International Journal of Soft Computing

Year: 2016
Volume: 11
Issue: 3
Page No. 221 - 226

A Detailed Survey on Security Attacks on Wireless Sensor Network and its Countermeasures

Authors : P. Sherubha and M. Mohana Priya

References

Adaobi, O., E. Igbesoko and M. Ghassemian, 2012. Evaluation of security problems and intrusion detection systems for routing attacks in wireless self-organised networks. Proceedings of the 5th International Conference on New Technologies, Mobility and Security, May 7-10, 2012, Istanbul, Turkey, pp: 1-5.

Admas, C. and S. Lloyd, 1997. Profiles and protocols for the Internet public-key infrastructure. Proceedings of the 6th IEEE Computer Society Workshop on Future Trends of Distributed Computing Systems, October 31-31, 1997, Tunis, Tunisia, pp: 220-224.

Almomani, I. and B. Al-Kasasbeh, 2015. Performance analysis of LEACH protocol under denial of service attacks. Proceedings of the 6th International Conference on Information and Communication Systems, April 7-9, 2015, Amman, Jordan, pp: 292-297.

Antikainen, M., T. Aura and M. Sarela, 2014. Denial-of-service attacks in bloom-filter-based forwarding. IEEE/ACM Trans. Networking, 22: 1463-1476.
CrossRef  |  Direct Link  |  

Bandyopadhyay, A., S. Vuppala and P. Choudhury, 2011. A simulation analysis of flooding attack in MANET using NS-3. Proceedings of the 2nd International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace and Electronic Systems Technology, February 28-March 3, 2011, Chennai, India, pp: 1-5.

Carzaniga, A., M.J. Rutherford and A.L. Wolf, 2004. A routing scheme for content-based networking. Proceedings of 23rd Annual Joint Conference of the IEEE Computer and Communications Societies, Volume 2, March 7-11, 2004, Hong Kong, China, pp: 918-928.

Chaubey, N., A. Aggarwal, S. Gandhi and K.A. Jani, 2015. Performance analysis of TSDRP and AODV routing protocol under black hole attacks in MANETs by varying network size. Proceedings of the 5th International Conference on Advanced Computing and Communication Technologies, February 21-22, 2015, Rohtak, India, pp: 320-324.

Dasgupta, M., S. Choudhury and N. Chaki, 2009. A secure hypercube based team multicast routing protocois (S-HTMRP). Proceedings of the IEEE International Advance Computing Conference, March 6-7, 2009, Patiala, India, pp: 1265-1269.

Dey, T., M.M.A. Hashem and S.K. Mondal, 2008. On performance analysis of AMBR protocol in mobile ad hoc networks. Proceedings of the International Conference on Computer and Communication Engineering, May 13-15, 2008, Kuala Lumpur, Malaysia, pp: 128-132.

Fraser, N.A., D.J. Kelly, R.A. Raines, R.O. Baldwin and B.E. Mullins, 2007. Using client puzzles to mitigate distributed denial of service attacks in the tor anonymous routing environment. Proceedings of the IEEE International Conference on Communications, June 24-28, 2007, Glasgow, Scotland, pp: 1197-1202.

Fu, Y., X. Wang and S. Li, 2008. Performance comparison and analysis of routing strategies in mobile ad hoc networks. Proceedings of the International Conference on Computer Science and Software Engineering, December 12-14, 2008, Wuhan, Hubei, pp: 505-510.

Fu, Z. and M. Papatriantafilou, 2012. Off the wall: Lightweight distributed filtering to mitigate distributed denial of service attacks. Proceedings of the IEEE 31st Symposium on Reliable Distributed Systems, October 8-11, 2012, Irvine, CA., USA., pp: 207-212.

Fu, Z., M. Papatriantafilou and P. Tsigas, 2012. Mitigating distributed denial of service attacks in multiparty applications in the presence of clock drifts. IEEE Trans. Dependable Secure Comput., 9: 401-413.
CrossRef  |  Direct Link  |  

Gracelin, S.R., E.N. Edna and S. Radha, 2010. A novel method for multiple attacks in NTP based routing algorithm. Proceedings of the International Conference on Wireless Communication and Sensor Computing, January 2-4, 2010, Chennai, India, pp: 1-6.

Jeni, P.J., A.V. Juliet, R. Parthasarathy and A.M. Bose, 2013. Performance analysis of DOA and AODV routing protocols with black hole attack in MANET. Proceedings of the IEEE International Conference on Smart Structures and Systems, March 28-29, 2013, Chennai, India, pp: 178-182.

Li, Z., B. Zhao, Y. Qu and K. Chen, 2006. An adaptive and distributed STDMA scheme for ad hoc and sensor networks. Proceedings of the International Conference on Networking, International Conference on Systems and International Conference on Mobile Communications and Learning Technologies, April 23-29, 2006, Morne, Mauritius, pp: 121-.

Mukkamala, S. and A.H. Sung, 2003. Detecting denial of service attacks using support vector machines. Proceedings the 12th IEEE International Conference on Fuzzy Systems, Volume 2, May 25-28, 2003, St. Louis, MI., USA., pp: 1231-1236.

Papadimitratos, P. and Z.J. Haas, 2002. Securing the Internet routing infrastructure. IEEE Commun. Mag., 10: 60-68.
CrossRef  |  

Phulre, S., P. Gautam and S.K. Mishra, 2014. Implementation of trusted multitier method for intrusion detection in mobile ad hoc networks with DSR algorithm. Proceedings of the IEEE Science and Information Conference (SAI), August 27-29, 2014, London, UK., pp: 666-673.

Renold, A.P., R. Poongothai and R. Parthasarathy, 2012. Performance analysis of LEACH with gray hole attack in wireless sensor networks. Proceedings of the International Conference on Computer Communication and Informatics, January 10-12, 2012, Coimbatore, India, pp: 1-4.

Rogers, S.A., S.S.B. Moore and C.A. Siller, 2003. Packet sequencing: A layer-2 WAN switching technology for per-flow ideal QoS and secure IP networking. Proceedings of the IEEE Military Communications Conference, Volume 2, October 13-16, 2003, Boston, MA., USA., pp: 954-959.

Rotenberg, E., C. Crespelle and M. Latapy, 2014. Measuring routing tables in the internet. Proceedings of the IEEE Conference on Computer Communications Workshops, April 27-May 2, 2014, Toronto, Canada, pp: 795-800.

Saghar, K., H. Farid and D. Kendal, 2016. Formal specifications OD denial of service attacks in wireless sensor networks. Proceedings of the 13th International Bhurban Conference on Applied Science and Technology, January 12-16, 2016, National Centre for Physics, Islamabad, Pakistan -.

Sangi, A.R., J. Liu and L. Zou, 2009. A performance analysis of AODV routing protocol under combined byzantine attacks in MANETs. Proceedings of the International Conference on Computational Intelligence and Software Engineering, December 11-13, 2009, Wuhan, China, pp: 1-56.

Savage, S., D. Wetherall, A. Karlin and T. Anderson, 2000. Practical network support for IP traceback. Proceedings of the Conference on Applications, Technologies, Architectures and Protocols for Computer Communication, August 28-September 1, 2000, Stockholm, Sweden, pp: 295-306.

Shea, R. and J. Liu, 2013. Performance of virtual machines under networked denial of service attacks: Experiments and analysis. IEEE Syst. J., 7: 335-345.
CrossRef  |  Direct Link  |  

Song, D.X. and A. Perrig, 2001. Advanced and authenticated marking schemes for IP traceback. Proceedings of the 20th Annual Joint Conference on IEEE Computer and Communications Societies, April 22-26, 2001, Anchorage, AK., USA., pp: 878-886.

Tarman, T.D., E.L. Witzke, K.C. Bauer, B.R. Kellogg and W.F. Young, 2001. Asynchronous Transfer Mode (ATM) intrusion detection. Proceedings of the Communications for Network-Centric Operations: Creating the Information Force Military Communications Conference, Volume 1, October 28-31, 2001, McLean, VA., pp: 87-91.

Tyagi, P. and D. Dembla, 2014. Investigating the security threats in vehicular ad hoc networks (VANETs): Towards security engineering for safer on-road transportation. Proceedings of the International Conference on Advances in Computing, Communications and Informatics, September 24-27, 2014, Greater Noida, India, pp: 2084-2090.

Xiao, B., W. Chen and Y. He, 2008. An autonomous defense against SYN flooding attacks: Detect and throttle attacks at the victim side independently. J. Parallel Distrib. Comput., 68: 456-470.
CrossRef  |  Direct Link  |  

Yi, P., Z. Dai, Y. Zhong and S. Zhang, 2005. Resisting flooding attacks in ad hoc networks. Proceedings of the International Conference on Information Technology: Coding and Computing, April 4-6, 2005, Las Vegas, NV., USA., pp: 657-662.

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved