An extended mechanism to prevent distributed denial of service attack in DV-Hop localisation algorithm in wireless sensor networks

2021 ◽  
Vol 14 (2) ◽  
pp. 112
Author(s):  
Navdeep Kaur ◽  
Kamaljit Singh Bhatia ◽  
Simarjeet Kaur
2016 ◽  
Vol 2016 ◽  
pp. 1-13 ◽  
Author(s):  
Katarzyna Mazur ◽  
Bogdan Ksiezopolski ◽  
Radoslaw Nielek

The growing popularity of wireless sensor networks increases the risk of security attacks. One of the most common and dangerous types of attack that takes place these days in any electronic society is a distributed denial of service attack. Due to the resource constraint nature of mobile sensors, DDoS attacks have become a major threat to its stability. In this paper, we established a model of a structural health monitoring network, being disturbed by one of the most common types of DDoS attacks, the flooding attack. Through a set of simulations, we explore the scope of flood-based DDoS attack problem, assessing the performance and the lifetime of the network under the attack condition. To conduct our research, we utilized the Quality of Protection Modeling Language. With the proposed approach, it was possible to examine numerous network configurations, parameters, attack options, and scenarios. The results of the carefully performed multilevel analysis allowed us to identify a new kind of DDoS attack, the delayed distributed denial of service, by the authors, referred to as DDDoS attack. Multilevel approach to DDoS attack analysis confirmed that, examining endangered environments, it is significant to take into account many characteristics at once, just to not overlook any important aspect.


2019 ◽  
Vol 8 (4) ◽  
pp. 9525-9532

Autonomous vehicles are cars that drive autonomously and safely to their destination. Autonomous vehicles offer driver convenience but can also be used as an attack tool to cause accidents. The attacker can infiltrate the controller area network exchanging information of the electronic control unit of the autonomous vehicles and take control of the vehicle's movement. As a result, the attacked autonomous vehicles may drive abnormally and cause an accident. In addition, an attacker can try various attacks such as a denial of service attack that sends many unnecessary packets to autonomous vehicles and paralyzes the network, and a replay attack that continuously sends old information that does not match the current road conditions. These attacks can cause vehicles accidents without infiltrative the controller area network controllers of autonomous vehicles. This paper proposes a countermeasure to denial of service attacks on autonomous vehicles, which uses the autonomous vehicles speed information sensed by sensor nodes of wireless sensor networks. In the event of an accident, for example, the autonomous vehicles detect a denial of service attack by comparing the information calculated at the base station with the Autonomous vehicles’ own information. The autonomous vehicles maintain speed based on the information received from the base station. Then the base station communicates with the infrastructure based on the road condition information received from the wireless sensor networks sensor nodes. This allows the infrastructure to control the roads and prevent further accidents. This paper shows that the WSN-based IoT can be modeled and simulated based on discrete event systems to cope with denial of service attacks on autonomous vehicles, enabling them to operate normally and safely.


2017 ◽  
Vol 2017 ◽  
pp. 1-10 ◽  
Author(s):  
Rabia Riaz ◽  
Tae-Sun Chung ◽  
Sanam Shahla Rizvi ◽  
Nazish Yaqub

The development of wireless sensor networks can be considered as the beginning of a new generation of applications. Authenticity of communicating entities is essential for the success of wireless sensor networks. Authentication in wireless sensor networks is always a challenging task due to broadcast nature of the transmission medium. Sensor nodes are usually resource constrained with respect to energy, memory, and computation and communication capabilities. It is not possible for each node to authenticate all incoming request messages, whether these request messages are from authorized or unauthorized nodes. Any malicious node can flood the network by sending messages repeatedly for creating denial of service attack, which will eventually bring down the whole network. In this paper, a lightweight authentication scheme named as Biphase Authentication Scheme (BAS) is presented for wireless sensor networks. This scheme provides initial small scale authentication for the request messages entering wireless sensor networks and resistance against denial of service attacks.


Sign in / Sign up

Export Citation Format

Share Document