2002
DOI: 10.1109/mc.2002.1039518
|View full text |Cite
|
Sign up to set email alerts
|

Denial of service in sensor networks

Abstract: Sensor networks hold the promise of facilitating large-scale, real-time data processing in complex environments. Their foreseeable applications will help protect and monitor military, environmental, safety-critical, or domestic infrastructures and resources.In these and other vital or security-sensitive deployments, keeping the network available for its intended use is essential. The stakes are high: Denial-of-service (DoS) attacks against such networks may permit real-world damage to the health and safety of … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
865
0
25

Year Published

2006
2006
2015
2015

Publication Types

Select...
5
2
2

Relationship

0
9

Authors

Journals

citations
Cited by 1,352 publications
(890 citation statements)
references
References 14 publications
0
865
0
25
Order By: Relevance
“…A DoS attack is always considered a threat for any kind of wireless network where jamming a network with a strong signal is always possible. Especially, this might be critical in sensor networks due to its use in life-critical applications [16]. Figure 14 shows a possible DoS attack on the node to node key agreement protocol, where the intruder is masquerading as the role of the node A. Pretending to be in the role of A, the intruder triggers the key agreement protocol and, thus, forces node B and server S to generate and exchange the rest of the three messages.…”
Section: Denial-of-service Attack On Node To Node Key Agreement Protocolmentioning
confidence: 99%
“…A DoS attack is always considered a threat for any kind of wireless network where jamming a network with a strong signal is always possible. Especially, this might be critical in sensor networks due to its use in life-critical applications [16]. Figure 14 shows a possible DoS attack on the node to node key agreement protocol, where the intruder is masquerading as the role of the node A. Pretending to be in the role of A, the intruder triggers the key agreement protocol and, thus, forces node B and server S to generate and exchange the rest of the three messages.…”
Section: Denial-of-service Attack On Node To Node Key Agreement Protocolmentioning
confidence: 99%
“…2. Denial of service (DoS) is an activity to make assets of the WBAN unavailable to its intended user [10]. In this paper DoS is an activity to make the WBAN sensors unavailable and unable to transmit its WBAN signal towards the WBAN base station.…”
Section: B Impact Variablementioning
confidence: 99%
“…In the positional paper, Wood [10] presented a number of different types of DOS attack, which can be used in the context of WSN. Ahmed [12] surveyed potential DOS attacks and pointed out that radio jamming on mobile machine can be an effective attack to WSN.…”
Section: Related Workmentioning
confidence: 99%
“…Denial-Of-Service (DOS) attack [10], [11], [12] is recognized as a biggest threat for the operation of mission-critical network. When a large-scale sensor network operates in a hostile environment, protection against DOS attacks becomes the most important issue for the longevity of system operation.…”
Section: Introductionmentioning
confidence: 99%