IJSTR

International Journal of Scientific & Technology Research

Home About Us Scope Editorial Board Blog/Latest News Contact Us
0.2
2019CiteScore
 
10th percentile
Powered by  Scopus
Scopus coverage:
Nov 2018 to May 2020

CALL FOR PAPERS
AUTHORS
DOWNLOADS
CONTACT

IJSTR >> Volume 5 - Issue 7, July 2016 Edition



International Journal of Scientific & Technology Research  
International Journal of Scientific & Technology Research

Website: http://www.ijstr.org

ISSN 2277-8616



Review Of Prevention Techniques For Denial Of Service (DOS) Attacks In Wireless Sensor Network

[Full Text]

 

AUTHOR(S)

Poonam Rolla, Manpreet Kaur

 

KEYWORDS

DOS Attacks, Prevention techniques, Security Goal, Wireless sensor network.

 

ABSTRACT

Wireless Sensor Networks comprised of several tiny sensor nodes which are densely deployed over the region to monitor the environmental conditions. These sensor nodes have certain design issues out of which security is the main predominant factor as it effects the whole lifetime of network. DDoS (Distributed denial of service) attack floods unnecessary packets in the sensor network. A review on DDoS attacks and their prevention techniques have been done in this paper.

 

REFERENCES

[1] Chan, Haowen, and Adrian Perrig. "Security and privacy in sensor networks." Computer 36.10 (2003): 103-105.

[2] Mirkovic, Jelena, and Peter Reiher. "A taxonomy of DDoS attack and DDoS defense mechanisms." ACM SIGCOMM Computer Communication Review 34.2 (2004): 39-53.

[3] Wood, Anthony D., and John A. Stankovic. "Denial of service in sensor networks." Computer 35.10 (2002): 54-62.

[4] Li, Bai, and Lynn Batten. "Using mobile agents to detect node compromise in path-based DoS attacks on wireless sensor networks." Wireless Communications, Networking and Mobile Computing, 2007. WiCom 2007. International Conference on. IEEE, 2007.

[5] Xu, Wenyuan, et al. "Jamming sensor networks: attack and defense strategies." Network, iEEE 20.3 (2006): 41-47.

[6] Jain, Sushil Kumar, and Kumkum Garg. "A hybrid model of defense techniques against base station jamming attack in wireless sensor networks." Computational Intelligence, Communication Systems and Networks, 2009. CICSYN'09. First International Conference on. IEEE, 2009.

[7] Badal, Tapas, and Dipti Verma. "A Modular Approach for Intrusion Detection System in Wireless Networks." (2011): 57-61.

[8] Xie, Miao, et al. "Anomaly detection in wireless sensor networks: A survey." Journal of Network and Computer Applications 34.4 (2011): 1302-1325.

[9] M. Kaur, A. Jain and A. K. Goel, "Energy Efficient Two Level Distributed Clustering Scheme to Prolong Stability Period of Wireless Sensor Network", International Conference on Advances in Computing, Communications and Informatics (ICACCI), pp. 68-73