2009 35th Annual Conference of IEEE Industrial Electronics 2009
DOI: 10.1109/iecon.2009.5415233
|View full text |Cite
|
Sign up to set email alerts
|

A scheme for preventing denial of service attacks on wireless sensor networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2011
2011
2021
2021

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 19 publications
(10 citation statements)
references
References 7 publications
0
10
0
Order By: Relevance
“…The proposed scheme tries to optimize the local information (information collected by watch dogs) into global information (decision taken by cluster head) in order to compensate the communication pattern in network. This paper [9] reviews the design and implementation of a novel defense strategy designed to work alongside existing DoS counter measures. The previous approaches were generic and were not capable of filtering out all attack traffic, instead a small amount of attack traffic reached the attackers intended victim.…”
Section: Literature Reviewmentioning
confidence: 99%
“…The proposed scheme tries to optimize the local information (information collected by watch dogs) into global information (decision taken by cluster head) in order to compensate the communication pattern in network. This paper [9] reviews the design and implementation of a novel defense strategy designed to work alongside existing DoS counter measures. The previous approaches were generic and were not capable of filtering out all attack traffic, instead a small amount of attack traffic reached the attackers intended victim.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Denial of service attack [15][16][17] can also cause paralysis of the vital nodes to form network segmentation.…”
Section: Related Workmentioning
confidence: 99%
“…These sensors are used in monitoring environmental conditions like humidity, temperature, movement, traffic monitoring, noise, military applications, and agriculture farm management. Since these sensors are battery‐operated devices, they are vulnerable to Denial of Service (DoS), which is caused by malicious attacks such as vampire attack, black hole attack, directional attack, and selective forwarding attack. The prevention techniques of these attacks are studied in Gunasekaran and Periakaruppan and Osanaiye et al Vampire attacks are not protocoled specific, hence difficult to detect.…”
Section: Introductionmentioning
confidence: 99%