DOS Attacks on WSN and Their Classifications With Countermeasures - A Survey
Wireless Sensor Networks (WSN) is a network of sensors, actuators, mobile and wearable devices that have processing and communication modules to monitor physical and environmental conditions. Currently millions of these type of smart devices serving in many fields like military, environment, and health services. Due to their unique deployment places even in hostile territories WSN are subject to various kinds of attacks. Self conﬁguration, autonomous device addition, network connection and resource limitation are the main features of WSN that makes it highly prone to network attacks. Denial of Service (DoS) attacks which targets the availability of a WSN system is one of the most potent threat to which a WSN must be resilient in order to continue operations. This studies aim to analyze and classify the WSN DoS threats and their countermeasures. Based on the survey we present the best approach to designing a WSN resilient against DoS attacks.
E. Edition, O. Systems, S. Edition, and B. D. Communications, the William Stallings Books on Computer Data and Computer Communications , 2011,Eighth Edition, vol. 139, no. 3. .
A. D. Wood and J. A. Stankovic, “A Taxonomy for Denial-of-Service Attacks in Wireless Sensor Networks,” Handb. Sens. Networks Compact Wirel. Wired Sens. Syst,2004., pp. 739–763.
J. Cai, P. Yi, Y. Tian, Y. Zhou, and N. Liu, “The Simulation and Comparison of Routing Attacks on DSR Protocol,” in 2009 5th International Conference on Wireless Communications, Networking and Mobile Computing, 2009, pp. 1–4.
N. Komninos, D. Vergados, and C. Douligeris, “Layered security design for mobile ad hoc networks,” Comput. Secur,2006, vol. 25, no. 2, pp. 121–130.
S. Umrao, A. Kumar, and P. Umrao, “Security attacks and their countermeasures along with node replication attack for time synchronization in wireless sensor network,2013,” pp. 576–581.
T. Chuachan, S. Puangpronpitag, F. Wang, Y. Zhang, Y. Xu, L. Wu, B. Diao, L. Jing, L. Ming, Y. Bin, L. Wenlong, V. Nigam, S. Jain, and K. Burse, “Profile Based Scheme against DDoS Attack in WSN,” 2014 Int. Conf. Comput. Netw. Commun., no. February 2014, pp. 11–20.
W. Qiao, J. Li, and J. Ren, “An efficient error-detection and error-correction (EDEC) scheme for network coding,” GLOBECOM - IEEE Glob. Telecommun. Conf. 2011, no. 978, pp. 0–4.
S. Ghormare and V. Sahare, “Implementation of data confidentiality for providing high security in Wireless Sensor Network,” in 2015 International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS),2015, pp. 1–5.
F. Ye, H. Luo, S. Lu, and L. Zhang, “Statistical En-route Filtering of injected false data in sensor networks,” Proc. - IEEE INFOCOM, 2004 vol. 4, no. 4, pp. 2446–2457.
V. B. Salve and L. Ragha, “AODV Based Secure Routing Algorithm against Sinkhole Attack in Wirelesses Sensor Networks,” 2015.
V. F. Taylor and D. T. Fokum, “Mitigating Black Hole Attacks in Wireless Sensor Networks Using Node-Resident Expert Systems,” 2014.
T. Lupu and V. Parvan, “Main Types of Attacks in Wireless Sensor Networks,” WSEAS Int. Conf. Proceedings. Recent Adv. Comput. Eng 2009., pp. 180–185.
Y. Jiang, J. Huang, and W. Jin, “INTRUSION TOLERANCE SYSTEM AGAINST DENIAL OF SERVICE ATTACKS IN WIRELESS SENSOR NETWORK.”
O. Xi, T. Bin, L. Qi, Z. Jian-yi, H. Zheng-ming, and X. Yang, “A Novel Framework of Defense System Agaist DoS Attacks in Wireless Sensor Networks,” 2011.
E. Achuthan and R. Kishore, “A novel anti jamming technique for Wireless Sensor Networks,” 2014 Int. Conf. Commun. Signal Process,2014, pp. 920–924.
V. C. Manju and K. M. Sasi, “Detection of jamming style DoS attack in Wireless Sensor Network,” Proc. 2012 2nd IEEE Int. Conf. Parallel, Distrib. Grid Comput. PDGC 2012, pp. 563–567.
A. Azim, S. Mahiba, T. Alam, K. Sabbir, and S. Ahmad, “Efficient Jammed Area Mapping in Wireless Sensor, 2014” vol. 6, no. 4, pp. 93–96.
S. Venkatasubramanian and V. Jothi, “Integrated authentication and security check with CDMA modulation technique in physical layer of Wireless Body Area Network,” 2012 IEEE Int. Conf. Comput. Intell. Comput. Res. 2012, pp. 1–6.
H. M. Sun, S. P. Hsu, and C. M. Chen, “Mobile Jamming attack and its countermeasure in wireless sensor networks,” 2007 Proc. - 21st Int. Conf. Adv. Inf. Netw. Appl. Work. AINAW’07, vol. 2, pp. 457–462.
I. Mandwi, P. Karmore, K. Ga, and Y. Bute, “Implementation of Packet-Hiding Algorithm for Preventing Selective Jamming Attaclks,” 2015.
N. Joshi, J. Sundararajan, and R. Karri, “Tamper Proofing by Design Using Generalized Involution-Based Concurrent Error Detection for Involutional Substitution Permutation and Feistel Networks,” 2006 IEEE Trans. Comput., vol. 55, no. 10, pp. 1230–1239.
[M. S. Obaidat, I. Woungang, S. K. Dhurandher, V. Koo, S. Engineering, and W. L. Branch, “Preventing Packet Dropping and Message Tampering Attacks on AODV-based Mobile Ad Hoc Networks,” 2012, pp. 1–5.
I. Khalil, “MCC: Mitigating Colluding Collision Attacks in Wireless Sensor Networks,” 2010 IEEE Glob. Telecommun. Conf. GLOBECOM 2010, pp. 1–5.
P. Reindl, K. Nygard, and X. Du, “Defending Malicious Collision Attacks in Wireless Sensor Networks,” 2010 IEEE/IFIP Int. Conf. Embed. Ubiquitous Comput., pp. 771–776.
S. A. Khan and Z. A. Baig, “On the use of Unified And-Or fuzzy operator for distributed node exhaustion attack decision-making in wireless sensor networks,” 2010, Int. Conf. Fuzzy Syst., pp. 1–7.
D. R. Raymond, R. C. Marchany, M. I. Brownfield, and S. F. Midkiff, “Effects of Denial-of-Sleep Attacks on Wireless Sensor Network MAC Protocols,” 2009 IEEE Trans. Veh. Technol., vol. 58, no. 1, pp. 367–380.
“CLUSTERED ADAPTIVE RATE LIMITING : DEFEATING DENIAL-OF-SLEEP ATTACKS IN WIRELESS SENSOR NETWORKS David R . Raymond and Scott F . Midkiff Bradley Department of Electrical and Computer Engineering Virginia Polytechnic Institute and State University Blacksbu,” pp. 1–7.
V. C. Manju, S. L. Senthil Lekha, and M. Sasi Kumar, “Mechanisms for detecting and preventing denial of sleep attacks on wireless sensor networks,” in 2013 IEEE CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES, 2013, pp. 74–77.
S. M. Sakharkar, R. S. Mangrulkar, and M. Atique, “A survey: A secure routing method for detecting false reports and gray-hole attacks along with Elliptic Curve Cryptography in wireless sensor networks,” in 2014 IEEE Students’ Conference on Electrical, Electronics and Computer Science, 2014, pp. 1–5.
I. Almomani and B. Al-Kasasbeh, “Performance analysis of LEACH protocol under Denial of Service attacks,” 2015 6th Int. Conf. Inf. Commun. Syst., pp. 292–297.
N. Dharini, R. Balakrishnan, and A. P. Renold, “Distributed Detection of Flooding and Gray Hole Attacks in Wireless Sensor Network,” 2015 no. May, pp. 178–184.
S. P. Dongare and R. S. Mangrulkar, “Implementing Energy Efficient Technique for Defense against Gray-Hole and Black-Hole Attacks in Wireless Sensor Networks,” 2015 pp. 167–173.
S. E. N. Etwork, “Hierarchical Design Bssed Intrusion Detection System For Wireless ad Hoc,” 2010, Netw. Secur., vol. 2, no. 3, pp. 102–117.
M. Vidya and S. Reshmi, “Preventing Denial of Service Attacks in Wireless Sensor Networks,2014” pp. 16–21.
J. H. Kim and T. H. Cho, “Inter leaved Hop-by-Hop Authentication using fuzzy logic to defend against of False Report Injection by Replaying an attack,” 2009 vol. 9, no. 7, pp. 91–96.
M. Dubey, P. Mayank Bhatt, and P. R. Bhandari, “Prevention of DDOS Attack in Wireless sensor network using secure routing,” Int. J. Adv. Res. Comput. Commun. Eng. 2015, vol. 4, no. 2, pp. 143–145.
I. Woungang, S. K. Dhurandher, V. Koo, and I. Traore, “Comparison of two security protocols for preventing packet dropping and message tampering attacks on AODV-based mobile ad Hoc networks,” Globecom Work. (GC Wkshps), 2012 IEEE, pp. 1037–1041.
D. Holmer, H. Rubens, and C. Nita-rotaru, “Mitigating Byzantine Attacks in Ad Hoc Wireless Networks,” Computer (Long. Beach. Calif)., no. March, 2004.
J. Soryal, “Byzantine Attack Isolation in IEEE 802 . 11 Wireless Ad- Hoc Networks.”
P. Zhang, J. Y. Koh, S. Lin, and I. Nevat, “Distributed Event Detection under Byzantine Attack in Wireless Sensor Networks,” 2014, no. April, pp. 21–24.
B. Stelte, “Protection against byzantine attacks on wireless sensor networks,” Wireless Information Networks and Systems (WINSYS), 2011 Proceedings of the International Conference on. pp. 53–58.
J. Xu, K. Wang, C. Wang, F. Hu, Z. Zhang, S. Xu, and J. Wu, “Byzantine fault-tolerant routing for large-scale wireless sensor networks based on fast ECDSA,” 2015 Tsinghua Science and Technology, vol. 20, no. 6. pp. 627–633.
K. M. A. Alheeti, A. Gruebler, and K. D. Mcdonald-maier, “On the Detection of Grey hole and Rushing Attacks in Self- Driving Vehicular Networks,” 2015 pp. 231–236,
L. Tamilselvan and V. Sankaranarayanan, “Solution to prevent rushing attack in wireless mobile ad hoc networks,” ISAHUC’ 06 - Proc. 2006 Int. Symp. Ad Hoc Ubiquitous Comput., pp. 42–47.
A. . Rawat, P. D. . Vyavahare, and A. K. . Ramani, “Evaluation of rushing attack on Secured Message Transmission (SMT/SRP) protocol for mobile Ad-hoc networks,” 2005 IEEE Int. Conf. Pers. Wirel. Commun., pp. 62–66.
C. Karlof and D. Wagner, “Secure routing in wireless sensor networks: attacks and countermeasures,” Proc. First IEEE Int. Work. Sens. Netw. Protoc. Appl. 2003., pp. 113–127.
M. Guerroumi, A. Derhab, and K. Saleem, “Intrusion Detection System against Sink Hole Attack in Wireless Sensor Networks with Mobile Sink,” 2015 12th Int. Conf. Inf. Technol. - New Gener., pp. 307–313.
M. A. Rassam, A. Zainal, and M. Al-shaboti, “A Sinkhole Attack Detection Scheme in Mintroute Wireless Sensor Networks,”2012 pp. 71–75.
S. Lim and L. Huie, “Hop-by-Hop cooperative detection of selective forwarding attacks in energy harvesting wireless sensor networks,” Comput. Netw. Commun. (ICNC), 2015 Int. Conf., pp. 315–319.
C. Kavitha, “A secured alternative path routing protocol against DoS attack,” 2014 Elev. Int. Conf. Wirel. Opt. Commun. Networks, 2014 pp. 1–5.
P. Sharma, M. Saluja, and K. K. Saluja, “DETECTION TECHNIQUES OF S ELECTIVE F ORWARDING A TTACKS IN WIRELESS SENSOR NETWORKS : A SURVEY,” 2012 pp. 13–18.
D. Kendall, “RAEED : A solution for Hello Flood Attack,” 2015, pp. 248–253.
M. Sayad Haghighi, K. Mohamedpour, V. Varadharajan, and B. G. Quinn, “Stochastic Modeling of Hello Flooding in Slotted CSMA/CA Wireless Sensor Networks,” 2011 IEEE Trans. Inf. Forensics Secur., vol. 6, no. 4, pp. 1185–1199.
M. A. Jan, P. Nanda, X. He, and R. P. Liu, “A Sybil Attack Detection Scheme for a Centralized Clustering-Based Hierarchical Network,” 2015 IEEE Trust., pp. 318–325.
A. A. Patel and S. J. Soni, “A novel proposal for defending against vampire attack in WSN,” Proc. - 2015 5th Int. Conf. Commun. Syst. Netw. Technol. CSNT 2015, pp. 624–627.
E. Mariyappan and C. Balakrishnan, “Power draining prevention in Ad-Hoc Sensor networks using sensor network encryption protocol,” 2014 Int. Conf. Inf. Commun. Embed. Syst. ICICES 2014, no. 978.
M. Computing, “Defending Against Vampire Attacks,” 2014 vol. 3, no. 11, pp. 668–679.
E. Y. Vasserman and N. Hopper, “Vampire attacks: Draining life from wireless ad Hoc sensor networks,” 2013 IEEE Trans. Mob. Comput., vol. 12, no. 2, pp. 318–332.
L. R. Deshmukh, “of the Vampire Attacks in WSN using Routing Loops,” pp. 61–66, 2015.
R. Abirami and G. Premalatha, “Depletion of vampire attacks in medium access control level using interior gateway routing protocol,” 2014 Int. Conf. Inf. Commun. Embed. Syst. ICICES 2014, no. 978.
Q. Dong, L. Gao, and X. Li, “A new client-puzzle based DoS-resistant scheme of IEEE 802.11i wireless authentication protocol,” Proc. - 2010 3rd Int. Conf. Biomed. Eng. Informatics, BMEI 2010, vol. 7, no. Bmei, pp. 2712–2716.
T. J. McNevin, J.-M. Park, and R. Marchany, “Chained puzzles: A novel framework for IP-layer client puzzles,” 2005 Int. Conf. Wirel. Networks, Commun. Mob. Comput., vol. 1, pp. 298–303.
C. U. I. Delong, L. Qirui, Y. U. Guilan, and X. Jianbin, “CONTENT-BASED AUDIO WATERMARKING METHOD TO RESIST DE-SYNCHRONIZATION ATTACKS.”
S. Rashid, U. Akram, S. Qaisar, S. A. Khan, and E. Felemban, “Wireless Sensor Network for Distributed Event Detection Based on Machine Learning,” 2014 IEEE Int. Conf. Internet Things(iThings), 2014 IEEE Green Comput. Commun. IEEE Cyber, Phys. Soc. Comput., no. iThings, pp. 540–545.
N. J. Patel and R. H. Jhaveri, “Detecting packet dropping nodes using machine learning techniques in Mobile ad-hoc network: A survey,” Signal Process. Commun. Eng. Syst. (SPACES), 2015 Int. Conf., pp. 468–472.
A. R. Pinto, B. Bitencort, M. A. R. Dantas, C. B. Montez, and F. Vasques, “Genetic machine learning approach for data fusion applications in dense Wireless Sensor Networks,” in 2008 IEEE International Conference on Emerging Technologies and Factory Automation, 2008, pp. 1177–1180.
H. Rathore and S. Jha, “Bio-inspired machine learning based Wireless Sensor Network security,” 2013 World Congr. Nat. Biol. Inspired Comput., pp. 140–146.
H. Rathore, V. Badarla, S. Jha, and A. Gupta, “Novel approach for security in Wireless Sensor Network using bio-inspirations,” 2014 Sixth Int. Conf. Commun. Syst. Networks, pp. 1–8.
A. S. A. Aziz, A. E. Hassanien, S. E. O. Hanaf, and M. F. Tolba, “Multi-layer hybrid machine learning techniques for anomalies detection and classification approach,” 13th Int. Conf. Hybrid Intell. Syst. HIS 2013, pp. 215–220.