Overview of DOS attacks on wireless sensor networks and experimental results for simulation of interference attacks

Wireless sensor networks are now used in various fields. The information transmitted in the wireless sensor networks is very sensitive, so the security issue is very important. DOS (denial of service) attacks are a fundamental threat to the functioning of wireless sensor networks. This paper describ...

Full description

Saved in:
Bibliographic Details
Published in:Ingeniería e investigación Vol. 38; no. 1; pp. 130 - 138
Main Authors: Gavric, Zeljko, Simic, Dejan
Format: Journal Article
Language:English
Published: Bogota Universidad Nacional de Colombia 2018
Facultad de Ingeniería, Universidad Nacional de Colombia
Subjects:
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Abstract Wireless sensor networks are now used in various fields. The information transmitted in the wireless sensor networks is very sensitive, so the security issue is very important. DOS (denial of service) attacks are a fundamental threat to the functioning of wireless sensor networks. This paper describes some of the most common DOS attacks and potential methods of protection against them. The case study shows one of the most frequent attacks on wireless sensor networks – the interference attack. In the introduction of this paper authors assume that the attack interference can cause significant obstruction of wireless sensor networks. This assumption has been proved in the case study through simulation scenario and simulation results.
AbstractList Wireless sensor networks are now used in various fields. The information transmitted in the wireless sensor networks is very sensitive, so the security issue is very important. DOS (denial of service) attacks are a fundamental threat to the functioning of wireless sensor networks. This paper describes some of the most common DOS attacks and potential methods of protection against them. The case study shows one of the most frequent attacks on wireless sensor networks – the interference attack. In the introduction of this paper authors assume that the attack interference can cause significant obstruction of wireless sensor networks. This assumption has been proved in the case study through simulation scenario and simulation results. Las redes de sensores inalámbricos se utilizan ahora en varios campos. La información transmitida en las redes de sensores inalámbricos es muy delicada, por lo que el tema de la seguridad es muy importante. Los ataques de DOS (Denegación de servicio) son una amenaza fundamental para el funcionamiento de las redes de sensores inalámbricos. Este documento describe algunos de los ataques DOS más comunes y los posibles métodos de protección contra ellos. El estudio de caso muestra uno de los ataques más frecuentes a las redes de sensores inalámbricos: el ataque de interferencia. En la introducción de este artículo, los autores suponen que la interferencia de ataque puede causar una obstrucción significativa de las redes de sensores inalámbricos. Esta suposición se ha demostrado en el estudio de caso a través de escenarios de simulación y los resultados de estas simulaciones.
Wireless sensor networks are now used in various fields. The information transmitted in the wireless sensor networks is very sensitive, so the security issue is very important. DOS (denial of service) attacks are a fundamental threat to the functioning of wireless sensor networks. This paper describes some of the most common DOS attacks and potential methods of protection against them. The case study shows one of the most frequent attacks on wireless sensor networks – the interference attack. In the introduction of this paper authors assume that the attack interference can cause significant obstruction of wireless sensor networks. This assumption has been proved in the case study through simulation scenario and simulation results.
ABSTRACT Wireless sensor networks are now used in various fields. The information transmitted in the wireless sensor networks is very sensitive, so the security issue is very important. DOS (denial of service) attacks are a fundamental threat to the functioning of wireless sensor networks. This paper describes some of the most common DOS attacks and potential methods of protection against them. The case study shows one of the most frequent attacks on wireless sensor networks - the interference attack. In the introduction of this paper authors assume that the attack interference can cause significant obstruction of wireless sensor networks. This assumption has been proved in the case study through simulation scenario and simulation results.
Author Gavrić, Željko
Simić, Dejan
AuthorAffiliation Slobomir P University
University of Belgrade
AuthorAffiliation_xml – name: Slobomir P University
– name: University of Belgrade
Author_xml – sequence: 1
  givenname: Zeljko
  surname: Gavric
  fullname: Gavric, Zeljko
  organization: Slobomir P University
– sequence: 2
  givenname: Dejan
  surname: Simic
  fullname: Simic, Dejan
  organization: University of Belgrade
BookMark eNpVkmtrHCEUhoeSQrdp_oOln3fqdVTol5BeEggsNOlncWaOi9uJbtXZbf993UtSCoJyPO_Dubxvm4sQAzTNe4JbIjjvPvqwbn3YQS5-3e6YCqTtBBfsVbOglKulkpRdNAtMKF6KDus3zVXOvse8k5hIzBdNXu0g7TzsUXTo8-oB2VLs8DOjGNDeJ5ggZ5Qh5JhQgLKPqf7ZMCL4vYXknyAUO6EEeZ5KRq5mZf80T7b4CqhIHwokBwnCAM_sd81rZ6cMV-f7svnx9cvjze3yfvXt7ub6fjlwrcrSCj5g1gOT0g1Mj1qAJqMSwmEALZVTQmpOrbPW9bSTEjOnsevtWJ_AB3bZ3J24Y7Qbs63V2vTHROvNMRDT2thU_DCBkYOU0DtFNZNccWE1J452o2SEWi7Hyvp0Znk71UH8jzvH5uCTjxtrIJvr748Y18FrSqSo8vYkz4OHKZpNnFOovZuHw27MYTcUE3VQ1MNwFXw4CbYp_prrgv9JKBZS8U4IVbP0KWtIMecE7qUsgs3RIqZaxDxbxBwtYo4WYX8BLPa1ow
CitedBy_id crossref_primary_10_1080_09720510_2020_1799580
crossref_primary_10_1007_s11277_021_09401_3
crossref_primary_10_1109_ACCESS_2020_3027325
crossref_primary_10_1007_s11276_021_02871_0
crossref_primary_10_3390_s21154951
crossref_primary_10_1007_s11277_021_09040_8
crossref_primary_10_1109_ACCESS_2022_3202807
crossref_primary_10_1007_s11277_022_09980_9
crossref_primary_10_1177_18479790231157220
crossref_primary_10_3390_electronics10111244
crossref_primary_10_31854_2307_1303_2019_7_1_75_83
crossref_primary_10_3390_jsan10010014
Cites_doi 10.4316/AECE.2016.01006
10.1109/ITCS.2010.5581263
10.1109/ICICES.2016.7518942
10.1109/GLOCOM.2009.5425381
10.1109/iccsp.2013.6577120
10.1109/ICCCNT.2014.6963043
10.3844/jcssp.2014.2037.2046
10.1109/NGCT.2016.7877454
10.1109/MPRV.2008.6
10.1109/MC.2002.1039518
10.1109/ICCCNET.2008.4787693
10.1109/TSSA.2011.6095400
10.1155/2014/303501
10.1109/SNS-PCS.2013.6553829
10.1080/07366981.2013.754207
10.1109/MNET.2006.1637931
10.1109/ICCSP.2014.6950086
10.1109/VTCFall.2016.7880885
10.1109/MCOM.2002.1024418
10.1109/ICSensT.2015.7438364
10.1109/UEMCON.2016.7777831
10.1145/1102219.1102235
10.1109/COMST.2006.315852
10.1109/CloudTech.2016.7847710
10.1002/9780470666388
10.15446/ing.investig.v35n2.45289
ContentType Journal Article
Copyright 2018. This work is published under http://creativecommons.org/licenses/by/4.0 (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
This work is licensed under a Creative Commons Attribution 4.0 International License.
LICENCIA DE USO: Los documentos a texto completo incluidos en Dialnet son de acceso libre y propiedad de sus autores y/o editores. Por tanto, cualquier acto de reproducción, distribución, comunicación pública y/o transformación total o parcial requiere el consentimiento expreso y escrito de aquéllos. Cualquier enlace al texto completo de estos documentos deberá hacerse a través de la URL oficial de éstos en Dialnet. Más información: https://dialnet.unirioja.es/info/derechosOAI | INTELLECTUAL PROPERTY RIGHTS STATEMENT: Full text documents hosted by Dialnet are protected by copyright and/or related rights. This digital object is accessible without charge, but its use is subject to the licensing conditions set by its authors or editors. Unless expressly stated otherwise in the licensing conditions, you are free to linking, browsing, printing and making a copy for your own personal purposes. All other acts of reproduction and communication to the public are subject to the licensing conditions expressed by editors and authors and require consent from them. Any link to this document should be made using its official URL in Dialnet. More info: https://dialnet.unirioja.es/info/derechosOAI
Copyright_xml – notice: 2018. This work is published under http://creativecommons.org/licenses/by/4.0 (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
– notice: This work is licensed under a Creative Commons Attribution 4.0 International License.
– notice: LICENCIA DE USO: Los documentos a texto completo incluidos en Dialnet son de acceso libre y propiedad de sus autores y/o editores. Por tanto, cualquier acto de reproducción, distribución, comunicación pública y/o transformación total o parcial requiere el consentimiento expreso y escrito de aquéllos. Cualquier enlace al texto completo de estos documentos deberá hacerse a través de la URL oficial de éstos en Dialnet. Más información: https://dialnet.unirioja.es/info/derechosOAI | INTELLECTUAL PROPERTY RIGHTS STATEMENT: Full text documents hosted by Dialnet are protected by copyright and/or related rights. This digital object is accessible without charge, but its use is subject to the licensing conditions set by its authors or editors. Unless expressly stated otherwise in the licensing conditions, you are free to linking, browsing, printing and making a copy for your own personal purposes. All other acts of reproduction and communication to the public are subject to the licensing conditions expressed by editors and authors and require consent from them. Any link to this document should be made using its official URL in Dialnet. More info: https://dialnet.unirioja.es/info/derechosOAI
DBID AAYXX
CITATION
3V.
7TB
7XB
8FD
8FE
8FG
8FK
8G5
ABJCF
ABUWG
AFKRA
AZQEC
BENPR
BGLVJ
CCPQU
CLZPN
DWQXO
FR3
GNUQQ
GUQSH
HCIFZ
KR7
L6V
M2O
M7S
MBDVC
PADUT
PIMPY
PQEST
PQQKQ
PQUKI
PRINS
PTHSS
Q9U
GPN
AGMXS
FKZ
DOA
DOI 10.15446/ing.investig.v38n1.65453
DatabaseName CrossRef
ProQuest Central (Corporate)
Mechanical & Transportation Engineering Abstracts
ProQuest Central (purchase pre-March 2016)
Technology Research Database
ProQuest SciTech Collection
ProQuest Technology Collection
ProQuest Central (Alumni) (purchase pre-March 2016)
Research Library (Alumni Edition)
Materials Science & Engineering Database (Proquest)
ProQuest Central (Alumni)
ProQuest Central
ProQuest Central Essentials
ProQuest Central
Technology Collection
ProQuest One Community College
Latin America & Iberia Database
ProQuest Central Korea
Engineering Research Database
ProQuest Central Student
Research Library Prep
SciTech Premium Collection
Civil Engineering Abstracts
ProQuest Engineering Collection
Research Library
Engineering Database
Research Library (Corporate)
Research Library China
Publicly Available Content Database
ProQuest One Academic Eastern Edition (DO NOT USE)
ProQuest One Academic
ProQuest One Academic UKI Edition
ProQuest Central China
Engineering Collection
ProQuest Central Basic
SciELO
Dialnet (Open Access Full Text)
Dialnet
DOAJ Directory of Open Access Journals
DatabaseTitle CrossRef
Publicly Available Content Database
Research Library Prep
ProQuest Central Student
Technology Collection
Technology Research Database
Mechanical & Transportation Engineering Abstracts
ProQuest Central Essentials
ProQuest Central (Alumni Edition)
SciTech Premium Collection
ProQuest One Community College
Research Library (Alumni Edition)
ProQuest Central China
ProQuest Central
ProQuest Engineering Collection
ProQuest Central Korea
ProQuest Research Library
Research Library China
Engineering Collection
Civil Engineering Abstracts
Engineering Database
ProQuest Central Basic
ProQuest One Academic Eastern Edition
ProQuest Technology Collection
ProQuest SciTech Collection
Latin America & Iberian Database
ProQuest One Academic UKI Edition
Materials Science & Engineering Collection
Engineering Research Database
ProQuest One Academic
ProQuest Central (Alumni)
DatabaseTitleList
Publicly Available Content Database


CrossRef
Database_xml – sequence: 1
  dbid: DOA
  name: Directory of Open Access Journals
  url: http://www.doaj.org/
  sourceTypes: Open Website
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
DocumentTitleAlternate Visión general de los ataques de DOS en redes de sensores inalámbricos y resultados experimentales para la simulación de ataques de interferencia
EISSN 2248-8723
EndPage 138
ExternalDocumentID oai_doaj_org_article_7c77ebf829374845a941f26d7312a47d
oai_dialnet_unirioja_es_ART0001292175
S0120_56092018000100130
10_15446_ing_investig_v38n1_65453
GroupedDBID 3V.
635
8FE
8FG
8G5
AAYXX
ABJCF
ABUWG
ABXHO
ACIWK
ADBBV
AENEX
AFKRA
AFPKN
ALMA_UNASSIGNED_HOLDINGS
APOWU
AZFZN
AZQEC
B14
BCNDV
BENPR
BGLVJ
BPHCQ
CCPQU
CITATION
CLZPN
DWQXO
FAEIB
GNUQQ
GROUPED_DOAJ
GUQSH
HCIFZ
KQ8
KWQ
L6V
M2O
M7S
OK1
PADUT
PIMPY
PQQKQ
PROAC
PTHSS
RDY
RNS
RTK
SCD
~02
7TB
7XB
8FD
8FK
FR3
KR7
MBDVC
PQEST
PQUKI
PRINS
Q9U
GPN
AGMXS
FKZ
IPNFZ
RIG
ID FETCH-LOGICAL-c498t-a54c03be377fc39d95e91d855f0ee978f857942afaafb267703f90fbad770e4c3
IEDL.DBID DOA
ISSN 0120-5609
IngestDate Tue Oct 22 15:15:28 EDT 2024
Thu Jul 20 13:41:51 EDT 2023
Tue Nov 19 21:48:25 EST 2024
Thu Nov 21 03:47:16 EST 2024
Thu Nov 21 23:31:27 EST 2024
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 1
Keywords Wireless communication
interferencia de radiofrecuencia
Intrusion detection
detección de intrusión
Wireless Sensor Networks
Communication system security
seguridad del sistema de comunicación
Redes de sensores inalámbricos
comunicación inalámbrica
Radiofrequency interference
Language English
License This work is licensed under a Creative Commons Attribution 4.0 International License. http://creativecommons.org/licenses/by/4.0
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c498t-a54c03be377fc39d95e91d855f0ee978f857942afaafb267703f90fbad770e4c3
OpenAccessLink https://doaj.org/article/7c77ebf829374845a941f26d7312a47d
PQID 2057846558
PQPubID 2035727
PageCount 9
ParticipantIDs doaj_primary_oai_doaj_org_article_7c77ebf829374845a941f26d7312a47d
dialnet_primary_oai_dialnet_unirioja_es_ART0001292175
scielo_journals_S0120_56092018000100130
proquest_journals_2057846558
crossref_primary_10_15446_ing_investig_v38n1_65453
PublicationCentury 2000
PublicationDate 2018-00-00
PublicationDateYYYYMMDD 2018-01-01
PublicationDate_xml – year: 2018
  text: 2018-00-00
PublicationDecade 2010
PublicationPlace Bogota
PublicationPlace_xml – name: Bogota
PublicationTitle Ingeniería e investigación
PublicationTitleAlternate Ing. Investig
PublicationYear 2018
Publisher Universidad Nacional de Colombia
Facultad de Ingeniería, Universidad Nacional de Colombia
Publisher_xml – name: Universidad Nacional de Colombia
– name: Facultad de Ingeniería, Universidad Nacional de Colombia
References ref13
ref35
ref12
ref34
ref15
ref37
ref14
ref36
ref31
ref30
ref11
ref33
ref10
ref32
ref2
ref1
ref17
ref39
ref16
ref38
ref19
ref18
ref24
ref23
ref26
ref25
ref20
ref22
ref21
ref28
ref27
ref29
ref8
ref7
ref9
ref4
ref3
ref6
ref5
ref40
Chaudhry, J. A.; Tariq, U.; Amin, M. A.; Rittenhouse, R. G 2013; 29
Malik, M.; Singh, Y 2015; 4
Dbibih, I.; Iala, I.; Aboutajdine, D.; Zytoune, O 2016
Yong, W.; Garhan, A.; Byrav, R 2006; 8
Maleh, Y.; Ezzati, A 2014; 5
Hamza, T.; Kaddoum, G.; Meddeb, A.; Matar, G 2016
Sonar, K.; Upadhyay, H 2014; 10
Callaway, E.; Gorday, P.; Hester, L.; Gutierrez, J. A.; Naeve, M.; Heile, B.; Bahl, V 2002; 40
Wazid, M.; Katal, A.; Sachan, R. S.; Goudar, R. H.; Singh, D. P 2013
Liu, H. I.; Chang, K. C 2011
Dargie, W; Poellabauer, C 2010
Isha, M; Gaurav, R 2013; 1
Buch, D.; Jinwala, D. C 2010
Shanthi, S.; Rajan, E. G 2016
Deng, J.; Han, R.; Mishra, S 2005
Singh, V. P.; Jain, S.; Singhai, J 2010; 7
Das, R.; Bal, S.; Das, S.; Sarkar, M. K.; Majumder, D.; Chakraborty, A.; Majumder, K 2016
Mathur, A.; Newe, T 2015
Oliveira, F; Semente, R; Fernandes, J; Júnior, S; Melo, T; Salazar, A 2015; 35
Danyang, Q.; Lin, M.; Erfu, W.; Hongbin, M.; Qun, D 2013
Choi, Y. S.; Oh, J. T.; Jang, J. S.; Ryou, J. C 2010
Benbrahim, S. E 2011
Wood, A. D.; Stankovic, J. A 2002; 35
Maheswari, S. U.; Usha, N. S.; Anita, E. M.; Devi, K. R 2016
Raymond, D.R.; Midkiff, S.F 2008; 7
Wesam, B; Mehdi, E. M 2014; 10
Sahu, S. S.; Priyadarshini, P.; Bilgaiyan, S 2014
Ghildiyal, S.; Mishra, A. K.; Gupta, A.; Garg, N 2014; 3
Xu, W.; Ma, K.; Trappe, W.; Zhang, Y 2006; 20
Hossain, M.; Muslima, U.; Islam, H 2015; 2
Nancy, J. T.; VijayaKumar, K. P.; Kumar, P. G 2014
Hamieh, A.; Ben-Othman, J.; Mokdad, L 2009
Shahzad, F; Pasha, M; Ahmad, A 2017; 14
Goyal, S.; Bhatia, T.; Verma, A. K 2015
Fan, C. S 2016; 16
Boulis, A 2011
Pomalaza, C 2004
Amara, S. O.; Beghdad, R.; Oussalah, M 2013; 47
Mopari, I. B.; Pukale, S. G.; Dhore, M. L 2008
Saxena, M 2007
References_xml – ident: ref1
  doi: 10.4316/AECE.2016.01006
– ident: ref35
  doi: 10.1109/ITCS.2010.5581263
– ident: ref7
– ident: ref24
  doi: 10.1109/ICICES.2016.7518942
– ident: ref38
  doi: 10.1109/GLOCOM.2009.5425381
– ident: ref22
  doi: 10.1109/iccsp.2013.6577120
– ident: ref36
  doi: 10.1109/ICCCNT.2014.6963043
– ident: ref25
– ident: ref30
  doi: 10.3844/jcssp.2014.2037.2046
– ident: ref27
– ident: ref19
– ident: ref32
– ident: ref37
  doi: 10.1109/NGCT.2016.7877454
– ident: ref13
  doi: 10.1109/MPRV.2008.6
– ident: ref4
  doi: 10.1109/MC.2002.1039518
– ident: ref11
– ident: ref33
  doi: 10.1109/ICCCNET.2008.4787693
– ident: ref34
  doi: 10.1109/TSSA.2011.6095400
– ident: ref9
  doi: 10.1155/2014/303501
– ident: ref16
  doi: 10.1109/SNS-PCS.2013.6553829
– ident: ref18
  doi: 10.1080/07366981.2013.754207
– ident: ref6
  doi: 10.1109/MNET.2006.1637931
– ident: ref15
  doi: 10.1109/ICCSP.2014.6950086
– ident: ref39
  doi: 10.1109/VTCFall.2016.7880885
– ident: ref28
– ident: ref8
  doi: 10.1109/MCOM.2002.1024418
– ident: ref21
  doi: 10.1109/ICSensT.2015.7438364
– ident: ref40
– ident: ref23
– ident: ref26
– ident: ref5
  doi: 10.1109/UEMCON.2016.7777831
– ident: ref29
  doi: 10.1145/1102219.1102235
– ident: ref20
  doi: 10.1109/COMST.2006.315852
– ident: ref17
  doi: 10.1109/CloudTech.2016.7847710
– ident: ref2
  doi: 10.1002/9780470666388
– ident: ref3
  doi: 10.15446/ing.investig.v35n2.45289
– ident: ref10
– ident: ref12
– ident: ref14
– ident: ref31
– year: 2011
  publication-title: Castalia - A simulator for Wireless Sensor Networks and Body Area Networks
  contributor:
    fullname: Boulis, A
– year: 2007
  publication-title: Security In Wireless Sensor Networks - A Layer Based Classification
  contributor:
    fullname: Saxena, M
– volume: 1
  start-page: 40
  issue: 2
  year: 2013
  end-page: 45
  article-title: DOS Attacks on TCP/IP Layers in WSN
  publication-title: International Journal of Computer Networks and Communications Security
  contributor:
    fullname: Isha, M; Gaurav, R
– start-page: 22
  year: 2011
  end-page: 27
  publication-title: Defending systems against tilt DDoS attacks
  contributor:
    fullname: Liu, H. I.; Chang, K. C
– volume: 29
  start-page: 7
  issue: 2
  year: 2013
  end-page: 12
  article-title: Dealing with sinkhole attacks in wireless sensor networks
  publication-title: Advanced Science and Technology Letters
  contributor:
    fullname: Chaudhry, J. A.; Tariq, U.; Amin, M. A.; Rittenhouse, R. G
– start-page: 1
  year: 2016
  end-page: 5
  publication-title: A Survey on Intelligent MAC Layer Jamming Attacks and Countermeasures in WSNs
  contributor:
    fullname: Hamza, T.; Kaddoum, G.; Meddeb, A.; Matar, G
– volume: 47
  start-page: 6
  issue: 2
  year: 2013
  end-page: 29
  article-title: Securing Wireless Sensor Networks: A Survey
  publication-title: EDPACS
  contributor:
    fullname: Amara, S. O.; Beghdad, R.; Oussalah, M
– year: 2010
  publication-title: Fundamentals of wireless sensor networks: theory and practice
  contributor:
    fullname: Dargie, W; Poellabauer, C
– volume: 8
  year: 2006
  article-title: A Survey Of Security Issues In Wireless Sensor Networks
  publication-title: IEEE Communications Surveys & Tutorials
  contributor:
    fullname: Yong, W.; Garhan, A.; Byrav, R
– volume: 16
  start-page: 41
  issue: 1
  year: 2016
  end-page: 46
  article-title: HIGH: A Hexagon-based Intelligent Grouping Approach inWireless Sensor Networks
  publication-title: Advances in Electrical and Computer Engineering
  contributor:
    fullname: Fan, C. S
– start-page: 89
  year: 2005
  end-page: 96
  publication-title: Defending against path-based DoS attacks in wireless sensor networks
  contributor:
    fullname: Deng, J.; Han, R.; Mishra, S
– start-page: 1
  year: 2008
  end-page: 5
  publication-title: Detection and defense against DDoS attack with IP spoofing
  contributor:
    fullname: Mopari, I. B.; Pukale, S. G.; Dhore, M. L
– volume: 35
  start-page: 67
  issue: 2
  year: 2015
  end-page: 73
  article-title: EEWES: An energy-efficient wireless sensor network embedded system to be applied on industrial environments
  publication-title: Ingeniería e Investigación
  contributor:
    fullname: Oliveira, F; Semente, R; Fernandes, J; Júnior, S; Melo, T; Salazar, A
– start-page: 426
  year: 2016
  end-page: 431
  publication-title: Comprehensive analysis of security attacks and intrusion detection system in wireless sensor networks
  contributor:
    fullname: Shanthi, S.; Rajan, E. G
– volume: 35
  start-page: 54
  issue: 10
  year: 2002
  end-page: 62
  article-title: Denial of service in sensor networks
  publication-title: Computer
  contributor:
    fullname: Wood, A. D.; Stankovic, J. A
– volume: 40
  start-page: 70
  issue: 8
  year: 2002
  end-page: 77
  article-title: Home networking with IEEE 802.15. 4: a developing standard for low-rate wireless personal area networks
  publication-title: IEEE Communications magazine
  contributor:
    fullname: Callaway, E.; Gorday, P.; Hester, L.; Gutierrez, J. A.; Naeve, M.; Heile, B.; Bahl, V
– start-page: 1
  year: 2016
  end-page: 5
  publication-title: A novel robust routing protocol RAEED to avoid DoS attacks in WSN
  contributor:
    fullname: Maheswari, S. U.; Usha, N. S.; Anita, E. M.; Devi, K. R
– volume: 3
  start-page: 140
  year: 2014
  end-page: 143
  article-title: Analysis of denial of service (dos) attacks in wireless sensor networks
  publication-title: IJRET: International Journal of Research in Engineering and Technology
  contributor:
    fullname: Ghildiyal, S.; Mishra, A. K.; Gupta, A.; Garg, N
– year: 2004
  publication-title: Wireless sensor network
  contributor:
    fullname: Pomalaza, C
– start-page: 1
  year: 2009
  end-page: 5
  publication-title: Detection of radio interference attacks in VANET
  contributor:
    fullname: Hamieh, A.; Ben-Othman, J.; Mokdad, L
– volume: 4
  start-page: 260
  issue: 6
  year: 2015
  end-page: 265
  article-title: A Review: DoS and DDoS Attacks
  publication-title: International Journal of Computer Science and Mobile Computing
  contributor:
    fullname: Malik, M.; Singh, Y
– year: 2011
  publication-title: Defense against traffic analysis attack in wireless sensor networks
  contributor:
    fullname: Benbrahim, S. E
– volume: 10
  start-page: 58
  year: 2014
  end-page: 63
  article-title: A Survey: DDOS Attack on Internet of Things
  publication-title: International Journal of Engineering Research and Development
  contributor:
    fullname: Sonar, K.; Upadhyay, H
– start-page: 576
  year: 2013
  end-page: 581
  publication-title: Detection and prevention mechanism for blackhole attack in wireless sensor network
  contributor:
    fullname: Wazid, M.; Katal, A.; Sachan, R. S.; Goudar, R. H.; Singh, D. P
– start-page: 1463
  year: 2015
  end-page: 1468
  publication-title: Wormhole and Sybil attack in WSN: A review
  contributor:
    fullname: Goyal, S.; Bhatia, T.; Verma, A. K
– volume: 20
  start-page: 41
  issue: 3
  year: 2006
  end-page: 47
  article-title: Jamming sensor networks: attack and defense strategies
  publication-title: IEEE Network
  contributor:
    fullname: Xu, W.; Ma, K.; Trappe, W.; Zhang, Y
– start-page: 1
  year: 2010
  end-page: 6
  publication-title: Integrated DDoS attack defense infrastructure for effective attack prevention
  contributor:
    fullname: Choi, Y. S.; Oh, J. T.; Jang, J. S.; Ryou, J. C
– year: 2010
  publication-title: Denial of Service Attacks in Wireless Sensor Networks
  contributor:
    fullname: Buch, D.; Jinwala, D. C
– start-page: 28
  year: 2013
  end-page: 33
  publication-title: An interference suppression mechanism for WSN
  contributor:
    fullname: Danyang, Q.; Lin, M.; Erfu, W.; Hongbin, M.; Qun, D
– start-page: 1435
  year: 2014
  end-page: 1439
  publication-title: Detection of jammer in Wireless Sensor Network
  contributor:
    fullname: Nancy, J. T.; VijayaKumar, K. P.; Kumar, P. G
– volume: 10
  start-page: 2037
  year: 2014
  end-page: 2046
  article-title: Review Clustering Mechanisms of Distributed Denial of Service Attacks
  publication-title: Journal of Computer Science
  contributor:
    fullname: Wesam, B; Mehdi, E. M
– start-page: 54
  year: 2015
  end-page: 58
  publication-title: Medical WSN: Defense for selective forwarding attack
  contributor:
    fullname: Mathur, A.; Newe, T
– volume: 7
  start-page: 74
  issue: 1
  year: 2008
  end-page: 81
  article-title: Denial of Service in Wireless Sensor Network: Attacks and Defenses
  publication-title: IEEE Pervasive Computing
  contributor:
    fullname: Raymond, D.R.; Midkiff, S.F
– volume: 2
  start-page: 393
  issue: 1
  year: 2015
  end-page: 403
  article-title: Security Analysis of Wireless Sensor Network
  publication-title: Journal of Multidisciplinary Engineering Science and Technology (JMEST)
  contributor:
    fullname: Hossain, M.; Muslima, U.; Islam, H
– volume: 5
  issue: 6
  year: 2014
  article-title: A review of security attacks and Intrusion Detection Schemes in Wireless Sensor Networks
  publication-title: International Journal of Wireless & Mobile Networks (IJWMN)
  contributor:
    fullname: Maleh, Y.; Ezzati, A
– start-page: 1
  year: 2014
  end-page: 6
  publication-title: Curbing Distributed Denial of Service attack by traffic filtering in Wireless Sensor Network
  contributor:
    fullname: Sahu, S. S.; Priyadarshini, P.; Bilgaiyan, S
– start-page: 1
  year: 2016
  end-page: 9
  publication-title: Performance analysis of various attacks under AODV in WSN & MANET using OPNET 14.5
  contributor:
    fullname: Das, R.; Bal, S.; Das, S.; Sarkar, M. K.; Majumder, D.; Chakraborty, A.; Majumder, K
– volume: 7
  start-page: 23
  issue: 11
  year: 2010
  end-page: 27
  article-title: Hello flood attack and its countermeasures in wireless sensor networks
  publication-title: IJCSI International Journal of Computer Science Issues
  contributor:
    fullname: Singh, V. P.; Jain, S.; Singhai, J
– start-page: 277
  year: 2016
  end-page: 282
  publication-title: Collision avoidance and service differentiation at the MAC layer of WSN designed for multi-purpose applications
  contributor:
    fullname: Dbibih, I.; Iala, I.; Aboutajdine, D.; Zytoune, O
– volume: 14
  issue: 12
  year: 2017
  article-title: A Survey of Active Attacks on Wireless Sensor Networks and their Countermeasures
  publication-title: International Journal of Computer Science and Information Security
  contributor:
    fullname: Shahzad, F; Pasha, M; Ahmad, A
SSID ssib046701704
ssib046701748
ssib046701705
ssib046701706
ssib046701707
ssib046701700
ssib046701744
ssib046701701
ssib046701745
ssib046701702
ssib046701746
ssib046701703
ssib046701747
ssib046701740
ssib046701741
ssib046701742
ssj0059305
ssib046701743
ssib026970781
ssib046701708
ssib046701709
ssib046701715
ssib046701716
ssib046701717
ssib046701718
ssib046701678
ssib046701711
ssib046701679
ssib046701712
ssib046701713
ssib046701714
ssib046701674
ssib046701675
ssib046701676
ssib046701677
ssib046701710
ssib046701673
ssib046701680
ssib046701719
ssib046701726
ssib046701727
ssib046701728
ssib046701729
ssib046701689
ssib046701722
ssib046701723
ssib046701724
ssib046701725
ssib046701685
ssib046701686
ssib046701687
ssib046701720
ssib046701688
ssib046701721
ssib046701681
ssib046701682
ssib046701683
ssib046701684
ssib046701690
ssib046701691
ssib046701737
ssib046701738
ssib046701739
ssib046701733
ssib046701734
ssib046701735
ssib046701736
ssib046701696
ssib046701697
ssib046701730
ssib046701698
ssib046701731
ssib046701699
ssib046701732
ssib046701692
ssib046701693
ssib046701694
ssib046701695
Score 2.2407956
Snippet Wireless sensor networks are now used in various fields. The information transmitted in the wireless sensor networks is very sensitive, so the security issue...
ABSTRACT Wireless sensor networks are now used in various fields. The information transmitted in the wireless sensor networks is very sensitive, so the...
SourceID doaj
dialnet
scielo
proquest
crossref
SourceType Open Website
Open Access Repository
Aggregation Database
StartPage 130
SubjectTerms Chief executive officers
Communication system security
Computer Engineering
comunicación inalámbrica
Cybersecurity
Denial of service attacks
detección de intrusión
ENGINEERING, MULTIDISCIPLINARY
Interference
interferencia de radiofrecuencia
Intrusion detection
Manufacturing
Radiofrequency interference
Redes de sensores inalámbricos
Remote sensors
seguridad del sistema de comunicación
Sensors
Simulation
Wireless communication
Wireless Sensor Networks
Title Overview of DOS attacks on wireless sensor networks and experimental results for simulation of interference attacks
URI https://www.proquest.com/docview/2057846558
http://www.scielo.org.co/scielo.php?script=sci_arttext&pid=S0120-56092018000100130&lng=en&tlng=en
https://dialnet.unirioja.es/servlet/oaiart?codigo=6629824
https://doaj.org/article/7c77ebf829374845a941f26d7312a47d
Volume 38
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://sdu.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrZ3Nb9MwGMYtmASCA-JTFAYyEhKnbvFXYh8H27QTk9iQuFmOY0tFI0VNO_597MZd2-fChVufVol-yuva75s4z0vIx9ApzVSopqqOzVQy7aatr9tUpUQTvfYsrJ-YXlw1X3_o07Nsk3PX6ivvCRvtgccLd9z4pglt1GlZyraXyhnJIq-7RjDuZNOtZ9-q3imm0kjitdlzsUmzQd5uL0BL0Ap0DboBrUGbfb39ZxQNPFtXmaKBTwOfBj4NfBr4NPBp4DPAZ4DPAJ8BPgN8BvgM8BngM8Bn9vl2jAOLZqA5aAFaglaga9ANaA0a-BjwMeBjwMeAjwEfAz4GfAz4GPAx4OPAx4GPAx8HPg58HPg48HHg48DHgU8AnwA-AXwC-ATwCeATwCeATwCfAD4JfBL4JPBJ4JPAJ4FPAp8EPnn3PFQZUTZj8zyrVuYh-bDuXSZlfZwbrMyKKc_RrdA9O6pTXST2Mu0H-TW0PixLa5L9ejon2ze7efX5U_KkFMT0ZJyIn5F7oX9OHu_YpL4gw-VtzmjCHzqP9PTyirrlMluD0HlPs9X6TcrW6BD6Yb6g_fhay0Bd39Hd9iV0EYbVzXKgqUqnw-xXaVuYT5ktcxblvefNuV-S7-dn118upqVZzNRLo5dTp6SvRBtE00QvTGdUMKzTSsUqBNPoqFVKPbiLzsWWp7m8EtFUsXVd-hikF6_IQT_vw2tCfeWd07VjUUvp0zAWUnujuTJeCNbWE8I3F9b-Hj2BbL6XkqNh03Wxm2jYdTTsOhoTokoI7o7Jzv6b71b9bDGb_3Q2DPbk2_X4gICn2m5CPueA7R-Uv0iLpC2LpP3XIjkhh5tw25KjDJanUl1n-0w9IZ_GIbD98SoPNZuHGs8Wj_nWYd7j8uZ_0Lwlj_JJxxvZh-RguViFd-T-0K3er1fxv3UwGZM
link.rule.ids 230,315,782,786,866,887,2106,4028,27932,27933,27934
linkProvider Directory of Open Access Journals
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Overview+of+DOS+attacks+on+wireless+sensor+networks+and+experimental+results+for+simulation+of+interference+attacks&rft.jtitle=Ingenier%C3%ADa+e+investigaci%C3%B3n&rft.au=Gavri%C4%87%2C+%C5%BDeljko&rft.au=Simi%C4%87%2C+Dejan&rft.date=2018&rft.pub=Universidad+Nacional+de+Colombia&rft.issn=0120-5609&rft.eissn=2248-8723&rft.volume=38&rft.issue=1&rft.spage=130&rft_id=info:doi/10.15446%2Fing.investig.v38n1.65453
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0120-5609&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0120-5609&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0120-5609&client=summon