2013 IEEE Wireless Communications and Networking Conference (WCNC) 2013
DOI: 10.1109/wcnc.2013.6554905
|View full text |Cite
|
Sign up to set email alerts
|

Detecting DoS attacks in WSN based on clustering technique

Abstract: WIth the facility of deployment, Wireless Sensor Networks becomes very popular but have special characteristics such as limited battery, limited processing power, and limited storage that makes the energy consumption saving a real challenge. Add to this and due to their distributed deployment, these networks are exposed to denial of service attacks such as jamming and greedy attacks. In all cases these attacks tackle the energy consumption in order to degrade the overall Quality of Service (QoS). In this paper… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
15
0

Year Published

2013
2013
2018
2018

Publication Types

Select...
5
1
1

Relationship

2
5

Authors

Journals

citations
Cited by 25 publications
(17 citation statements)
references
References 12 publications
0
15
0
Order By: Relevance
“…The first is related to the control nodes election, while the second concerns detection and blocking of compromised nodes. In the first phase, we used the recursive method presented in [19]. This method is mainly based on applying LEACH algorithm recursively.…”
Section: Methods Descriptionmentioning
confidence: 99%
See 1 more Smart Citation
“…The first is related to the control nodes election, while the second concerns detection and blocking of compromised nodes. In the first phase, we used the recursive method presented in [19]. This method is mainly based on applying LEACH algorithm recursively.…”
Section: Methods Descriptionmentioning
confidence: 99%
“…Mansouri et al have proposed a new approach to detect DoS attacks [19]. They used recursively clustering technique to detect malicious nodes susceptible to block network activity.…”
Section: Related Workmentioning
confidence: 99%
“…Low Energy Adaptive Clustering Hierarchy (LEACH) algorithm is proposed by (Mansouri et al, 2013). To preserve the energy consumption in WSN nodes, an energy-preserving solution to detect compromised nodes in WSN is introduced to analyzes the traffic inside a cluster and sends warning to the cluster heads whenever abnormal behavior is detected in Wireless Sensor Network (WSN) environment.…”
Section: Detection Using Hierarchical Clustering Methodsmentioning
confidence: 99%
“…Mobility-assisted distributed clustering [27] and secure privacy preserving in hierarchical sensor network [28] establishes the energy-efficient secure route paths in the network. Clustering technique detects the denial-of-service attacks [29] in sensor networks. Recursive-clustering-based approach for denial of service attacks [30] enhances the cluster structures to avoid intrusions in the network.…”
Section: Related Workmentioning
confidence: 99%