2018
DOI: 10.15446/ing.investig.v38n1.65453
|View full text |Cite
|
Sign up to set email alerts
|

Overview of DOS attacks on wireless sensor networks and experimental results for simulation of interference attacks

Abstract: Wireless sensor networks are now used in various fields. The information transmitted in the wireless sensor networks is very sensitive, so the security issue is very important. DOS (denial of service) attacks are a fundamental threat to the functioning of wireless sensor networks. This paper describes some of the most common DOS attacks and potential methods of protection against them. The case study shows one of the most frequent attacks on wireless sensor networks -the interference attack. In the introductio… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
14
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
7
3

Relationship

0
10

Authors

Journals

citations
Cited by 27 publications
(14 citation statements)
references
References 27 publications
(40 reference statements)
0
14
0
Order By: Relevance
“…Most of the literature reviewed is focused on degradation techniques, and inside them, in two main directions: the first one is the characterization of electronic attacks against WiFi networks; for example, in [37,38] the authors propose a classification of DoS attacks in wireless infrastructures, based on the network layer in which the attack is performed, from the physical layer to the application one. As stated before, this kind of techniques is outside of the scope of this paper because they are closer to EA than to CNA.…”
Section: • Mitre Attandck Previously Discussed In This Work •mentioning
confidence: 99%
“…Most of the literature reviewed is focused on degradation techniques, and inside them, in two main directions: the first one is the characterization of electronic attacks against WiFi networks; for example, in [37,38] the authors propose a classification of DoS attacks in wireless infrastructures, based on the network layer in which the attack is performed, from the physical layer to the application one. As stated before, this kind of techniques is outside of the scope of this paper because they are closer to EA than to CNA.…”
Section: • Mitre Attandck Previously Discussed In This Work •mentioning
confidence: 99%
“…A related discussion, in the context of the power grid has been developed and a complete taxonomy of attacks including jamming has been presented in [10]. The authors discuss the obstruction of wireless sensor networks caused by jamming attacks in [11]. Using simulated scenarios and results, the significance of such obstructions could be determined.…”
Section: A Jamming Attack Mechanismsmentioning
confidence: 99%
“…In [22] the author has presented some DoS attack and have suggested some solution for detecting and solving certain attack. They have categorized some DoS attacks according to protocol stack layers and have described sinkhole, Hello flooding, wormhole, selective forwarding attack for network layer and flooding attack for the transport layer.…”
Section: Introductionmentioning
confidence: 99%