This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Denial-of-Service in Wireless Sensor Networks: Attacks and Defenses
January-March 2008 (vol. 7 no. 1)
pp. 74-81
David R. Raymond, Virginia Tech
Scott F. Midkiff, Virginia Tech
Increased interest in wireless sensor networks reinforces the importance of developing robust security mechanisms to protect them from malicious attack. If sensor networks are to meet current expectations, they must be robust in the face of network attacks, including denial of service.

1. A.D. Wood and J.A. Stankovic, "Denial of Service in Sensor Networks," Computer, vol. 35, no. 10, 2002, pp. 54–62.
2. K. Sohrabi et al., "Protocols for Self-Organization of a Wireless Sensor Network," IEEE Personal Comm., vol. 7, no. 5, 2000, pp. 16–27.
3. A. Perrig et al., "SPINS: Security Protocols for Sensor Networks," Wireless Networks, vol. 8, no. 55, 2002, pp. 521–534.
4. C. Karlof, N. Sastry, and D. Wagner, "TinySec: A Link Layer Security Architecture for Wireless Sensor Networks," Proc. 2nd Int'l Conf. Embedded Networked Sensor Systems, ACM Press, 2004, pp. 162–175.
5. IEEE Std. 802.15.4, Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specification for Low-Rate Wireless Personal Area Networks (LR-WPANs), IEEE, 2003.
6. N. Sastry and D. Wagner, "Security Considerations for IEEE 802.15.4 Networks," Proc. ACM Workshop Wireless Security, ACM Press, 2004, pp. 32–42.
7. W. Xu et al., "The Feasibility of Launching and Detecting Jamming Attacks in Wireless Networks," Proc. 11th Ann. Int'l Conf. Mobile Computing and Networking, ACM Press, 2005, pp. 46–57.
8. A. Woo, T. Tong, and D. Culler, "Taming the Underlying Challenges for Reliable Multihop Routing in Sensor Networks," Proc. 1st ACM Int'l Conf. Embedded Networked Sensor Systems, ACM Press, 2003, pp. 14–27.
9. D. Raymond et al., "Effects of Denial of Sleep Attacks on Wireless Sensor Network MAC Protocols," Proc. 7th Ann. IEEE Systems, Man, and Cybernetics (SMC) Information Assurance Workshop (IAW), IEEE Press, 2006, pp. 297–304.
10. F. Stajano and R. Anderson, "The Resurrecting Duckling: Security Issues for Ad-Hoc Wireless Networks," Proc. 7th Int'l Workshop Security Protocols, Springer, 1999, pp. 172–194.
11. W. Ye, J. Heidemann, and D. Estrin, "Medium Access Control with Coordinated Adaptive Sleeping for Wireless Sensor Networks," IEEE/ACM Trans. Networking, vol. 12, no. 3, 2004, pp. 493–506.
12. J. Polastre, J. Hill, and D. Culler, "Versatile Low Power Media Access for Wireless Sensor Networks," Proc. 2nd ACM Int'l Conf. Embedded Networked Sensor Systems, ACM Press, 2004, pp. 95–107.
13. T. VanDam and K. Langendoen, "An Adaptive Energy-Efficient MAC Protocol for Wireless Sensor Networks," Proc. 1st ACM Int'l Conf. Embedded Networked Sensor Systems, ACM Press, 2003, pp. 171–180.
14. C. Karlof and D. Wagner, "Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures," Proc. 1st IEEE Int'l Workshop Sensor Network Protocols and Applications, IEEE Press, 2003, pp. 113–127.
15. Y. Yu, R. Govindan, and D. Estrin, Geograhical and Energy Aware Routing: A Recursive Data Dissemination Protocol for Wireless Sensor Networks, tech. report UCLA/CSD-tr-01-0023, Computer Science Dept., Univ. of California, Los Angeles, 2001.
16. K. Sun et al., "Secure Distributed Cluster Formation in Wireless Sensor Networks," Proc. 22nd Ann. Computer Security Applications Conf., IEEE CS Press, 2006, pp. 131–140.
17. G.V. Crosby, N. Pissinou, and J. Gadze, "A Framework for Trust-Based Cluster Head Election in Wireless Sensor Networks," Proc. 2nd IEEE Workshop Dependability and Security in Sensor Networks and Systems, IEEE Press, 2006, pp. 13–22.
18. J. Deng, R. Han, and S. Mishra, "Intrusion Tolerance and Anti-Traffic Analysis Strategies for Wireless Sensor Networks," Proc. Int'l Conf. Dependable Systems and Networks, IEEE CS Press, 2004, pp. 637–656.
19. J. Deng, R. Han, and S. Mishra, "Defending against Path-Based DoS Attacks in Wireless Sensor Networks," Proc. 3rd ACM Workshop Security of Ad Hoc and Sensor Networks, ACM Press, 2005, pp. 89–96.
20. J.W. Hui and D. Culler, "The Dynamic Behavior of a Data Dissemination Protocol for Network Programming at Scale," Proc. 2nd ACM Conf. Embedded Networked Sensor Systems, ACM Press, 2004, pp. 81–94.
21. P.K. Dutta et al., "Securing the Deluge Network Programming System," Proc. 5th Int'l Conf. Information Processing in Sensor Networks, ACM Press, 2006, pp. 326–333.

Index Terms:
Denial-of-service attacks, denial-of-sleep attacks, security, wireless sensor networks
Citation:
David R. Raymond, Scott F. Midkiff, "Denial-of-Service in Wireless Sensor Networks: Attacks and Defenses," IEEE Pervasive Computing, vol. 7, no. 1, pp. 74-81, Jan.-March 2008, doi:10.1109/MPRV.2008.6
Usage of this product signifies your acceptance of the Terms of Use.