Overview of DOS attacks on wireless sensor networks and experimental results for simulation of interference attacks
Wireless sensor networks are now used in various fields. The information transmitted in the wireless sensor networks is very sensitive, so the security issue is very important. DOS (denial of service) attacks are a fundamental threat to the functioning of wireless sensor networks. This paper describ...
Saved in:
Published in: | Ingeniería e investigación Vol. 38; no. 1; pp. 130 - 138 |
---|---|
Main Authors: | , |
Format: | Journal Article |
Language: | English |
Published: |
Bogota
Universidad Nacional de Colombia
2018
Facultad de Ingeniería, Universidad Nacional de Colombia |
Subjects: | |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Abstract | Wireless sensor networks are now used in various fields. The information transmitted in the wireless sensor networks is very sensitive, so the security issue is very important. DOS (denial of service) attacks are a fundamental threat to the functioning of wireless sensor networks. This paper describes some of the most common DOS attacks and potential methods of protection against them. The case study shows one of the most frequent attacks on wireless sensor networks – the interference attack. In the introduction of this paper authors assume that the attack interference can cause significant obstruction of wireless sensor networks. This assumption has been proved in the case study through simulation scenario and simulation results. |
---|---|
AbstractList | Wireless sensor networks are now used in various fields. The information transmitted in the wireless sensor networks is very sensitive, so the security issue is very important. DOS (denial of service) attacks are a fundamental threat to the functioning of wireless sensor networks. This paper describes some of the most common DOS attacks and potential methods of protection against them. The case study shows one of the most frequent attacks on wireless sensor networks – the interference attack. In the introduction of this paper authors assume that the attack interference can cause significant obstruction of wireless sensor networks. This assumption has been proved in the case study through simulation scenario and simulation results.
Las redes de sensores inalámbricos se utilizan ahora en varios campos. La información transmitida en las redes de sensores inalámbricos es muy delicada, por lo que el tema de la seguridad es muy importante. Los ataques de DOS (Denegación de servicio) son una amenaza fundamental para el funcionamiento de las redes de sensores inalámbricos. Este documento describe algunos de los ataques DOS más comunes y los posibles métodos de protección contra ellos. El estudio de caso muestra uno de los ataques más frecuentes a las redes de sensores inalámbricos: el ataque de interferencia. En la introducción de este artículo, los autores suponen que la interferencia de ataque puede causar una obstrucción significativa de las redes de sensores inalámbricos. Esta suposición se ha demostrado en el estudio de caso a través de escenarios de simulación y los resultados de estas simulaciones. Wireless sensor networks are now used in various fields. The information transmitted in the wireless sensor networks is very sensitive, so the security issue is very important. DOS (denial of service) attacks are a fundamental threat to the functioning of wireless sensor networks. This paper describes some of the most common DOS attacks and potential methods of protection against them. The case study shows one of the most frequent attacks on wireless sensor networks – the interference attack. In the introduction of this paper authors assume that the attack interference can cause significant obstruction of wireless sensor networks. This assumption has been proved in the case study through simulation scenario and simulation results. ABSTRACT Wireless sensor networks are now used in various fields. The information transmitted in the wireless sensor networks is very sensitive, so the security issue is very important. DOS (denial of service) attacks are a fundamental threat to the functioning of wireless sensor networks. This paper describes some of the most common DOS attacks and potential methods of protection against them. The case study shows one of the most frequent attacks on wireless sensor networks - the interference attack. In the introduction of this paper authors assume that the attack interference can cause significant obstruction of wireless sensor networks. This assumption has been proved in the case study through simulation scenario and simulation results. |
Author | Gavrić, Željko Simić, Dejan |
AuthorAffiliation | Slobomir P University University of Belgrade |
AuthorAffiliation_xml | – name: Slobomir P University – name: University of Belgrade |
Author_xml | – sequence: 1 givenname: Zeljko surname: Gavric fullname: Gavric, Zeljko organization: Slobomir P University – sequence: 2 givenname: Dejan surname: Simic fullname: Simic, Dejan organization: University of Belgrade |
BookMark | eNpVkmtrHCEUhoeSQrdp_oOln3fqdVTol5BeEggsNOlncWaOi9uJbtXZbf993UtSCoJyPO_Dubxvm4sQAzTNe4JbIjjvPvqwbn3YQS5-3e6YCqTtBBfsVbOglKulkpRdNAtMKF6KDus3zVXOvse8k5hIzBdNXu0g7TzsUXTo8-oB2VLs8DOjGNDeJ5ggZ5Qh5JhQgLKPqf7ZMCL4vYXknyAUO6EEeZ5KRq5mZf80T7b4CqhIHwokBwnCAM_sd81rZ6cMV-f7svnx9cvjze3yfvXt7ub6fjlwrcrSCj5g1gOT0g1Mj1qAJqMSwmEALZVTQmpOrbPW9bSTEjOnsevtWJ_AB3bZ3J24Y7Qbs63V2vTHROvNMRDT2thU_DCBkYOU0DtFNZNccWE1J452o2SEWi7Hyvp0Znk71UH8jzvH5uCTjxtrIJvr748Y18FrSqSo8vYkz4OHKZpNnFOovZuHw27MYTcUE3VQ1MNwFXw4CbYp_prrgv9JKBZS8U4IVbP0KWtIMecE7qUsgs3RIqZaxDxbxBwtYo4WYX8BLPa1ow |
CitedBy_id | crossref_primary_10_1080_09720510_2020_1799580 crossref_primary_10_1007_s11277_021_09401_3 crossref_primary_10_1109_ACCESS_2020_3027325 crossref_primary_10_1007_s11276_021_02871_0 crossref_primary_10_3390_s21154951 crossref_primary_10_1007_s11277_021_09040_8 crossref_primary_10_1109_ACCESS_2022_3202807 crossref_primary_10_1007_s11277_022_09980_9 crossref_primary_10_1177_18479790231157220 crossref_primary_10_3390_electronics10111244 crossref_primary_10_31854_2307_1303_2019_7_1_75_83 crossref_primary_10_3390_jsan10010014 |
Cites_doi | 10.4316/AECE.2016.01006 10.1109/ITCS.2010.5581263 10.1109/ICICES.2016.7518942 10.1109/GLOCOM.2009.5425381 10.1109/iccsp.2013.6577120 10.1109/ICCCNT.2014.6963043 10.3844/jcssp.2014.2037.2046 10.1109/NGCT.2016.7877454 10.1109/MPRV.2008.6 10.1109/MC.2002.1039518 10.1109/ICCCNET.2008.4787693 10.1109/TSSA.2011.6095400 10.1155/2014/303501 10.1109/SNS-PCS.2013.6553829 10.1080/07366981.2013.754207 10.1109/MNET.2006.1637931 10.1109/ICCSP.2014.6950086 10.1109/VTCFall.2016.7880885 10.1109/MCOM.2002.1024418 10.1109/ICSensT.2015.7438364 10.1109/UEMCON.2016.7777831 10.1145/1102219.1102235 10.1109/COMST.2006.315852 10.1109/CloudTech.2016.7847710 10.1002/9780470666388 10.15446/ing.investig.v35n2.45289 |
ContentType | Journal Article |
Copyright | 2018. This work is published under http://creativecommons.org/licenses/by/4.0 (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. This work is licensed under a Creative Commons Attribution 4.0 International License. LICENCIA DE USO: Los documentos a texto completo incluidos en Dialnet son de acceso libre y propiedad de sus autores y/o editores. Por tanto, cualquier acto de reproducción, distribución, comunicación pública y/o transformación total o parcial requiere el consentimiento expreso y escrito de aquéllos. Cualquier enlace al texto completo de estos documentos deberá hacerse a través de la URL oficial de éstos en Dialnet. Más información: https://dialnet.unirioja.es/info/derechosOAI | INTELLECTUAL PROPERTY RIGHTS STATEMENT: Full text documents hosted by Dialnet are protected by copyright and/or related rights. This digital object is accessible without charge, but its use is subject to the licensing conditions set by its authors or editors. Unless expressly stated otherwise in the licensing conditions, you are free to linking, browsing, printing and making a copy for your own personal purposes. All other acts of reproduction and communication to the public are subject to the licensing conditions expressed by editors and authors and require consent from them. Any link to this document should be made using its official URL in Dialnet. More info: https://dialnet.unirioja.es/info/derechosOAI |
Copyright_xml | – notice: 2018. This work is published under http://creativecommons.org/licenses/by/4.0 (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. – notice: This work is licensed under a Creative Commons Attribution 4.0 International License. – notice: LICENCIA DE USO: Los documentos a texto completo incluidos en Dialnet son de acceso libre y propiedad de sus autores y/o editores. Por tanto, cualquier acto de reproducción, distribución, comunicación pública y/o transformación total o parcial requiere el consentimiento expreso y escrito de aquéllos. Cualquier enlace al texto completo de estos documentos deberá hacerse a través de la URL oficial de éstos en Dialnet. Más información: https://dialnet.unirioja.es/info/derechosOAI | INTELLECTUAL PROPERTY RIGHTS STATEMENT: Full text documents hosted by Dialnet are protected by copyright and/or related rights. This digital object is accessible without charge, but its use is subject to the licensing conditions set by its authors or editors. Unless expressly stated otherwise in the licensing conditions, you are free to linking, browsing, printing and making a copy for your own personal purposes. All other acts of reproduction and communication to the public are subject to the licensing conditions expressed by editors and authors and require consent from them. Any link to this document should be made using its official URL in Dialnet. More info: https://dialnet.unirioja.es/info/derechosOAI |
DBID | AAYXX CITATION 3V. 7TB 7XB 8FD 8FE 8FG 8FK 8G5 ABJCF ABUWG AFKRA AZQEC BENPR BGLVJ CCPQU CLZPN DWQXO FR3 GNUQQ GUQSH HCIFZ KR7 L6V M2O M7S MBDVC PADUT PIMPY PQEST PQQKQ PQUKI PRINS PTHSS Q9U GPN AGMXS FKZ DOA |
DOI | 10.15446/ing.investig.v38n1.65453 |
DatabaseName | CrossRef ProQuest Central (Corporate) Mechanical & Transportation Engineering Abstracts ProQuest Central (purchase pre-March 2016) Technology Research Database ProQuest SciTech Collection ProQuest Technology Collection ProQuest Central (Alumni) (purchase pre-March 2016) Research Library (Alumni Edition) Materials Science & Engineering Database (Proquest) ProQuest Central (Alumni) ProQuest Central ProQuest Central Essentials ProQuest Central Technology Collection ProQuest One Community College Latin America & Iberia Database ProQuest Central Korea Engineering Research Database ProQuest Central Student Research Library Prep SciTech Premium Collection Civil Engineering Abstracts ProQuest Engineering Collection Research Library Engineering Database Research Library (Corporate) Research Library China Publicly Available Content Database ProQuest One Academic Eastern Edition (DO NOT USE) ProQuest One Academic ProQuest One Academic UKI Edition ProQuest Central China Engineering Collection ProQuest Central Basic SciELO Dialnet (Open Access Full Text) Dialnet DOAJ Directory of Open Access Journals |
DatabaseTitle | CrossRef Publicly Available Content Database Research Library Prep ProQuest Central Student Technology Collection Technology Research Database Mechanical & Transportation Engineering Abstracts ProQuest Central Essentials ProQuest Central (Alumni Edition) SciTech Premium Collection ProQuest One Community College Research Library (Alumni Edition) ProQuest Central China ProQuest Central ProQuest Engineering Collection ProQuest Central Korea ProQuest Research Library Research Library China Engineering Collection Civil Engineering Abstracts Engineering Database ProQuest Central Basic ProQuest One Academic Eastern Edition ProQuest Technology Collection ProQuest SciTech Collection Latin America & Iberian Database ProQuest One Academic UKI Edition Materials Science & Engineering Collection Engineering Research Database ProQuest One Academic ProQuest Central (Alumni) |
DatabaseTitleList | Publicly Available Content Database CrossRef |
Database_xml | – sequence: 1 dbid: DOA name: Directory of Open Access Journals url: http://www.doaj.org/ sourceTypes: Open Website |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering |
DocumentTitleAlternate | Visión general de los ataques de DOS en redes de sensores inalámbricos y resultados experimentales para la simulación de ataques de interferencia |
EISSN | 2248-8723 |
EndPage | 138 |
ExternalDocumentID | oai_doaj_org_article_7c77ebf829374845a941f26d7312a47d oai_dialnet_unirioja_es_ART0001292175 S0120_56092018000100130 10_15446_ing_investig_v38n1_65453 |
GroupedDBID | 3V. 635 8FE 8FG 8G5 AAYXX ABJCF ABUWG ABXHO ACIWK ADBBV AENEX AFKRA AFPKN ALMA_UNASSIGNED_HOLDINGS APOWU AZFZN AZQEC B14 BCNDV BENPR BGLVJ BPHCQ CCPQU CITATION CLZPN DWQXO FAEIB GNUQQ GROUPED_DOAJ GUQSH HCIFZ KQ8 KWQ L6V M2O M7S OK1 PADUT PIMPY PQQKQ PROAC PTHSS RDY RNS RTK SCD ~02 7TB 7XB 8FD 8FK FR3 KR7 MBDVC PQEST PQUKI PRINS Q9U GPN AGMXS FKZ IPNFZ RIG |
ID | FETCH-LOGICAL-c498t-a54c03be377fc39d95e91d855f0ee978f857942afaafb267703f90fbad770e4c3 |
IEDL.DBID | DOA |
ISSN | 0120-5609 |
IngestDate | Tue Oct 22 15:15:28 EDT 2024 Thu Jul 20 13:41:51 EDT 2023 Tue Nov 19 21:48:25 EST 2024 Thu Nov 21 03:47:16 EST 2024 Thu Nov 21 23:31:27 EST 2024 |
IsDoiOpenAccess | true |
IsOpenAccess | true |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 1 |
Keywords | Wireless communication interferencia de radiofrecuencia Intrusion detection detección de intrusión Wireless Sensor Networks Communication system security seguridad del sistema de comunicación Redes de sensores inalámbricos comunicación inalámbrica Radiofrequency interference |
Language | English |
License | This work is licensed under a Creative Commons Attribution 4.0 International License. http://creativecommons.org/licenses/by/4.0 |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c498t-a54c03be377fc39d95e91d855f0ee978f857942afaafb267703f90fbad770e4c3 |
OpenAccessLink | https://doaj.org/article/7c77ebf829374845a941f26d7312a47d |
PQID | 2057846558 |
PQPubID | 2035727 |
PageCount | 9 |
ParticipantIDs | doaj_primary_oai_doaj_org_article_7c77ebf829374845a941f26d7312a47d dialnet_primary_oai_dialnet_unirioja_es_ART0001292175 scielo_journals_S0120_56092018000100130 proquest_journals_2057846558 crossref_primary_10_15446_ing_investig_v38n1_65453 |
PublicationCentury | 2000 |
PublicationDate | 2018-00-00 |
PublicationDateYYYYMMDD | 2018-01-01 |
PublicationDate_xml | – year: 2018 text: 2018-00-00 |
PublicationDecade | 2010 |
PublicationPlace | Bogota |
PublicationPlace_xml | – name: Bogota |
PublicationTitle | Ingeniería e investigación |
PublicationTitleAlternate | Ing. Investig |
PublicationYear | 2018 |
Publisher | Universidad Nacional de Colombia Facultad de Ingeniería, Universidad Nacional de Colombia |
Publisher_xml | – name: Universidad Nacional de Colombia – name: Facultad de Ingeniería, Universidad Nacional de Colombia |
References | ref13 ref35 ref12 ref34 ref15 ref37 ref14 ref36 ref31 ref30 ref11 ref33 ref10 ref32 ref2 ref1 ref17 ref39 ref16 ref38 ref19 ref18 ref24 ref23 ref26 ref25 ref20 ref22 ref21 ref28 ref27 ref29 ref8 ref7 ref9 ref4 ref3 ref6 ref5 ref40 Chaudhry, J. A.; Tariq, U.; Amin, M. A.; Rittenhouse, R. G 2013; 29 Malik, M.; Singh, Y 2015; 4 Dbibih, I.; Iala, I.; Aboutajdine, D.; Zytoune, O 2016 Yong, W.; Garhan, A.; Byrav, R 2006; 8 Maleh, Y.; Ezzati, A 2014; 5 Hamza, T.; Kaddoum, G.; Meddeb, A.; Matar, G 2016 Sonar, K.; Upadhyay, H 2014; 10 Callaway, E.; Gorday, P.; Hester, L.; Gutierrez, J. A.; Naeve, M.; Heile, B.; Bahl, V 2002; 40 Wazid, M.; Katal, A.; Sachan, R. S.; Goudar, R. H.; Singh, D. P 2013 Liu, H. I.; Chang, K. C 2011 Dargie, W; Poellabauer, C 2010 Isha, M; Gaurav, R 2013; 1 Buch, D.; Jinwala, D. C 2010 Shanthi, S.; Rajan, E. G 2016 Deng, J.; Han, R.; Mishra, S 2005 Singh, V. P.; Jain, S.; Singhai, J 2010; 7 Das, R.; Bal, S.; Das, S.; Sarkar, M. K.; Majumder, D.; Chakraborty, A.; Majumder, K 2016 Mathur, A.; Newe, T 2015 Oliveira, F; Semente, R; Fernandes, J; Júnior, S; Melo, T; Salazar, A 2015; 35 Danyang, Q.; Lin, M.; Erfu, W.; Hongbin, M.; Qun, D 2013 Choi, Y. S.; Oh, J. T.; Jang, J. S.; Ryou, J. C 2010 Benbrahim, S. E 2011 Wood, A. D.; Stankovic, J. A 2002; 35 Maheswari, S. U.; Usha, N. S.; Anita, E. M.; Devi, K. R 2016 Raymond, D.R.; Midkiff, S.F 2008; 7 Wesam, B; Mehdi, E. M 2014; 10 Sahu, S. S.; Priyadarshini, P.; Bilgaiyan, S 2014 Ghildiyal, S.; Mishra, A. K.; Gupta, A.; Garg, N 2014; 3 Xu, W.; Ma, K.; Trappe, W.; Zhang, Y 2006; 20 Hossain, M.; Muslima, U.; Islam, H 2015; 2 Nancy, J. T.; VijayaKumar, K. P.; Kumar, P. G 2014 Hamieh, A.; Ben-Othman, J.; Mokdad, L 2009 Shahzad, F; Pasha, M; Ahmad, A 2017; 14 Goyal, S.; Bhatia, T.; Verma, A. K 2015 Fan, C. S 2016; 16 Boulis, A 2011 Pomalaza, C 2004 Amara, S. O.; Beghdad, R.; Oussalah, M 2013; 47 Mopari, I. B.; Pukale, S. G.; Dhore, M. L 2008 Saxena, M 2007 |
References_xml | – ident: ref1 doi: 10.4316/AECE.2016.01006 – ident: ref35 doi: 10.1109/ITCS.2010.5581263 – ident: ref7 – ident: ref24 doi: 10.1109/ICICES.2016.7518942 – ident: ref38 doi: 10.1109/GLOCOM.2009.5425381 – ident: ref22 doi: 10.1109/iccsp.2013.6577120 – ident: ref36 doi: 10.1109/ICCCNT.2014.6963043 – ident: ref25 – ident: ref30 doi: 10.3844/jcssp.2014.2037.2046 – ident: ref27 – ident: ref19 – ident: ref32 – ident: ref37 doi: 10.1109/NGCT.2016.7877454 – ident: ref13 doi: 10.1109/MPRV.2008.6 – ident: ref4 doi: 10.1109/MC.2002.1039518 – ident: ref11 – ident: ref33 doi: 10.1109/ICCCNET.2008.4787693 – ident: ref34 doi: 10.1109/TSSA.2011.6095400 – ident: ref9 doi: 10.1155/2014/303501 – ident: ref16 doi: 10.1109/SNS-PCS.2013.6553829 – ident: ref18 doi: 10.1080/07366981.2013.754207 – ident: ref6 doi: 10.1109/MNET.2006.1637931 – ident: ref15 doi: 10.1109/ICCSP.2014.6950086 – ident: ref39 doi: 10.1109/VTCFall.2016.7880885 – ident: ref28 – ident: ref8 doi: 10.1109/MCOM.2002.1024418 – ident: ref21 doi: 10.1109/ICSensT.2015.7438364 – ident: ref40 – ident: ref23 – ident: ref26 – ident: ref5 doi: 10.1109/UEMCON.2016.7777831 – ident: ref29 doi: 10.1145/1102219.1102235 – ident: ref20 doi: 10.1109/COMST.2006.315852 – ident: ref17 doi: 10.1109/CloudTech.2016.7847710 – ident: ref2 doi: 10.1002/9780470666388 – ident: ref3 doi: 10.15446/ing.investig.v35n2.45289 – ident: ref10 – ident: ref12 – ident: ref14 – ident: ref31 – year: 2011 publication-title: Castalia - A simulator for Wireless Sensor Networks and Body Area Networks contributor: fullname: Boulis, A – year: 2007 publication-title: Security In Wireless Sensor Networks - A Layer Based Classification contributor: fullname: Saxena, M – volume: 1 start-page: 40 issue: 2 year: 2013 end-page: 45 article-title: DOS Attacks on TCP/IP Layers in WSN publication-title: International Journal of Computer Networks and Communications Security contributor: fullname: Isha, M; Gaurav, R – start-page: 22 year: 2011 end-page: 27 publication-title: Defending systems against tilt DDoS attacks contributor: fullname: Liu, H. I.; Chang, K. C – volume: 29 start-page: 7 issue: 2 year: 2013 end-page: 12 article-title: Dealing with sinkhole attacks in wireless sensor networks publication-title: Advanced Science and Technology Letters contributor: fullname: Chaudhry, J. A.; Tariq, U.; Amin, M. A.; Rittenhouse, R. G – start-page: 1 year: 2016 end-page: 5 publication-title: A Survey on Intelligent MAC Layer Jamming Attacks and Countermeasures in WSNs contributor: fullname: Hamza, T.; Kaddoum, G.; Meddeb, A.; Matar, G – volume: 47 start-page: 6 issue: 2 year: 2013 end-page: 29 article-title: Securing Wireless Sensor Networks: A Survey publication-title: EDPACS contributor: fullname: Amara, S. O.; Beghdad, R.; Oussalah, M – year: 2010 publication-title: Fundamentals of wireless sensor networks: theory and practice contributor: fullname: Dargie, W; Poellabauer, C – volume: 8 year: 2006 article-title: A Survey Of Security Issues In Wireless Sensor Networks publication-title: IEEE Communications Surveys & Tutorials contributor: fullname: Yong, W.; Garhan, A.; Byrav, R – volume: 16 start-page: 41 issue: 1 year: 2016 end-page: 46 article-title: HIGH: A Hexagon-based Intelligent Grouping Approach inWireless Sensor Networks publication-title: Advances in Electrical and Computer Engineering contributor: fullname: Fan, C. S – start-page: 89 year: 2005 end-page: 96 publication-title: Defending against path-based DoS attacks in wireless sensor networks contributor: fullname: Deng, J.; Han, R.; Mishra, S – start-page: 1 year: 2008 end-page: 5 publication-title: Detection and defense against DDoS attack with IP spoofing contributor: fullname: Mopari, I. B.; Pukale, S. G.; Dhore, M. L – volume: 35 start-page: 67 issue: 2 year: 2015 end-page: 73 article-title: EEWES: An energy-efficient wireless sensor network embedded system to be applied on industrial environments publication-title: Ingeniería e Investigación contributor: fullname: Oliveira, F; Semente, R; Fernandes, J; Júnior, S; Melo, T; Salazar, A – start-page: 426 year: 2016 end-page: 431 publication-title: Comprehensive analysis of security attacks and intrusion detection system in wireless sensor networks contributor: fullname: Shanthi, S.; Rajan, E. G – volume: 35 start-page: 54 issue: 10 year: 2002 end-page: 62 article-title: Denial of service in sensor networks publication-title: Computer contributor: fullname: Wood, A. D.; Stankovic, J. A – volume: 40 start-page: 70 issue: 8 year: 2002 end-page: 77 article-title: Home networking with IEEE 802.15. 4: a developing standard for low-rate wireless personal area networks publication-title: IEEE Communications magazine contributor: fullname: Callaway, E.; Gorday, P.; Hester, L.; Gutierrez, J. A.; Naeve, M.; Heile, B.; Bahl, V – start-page: 1 year: 2016 end-page: 5 publication-title: A novel robust routing protocol RAEED to avoid DoS attacks in WSN contributor: fullname: Maheswari, S. U.; Usha, N. S.; Anita, E. M.; Devi, K. R – volume: 3 start-page: 140 year: 2014 end-page: 143 article-title: Analysis of denial of service (dos) attacks in wireless sensor networks publication-title: IJRET: International Journal of Research in Engineering and Technology contributor: fullname: Ghildiyal, S.; Mishra, A. K.; Gupta, A.; Garg, N – year: 2004 publication-title: Wireless sensor network contributor: fullname: Pomalaza, C – start-page: 1 year: 2009 end-page: 5 publication-title: Detection of radio interference attacks in VANET contributor: fullname: Hamieh, A.; Ben-Othman, J.; Mokdad, L – volume: 4 start-page: 260 issue: 6 year: 2015 end-page: 265 article-title: A Review: DoS and DDoS Attacks publication-title: International Journal of Computer Science and Mobile Computing contributor: fullname: Malik, M.; Singh, Y – year: 2011 publication-title: Defense against traffic analysis attack in wireless sensor networks contributor: fullname: Benbrahim, S. E – volume: 10 start-page: 58 year: 2014 end-page: 63 article-title: A Survey: DDOS Attack on Internet of Things publication-title: International Journal of Engineering Research and Development contributor: fullname: Sonar, K.; Upadhyay, H – start-page: 576 year: 2013 end-page: 581 publication-title: Detection and prevention mechanism for blackhole attack in wireless sensor network contributor: fullname: Wazid, M.; Katal, A.; Sachan, R. S.; Goudar, R. H.; Singh, D. P – start-page: 1463 year: 2015 end-page: 1468 publication-title: Wormhole and Sybil attack in WSN: A review contributor: fullname: Goyal, S.; Bhatia, T.; Verma, A. K – volume: 20 start-page: 41 issue: 3 year: 2006 end-page: 47 article-title: Jamming sensor networks: attack and defense strategies publication-title: IEEE Network contributor: fullname: Xu, W.; Ma, K.; Trappe, W.; Zhang, Y – start-page: 1 year: 2010 end-page: 6 publication-title: Integrated DDoS attack defense infrastructure for effective attack prevention contributor: fullname: Choi, Y. S.; Oh, J. T.; Jang, J. S.; Ryou, J. C – year: 2010 publication-title: Denial of Service Attacks in Wireless Sensor Networks contributor: fullname: Buch, D.; Jinwala, D. C – start-page: 28 year: 2013 end-page: 33 publication-title: An interference suppression mechanism for WSN contributor: fullname: Danyang, Q.; Lin, M.; Erfu, W.; Hongbin, M.; Qun, D – start-page: 1435 year: 2014 end-page: 1439 publication-title: Detection of jammer in Wireless Sensor Network contributor: fullname: Nancy, J. T.; VijayaKumar, K. P.; Kumar, P. G – volume: 10 start-page: 2037 year: 2014 end-page: 2046 article-title: Review Clustering Mechanisms of Distributed Denial of Service Attacks publication-title: Journal of Computer Science contributor: fullname: Wesam, B; Mehdi, E. M – start-page: 54 year: 2015 end-page: 58 publication-title: Medical WSN: Defense for selective forwarding attack contributor: fullname: Mathur, A.; Newe, T – volume: 7 start-page: 74 issue: 1 year: 2008 end-page: 81 article-title: Denial of Service in Wireless Sensor Network: Attacks and Defenses publication-title: IEEE Pervasive Computing contributor: fullname: Raymond, D.R.; Midkiff, S.F – volume: 2 start-page: 393 issue: 1 year: 2015 end-page: 403 article-title: Security Analysis of Wireless Sensor Network publication-title: Journal of Multidisciplinary Engineering Science and Technology (JMEST) contributor: fullname: Hossain, M.; Muslima, U.; Islam, H – volume: 5 issue: 6 year: 2014 article-title: A review of security attacks and Intrusion Detection Schemes in Wireless Sensor Networks publication-title: International Journal of Wireless & Mobile Networks (IJWMN) contributor: fullname: Maleh, Y.; Ezzati, A – start-page: 1 year: 2014 end-page: 6 publication-title: Curbing Distributed Denial of Service attack by traffic filtering in Wireless Sensor Network contributor: fullname: Sahu, S. S.; Priyadarshini, P.; Bilgaiyan, S – start-page: 1 year: 2016 end-page: 9 publication-title: Performance analysis of various attacks under AODV in WSN & MANET using OPNET 14.5 contributor: fullname: Das, R.; Bal, S.; Das, S.; Sarkar, M. K.; Majumder, D.; Chakraborty, A.; Majumder, K – volume: 7 start-page: 23 issue: 11 year: 2010 end-page: 27 article-title: Hello flood attack and its countermeasures in wireless sensor networks publication-title: IJCSI International Journal of Computer Science Issues contributor: fullname: Singh, V. P.; Jain, S.; Singhai, J – start-page: 277 year: 2016 end-page: 282 publication-title: Collision avoidance and service differentiation at the MAC layer of WSN designed for multi-purpose applications contributor: fullname: Dbibih, I.; Iala, I.; Aboutajdine, D.; Zytoune, O – volume: 14 issue: 12 year: 2017 article-title: A Survey of Active Attacks on Wireless Sensor Networks and their Countermeasures publication-title: International Journal of Computer Science and Information Security contributor: fullname: Shahzad, F; Pasha, M; Ahmad, A |
SSID | ssib046701704 ssib046701748 ssib046701705 ssib046701706 ssib046701707 ssib046701700 ssib046701744 ssib046701701 ssib046701745 ssib046701702 ssib046701746 ssib046701703 ssib046701747 ssib046701740 ssib046701741 ssib046701742 ssj0059305 ssib046701743 ssib026970781 ssib046701708 ssib046701709 ssib046701715 ssib046701716 ssib046701717 ssib046701718 ssib046701678 ssib046701711 ssib046701679 ssib046701712 ssib046701713 ssib046701714 ssib046701674 ssib046701675 ssib046701676 ssib046701677 ssib046701710 ssib046701673 ssib046701680 ssib046701719 ssib046701726 ssib046701727 ssib046701728 ssib046701729 ssib046701689 ssib046701722 ssib046701723 ssib046701724 ssib046701725 ssib046701685 ssib046701686 ssib046701687 ssib046701720 ssib046701688 ssib046701721 ssib046701681 ssib046701682 ssib046701683 ssib046701684 ssib046701690 ssib046701691 ssib046701737 ssib046701738 ssib046701739 ssib046701733 ssib046701734 ssib046701735 ssib046701736 ssib046701696 ssib046701697 ssib046701730 ssib046701698 ssib046701731 ssib046701699 ssib046701732 ssib046701692 ssib046701693 ssib046701694 ssib046701695 |
Score | 2.2407956 |
Snippet | Wireless sensor networks are now used in various fields. The information transmitted in the wireless sensor networks is very sensitive, so the security issue... ABSTRACT Wireless sensor networks are now used in various fields. The information transmitted in the wireless sensor networks is very sensitive, so the... |
SourceID | doaj dialnet scielo proquest crossref |
SourceType | Open Website Open Access Repository Aggregation Database |
StartPage | 130 |
SubjectTerms | Chief executive officers Communication system security Computer Engineering comunicación inalámbrica Cybersecurity Denial of service attacks detección de intrusión ENGINEERING, MULTIDISCIPLINARY Interference interferencia de radiofrecuencia Intrusion detection Manufacturing Radiofrequency interference Redes de sensores inalámbricos Remote sensors seguridad del sistema de comunicación Sensors Simulation Wireless communication Wireless Sensor Networks |
Title | Overview of DOS attacks on wireless sensor networks and experimental results for simulation of interference attacks |
URI | https://www.proquest.com/docview/2057846558 http://www.scielo.org.co/scielo.php?script=sci_arttext&pid=S0120-56092018000100130&lng=en&tlng=en https://dialnet.unirioja.es/servlet/oaiart?codigo=6629824 https://doaj.org/article/7c77ebf829374845a941f26d7312a47d |
Volume | 38 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://sdu.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrZ3Nb9MwGMYtmASCA-JTFAYyEhKnbvFXYh8H27QTk9iQuFmOY0tFI0VNO_597MZd2-fChVufVol-yuva75s4z0vIx9ApzVSopqqOzVQy7aatr9tUpUQTvfYsrJ-YXlw1X3_o07Nsk3PX6ivvCRvtgccLd9z4pglt1GlZyraXyhnJIq-7RjDuZNOtZ9-q3imm0kjitdlzsUmzQd5uL0BL0Ap0DboBrUGbfb39ZxQNPFtXmaKBTwOfBj4NfBr4NPBp4DPAZ4DPAJ8BPgN8BvgM8BngM8Bn9vl2jAOLZqA5aAFaglaga9ANaA0a-BjwMeBjwMeAjwEfAz4GfAz4GPAx4OPAx4GPAx8HPg58HPg48HHg48DHgU8AnwA-AXwC-ATwCeATwCeATwCfAD4JfBL4JPBJ4JPAJ4FPAp8EPnn3PFQZUTZj8zyrVuYh-bDuXSZlfZwbrMyKKc_RrdA9O6pTXST2Mu0H-TW0PixLa5L9ejon2ze7efX5U_KkFMT0ZJyIn5F7oX9OHu_YpL4gw-VtzmjCHzqP9PTyirrlMluD0HlPs9X6TcrW6BD6Yb6g_fhay0Bd39Hd9iV0EYbVzXKgqUqnw-xXaVuYT5ktcxblvefNuV-S7-dn118upqVZzNRLo5dTp6SvRBtE00QvTGdUMKzTSsUqBNPoqFVKPbiLzsWWp7m8EtFUsXVd-hikF6_IQT_vw2tCfeWd07VjUUvp0zAWUnujuTJeCNbWE8I3F9b-Hj2BbL6XkqNh03Wxm2jYdTTsOhoTokoI7o7Jzv6b71b9bDGb_3Q2DPbk2_X4gICn2m5CPueA7R-Uv0iLpC2LpP3XIjkhh5tw25KjDJanUl1n-0w9IZ_GIbD98SoPNZuHGs8Wj_nWYd7j8uZ_0Lwlj_JJxxvZh-RguViFd-T-0K3er1fxv3UwGZM |
link.rule.ids | 230,315,782,786,866,887,2106,4028,27932,27933,27934 |
linkProvider | Directory of Open Access Journals |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Overview+of+DOS+attacks+on+wireless+sensor+networks+and+experimental+results+for+simulation+of+interference+attacks&rft.jtitle=Ingenier%C3%ADa+e+investigaci%C3%B3n&rft.au=Gavri%C4%87%2C+%C5%BDeljko&rft.au=Simi%C4%87%2C+Dejan&rft.date=2018&rft.pub=Universidad+Nacional+de+Colombia&rft.issn=0120-5609&rft.eissn=2248-8723&rft.volume=38&rft.issue=1&rft.spage=130&rft_id=info:doi/10.15446%2Fing.investig.v38n1.65453 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0120-5609&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0120-5609&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0120-5609&client=summon |