Detecting jamming attacks in ubiquitous sensor networks

被引:0
|
作者
Amin, Syed Obaid [1 ]
Siddiqui, Muhammad Shoaib [1 ]
Hong, Choong Seon [1 ]
机构
[1] Kyung Hee Univ, Dept Comp Engn, Sch Elect & Informat, Seoul, South Korea
关键词
USN; traceback; DDoS; DoS;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In-house USNs (Ubiquitous Sensor Network) can produce critical pieces of an accident-notification chain, thus they must be protected from failure. Denial of service attacks against such networks may permit fatal damage to the health and safety of people. Traditional intrusion detection schemes cannot work for USN due to its peculiar characteristics for instance, limited energy and computation resources. In this paper we propose a detection and traceback mechanism for jamming and selective forwarding attacks on USN by observing MAC layer abnormalities. The proposed scheme is light weight and requires minimum computation to detect a DDoS attack on miniature sensor nodes.
引用
收藏
页码:40 / 45
页数:6
相关论文
共 50 条
  • [21] Detecting Cluster Head Attacks in Heterogeneous Wireless Sensor Networks
    Jia, Chenlong
    Lim, Teng Joon
    2017 IEEE 85TH VEHICULAR TECHNOLOGY CONFERENCE (VTC SPRING), 2017,
  • [22] Detecting and Defending against Replication Attacks in Wireless Sensor Networks
    Chen, Xiang-yi
    Meng, Li-xia
    Zhan, Yong-zhao
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2013,
  • [23] Preventing Attacks and Detecting Intruder for Secured Wireless Sensor Networks
    Kalnoor, Gauri
    Agarkhed, Jayashree
    PROCEEDINGS OF THE 2016 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, SIGNAL PROCESSING AND NETWORKING (WISPNET), 2016, : 1062 - 1067
  • [24] Anomaly detection algorithm for detecting attacks in wireless sensor networks
    Van Phuong, Tran
    Hung, Le Xuan
    Cho, Seon Jin
    Lee, Young-Koo
    Lee, Sungyoung
    INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2006, 3975 : 735 - 736
  • [25] Detecting node replication attacks in wireless sensor networks: A survey
    Zhu, Wen Tao
    Zhou, Jianying
    Deng, Robert H.
    Bao, Feng
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2012, 35 (03) : 1022 - 1034
  • [26] Channel Detecting Jamming Attacks on Symmetric Blind Rendezvous Algorithms for Cognitive Radio Networks
    Oh, Young-Hyun
    Thuente, David J.
    2014 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM 2014), 2014, : 1005 - 1010
  • [27] Efficiently Detecting Wormhole Attacks in Sensor Networks by Information Potential
    Li, Qin
    Zeng, Qingkai
    2008 THIRD INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND NETWORKING IN CHINA, VOLS 1-3, 2008, : 658 - 664
  • [28] An approach for detecting and distinguishing errors versus attacks in sensor networks
    Basile, Claudio
    Gupta, Meeta
    Kalbarczyk, Zbigniew
    Iyer, Ravi K.
    DSN 2006 INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, PROCEEDINGS, 2006, : 473 - 482
  • [29] Defending jamming attacks in wireless sensor networks using stackelberg monitoring strategies
    Karapistoli, Eirini
    Economides, Anastasios A.
    2014 IEEE/CIC International Conference on Communications in China, ICCC 2014, 2015, : 161 - 165
  • [30] MULEPRO: A multi-channel response to jamming attacks in wireless sensor networks
    Department of Computer Science, George Mason University, Fairfax, VA 22030, United States
    Wireless Commun. Mobile Comput., 5 (704-721):