4.6 Article

Denial of Service Defence for Resource Availability in Wireless Sensor Networks

Journal

IEEE ACCESS
Volume 6, Issue -, Pages 6975-7004

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/ACCESS.2018.2793841

Keywords

Denial of service (DoS); detection techniques; intrusion detection system (IDS); resource availability; resource depletion; wireless sensor networks (WSNs)

Ask authors/readers for more resources

Wireless sensor networks (WSN) over the years have become one of the most promising networking solutions with exciting new applications for the near future. Its deployment has been enhanced by its small, inexpensive, and smart sensor nodes, which are easily deployed, depending on its application and coverage area. Common applications include its use for military operations, monitoring environmental conditions (such as volcano detection, agriculture, and management), distributed control systems, healthcare, and the detection of radioactive sources. Notwithstanding its promising attributes, security in WSN is a big challenge and remains an ongoing research trend. Deployed sensor nodes are vulnerable to various security attacks due to its architecture, hostile deployment location, and insecure routing protocol. Furthermore, the sensor nodes in WSNs are characterized by their resource constraints, such as, limited energy, low bandwidth, short communication range, limited processing, and storage capacity, which have made the sensor nodes an easy target. Therefore, in this paper, we present a review of denial of service attacks that affect resource availability in WSN and their countermeasure by presenting a taxonomy. Future research directions and open research issues are also discussed.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.6
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available