Wang X, and Hanzo L A survey on wireless security: Technical challenges, recent advances, and future trends Proceedings of the IEEE 2016 104 9 1727-1765
[61]
Bhattasali, T., Chaki, R., Sanyal, S.: Sleep deprivation attack detection in wireless sensor network. CoRR abs/1203.0231 (2012), http://arxiv.org/abs/1203.0231.
[62]
Yu, Y., Govindan, R., Estrin, D.: Geographical and energy aware routing: A recursive data dissemination protocol for wireless sensor networks (2001).
[63]
Al-Fuqaha A, Guizani M, Mohammadi M, Aledhari M, and Ayyash M Internet of things: A survey on enabling technologies, protocols, and applications IEEE Communications Surveys & Tutorials 2015 17 4 2347-2376
[64]
Sun, K., Peng, P., Ning, P., & Wang, C. (2006). Secure distributed cluster formation in wireless sensor networks. In 22nd annual computer security applications conference (pp. 131–140). IEEE, Miami Beach, FL, USA.
[65]
Tyagi S and Kumar N A systematic review on clustering and routing techniques based upon leach protocol for wireless sensor networks Journal of Network and Computer Applications 2013 36 2 623-645
[66]
Mohi, M., Movaghar, A., & Zadeh, P. M. (2009). A bayesian game approach for preventing dos attacks in wireless sensor networks. In International conference on communications and mobile computing (vol. 3, pp. 507–511). IEEE, Yunnan, China.
[67]
Chakeres, I. D., Belding-Royer, E. M. (2004). Aodv routing protocol implementation design. In International conference on distributed computing systems workshops (pp. 698–703). IEEE, Hachioji, Tokyo, Japan.
[68]
Patil S and Chaudhari S Dos attack prevention technique in wireless sensor networks Procedia Computer Science 2016 79 715-721
[69]
Li XM, Zhou Q, Li P, Li H, and Lu R Event-triggered consensus control for multi-agent systems against false data-injection attacks IEEE Transactions on Cybernetics 2019 50 5 1856-1866
[70]
Aura, T., Nikander, P., Leiwo, J. (2000). Dos-resistant authentication with client puzzles. In International workshop on security protocols (pp. 170–177). Springer, Berlin.
[71]
Zhang YY, Li XZ, and Liu YA The detection and defence of DoS attack for wireless sensor network The Journal of China Universities of Posts and Telecommunications 2012 19 52-56

Cited By

View all
  • (2024)Enhancing Internet of Medical Things security with artificial intelligenceComputers in Biology and Medicine10.1016/j.compbiomed.2024.108036170:COnline publication date: 25-Jun-2024
  • (2024)VMRF: revolutionizing military border surveillance with extensive coverage and connectivityTelecommunications Systems10.1007/s11235-024-01125-686:3(481-502)Online publication date: 1-Jul-2024
  • (2022)Secure and Energy Efficient Routing in Wireless Sensor Network using Machine LearningProceedings of the 2022 Fourteenth International Conference on Contemporary Computing10.1145/3549206.3549299(544-549)Online publication date: 4-Aug-2022

Index Terms

  1. Denial-of-Service Attacks on Wireless Sensor Network and Defense Techniques
            Index terms have been assigned to the content through auto-classification.

            Recommendations

            Comments

            Information & Contributors

            Information

            Published In

            cover image Wireless Personal Communications: An International Journal
            Wireless Personal Communications: An International Journal  Volume 116, Issue 3
            Feb 2021
            1226 pages

            Publisher

            Kluwer Academic Publishers

            United States

            Publication History

            Published: 01 February 2021

            Author Tags

            1. Denial-of-service
            2. Wireless sensor network
            3. Attacks
            4. Defense
            5. Analysis

            Qualifiers

            • Research-article

            Contributors

            Other Metrics

            Bibliometrics & Citations

            Bibliometrics

            Article Metrics

            • Downloads (Last 12 months)0
            • Downloads (Last 6 weeks)0
            Reflects downloads up to 06 Oct 2024

            Other Metrics

            Citations

            Cited By

            View all
            • (2024)Enhancing Internet of Medical Things security with artificial intelligenceComputers in Biology and Medicine10.1016/j.compbiomed.2024.108036170:COnline publication date: 25-Jun-2024
            • (2024)VMRF: revolutionizing military border surveillance with extensive coverage and connectivityTelecommunications Systems10.1007/s11235-024-01125-686:3(481-502)Online publication date: 1-Jul-2024
            • (2022)Secure and Energy Efficient Routing in Wireless Sensor Network using Machine LearningProceedings of the 2022 Fourteenth International Conference on Contemporary Computing10.1145/3549206.3549299(544-549)Online publication date: 4-Aug-2022

            View Options

            View options

            Get Access

            Login options

            Media

            Figures

            Other

            Tables

            Share

            Share

            Share this Publication link

            Share on social media