On Denial of Service Attacks for Wireless Sensor Networks

نویسندگان

  • Nischay Bahl
  • Ajay K. Sharma
  • Harsh K. Verma
  • Konstantinos Pelechrinis
  • Marios Iliofotou
  • Srikanth V. Krishnamurthy
  • Robert Szewczyk
  • Joseph Polastre
  • Alan Mainwaring
  • Adrian Perrig
  • John Stankovic
  • David Wagner
  • JP Walters
  • Yang Xiao
  • Anthony D. Wood
  • John A. Stankovic
  • Sherif Khattab
  • Daniel Mosse
  • Wenyuan Xu
  • Timothy Wood
  • Wade Trappe
  • Hung-Min Sun
  • Shih-Pu Hsu
چکیده

On denial-of-service (DoS) attacks for wireless sensor networks (WSNs), we investigated the security aspects of the physical layer. We conducted the simulative performance analysis of jamming attacks for signal-to-noise ratio (SNR), bit error rate (BER), network throughput and packet delivery ratio (PDR) using IEEE 802. 15. 4 based OPNET simulative model for WSN under constant and varying intensity of jamming attacks. Under constant jamming attack, simulations revealed that average sink node PDR degrades from 79. 01% in a normal scenario, to 59. 22% in jammed scenario. Also, normal scenario shows maximum PDR of 89. 68% and minimum PDR of 70. 02% while jammed scenario shows a maximum PDR of 64. 93% and minimum PDR of 49. 90%. Under varying intensity of jamming attack, simulations revealed that average sink node PDR decreases, from 79. 01% in a normal scenario, by 5. 54%, 4. 53%, 6. 36% and 3. 35% with the introduction of one, two, three and four jammers respectively. Further, the average SNR decreases, from 73. 59%, in a normal scenario, by 5. 43%, 5. 63%, 10. 44% and 20. 39% with the introduction of one, two, three and four jammers respectively.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Evaluation of an Intrusion Detection System for Routing Attacks in Wireless Self-organised Networks

Wireless Sensor Networks (WSNs) arebecoming increasingly popular, and very useful in militaryapplications and environmental monitoring. However,security is a major challenge for WSNs because they areusually setup in unprotected environments. Our goal in thisstudy is to simulate an Intrusion Detection System (IDS)that monitors the WSN and report intrusions accurately andeffectively. We have thus...

متن کامل

A Lightweight Intrusion Detection System Based on Specifications to Improve Security in Wireless Sensor Networks

Due to the prevalence of Wireless Sensor Networks (WSNs) in the many mission-critical applications such as military areas, security has been considered as one of the essential parameters in Quality of Service (QoS), and Intrusion Detection System (IDS) is considered as a fundamental requirement for security in these networks. This paper presents a lightweight Intrusion Detection System to prote...

متن کامل

A Secure Routing Algorithm for Underwater Wireless Sensor Networks

Recently, underwater Wireless Sensor Networks (UWSNs) attracted the interest of many researchers and the past three decades have held the rapid progress of underwater acoustic communication. One of the major problems in UWSNs is how to transfer data from the mobile node to the base stations and choosing the optimized route for data transmission. Secure routing in UWSNs is necessary for packet d...

متن کامل

Intrusion Detection in Wireless Sensor Networks using Genetic Algorithm

Wireless sensor networks, due to the characteristics of sensors such as wireless communication channels, the lack of infrastructure and targeted threats, are very vulnerable to the various attacks. Routing attacks on the networks, where a malicious node from sending data to the base station is perceived. In this article, a method that can be used to transfer the data securely to prevent attacks...

متن کامل

Security Analysis of Lightweight Authentication Scheme with Key Agreement using Wireless Sensor Network for Agricultural Monitoring System

Wireless sensor networks have many applications in the real world and have been developed in various environments. But the limitations of these networks, including the limitations on the energy and processing power of the sensors, have posed many challenges to researchers. One of the major challenges is the security of these networks, and in particular the issue of authentication in the wireles...

متن کامل

HF-Blocker: Detection of Distributed Denial of Service Attacks Based On Botnets

Abstract—Today, botnets have become a serious threat to enterprise networks. By creation of network of bots, they launch several attacks, distributed denial of service attacks (DDoS) on networks is a sample of such attacks. Such attacks with the occupation of system resources, have proven to be an effective method of denying network services. Botnets that launch HTTP packet flood attacks agains...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012