Limiting DoS attacks during multihop data delivery in wireless sensor networks

Jing Deng, Richard Han, Shivakant Mishra
2006 International Journal of Security and Networks (IJSN)  
Denial of Service (DoS) attacks can be easily launched in Wireless Sensor Networks (WSNs). Due to their resource constraints, namely limited energy, memory and bandwidth, WSNs are especially vulnerable to DoS attacks. This paper addresses a particular class of DoS attacks that overwhelm resources along a multihop data delivery path. Since WSNs are typically tree-structured, then a DoS attack on a path will be especially effective in denying routing service to an entire branch of sensor nodes,
more » ... of sensor nodes, not just the nodes along the path. This paper proposes a solution using one-way hash chains to protect end-to-end multihop communications in WSNs against such Path-based DoS (PDoS) attacks. The proposed solution is lightweight, tolerates bursty packet losses and can easily be implemented in modern WSNs. This paper reports on performance measured from a prototype implementation. He has published ten papers on security in wireless sensor networks and a book chapter on security, privacy and fault tolerance in sensor networks. His research interests include wireless security, secure network routing and security for sensor networks. , CO. His current research interests include the design and implementation of secure and highly available wireless sensor networks and system-level support to facilitate highly available and dependable computing over the internet. Large sensor networks are often organised hierarchically via a tree structure to conserve energy and network bandwidth. The tree consists of leaf sensor nodes, aggregator nodes and a base station, as given in Figure 1 . Leaf sensor nodes send their sensed data to an aggregator node. Aggregator nodes process and summarise the data from member nodes and send the aggregated result to a base
doi:10.1504/ijsn.2006.011776 fatcat:6vojp6rxkbapflbbr752xilnha