Analysis of the WSN MAC Protocols under Jamming DoS Attack
نویسندگان
چکیده
Wireless Sensor Network (WSN) is a wireless network consisting of small nodes with sensing, computation, and wireless communications capabilities. The design of wireless sensor networks depends of many factors, such as transmission errors, network topology and power consumption. Many routing protocols, protocols for data transmission, are specifically designed for wireless sensor networks where energy consumption is essential. This paper provides a brief description of the IEEE 802.15.4/ZigBee standard, also surveys the known attacks on wireless sensor networks. WSNs are particularly vulnerable to several key types of attacks. These attacks can be performed in several different ways. One of the commonly used methods is a denial of service (DoS), but there are also other types of attacks from which we should be aware as a traffic analysis, privacy violation, physical attacks etc. Three MAC protocols, such as IEEE 802.15.4 MAC, T-MAC, and S-MAC are proposed to analyse the performance of the WSN under DoS attack using OMNeT++ simulator. Different application scenarios have been evaluated. Performance parameters such as throughput, network delay, energy consumption in the coordinator, and network load are the main considered factors in our study.
منابع مشابه
MAC Layer DoS Attacks in Wireless Sensor Networks: A Survey
Wireless sensor networks (WSN) are very popular area of interest both in academic studies and industrial applications since they can work individually without additional maintenance and can be deployed in diverse applications. However, the limited source of the nodes cannot guarantee a sufficient level of security and also complicates the design and the implementation of the algorithms/protocol...
متن کاملImpact of High-Mobility Radio Jamming in Large-Scale Wireless Sensor Networks
Denial-Of-Service (DOS) attack is recognized as a biggest threat against the operation of large-scale wireless sensor networks (WSN). Especially, high-mobility radio jamming like vehicles carrying radio jamming device can cause a serious damage in performance of WSNs. Because of resource-constraint design of sensor node, it is hard to provide enough protection against high-mobility jamming atta...
متن کاملJamming Attack Detection and Countermeasures In Wireless Sensor Network Using Ant System
Sensors have varied constraints, which makes the network challenging for communicating with its peers. In this paper, an extension to the security of physical layer of a predictive sensor network model using the ant system is proposed. The Denial of Service (DoS) attack on sensor networks not only diminishes the network performance but also affects the reliability of the information making dete...
متن کاملA Mechanism for Detecting and Identifying DoS attack in VANET
VANET (Vehicular Ad-hoc Network) which is a hy- brid network (combination of infrastructure and infra- structure-less networks) is an emergent technology with promising future as well as great challenges especially in security. By the other hand this type of network is very sensible to safety problem. This paper focuses on a new mechanism for DoS (denial of service) attacks on the physical and ...
متن کاملCognitive Radio Based Jamming Resilient Multi-channel MAC Protocol for Wireless Network
Radio jamming attack is the most effective and easiest Denial-of –Service (DOS) attack in wireless network. In this paper, we proposed a multi-channel MAC protocol to mitigate the jamming attacks by using cognitive radio. The Cognitive Radio (CR) technology supports real-time spectrum sensing and fast channel switching. By using CR technologies, the legitimate nodes can perform periodic spectru...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- I. J. Network Security
دوره 16 شماره
صفحات -
تاریخ انتشار 2014