2021
DOI: 10.1109/access.2021.3089683
|View full text |Cite
|
Sign up to set email alerts
|

Prediction of Re-Occurrences of Spoofed ACK Packets Sent to Deflate a Target Wireless Sensor Network Node by DDOS

Abstract: The Wireless Sensor Network (WSN) has evolved into a new IoT scheme, and its adoption has no restrictions at present. Sadly, security has an impact on the network of wireless sensors, and Denial-of-Service (DOS) categories of attacks are security concerns. This study therefore focuses on the distributed denial of service (DDOS), especially on DDoS-PSH-ACK (ACK & PUSH ACK Flood) in WSN. An experimental analysis was developed to predict that many spoofed ACK packets were reoccurring in order to deflate the targe… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 12 publications
(4 citation statements)
references
References 24 publications
0
4
0
Order By: Relevance
“…Al-Naeem [23] conducted a study to predict DDoS attacks with transmission behavior variability to obtain high accuracy. This study's pattern of security attacks is in the form of fake ACKs, which deceive the target node, where the delivery is considered successful but failed.…”
Section: Wsn Security Systemsmentioning
confidence: 99%
“…Al-Naeem [23] conducted a study to predict DDoS attacks with transmission behavior variability to obtain high accuracy. This study's pattern of security attacks is in the form of fake ACKs, which deceive the target node, where the delivery is considered successful but failed.…”
Section: Wsn Security Systemsmentioning
confidence: 99%
“…11 There are several attacks are occurred in IWSN such as denial of service (DoS), black hole, Sybil attack, node capture (NC) attack, and wormhole attack. [12][13][14] Among these attacks, the DoS and NC attacks are considered as most hazardous attacks in which an intruder can accomplish numerous redundant operations in the network. These redundant operations can easily collapse the entire process of IWSN.…”
Section: Introductionmentioning
confidence: 99%
“…This method performs encryption twice over the IoT environment using quadratic form residues. Al-Naeem [22] attempted to predict the reoccurrences of spoofed acknowledgement packets sent to deflate a target network node by a distributed denial-of-service (DDoS) attack. The prediction of DDoS attacks is done based on the variability analysis of the transmission pattern.…”
mentioning
confidence: 99%
“…The proposed solution is designed to operate within the unique constraints of WSN environments, focusing primarily on the CH and base station (BS) levels to optimize resource usage. By leveraging enhanced fuzzy logic for CH selection and introducing a lightweight, hybrid encryption model combining modified advanced encryption standard (AES) and Rivest-Shamir-Adleman (RSA), the proposed methodology is custom-made to address the identified gaps [21], [22]. This method ensures resourceconscious security and efficiency improvements, responding directly to the challenges outlined by Ahmed et al [11], and the optimization needs identified in studies by Haseeb et al [13] and Niu et al [15].…”
mentioning
confidence: 99%