Bimonthly    Since 1986
ISSN 1004-9037
Publication Details
Edited by: Editorial Board of Journal of Data Acquisition and Processing
P.O. Box 2704, Beijing 100190, P.R. China
Sponsored by: Institute of Computing Technology, CAS & China Computer Federation
Undertaken by: Institute of Computing Technology, CAS
Published by: SCIENCE PRESS, BEIJING, CHINA
Distributed by:
China: All Local Post Offices
 
   
      05 July 2023, Volume 38 Issue 3
    Article

    THE METHOD USED TO IDENTIFY AND EVADE DOS ATTACKS IN WSNS
    Oshin Sharma
    Journal of Data Acquisition and Processing, 2023, 38 (3): 6515-6524 . 

    Abstract

    A few of the many uses for wireless sensor networks (WSNs) include the military, the medical industry, the monitoring of the ocean and animals, the functioning of manufacturing machinery, the safety of structures, and even the detection of earthquakes. WSNs are more prone to intrusion than wired networks because of their complexity and upkeep requirements. Each node has a limited number of resources it can use, including electricity, random access memory (RAM), and a central processing unit (CPU). Developing a quick and dependable security protocol is crucial to thwarting attacks on WSNs, particularly Denial-of-Service (DoS) attacks. However, suppose an attacker sends many phone signals or retransmits signals that have already been sent. In that case, they may be able to take control of some sensors and launch a DoS assault. If it were severed by a DoS attack, whether purposefully or unintentionally, the quantity of bandwidth available for wireless communications would be significantly decreased. The network is hampered by this, which increases the likelihood of a crash. The procedures described, including message observation and shared key authentication, enable the cluster head (CH) and other sensor nodes in the network to now assess whether the communicating node is an attacker node or not. This method enables the quick identification and mitigation of the source of DoS attacks.

    Keyword

    Cluster Head (CH), Denial of Service (DoS), Wireless Sensor Network (WSN), Sensor Network (SN), One-Way Hash Chain


    PDF Download (click here)

SCImago Journal & Country Rank

ISSN 1004-9037

         

Home
Editorial Board
Author Guidelines
Subscription
Journal of Data Acquisition and Processing
Institute of Computing Technology, Chinese Academy of Sciences
P.O. Box 2704, Beijing 100190 P.R. China
E-mail: info@sjcjycl.cn
 
  Copyright ©2015 JCST, All Rights Reserved
.