Abstract
The basic characteristic of a wireless sensor network is to sense the environment and to gather different types of data. It is used in various vital sectors, such as military, health-care, traffic monitoring, and so on. This provides many helpful data about these fields, which is used in implementing new technologies for them. However, there are numerous challenges and risks, regarding the security vulnerability of a wireless sensor network. This is because the resources of a wireless sensor network are very low (for example, low power, low computational resources, low storage, etc.). These constraints make them susceptible to different kinds of security attacks, especially the denial of service attacks. In this survey, we have outlined different kinds of DoS attacks in different layers of the hybrid layering model. We have also presented different defense mechanisms to protect/mitigate these attacks at different layers. Layer by layer analysis makes it easy to distinguish among different types of attacks and their defense techniques, along with the characteristics of the layers. Analysis of the critical issues of these attacks and defenses are finally presented with possible measures. This survey work can be very beneficial for the researchers and engineers in designing WSN topology with ensured security.
Similar content being viewed by others
References
Dargie, W., & Poellabauer, C. (2010). Fundamentals of wireless sensor networks: Theory and practice. Hoboken: Wiley.
Alaba, F. A., Othman, M., Hashem, I. A. T., & Alotaibi, F. (2017). Internet of things security: A survey. Journal of Network and Computer Applications, 88, 10–28.
Akyildiz, I. F., Su, W., Sankarasubramaniam, Y., & Cayirci, E. (2002). Wireless sensor networks: A survey. Computer Networks, 38(4), 393–422.
Lewis, F. L., et al. (2004). Wireless sensor networks. Smart Environments: Technologies, Protocols, and Applications, 11, 46.
Raghavendra, C. S., Sivalingam, K. M., & Znati, T. (2006). Wireless sensor networks. Berlin: Springer.
Akyildiz, I. F., & Vuran, M. C. (2010). Wireless sensor networks (Vol. 4). Hoboken: Wiley.
Yick, J., Mukherjee, B., & Ghosal, D. (2008). Wireless sensor network survey. Computer Networks, 52(12), 2292–2330.
Sicari, S., Rizzardi, A., Grieco, L. A., & Coen-Porisini, A. (2015). Security, privacy and trust in internet of things: The road ahead. Computer Networks, 76, 146–164.
Ozdemir, S., & Xiao, Y. (2009). Secure data aggregation in wireless sensor networks: A comprehensive overview. Computer Networks, 53(12), 2022–2037.
Hasan, M. Z., Al-Rizzo, H., & Al-Turjman, F. (2017). A survey on multipath routing protocols for QOS assurances in real-time wireless multimedia sensor networks. IEEE Communications Surveys & Tutorials, 19(3), 1424–1456.
Tanenbaum, A. S., & Wetherall, D. J. (2011). Computer networks. London: Pearson.
Sun, B., Gui, C., Song, Y., & Chen, H. (2014). A novel network coding and multi-path routing approach for wireless sensor network. Wireless Personal Communications, 77(1), 87–99.
Anand, C., & Gnanamurthy, R. (2016). Localized dos attack detection architecture for reliable data transmission over wireless sensor network. Wireless Personal Communications, 90(2), 847–859.
Buschmann, C., Pfisterer, D., Fischer, S., Fekete, S. P., & Kröller, A. (2005). Spyglass: A wireless sensor network visualizer. ACM Sigbed Review, 2(1), 1–6.
Bhushan, B., & Sahoo, G. (2018). Recent advances in attacks, technical challenges, vulnerabilities and their countermeasures in wireless sensor networks. Wireless Personal Communications, 98(2), 2037–2077.
Kim, D., Jung, S., Hwang, D. J., & Kim, S. (2016). Mobile-based dos attack security agent in sensor networking. Wireless Personal Communications, 86(1), 91–107.
Wood, A. D., & Stankovic, J. A. (2002). Denial of service in sensor networks. Computer, 35(10), 54–62.
Raymond, D. R., & Midkiff, S. F. (2008). Denial-of-service in wireless sensor networks: Attacks and defenses. IEEE Pervasive Computing, 7(1), 74–81.
Wang, Y., Attebury, G., & Ramamurthy, B. (2006). A survey of security issues in wireless sensor networks. IEEE Communications Surveys & Tutorials, 8(2), 2–23.
Zhou, Y., Fang, Y., & Zhang, Y. (2008). Securing wireless sensor networks: A survey. IEEE Communications Surveys & Tutorials, 10(3), 6–28.
Padmavathi, D.G., & Shanmugapriya, M., et al. (2009). A survey of attacks, security mechanisms and challenges in wireless sensor networks. arXiv preprint arXiv:0909.0576.
Kavitha, T., & Sridharan, D. (2010). Security vulnerabilities in wireless sensor networks: A survey. Journal of Information Assurance and Security, 5(1), 31–44.
Sharma, K., & Ghose, M. (2010). Wireless sensor networks: An overview on its security threats. IJCA, Special Issue on “Mobile Ad-hoc Networks” MANETs (pp. 42–45).
Xing, K., Srinivasan, S.S.R., Jose, M., Li, J., & Cheng, X., et al. (2010). Attacks and countermeasures in sensor networks: A survey. In Network security (pp. 251–272). Boston, MA: Springer.
Singh, S. K., Singh, M., & Singh, D. (2011). A survey on network security and attack defense mechanism for wireless sensor networks. International Journal of Computer Trends and Technology, 1(2), 9–17.
Zhao, G. (2011). Wireless sensor networks for industrial process monitoring and control: A survey. Network Protocols and Algorithms, 3(1), 46–63.
Islam, K., Shen, W., & Wang, X. (2012). Wireless sensor network reliability and security in factory automation: A survey. IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews), 42(6), 1243–1256.
ĐJurišić, M.P., Tafa, Z., Dimić, G., & Milutinović, V. (2012). A survey of military applications of wireless sensor networks. In Mediterranean conference on embedded computing (MECO) (pp. 196–199). IEEE, Bar, Montenegro.
Alemdar, H., & Ersoy, C. (2010). Wireless sensor networks for healthcare: A survey. Computer Networks, 54(15), 2688–2710.
Kumar, P., & Lee, H. J. (2011). Security issues in healthcare applications using wireless medical sensor networks: A survey. Sensors, 12(1), 55–91.
Christin, D., Mogre, P. S., & Hollick, M. (2010). Survey on wireless sensor network technologies for industrial automation: The security and quality of service perspectives. Future Internet, 2(2), 96–125.
Kulkarni, R. V., Forster, A., & Venayagamoorthy, G. K. (2011). Computational intelligence in wireless sensor networks: A survey. IEEE Communications Surveys & Tutorials, 13(1), 68–96.
Bi, S., & Zhang, Y. J. (2018). Computation rate maximization for wireless powered mobile-edge computing with binary computation offloading. IEEE Transactions on Wireless Communications, 17(6), 4177–4190.
Ayyildiz, C., Erdem, H. E., Dirikgil, T., Dugenci, O., Kocak, T., Altun, F., et al. (2019). Structure health monitoring using wireless sensor networks on structural elements. Ad Hoc Networks, 82, 68–76.
Tolani, M., Singh, R. K., et al. (2019). Lifetime improvement of wireless sensor network by information sensitive aggregation method for railway condition monitoring. Ad Hoc Networks, 87, 128–145.
Boukerche, A., & Sun, P. (2018). Connectivity and coverage based protocols for wireless sensor networks. Ad Hoc Networks, 80, 54–69.
Zhou, Y., Yang, B., Mu, Y., & Xia, Z. (2018). Continuous leakage-resilient access control for wireless sensor networks. Ad Hoc Networks, 80, 41–53.
Swain, R. R., Khilar, P. M., & Bhoi, S. K. (2018). Heterogeneous fault diagnosis for wireless sensor networks. Ad Hoc Networks, 69, 15–37.
Granjal, J., Monteiro, E., & Silva, J. S. (2015). Security in the integration of low-power wireless sensor networks with the internet: A survey. Ad Hoc Networks, 24, 264–287.
Pesko, M., Smolnikar, M., Vučnik, M., Javornik, T., Pejanović-Djurišić, M., & Mohorčič, M. (2014). Smartphone with augmented gateway functionality as opportunistic wsn gateway device. Wireless Personal Communications, 78(3), 1811–1826.
Singh, V. K., Singh, V. K., & Kumar, M. (2017). In-network data processing based on compressed sensing in WSN: A survey. Wireless Personal Communications, 96(2), 2087–2124.
Akyildiz, I. F., Su, W., Sankarasubramaniam, Y., & Cayirci, E. (2002). A survey on sensor networks. IEEE Communications Magazine, 40(8), 102–114.
Sohrabi, K., Gao, J., Ailawadhi, V., & Pottie, G. J. (2000). Protocols for self-organization of a wireless sensor network. IEEE Personal Communications, 7(5), 16–27.
Xu, W., Ma, K., Trappe, W., & Zhang, Y. (2006). Jamming sensor networks: Attack and defense strategies. IEEE Network, 20(3), 41–47.
Xu, W., Trappe, W., Zhang, Y., & Wood, T. (2005). The feasibility of launching and detecting jamming attacks in wireless networks. In Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing (pp. 46–57). ACM, Urbana-Champaign, IL, USA.
Hamamreh, J. M., Furqan, H. M., & Arslan, H. (2018). Classifications and applications of physical layer security techniques for confidentiality: A comprehensive survey. IEEE Communications Surveys & Tutorials, 21(2), 1773–1828.
Raymond, D. R., Marchany, R. C., Brownfield, M. I., & Midkiff, S. F. (2009). Effects of denial-of-sleep attacks on wireless sensor network MAC protocols. IEEE Transactions on Vehicular Technology, 58(1), 367–380.
Ye, W., Heidemann, J., & Estrin, D. (2004). Medium access control with coordinated adaptive sleeping for wireless sensor networks. IEEE/ACM Transactions on Networking (ToN), 12(3), 493–506.
Song, W. M., Liu, Y. M., & Zhang, S. E. (2008). Research on SMAC protocol for WSN. In International conference on wireless communications, networking and mobile computing (pp. 1–4). IEEE, Dalian, China.
Polastre, J., Hill, J., & Culler, D. (2004). Versatile low power media access for wireless sensor networks. In Proceedings of the 2nd international conference on Embedded networked sensor systems (pp. 95–107). ACM, Baltimore, MD, USA.
Raza, U., Kulkarni, P., & Sooriyabandara, M. (2017). Low power wide area networks: An overview. IEEE Communications Surveys & Tutorials, 19(2), 855–873.
Van Dam, T., Langendoen, K. (2003). An adaptive energy-efficient mac protocol for wireless sensor networks. In Proceedings of the 1st international conference on embedded networked sensor systems (pp. 171–180). ACM, Los Angeles, California, USA.
Srinivas, V. B., & Umar, S. (2013). Spoofing attacks in wireless sensor networks. International Journal of Science, Engineering and Computer Technology, 3(6), 201.
Karlof, C., & Wagner, D. (2003). Secure routing in wireless sensor networks: Attacks and countermeasures. Ad Hoc Networks, 1(2), 293–315.
Mao, Y., You, C., Zhang, J., Huang, K., & Letaief, K. B. (2017). A survey on mobile edge computing: The communication perspective. IEEE Communications Surveys & Tutorials, 19(4), 2322–2358.
Singh, V. P., Jain, S., & Singhai, J. (2010). Hello flood attack and its countermeasures in wireless sensor networks. IJCSI International Journal of Computer Science Issues, 7(11), 23–27.
Deng, J., Han, R., & Mishra, S. (2005). Defending against path-based dos attacks in wireless sensor networks. In Proceedings of the 3rd ACM workshop on security of ad hoc and sensor networks (pp. 89–96). ACM, Alexandria, VA, USA.
Woo, A., Tong, T., & Culler, D. (2003). Taming the underlying challenges of reliable multihop routing in sensor networks. In Proceedings of the 1st international conference on embedded networked sensor systems (pp. 14–27). ACM, Los Angeles, California, USA.
Anderson, R., & Kuhn, M. (1996). Tamper resistance-a cautionary note. In Proceedings of the second Usenix workshop on electronic commerce (vol. 2, pp. 1–11). Oakland, California.
Zou, Y., Zhu, J., Wang, X., & Hanzo, L. (2016). A survey on wireless security: Technical challenges, recent advances, and future trends. Proceedings of the IEEE, 104(9), 1727–1765.
Bhattasali, T., Chaki, R., Sanyal, S.: Sleep deprivation attack detection in wireless sensor network. CoRR abs/1203.0231 (2012), http://arxiv.org/abs/1203.0231.
Yu, Y., Govindan, R., Estrin, D.: Geographical and energy aware routing: A recursive data dissemination protocol for wireless sensor networks (2001).
Al-Fuqaha, A., Guizani, M., Mohammadi, M., Aledhari, M., & Ayyash, M. (2015). Internet of things: A survey on enabling technologies, protocols, and applications. IEEE Communications Surveys & Tutorials, 17(4), 2347–2376.
Sun, K., Peng, P., Ning, P., & Wang, C. (2006). Secure distributed cluster formation in wireless sensor networks. In 22nd annual computer security applications conference (pp. 131–140). IEEE, Miami Beach, FL, USA.
Tyagi, S., & Kumar, N. (2013). A systematic review on clustering and routing techniques based upon leach protocol for wireless sensor networks. Journal of Network and Computer Applications, 36(2), 623–645.
Mohi, M., Movaghar, A., & Zadeh, P. M. (2009). A bayesian game approach for preventing dos attacks in wireless sensor networks. In International conference on communications and mobile computing (vol. 3, pp. 507–511). IEEE, Yunnan, China.
Chakeres, I. D., Belding-Royer, E. M. (2004). Aodv routing protocol implementation design. In International conference on distributed computing systems workshops (pp. 698–703). IEEE, Hachioji, Tokyo, Japan.
Patil, S., & Chaudhari, S. (2016). Dos attack prevention technique in wireless sensor networks. Procedia Computer Science, 79, 715–721.
Li, X. M., Zhou, Q., Li, P., Li, H., & Lu, R. (2019). Event-triggered consensus control for multi-agent systems against false data-injection attacks. IEEE Transactions on Cybernetics, 50(5), 1856–1866.
Aura, T., Nikander, P., Leiwo, J. (2000). Dos-resistant authentication with client puzzles. In International workshop on security protocols (pp. 170–177). Springer, Berlin.
Zhang, Y. Y., Li, X. Z., & Liu, Y. A. (2012). The detection and defence of DoS attack for wireless sensor network. The Journal of China Universities of Posts and Telecommunications, 19, 52–56.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Islam, M.N.U., Fahmin, A., Hossain, M.S. et al. Denial-of-Service Attacks on Wireless Sensor Network and Defense Techniques. Wireless Pers Commun 116, 1993–2021 (2021). https://doi.org/10.1007/s11277-020-07776-3
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-020-07776-3