2011
DOI: 10.1002/sec.373
|View full text |Cite
|
Sign up to set email alerts
|

A proposed security scheme against Denial of Service attacks in cluster‐based wireless sensor networks

Abstract: Traditional security schemes developed for sensor networks are not suitable for cluster‐based wireless sensor networks (WSNs) because of their susceptibility to Denial of Service (DoS) attacks. In this paper, we provide a security scheme against DoS attacks (SSAD) in cluster‐based WSNs. The scheme establishes trust management with energy character, which leads nodes to elect trusted cluster heads. Furthermore, a new type of vice cluster head node is proposed to detect betrayed cluster heads. Theoretical analys… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
11
0

Year Published

2012
2012
2021
2021

Publication Types

Select...
8
1

Relationship

1
8

Authors

Journals

citations
Cited by 16 publications
(11 citation statements)
references
References 20 publications
0
11
0
Order By: Relevance
“…Due to the current development of artificial intelligence technology [12,31,38,39], the development of edge networks and edge computing is in the ascendant [48,50]. Secure data collection is an important guarantee for the applications development [27,34,37,51,52]. Therefore, how to ensure the safety of data collection is an important research issue and there have been quite a lot of researchers focusing on it [53][54][55].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Due to the current development of artificial intelligence technology [12,31,38,39], the development of edge networks and edge computing is in the ascendant [48,50]. Secure data collection is an important guarantee for the applications development [27,34,37,51,52]. Therefore, how to ensure the safety of data collection is an important research issue and there have been quite a lot of researchers focusing on it [53][54][55].…”
Section: Related Workmentioning
confidence: 99%
“…These sensing devices are relatively simple and do not have the ability to communicate directly with the Internet [4,9,24]. They are often selforganized into networks [25][26][27]. Sensing devices on the roadside act as gateway to collect the data of the entire network [4], and then send the collected data to the passing mobile vehicles [28][29][30].…”
Section: Introductionmentioning
confidence: 99%
“…Some common models of attack are Ping of Death, Syn Flood, Land Attack, and Teardrop [17]. There are various types of methods proposed by various researchers to anticipate security problems in cloud computing, especially in DDOS [21,22].…”
Section: Ip Spoofingmentioning
confidence: 99%
“…In an external attack, the attacker node is not an authorized participant of the sensor network. Adversaries can severely limit the usefulness of a WSN through denial-of-service (DoS) attacks [16,17]. An attacker may simply disrupt the network operation by broadcasting a high-energy signal.…”
Section: Related Workmentioning
confidence: 99%