Detecting jamming attacks in ubiquitous sensor networks

被引:0
|
作者
Amin, Syed Obaid [1 ]
Siddiqui, Muhammad Shoaib [1 ]
Hong, Choong Seon [1 ]
机构
[1] Kyung Hee Univ, Dept Comp Engn, Sch Elect & Informat, Seoul, South Korea
关键词
USN; traceback; DDoS; DoS;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In-house USNs (Ubiquitous Sensor Network) can produce critical pieces of an accident-notification chain, thus they must be protected from failure. Denial of service attacks against such networks may permit fatal damage to the health and safety of people. Traditional intrusion detection schemes cannot work for USN due to its peculiar characteristics for instance, limited energy and computation resources. In this paper we propose a detection and traceback mechanism for jamming and selective forwarding attacks on USN by observing MAC layer abnormalities. The proposed scheme is light weight and requires minimum computation to detect a DDoS attack on miniature sensor nodes.
引用
收藏
页码:40 / 45
页数:6
相关论文
共 50 条
  • [31] Defending Jamming Attacks in Wireless Sensor Networks using Stackelberg Monitoring Strategies
    Karapistoli, Eirini
    Economides, Anastasios A.
    2014 IEEE/CIC INTERNATIONAL CONFERENCE ON COMMUNICATIONS IN CHINA (ICCC), 2014, : 161 - 165
  • [32] MULEPRO: a multi-channel response to jamming attacks in wireless sensor networks
    Alnifie, Ghada
    Simon, Robert
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2010, 10 (05): : 704 - 721
  • [33] Sensor wars: Detecting and defending against spam attacks in wireless sensor networks
    Sancak, S
    Cayirci, E
    Coskun, V
    Levi, A
    2004 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-7, 2004, : 3668 - 3672
  • [34] Security Vulnerabilities and Countermeasures against Jamming Attacks in Wireless Sensor Networks: A Survey
    Jaitly, Sunakshi
    Malhotra, Harshit
    Bhushan, Bharat
    2017 INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATIONS AND ELECTRONICS (COMPTELIX), 2017, : 559 - 564
  • [35] A Report Generation Method for Defending False Negative Attacks in Ubiquitous Sensor Networks
    Lee, Hae Young
    Cho, Tae Ho
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2007, 7 (11): : 49 - 54
  • [36] A key distribution scheme preventing collusion attacks in ubiquitous heterogeneous sensor networks
    Kausar, Firdous
    Hussain, Sajid
    Park, Jong Hyuk
    Masood, Ashraf
    EMERGING DIRECTIONS IN EMBEDDED AND UBIQUITOUS COMPUTING, PROCEEDINGS, 2007, 4809 : 745 - +
  • [37] Selective Jamming Attacks in Wireless Networks
    Proano, Alejandro
    Lazos, Loukas
    2010 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, 2010,
  • [38] Detecting attacks on networks
    Herringshaw, C
    COMPUTER, 1997, 30 (12) : 16 - 17
  • [39] MITIGATION OF JAMMING ATTACKS IN WIRELESS NETWORKS
    Dorus, R.
    Vinoth, P.
    2013 IEEE INTERNATIONAL CONFERENCE ON EMERGING TRENDS IN COMPUTING, COMMUNICATION AND NANOTECHNOLOGY (ICE-CCN'13), 2013, : 168 - 171
  • [40] Fuzzy-Logic Based IDS for Detecting Jamming Attacks in Wireless Mesh IoT Networks
    Savva, Michael
    Ioannou, Iacovos
    Vassiliou, Vasos
    2022 20TH MEDITERRANEAN COMMUNICATION AND COMPUTER NETWORKING CONFERENCE (MEDCOMNET), 2022,