A Review on Denial of Service Attack in MANET
Wireless Sensor Networks (WSNs) is a kind of computer network that is normally utilized for environmental observation and defense observation. WSNs are frequently affected by jamming attacks, flooding attack and broadcast attacks. Securing WSN is a difficult task. The well-known attack in WSN is Denial of Service (DoS) attack. DoS attack is caused by jamming single or group of nodes and there by disturbing the communication. In this paper presenting a brief study on WSN and its applications providing a review on DoS attack as well as flooding attack, their respective types, and security concerns.
Keywords: Wireless Sensor Network (WSN), Security, Denial of Service Attack, Flooding Attack
Cite this Artilce
Rakhi Jaiswal, Durgesh Wadbude. A Review on Denial of Service Attack in MANET. Recent Trends in Parallel Computing. 2015; 2(3): 36–43p.
Sanjeev Kumar Gupta, Poonam Sinha, Overview of Wireless Sensor Network: A Survey. Int J Adv Res Comput Commun Eng. January 2014; 3(1): 5201–5207p.
Shikha Jindal, Raman Maini, An Efficient Technique for Detection of Flooding and Jamming Attacks in Wireless Sensor Networks. Int J Comp Appl. 2014; 98(10): doi: 10.5120/17220-7458.
Munish Dhar, Rajeshwar Singh, A Review Of Security Issues And Denial Of Service Attacks In Wireless Sensor Networks. Int J Comp Sci Info Technol Res. 2015; 3(1): 27–33p.
Ruchita Meher, Seema Ladhe, Review Paper on Flooding Attack in MANET. Int J Eng Res Appl. 2014; 4(1): 39–46p.
Al-Sakib Khan Pathan, Denial of Service in Wireless Sensor Networks: Issues and Challenges. In: Advances in Communications and Media Research, USA, 2010, 1–7p. ISBN 9781608765768.
Nitin Mohil, Kanta Dhankhar, Survey of Detection and Prevention Mechanism for Flooding Attacks in MANETs. Int J Res Advent Technol. May 2014; 2(5): 300–306p.
Dharini N, Ranjith Balakrishnan, Pravin Renold A, Distributed Detection of Flooding and Gray Hole Attacks in Wireless Sensor Network. International Conference On Smart Technologies And Management For Computing, Communication, Controls, Energy And Materials (ICSTM), Chennai, 2015, 178–184p.
Monowar H. Bhuyan, Bhattacharyya DK, Kalita JK, An Empirical Evaluation of Information Metrics for Low-rate and High-rate DDoS Attack Detection, Patt Recog Lett. 2015; 51: 1–7p.
Sawant PV, Sable MP, Kore PV, et al. A System For Denial of Service Attack Detection based on Multivariate Correlation Analysis. Multidisciplinary J Res Eng Technol. 2015; 2(2): 432–436p.
Vikash Kumar, Anshu Jain, Barwal PN, Wireless Sensor Networks: Security Issues, Challenges and Solutions. Int J Info Comput Technol. 2014; 4(8): 859–868p.
Deepali Virmani, Ankita Soni, Shringarica Chandel, et al. Routing Attacks in Wireless Sensor Networks: A Survey, Int J Comp Sci Info Technol. 5(2): 2014.
Muhammad Aamir, Mustafa Ali Zaidi, DDoS Attack and Defense: Review of Some Traditional and Current Techniques, SZABIST, Karachi, Pakistan, Computer Science. 2014.
Venkatraman K, Vijay Daniel J, Murugaboopathi G, Various Attacks in Wireless Sensor Network: Survey, Int J Soft Comput Eng. March 2013; 3(1): 208–211p.
Priyanka Negi, Anupama Mishra, Gupta BB, Enhanced CBF Packet Filtering Method to Detect DDoS Attack in Cloud Computing Environment, Computer Science. 2013.
Saman Taghavi Zargar, James Joshi, David Tipper, Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding Attacks, IEEE Commun Surveys. 2013; 15(4): 2046–2069p.
Hao Chen, Thomas Gaska, Yu Chen, et al. An Optimized Reconfigurable Power Spectral Density Converter for Real-time Shrew DDoS Attacks Detection, Comp Electr Eng. 2013; 39: 295–308p.
Priya Maidamwar, Nekita Chavhan, A Survey on Security Issues to DetectWormhole Attack In Wireless Sensor Network, Int J AdHoc Netw Syst. (IJANS). October 2012; 2(4): 37p.
Hakem Beitollahi, Geert Deconinck, Tackling Application-layer DDoS Attacks, The 3rd International Conference on Ambient Systems, Networks and Technologies (ANT-2012), 10: 432–441p.
Akash Mittal, Ajit Kumar Shrivastava, Manish Manoria, A Review of DDOS Attack and its Countermeasures in TCP Based Networks, Int J Comp Sci Eng Survey (IJCSES). November 2011; 2(4): 177–187p.
David R. Raymond, Randy C, Effects of Denial-of-Sleep Attacks on Wireless Sensor Network MAC Protocols, IEEE T Veh Technol. January 2009; 58(I): 367–380p.
Haining W, et al. Defense Against Spoofed IP Traffic Using Hop-Count Filtering, Networking, IEEE/ACM T. 2007; 15: 40–53p.
Jan Blumenthal, Ralf Grossmann, Frank Golatowski, et al. Weighted Centroid Localization in Zigbee-based Sensor Networks, IEEE International Symposium on Intelligent Signal Processing, (WISP 2007), Alcala de Henares, 2007, 1–6p.
Hung-Min, Shis-Pu, Chien Ming Chen, Mobile Jamming Attack and its countermeasure in Wireless Sensor Networking and Applications, Workshops 21st International conference on Advanced Information Networking and Applications Workshops, Niagara Falls, Ont, 2007, 457 – 462p.
Wenyuan Xu, Ke Ma, Wade Trappe, et al. Jamming Sensor Networks: Attack and Defens Strategies. IEEE Network, May/June 2006, 20(3): 41–47p.
Mohd. Jameel Hashmi, Manish Saxena, Rajesh Saini, Classification of DDoS Attacks and their Defense Techniques using Intrusion Prevention System, Int J Comput Sci Commun Netw. 2012; 2(5): 607–614p.
Wei Zhoua, Weijia Jia b, Sheng Wenc, et al. Detection and Defense of Application-layer DDoS Attacks in Backbone Web Traffic, Future Gener Comp Sy. September 2014; 38: 36–46p.
- There are currently no refbacks.
This site has been shifted to https://stmcomputers.stmjournals.com/