Abstract
Internet of Things (IoT) technology is getting more importance as many organizations from different sectors are moving toward adopting this technology. It introduces an efficient ways of collecting, processing and distributing data. Wireless sensor networks (WSNs) play a vital role in the expanding growth of internet of things (IoT). However, DoS (denial-of-service) attacks are a major threat of WSNs. In this study, graph theory based model has been proposed to analyse the security of WSN under DoS attacks. The proposed model describes and assesses the security of WSN when it encounter DoS attacks by finding the attacks success probability, attack cost, attack impact, mean-time-to-compromise, attack risk and return-on-attack values. The impact of mitigation methods toward strengthening the WSN security has been described. smart home scenario WSN has been tacking as an example. The results showed that the capability of the proposed model to analysis the effects of DoS attacks in WSN. Also it showed the impact of mitigation methods in improving WSN security.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Hoque, N., Bhattacharyya, D.K., Kalita, J.K.: Botnet in DDoS attacks: trends and challenges. IEEE Commun. Surv. Tutorials 17(4), 2242–2270 (2015)
Ge, M., Hong, J.B., Guttmann, W., Kim, D.S.: A framework for automating security analysis of the internet of things. J. Netw. Comput. Appl. 83, 12–27 (2017)
Lazarescu, M.T.: Design of a WSN platform for long-term environmental monitoring for IoT applications. IEEE J. Emerg. Sel. Top. Circ. Syst. 3(1), 45–54 (2013)
Kinney, P.: Zigbee technology: wireless control that simply works. Commun. Des. Conf. 2, 1–7 (2003)
Durkota, K., Lisý, V., Bošanský, B., Kiekintveld, C.: Optimal network security hardening using attack graph games. In: Twenty-Fourth International Joint Conference on Artificial Intelligence (2015)
Ruijters, E., Stoelinga, M.: Fault tree analysis: a survey of the state-of-the-art in modeling, analysis and tools. Comput. Sci. Rev. 15, 29–62 (2015)
Cayirci, E.: Wireless sensor networks. In: Wireless Information Highways, IGI Global, pp. 273–301 (2005)
Brodsy, J., McConnell, A.: Jamming and interference induced denial-of-service attacks on IEEE 802.15. 4-based wireless networks. In: Proceedings of the SCADA Security Scientific Symposium, pp. 1–2 (2009)
Brodsky, J., McConnell, A.: Jamming and interference induced denial-of-service attacks. In: IEEE 802.15. 4-Based Wireless Networks, Proc. SCADA Security Scientific Symp. 2009 (S4), pp. 1–2 (2009)
Mpitziopoulos, A., Gavalas, D., Konstantopoulos, C., Pantziou, G.: A survey on jamming attacks and countermeasures in WSNs. IEEE Commun. Surv. Tutorials 11(4), 42–56 (2009)
Radmand, P., et al.: ZigBee/ZigBee PRO security assessment based on compromised cryptographic keys. In: 2010 International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, pp. 465–470 (2010)
Cao, X., Shila, D.M., Cheng, Y., Yang, Z., Zhou, Y., Chen, J.: Ghost-in-zigbee: Energy depletion attack on zigbee-based wireless networks. IEEE Internet Things J. 3(5), 816–829 (2016)
Sisodia, D., Mergendahl, S., Li, J., Cam, H.: Securing the smart home via a two-mode security framework. In: International Conference on Security and Privacy in Communication Systems, pp. 22–42 (2018)
Sahner, R.A., Trivedi, K., Puliafito, A.: Performance and Reliability Analysis of Computer Systems: An Example-Based Approach Using the SHARPE Software Package. Springer, Cham (2012)
Egli, P., Netmodule, A.G.: Susceptibility of Wireless Devices to Denial of Service Attacks. Technical White Paper. Netmodule AG, Bern (2006)
Scott-Hayward, S., Callaghan, G.O., Sezer, S.: SDN security: a survey. In: 2013 IEEE SDN For Future Networks and Services (SDN4FNS), pp. 1–7 (2013)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Aborujilah, A. et al. (2020). Security Assessment Model to Analysis DOS Attacks in WSN. In: Saeed, F., Mohammed, F., Gazem, N. (eds) Emerging Trends in Intelligent Computing and Informatics. IRICT 2019. Advances in Intelligent Systems and Computing, vol 1073. Springer, Cham. https://doi.org/10.1007/978-3-030-33582-3_74
Download citation
DOI: https://doi.org/10.1007/978-3-030-33582-3_74
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-33581-6
Online ISBN: 978-3-030-33582-3
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)