[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to main content

Security Assessment Model to Analysis DOS Attacks in WSN

  • Conference paper
  • First Online:
Emerging Trends in Intelligent Computing and Informatics (IRICT 2019)

Abstract

Internet of Things (IoT) technology is getting more importance as many organizations from different sectors are moving toward adopting this technology. It introduces an efficient ways of collecting, processing and distributing data. Wireless sensor networks (WSNs) play a vital role in the expanding growth of internet of things (IoT). However, DoS (denial-of-service) attacks are a major threat of WSNs. In this study, graph theory based model has been proposed to analyse the security of WSN under DoS attacks. The proposed model describes and assesses the security of WSN when it encounter DoS attacks by finding the attacks success probability, attack cost, attack impact, mean-time-to-compromise, attack risk and return-on-attack values. The impact of mitigation methods toward strengthening the WSN security has been described. smart home scenario WSN has been tacking as an example. The results showed that the capability of the proposed model to analysis the effects of DoS attacks in WSN. Also it showed the impact of mitigation methods in improving WSN security.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
£29.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
GBP 19.95
Price includes VAT (United Kingdom)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
GBP 143.50
Price includes VAT (United Kingdom)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
GBP 179.99
Price includes VAT (United Kingdom)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Hoque, N., Bhattacharyya, D.K., Kalita, J.K.: Botnet in DDoS attacks: trends and challenges. IEEE Commun. Surv. Tutorials 17(4), 2242–2270 (2015)

    Article  Google Scholar 

  2. Ge, M., Hong, J.B., Guttmann, W., Kim, D.S.: A framework for automating security analysis of the internet of things. J. Netw. Comput. Appl. 83, 12–27 (2017)

    Article  Google Scholar 

  3. Lazarescu, M.T.: Design of a WSN platform for long-term environmental monitoring for IoT applications. IEEE J. Emerg. Sel. Top. Circ. Syst. 3(1), 45–54 (2013)

    Article  Google Scholar 

  4. Kinney, P.: Zigbee technology: wireless control that simply works. Commun. Des. Conf. 2, 1–7 (2003)

    Google Scholar 

  5. Durkota, K., Lisý, V., Bošanský, B., Kiekintveld, C.: Optimal network security hardening using attack graph games. In: Twenty-Fourth International Joint Conference on Artificial Intelligence (2015)

    Google Scholar 

  6. Ruijters, E., Stoelinga, M.: Fault tree analysis: a survey of the state-of-the-art in modeling, analysis and tools. Comput. Sci. Rev. 15, 29–62 (2015)

    Article  MathSciNet  Google Scholar 

  7. Cayirci, E.: Wireless sensor networks. In: Wireless Information Highways, IGI Global, pp. 273–301 (2005)

    Google Scholar 

  8. Brodsy, J., McConnell, A.: Jamming and interference induced denial-of-service attacks on IEEE 802.15. 4-based wireless networks. In: Proceedings of the SCADA Security Scientific Symposium, pp. 1–2 (2009)

    Google Scholar 

  9. Brodsky, J., McConnell, A.: Jamming and interference induced denial-of-service attacks. In: IEEE 802.15. 4-Based Wireless Networks, Proc. SCADA Security Scientific Symp. 2009 (S4), pp. 1–2 (2009)

    Google Scholar 

  10. Mpitziopoulos, A., Gavalas, D., Konstantopoulos, C., Pantziou, G.: A survey on jamming attacks and countermeasures in WSNs. IEEE Commun. Surv. Tutorials 11(4), 42–56 (2009)

    Article  Google Scholar 

  11. Radmand, P., et al.: ZigBee/ZigBee PRO security assessment based on compromised cryptographic keys. In: 2010 International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, pp. 465–470 (2010)

    Google Scholar 

  12. Cao, X., Shila, D.M., Cheng, Y., Yang, Z., Zhou, Y., Chen, J.: Ghost-in-zigbee: Energy depletion attack on zigbee-based wireless networks. IEEE Internet Things J. 3(5), 816–829 (2016)

    Article  Google Scholar 

  13. Sisodia, D., Mergendahl, S., Li, J., Cam, H.: Securing the smart home via a two-mode security framework. In: International Conference on Security and Privacy in Communication Systems, pp. 22–42 (2018)

    Google Scholar 

  14. Sahner, R.A., Trivedi, K., Puliafito, A.: Performance and Reliability Analysis of Computer Systems: An Example-Based Approach Using the SHARPE Software Package. Springer, Cham (2012)

    MATH  Google Scholar 

  15. Egli, P., Netmodule, A.G.: Susceptibility of Wireless Devices to Denial of Service Attacks. Technical White Paper. Netmodule AG, Bern (2006)

    Google Scholar 

  16. Scott-Hayward, S., Callaghan, G.O., Sezer, S.: SDN security: a survey. In: 2013 IEEE SDN For Future Networks and Services (SDN4FNS), pp. 1–7 (2013)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Abdulaziz Aborujilah .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Aborujilah, A. et al. (2020). Security Assessment Model to Analysis DOS Attacks in WSN. In: Saeed, F., Mohammed, F., Gazem, N. (eds) Emerging Trends in Intelligent Computing and Informatics. IRICT 2019. Advances in Intelligent Systems and Computing, vol 1073. Springer, Cham. https://doi.org/10.1007/978-3-030-33582-3_74

Download citation

Publish with us

Policies and ethics