DoS Attacks on different Layers of WSN: A Review

WSNs plays an important role in many of the applications like patient health monitoring, battlefields surveillance, traffic control, environmental observation, home automation and building intrusion surveillance. WSNs are convenient, cost effective, and give ease of integration with other networks and their components. However, wireless technology also produces new threats. Since WSNs communicate by using radio frequencies therefore the risk of interference is more than with wired networks. If the message to be passed is not in an encrypted form, or is encrypted by using a feeble algorithm and the attacker can easily read it, and it is the compromise to the confidentiality. Security objectives include: protecting confidentiality, assuring integrity, providing authentication and supporting availability of the information and information systems. In this paper we describe the types of existing DoS attacks and how existing techniques can be used to prevent or mitigate these attacks in WSNs. General Terms WSN Security, DoS Attack, Defenses.

[1]  Christof Paar,et al.  Cryptographic Hardware and Embedded Systems - CHES 2002 , 2003, Lecture Notes in Computer Science.

[2]  Choong Seon Hong,et al.  Security in wireless sensor networks: issues and challenges , 2006, 2006 8th International Conference Advanced Communication Technology.

[3]  Francis Olivier,et al.  Electromagnetic Analysis: Concrete Results , 2001, CHES.

[4]  Yong Wang,et al.  A survey of security issues in wireless sensor networks , 2006, IEEE Communications Surveys & Tutorials.

[5]  Kalpana Sharma,et al.  Wireless Sensor Networks: An Overview on its Security Threats , 2010 .

[6]  Philip LaRoche Campbell A taxonomy of Denial of Service attacks. , 2003, S&P 2003.

[8]  John A. Stankovic,et al.  A Taxonomy for Denial-of-Service Attacks in Wireless Sensor Networks , 2004, Handbook of Sensor Networks.

[9]  P. N. Barwal,et al.  Wireless Sensor Networks : Security Issues , Challenges and Solutions , 2006 .

[10]  D. Llewellyn-Jones,et al.  Dynamic Group-Based Key Establishment for Large-scale Wireless Sensor Networks , 2006, 2006 First International Conference on Communications and Networking in China.

[11]  Xu Qiao-ping,et al.  Secure On-demand Routing Protocol for Ad Hoc Network , 2010 .

[12]  Ahmad Alkhatib,et al.  Wireless Sensor Network Architecture , 2012 .

[13]  Shivakant Mishra,et al.  Countermeasures Against Traffic Analysis Attacks in Wireless Sensor Networks , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).

[14]  Yih-Chun Hu,et al.  Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2002, MobiCom '02.

[15]  Rekha Jain,et al.  Wireless Sensor Network -A Survey , 2013 .

[16]  Seyed Ali Ghorashi,et al.  Fuzzy C-Means Clustering-Based Jamming Detection Algorithm at Base Station , 2013 .

[17]  Charalampos Konstantopoulos,et al.  A survey on jamming attacks and countermeasures in WSNs , 2009, IEEE Communications Surveys & Tutorials.

[18]  K. Kifayat,et al.  Group-Based Secure Communication for Large-Scale Wireless Sensor Networks , 2009 .

[19]  S. Shankar Sastry,et al.  A Fine-Grained Taxonomy of Security Vulnerability in Active Network Environments , 2004, ICCSA.