scholarly journals Multilevel Modeling of Distributed Denial of Service Attacks in Wireless Sensor Networks

2016 ◽  
Vol 2016 ◽  
pp. 1-13 ◽  
Author(s):  
Katarzyna Mazur ◽  
Bogdan Ksiezopolski ◽  
Radoslaw Nielek

The growing popularity of wireless sensor networks increases the risk of security attacks. One of the most common and dangerous types of attack that takes place these days in any electronic society is a distributed denial of service attack. Due to the resource constraint nature of mobile sensors, DDoS attacks have become a major threat to its stability. In this paper, we established a model of a structural health monitoring network, being disturbed by one of the most common types of DDoS attacks, the flooding attack. Through a set of simulations, we explore the scope of flood-based DDoS attack problem, assessing the performance and the lifetime of the network under the attack condition. To conduct our research, we utilized the Quality of Protection Modeling Language. With the proposed approach, it was possible to examine numerous network configurations, parameters, attack options, and scenarios. The results of the carefully performed multilevel analysis allowed us to identify a new kind of DDoS attack, the delayed distributed denial of service, by the authors, referred to as DDDoS attack. Multilevel approach to DDoS attack analysis confirmed that, examining endangered environments, it is significant to take into account many characteristics at once, just to not overlook any important aspect.

Cloud services among public and business companies have become popular in recent years. For production activities, many companies rely on cloud technology. Distributed Denial of Services (DDoS) attack is an extremely damaging general and critical type of cloud attacks. Several efforts have been made in recent years to identify numerous types of DDoS attacks. This paper discusses the different types of DDoS attacks and their cloud computing consequences. Distributed Denial of Service attack (DDoS) is a malicious attempt to disrupt the normal movement of a targeted server, service or network through influx of internet traffic overwhelming the target or its infrastructure. The use of multiple affected computer systems as a source of attacks makes DDoS attacks effective. Computers and other networked tools, including IoT phones, may be included on exploited machines. A DDoS attack from a high level resembles a traffic jam that is caused by roads that prevents normal travel at their desired destination. So DDoS Attack is a major challenging problem in integrated Cloud and IoT. Hence, this paper proposes Shield Advanced Mitigation System of Distributed Denial of Service Attack in the integration of Internet of Things and Cloud Computing Environment. This secure architecture use two verification process to identify whether user is legitimate or malicious. Dynamic Captcha Testing with Equal Probability test for first verification process, moreover Zigsaw Image Puzzle Test is used for second verification process, and Intrusion Detection Prevention System is used to identify and prevent malicious user, moreover reverse proxy is used to hide server location. These functional components and flow could strengthen security in Client side network to provide cloud services furthermore to overcome distributed denial of service attack in the integration of Internet of Things and Cloud Environment.


2019 ◽  
Vol 8 (4) ◽  
pp. 9525-9532

Autonomous vehicles are cars that drive autonomously and safely to their destination. Autonomous vehicles offer driver convenience but can also be used as an attack tool to cause accidents. The attacker can infiltrate the controller area network exchanging information of the electronic control unit of the autonomous vehicles and take control of the vehicle's movement. As a result, the attacked autonomous vehicles may drive abnormally and cause an accident. In addition, an attacker can try various attacks such as a denial of service attack that sends many unnecessary packets to autonomous vehicles and paralyzes the network, and a replay attack that continuously sends old information that does not match the current road conditions. These attacks can cause vehicles accidents without infiltrative the controller area network controllers of autonomous vehicles. This paper proposes a countermeasure to denial of service attacks on autonomous vehicles, which uses the autonomous vehicles speed information sensed by sensor nodes of wireless sensor networks. In the event of an accident, for example, the autonomous vehicles detect a denial of service attack by comparing the information calculated at the base station with the Autonomous vehicles’ own information. The autonomous vehicles maintain speed based on the information received from the base station. Then the base station communicates with the infrastructure based on the road condition information received from the wireless sensor networks sensor nodes. This allows the infrastructure to control the roads and prevent further accidents. This paper shows that the WSN-based IoT can be modeled and simulated based on discrete event systems to cope with denial of service attacks on autonomous vehicles, enabling them to operate normally and safely.


2017 ◽  
Vol 2017 ◽  
pp. 1-10 ◽  
Author(s):  
Rabia Riaz ◽  
Tae-Sun Chung ◽  
Sanam Shahla Rizvi ◽  
Nazish Yaqub

The development of wireless sensor networks can be considered as the beginning of a new generation of applications. Authenticity of communicating entities is essential for the success of wireless sensor networks. Authentication in wireless sensor networks is always a challenging task due to broadcast nature of the transmission medium. Sensor nodes are usually resource constrained with respect to energy, memory, and computation and communication capabilities. It is not possible for each node to authenticate all incoming request messages, whether these request messages are from authorized or unauthorized nodes. Any malicious node can flood the network by sending messages repeatedly for creating denial of service attack, which will eventually bring down the whole network. In this paper, a lightweight authentication scheme named as Biphase Authentication Scheme (BAS) is presented for wireless sensor networks. This scheme provides initial small scale authentication for the request messages entering wireless sensor networks and resistance against denial of service attacks.


Sign in / Sign up

Export Citation Format

Share Document