Highly-resilient, energy-efficient multipath routing in wireless sensor networks
ACM SIGMOBILE Mobile Computing and Communications Review
Ariadne: a secure on-demand routing protocol for ad hoc networks
Proceedings of the 8th annual international conference on Mobile computing and networking
SPINS: security protocols for sensor networks
Wireless Networks
Denial of Service in Sensor Networks
Computer
Efficient Authentication and Signing of Multicast Streams over Lossy Channels
SP '00 Proceedings of the 2000 IEEE Symposium on Security and Privacy
LEAP: efficient security mechanisms for large-scale distributed sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
JAM: A Jammed-Area Mapping Service for Sensor Networks
RTSS '03 Proceedings of the 24th IEEE International Real-Time Systems Symposium
Understanding packet delivery performance in dense wireless sensor networks
Proceedings of the 1st international conference on Embedded networked sensor systems
Taming the underlying challenges of reliable multihop routing in sensor networks
Proceedings of the 1st international conference on Embedded networked sensor systems
SIA: secure information aggregation in sensor networks
Proceedings of the 1st international conference on Embedded networked sensor systems
Impact of radio irregularity on wireless sensor networks
Proceedings of the 2nd international conference on Mobile systems, applications, and services
TinySec: a link layer security architecture for wireless sensor networks
SenSys '04 Proceedings of the 2nd international conference on Embedded networked sensor systems
ELF: an efficient log-structured flash file system for micro sensor nodes
SenSys '04 Proceedings of the 2nd international conference on Embedded networked sensor systems
INSENS: Intrusion-tolerant routing for wireless sensor networks
Computer Communications
Almost optimal hash sequence traversal
FC'02 Proceedings of the 6th international conference on Financial cryptography
A performance evaluation of intrusion-tolerant routing in wireless sensor networks
IPSN'03 Proceedings of the 2nd international conference on Information processing in sensor networks
DoS-resilient secure aggregation queries in sensor networks
Proceedings of the twenty-sixth annual ACM symposium on Principles of distributed computing
Secure and highly-available aggregation queries in large-scale sensor networks via set sampling
IPSN '09 Proceedings of the 2009 International Conference on Information Processing in Sensor Networks
IEEE 802.11 user fingerprinting and its applications for intrusion detection
Computers & Mathematics with Applications
Dynamic window based multihop authentication for WSN
Proceedings of the 17th ACM conference on Computer and communications security
Error compensation algorithm in wireless sensor networks synchronisation
International Journal of Sensor Networks
A dynamic TDMA based scheme for securing query processing in WSN
Wireless Networks
Ensuring basic security and preventing replay attack in a query processing application domain in WSN
ICCSA'10 Proceedings of the 2010 international conference on Computational Science and Its Applications - Volume Part III
The effect of leaders on the consistency of group behaviour
International Journal of Sensor Networks
Security and Communication Networks
Temporal accountability and anonymity in medical sensor networks
Mobile Networks and Applications - Special issue on Wireless and Personal Communications
Hi-index | 0.00 |
Denial of Service (DoS) attacks can be easily launched in Wireless Sensor Networks (WSNs). Due to their resource constraints, namely limited energy, memory and bandwidth, WSNs are especially vulnerable to DoS attacks. This paper addresses a particular class of DoS attacks that overwhelm resources along a multihop data delivery path. Since WSNs are typically tree-structured, then a DoS attack on a path will be especially effective in denying routing service to an entire branch of sensor nodes, not just the nodes along the path. This paper proposes a solution using one-way hash chains to protect end-to-end multihop communications in WSNs against such Path-based DoS (PDoS) attacks. The proposed solution is lightweight, tolerates bursty packet losses and can easily be implemented in modern WSNs. This paper reports on performance measured from a prototype implementation.