Table of Contents Author Guidelines Submit a Manuscript
Journal of Sensors
Volume 2016 (2016), Article ID 5017248, 13 pages
http://dx.doi.org/10.1155/2016/5017248
Research Article

Multilevel Modeling of Distributed Denial of Service Attacks in Wireless Sensor Networks

1Institute of Computer Science, Maria Curie-Sklodowska University, Pl. M. Curie-Sklodowskiej 5, 20-031 Lublin, Poland
2Polish-Japanese Academy of Information Technology, Koszykowa 86, 02-008 Warsaw, Poland

Received 24 March 2016; Accepted 29 May 2016

Academic Editor: Fei Yu

Copyright © 2016 Katarzyna Mazur et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. B. Ksiezopolski, “The official web page of the qop-ml project, 2012”.
  2. M. Dhar and R. Singh, “A review of security issues and denial of service attacks in wireless sensor networks,” International Journal of Computer Science and Information Technology Research, vol. 3, no. 1, pp. 27–33, 2015. View at Google Scholar
  3. G. Kumar, “Understanding denial of service (dos) attacks using osi reference model,” International Journal of Education and Science Research, vol. 1, no. 5, 2014. View at Google Scholar
  4. Isha, A. Malik, and G. Raj, “Dos attacks on tcp/ip layers in wsn,” International Journal of Computer Networks and Communications Security, vol. 1, no. 2, pp. 40–45, 2013. View at Google Scholar
  5. A. D. Wood and J. A. Stankovic, “A taxonomy for denial-of-service attacks in wireless sensor networks,” in Handbook of Sensor Networks Compact Wireless and Wired Sensing Systems, M. Ilyas and I. Mahgoub, Eds., CRC Press, New York, NY, USA, 2004. View at Publisher · View at Google Scholar
  6. J. Mirkovic and P. Reiher, “A taxonomy of DDoS attack and DDoS defense mechanisms,” ACM SIGCOMM Computer Communication Review, vol. 34, no. 2, pp. 39–53, 2004. View at Publisher · View at Google Scholar
  7. A. Asosheh and N. Ramezani, “A comprehensive taxonomy of DDoS attacks and defense mechanism applying in a smart classification,” WSEAS Transactions on Computers, vol. 7, no. 4, pp. 281–290, 2008. View at Google Scholar · View at Scopus
  8. D. K. Chaitanya and G. Arindam, “Analysis of denial-of-service attacks on wireless sensor networks using simulation,” in Proceedings of the IT Security for the Next Generation—European Cup, University of Applied Sciences, Erfurt, Germany, January 2011.
  9. Q. Huang, H. Kobayashi, and B. Liu, “Modeling of distributed denial of service attacks in wireless networks,” in Proceedings of the IEEE Pacific Rim Conference on Communications, Computers and signal Processing, pp. 41–44, Victoria, Canada, August 2003. View at Publisher · View at Google Scholar
  10. L. Pei, C. Li, R. Hou, Y. Zhang, and H. Ou, “Computer simulation of denial of service attack in military information network using opnet,” in Proceedings of the 3rd International Conference on Multimedia Technology (ICMT '13), 2013.
  11. I. Mukhopadhayay, S. Polle, and P. Naskar, “Analysis of denial-of-service attacks on wireless sensor networks using simulation,” IOSR Journal of Computer Engineering (IOSR-JCE), vol. 16, 2014. View at Google Scholar
  12. R. Bhatnagar, “The proposal of hybrid intrusion detection for defence of sync flood attack in wireless sensor network,” International Journal of Computer Science & Engineering Survey, vol. 3, no. 2, pp. 31–38, 2012. View at Publisher · View at Google Scholar
  13. S. Tripathy and S. Nandi, “Defense against outside attacks in wireless sensor networks,” Computer Communications, vol. 31, no. 4, pp. 818–826, 2008. View at Publisher · View at Google Scholar · View at Scopus
  14. J.-H. Son, H. Luo, and S.-W. Seo, “Denial of service attack-resistant flooding authentication in wireless sensor networks,” Computer Communications, vol. 33, no. 13, pp. 1531–1542, 2010. View at Publisher · View at Google Scholar · View at Scopus
  15. V. S. Dines Kumar and C. Navaneethan, “Protection against denial of service (dos) attacks in wireless sensor networks,” International Journal of Advanced Research in Computer Science & Technology, vol. 2, no. 1, pp. 439–443, 2014. View at Google Scholar
  16. L.-C. Chen, T. A. Longstaff, and K. M. Carley, “Characterization of defense mechanisms against distributed denial of service attacks,” Computers and Security, vol. 23, no. 8, pp. 665–678, 2004. View at Publisher · View at Google Scholar · View at Scopus
  17. M. Eian and S. F. Mjølsnes, “The modeling and comparison of wireless network denial of service attacks,” in Proceedings of the 3rd ACM SOSP Workshop on Networking, Systems, and Applications on Mobile Handhelds (MobiHeld '11), October 2011. View at Publisher · View at Google Scholar · View at Scopus
  18. G. Dini and M. Tiloca, “ASF: an attack simulation framework for wireless sensor networks,” in Proceedings of the IEEE 8th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob '12), pp. 203–210, Barcelona, Spain, October 2012. View at Publisher · View at Google Scholar · View at Scopus
  19. Y.-Y. Zhang, X.-Z. Li, and Y.-A. Liu, “The detection and defence of DoS attack for wireless sensor network,” The Journal of China Universities of Posts and Telecommunications, vol. 19, no. 2, pp. 52–56, 2012. View at Publisher · View at Google Scholar · View at Scopus
  20. B. Ksiezopolski, “QoP-ML: quality of protection modelling language for cryptographic protocols,” Computers & Security, vol. 31, no. 4, pp. 569–596, 2012. View at Publisher · View at Google Scholar · View at Scopus
  21. B. Ksiezopolski, Multilevel Modeling of Secure Systems in QoP-ML, CRC Press/Taylor & Francis, New York, NY, USA, 2015.
  22. G. Anastasi, G. Lo Re, and M. Ortolani, “WSNs for structural health monitoring of historical buildings,” in Proceedings of the 2nd Conference on Human System Interactions (HSI '09), pp. 574–579, IEEE, Catania, Italy, May 2009. View at Publisher · View at Google Scholar · View at Scopus
  23. Crossbow Technology, “TelosB mote platform datasheet,” Document Part Number 6020-0094-01, rev B, 2004, http://www.willow.co.uk/TelosB_Datasheet.pdf. View at Google Scholar
  24. I. Mansour, D. Rusinek, G. Chalhoub, P. Lafourcade, and B. Ksiezopolski, “Multihop node authentication mechanisms for wireless sensor networks,” in Ad-Hoc, Mobile, and Wireless Networks: 13th International Conference, ADHOC-NOW 2014, Benidorm, Spain, June 22–27, 2014 Proceedings, vol. 8487 of Lecture Notes in Computer Science, pp. 402–418, Springer, Berlin, Germany, 2014. View at Publisher · View at Google Scholar
  25. D. Rusinek, B. Ksiezopolski, and A. Wierzbicki, “Security trade-off and energy efficiency analysis in wireless sensor networks,” International Journal of Distributed Sensor Networks, vol. 2015, Article ID 943475, 17 pages, 2015. View at Publisher · View at Google Scholar · View at Scopus
  26. B. Księżopolski, D. Rusinek, and A. Wierzbicki, “On the modelling of kerberos protocol in the quality of protection modelling language (QoP-ML),” Annales UMCS, Informatica, vol. 12, no. 4, pp. 69–81, 2012. View at Publisher · View at Google Scholar
  27. P. Szalachowski, B. Ksiezopolski, and Z. Kotulski, “Optimization of the TLS security protocol,” Annales UMCS: Informatica, vol. 9, pp. 59–75, 2009. View at Google Scholar