2018
DOI: 10.1109/access.2018.2793841
|View full text |Cite
|
Sign up to set email alerts
|

Denial of Service Defence for Resource Availability in Wireless Sensor Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
65
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 114 publications
(65 citation statements)
references
References 100 publications
0
65
0
Order By: Relevance
“…In [13], researchers review the denial of service attacks affecting resource accessibility in WSN and their countermeasure by providing a taxonomy.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…In [13], researchers review the denial of service attacks affecting resource accessibility in WSN and their countermeasure by providing a taxonomy.…”
Section: Related Workmentioning
confidence: 99%
“…The power, timing of the channel, and the frequency are affected by the non-invasive, however, information transmission, service availability, and routing process are influenced by the invasive attacks. Among the WSN attacks, the service or the system is made inaccessible by DoSA [2]. The DoSA is one of the WSNs' power exhausting attacks as a special Denial-of-Service (DoS) trying to maintain the sensor nodes awake to use further energy of the controlled power supply.…”
Section: Introductionmentioning
confidence: 99%
“…And D, Attack interval, respectively. As shown in the figure, ASDA-RSA increases the residual energy by more than 11,14,15,16,20, and 23% those of current approaches, respectively. Figure 12 and 13, shows the comparison of the ASDA-RSA proposed scheme, CrossLayer, ASDA-BlowFish, ASDA-AES, GA-DoSLD, ASDA-3DES, and ASDA-DES models in term of Lifetime.…”
Section: Simulation Resultsmentioning
confidence: 85%
“…In other words, detection ratio is the probability of successfully identifying all the security threats. Thus, the formulation is shown in Equation (16). Table 3 lists the parameters employed for detection rate.…”
Section: Detection Ratiomentioning
confidence: 99%
“…Since these sensors are battery‐operated devices, they are vulnerable to Denial of Service (DoS), which is caused by malicious attacks such as vampire attack, black hole attack, directional attack, and selective forwarding attack. The prevention techniques of these attacks are studied in Gunasekaran and Periakaruppan and Osanaiye et al Vampire attacks are not protocoled specific, hence difficult to detect.…”
Section: Introductionmentioning
confidence: 99%