Denial of Service Defence for Resource Availability in Wireless Sensor Networks

Opeyemi A. Osanaiye, Attahiru S. Alfa, Gerhard P. Hancke
2018 IEEE Access  
Wireless sensor networks (WSN) over the years have become one of the most promising networking solutions with exciting new applications for the near future. Its deployment has been enhanced by its small, inexpensive and smart sensor nodes, which are easily deployed, depending on its application and coverage area. Common applications include its use for military operations, monitoring environmental conditions (such as volcano detection, agriculture and management), distributed control systems,
more » ... althcare and detection of radioactive sources. Notwithstanding its promising attributes, security in WSN is a big challenge and remains an ongoing research trend. Deployed sensor nodes are vulnerable to various security attacks due to its architecture, hostile deployment location and insecure routing protocol. Furthermore, the sensor nodes in WSNs are characterised by their resource constraints, such as, limited energy, low bandwidth, short communication range, limited processing and storage capacity which have made the sensor nodes an easy target. Therefore, in this work, we present a review of DoS attacks that affect resource availability in WSN and their countermeasure by presenting a taxonomy. Future research directions and open research issues are also discussed. Index Terms-Denial of Service (DoS), detection techniques, intrusion detection system (IDS), resource availability, resource depletion, wireless sensor networks (WSNs). Other common application includes its use for military operations, distributed control system and detection of radioactive sources. WSN has become one of the most preferred networking solutions, however, it's extremely limited resources such as energy, memory, computing and bandwidth has made it vulnerable to both passive and active attack. Passive attack is carried out by an adversary by monitoring an ongoing communication between two nodes (e.g. eavesdropping) [4] while an active attack takes advantage of the broadcast nature of wireless communication medium to launch an attack. Furthermore, sensor nodes are exposed to physical attacks as a result of its lack of tamper-resistance due to cost constraint. Common among the security threats in WSN are denial of service attack, communication attack, node compromise, protocol-specific attack and impersonation attack [5] . The network security policy is guided by the confidentiality, integrity and availability (CIA) triad model [6] . Both the integrity and confidentiality of transmitted data in WSN have attracted the attention of security experts, both in the academia and industry, while not much interest has been given to security attacks that affects the availability of resources.
doi:10.1109/access.2018.2793841 fatcat:chajqpv6arfphif46zj3w2f5da