2017
DOI: 10.1002/cpe.4266
|View full text |Cite
|
Sign up to set email alerts
|

DoS detection in WSNs: Energy‐efficient methods for selecting monitoring nodes

Abstract: Summary The use of wireless sensor networks (WSNs) has increased rapidly over the last years. Due to their low resources, sensors come along with new issues regarding network security and energy consumption. Focusing on the network availability, previous studies proposed to protect clustered network against denial of service attacks with the use of traffic monitoring agents on some nodes. Those control nodes have to analyze the traffic inside a cluster and to send warnings to the cluster head whenever an abnor… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
4
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 39 publications
0
4
0
Order By: Relevance
“…In this paper, the focus is on the placing of detection sensors. There are several works in this field: Jeong et al (2004) and Islam et al (2008) minimize the number of sensors such that every path of a given length (r) contains a sensor; Armbruster et al (2007) analyze the problem of packet filter placement to defend a network against spoofed denial of service attacks; Monnet et al (2017) place control nodes in clustered WSNs to save the energy of nodes; Fayaz et al (2015) address the resource management problem to determine the number and location of defense VMs, which combines detection node placement with a re-routing strategy. This paper concentrates on the costly deployment of detection sensors (probes) against multiple-target flooding attacks.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…In this paper, the focus is on the placing of detection sensors. There are several works in this field: Jeong et al (2004) and Islam et al (2008) minimize the number of sensors such that every path of a given length (r) contains a sensor; Armbruster et al (2007) analyze the problem of packet filter placement to defend a network against spoofed denial of service attacks; Monnet et al (2017) place control nodes in clustered WSNs to save the energy of nodes; Fayaz et al (2015) address the resource management problem to determine the number and location of defense VMs, which combines detection node placement with a re-routing strategy. This paper concentrates on the costly deployment of detection sensors (probes) against multiple-target flooding attacks.…”
Section: Discussionmentioning
confidence: 99%
“…For certain types of attack (direct floods without transport/network signature), the article suggests a location-based filtering approach that compares traffic volumes for ISP-ISP links during normal operation and during an attack. Monnet et al (2017) place control nodes (CNs) in a clustered wireless sensor network (WSN). The CN detects abnormal behavior (DoS) and reports it to a cluster leader up in the WSN hierarchy.…”
Section: 2mentioning
confidence: 99%
“…Several research works have been achieved to help secure the WSN against different types of attacks while spending minimal energy. 37,38 Among the proposed solutions we cite the example of the work performed by Monnet et al 39 which constitutes an improvement method of monitoring nodes selection to detect DoS attacks.…”
Section: Security Aspectmentioning
confidence: 99%
“…Authors present an activity model of the network and evaluate how the remaining energy behaves to predict the energy consumption of the nodes. The ratio between the network security and energy consumption is discussed in . Three energy‐aware security methods for hierarchically clustered wireless sensor network were presented and evaluated through simulation scenarios as a basis to establish recommendations regarding the use cases of those methods.…”
mentioning
confidence: 99%