TY - JOUR
T1 - A novel method defends against the path-based DoS for wireless sensor network
AU - Chen, Dong
AU - Zhang, Zhenjiang
AU - Tseng, Fan Hsun
AU - Chao, Han Chieh
AU - Chou, Li Der
PY - 2014
Y1 - 2014
N2 - WSNs are significantly different from the traditional network architecture due to its wireless communication, energy limitation, and computation constraint and environment of the application. Because of these differences, security becomes a critical issue. The path-based denial of service (PDoS) attacks harm the network maintenance and cause serious damage in the resource constrained WSNs. In a PDoS attack, an adversary can overwhelm sensor node and cluster head node to flood packets along the routing path so that intermediate node must keep active mode and exhaust the energy. In this paper, we creatively propose a novel method, which is operated at the base station to detect the malicious behavior. The proposed method is combined with triple exponential smoothing and Markov chain, so that it makes the detection results more accurate. Meanwhile, we first use the concept of black hole to defend the PDoS attack in WSNs. Simulation results are provided to evaluate the performance and illustrate the contribution of this mechanism.
AB - WSNs are significantly different from the traditional network architecture due to its wireless communication, energy limitation, and computation constraint and environment of the application. Because of these differences, security becomes a critical issue. The path-based denial of service (PDoS) attacks harm the network maintenance and cause serious damage in the resource constrained WSNs. In a PDoS attack, an adversary can overwhelm sensor node and cluster head node to flood packets along the routing path so that intermediate node must keep active mode and exhaust the energy. In this paper, we creatively propose a novel method, which is operated at the base station to detect the malicious behavior. The proposed method is combined with triple exponential smoothing and Markov chain, so that it makes the detection results more accurate. Meanwhile, we first use the concept of black hole to defend the PDoS attack in WSNs. Simulation results are provided to evaluate the performance and illustrate the contribution of this mechanism.
UR - http://www.scopus.com/inward/record.url?scp=84904682906&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84904682906&partnerID=8YFLogxK
U2 - 10.1155/2014/654271
DO - 10.1155/2014/654271
M3 - Article
AN - SCOPUS:84904682906
SN - 1550-1329
VL - 2014
JO - International Journal of Distributed Sensor Networks
JF - International Journal of Distributed Sensor Networks
M1 - 654271
ER -