Proceedings of the 3rd ACM Workshop on Security of Ad Hoc and Sensor Networks 2005
DOI: 10.1145/1102219.1102235
|View full text |Cite
|
Sign up to set email alerts
|

Defending against path-based DoS attacks in wireless sensor networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
105
0

Year Published

2006
2006
2021
2021

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 150 publications
(105 citation statements)
references
References 17 publications
0
105
0
Order By: Relevance
“…1) Reprogramming Attack: In this sort of assault attacker get get admission to of supply code of original programming and attacker modifies the source code Such that application is going into limitless loophole so that network useful resource end up inaccessible, and request continue to be infinitely waiting for respond. 2) Path based DoS [7]: Conventional DDoS preventive measures and defenses too carefully rely on electricity supply, computing property, and longtime processing. Considering the traits of IoT environment, all such preconditions have to be avoided inside the layout of IoT defense tool.…”
Section: Ddos On Application Layermentioning
confidence: 99%
“…1) Reprogramming Attack: In this sort of assault attacker get get admission to of supply code of original programming and attacker modifies the source code Such that application is going into limitless loophole so that network useful resource end up inaccessible, and request continue to be infinitely waiting for respond. 2) Path based DoS [7]: Conventional DDoS preventive measures and defenses too carefully rely on electricity supply, computing property, and longtime processing. Considering the traits of IoT environment, all such preconditions have to be avoided inside the layout of IoT defense tool.…”
Section: Ddos On Application Layermentioning
confidence: 99%
“…Each node consumed 16.25 μJ and 12.25 μJper byte when transmitting and receiving, respectively. False event packets were large TinyOS packets of 29 bytes each [7].The chosen detection scheme adapted the algorithm of Flooding Attack Prevention (FAP) to detect a flooding attack in the ad-hoc network for use in the sensor network [8].…”
Section: Fig3:-multipath Routing Typesmentioning
confidence: 99%
“…• Increased attacks' risks and vulnerabilities [22], new attacks, increased tiny/embedded devices, multi-hopping routing (selfish) [21]; • Devices with limited capabilities [15,16], pervasiveness (privacy worries), wireless (medium) [4,13,22] and mobility;…”
Section: Vulnerabilities and Challenges Of Wsnsmentioning
confidence: 99%
“…• Typical combinational attacks include jamming attack; send a large number of packets to the base station by attacker [16];…”
Section: Path-based Dos (Pdos)mentioning
confidence: 99%