Skip to main content

Denial of Service Attack Detection in Wireless Sensor Networks and Software Defined Wireless Sensor Networks: A Brief Review

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 489))

Abstract

Wireless Sensor Network (WSN) is a communication technology that aims at connecting remote sensors to aggregation devices, and is an important building block for the Internet of Things (IoT) infrastructure. However, WSN is faced by many challenges such as network management, energy consumption, and security. A potential solution was introduced to mitigate these challenges, which is the integration of software-defined networks (SDN) concept with WSN to form what is known as a software-defined wireless sensor network (SDWSN). The SDWSN model allowed a simplification of network management and configuration with more control and programmability. However, and due to the use open interfaces and standard protocols, securing SDWSN communications against various attacks is still a real challenge. In this paper, we present a comprehensive review of one of the most devastating, and yet very challenging attack on the WSN/SDWSN, namely Denial of Service (DoS) attack, as well as the recent solutions for detecting this attacks, and which we noticed that it have differed in terms of its complexity, accuracy and also its applied. Moreover, we provide an evaluation of the proposed solutions, as well as our recommendations to improve the protection level in WSN/SDWSN with regards to future trends.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   219.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   279.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Cheng, N., et al.: Big data driven vehicular networks. IEEE Network 32(6), 160–167 (2018)

    Article  Google Scholar 

  2. Atzori, L., Iera, A., Morabito, G.: The internet of things: a survey. Comput. Netw. 54(15), 2787–2805 (2010)

    Article  Google Scholar 

  3. Alsace, H., Domaine, F., Math, L.M.D., Fili, I., Sp, I.: T hèse de D octorat 3 ème Cycle M r K amel SADDIKI D enial of services attack in wireless networks. 2018–2019 (2019)

    Google Scholar 

  4. Amish, P., Vaghela, V.B.: Detection and prevention of wormhole attack in wireless sensor network using AOMDV protocol. Procedia Comput. Sci. 79, 700–707 (2016)

    Article  Google Scholar 

  5. Kobo, H.I., Abu-Mahfouz, A.M., Hancke, G.P.: A survey on software-defined wireless sensor networks: challenges and design requirements. IEEE Access 5, 1872–1899 (2017)

    Article  Google Scholar 

  6. Ndiaye, M., Hancke, G.P., Abu-Mahfouz, A.M.: Software defined working for improved wireless sensor network management: a survey. Sensors. 17(5:1031), 1–32 (2017)

    Google Scholar 

  7. Saqib, M., Khan, F.Z., Ahmed, M., Mehmood, R.M.: A critical review on security approaches to software-defined wireless sensor networking. Int. J. Distrib. Sens. Netw. 15(12), 155014771988990 (2019)

    Article  Google Scholar 

  8. Pritchard, S.W., et al.: Security in software-defined wireless sensor networks: threats, challenges and potential solutions. In: Proceedings – 2017 IEEE 15th International Conference on Industrial Informatics, vol. 2017, pp. 168–73 (2017)

    Google Scholar 

  9. Venkatraman, K., Daniel, J.V., Murugaboopathi, G.: Various attacks in wireless sensor network: survey. Int. J. Soft Comput. Eng. 31, 2231–2307 (2013)

    Google Scholar 

  10. Patel, M.M., Aggarwal, A.: Security attacks in wireless sensor networks: a survey. In: 2013 International Conference Intelligent System Signal Processing ISSP 2013, pp. 329–333 (2013)

    Google Scholar 

  11. Dubey, R., Jain, V., Thakur, R.S., Choubey, S.D.: Attacks in wireless sensor networks. Comput. Sci. 3(3), 2–5 (2012)

    Google Scholar 

  12. Manuel, M., Isong, B., Esiefarienrhe, M., Abu-Mahfouz, A.M.: Analysis of notable security issues in SDWSN. In: IECON 2018-44th Annual Conference of the IEEE Industrial Electronics Society, pp. 4706–4711. IEEE (2018)

    Google Scholar 

  13. Derhab, A., Bouras, A., Belaoued, M., Maglaras, L., Khan, F.A.: Two-hop monitoring mechanism based on relaxed flow conservation constraints against selective routing attacks in wireless sensor networks. Sensors 20(21), 6106 (2020)

    Article  Google Scholar 

  14. Lehsaini, M.: Thèse de Doctorat Diffusion et couverture basées sur le clustering dans les réseaux de capteurs : application à la domotique. Université A.B Tlemcen (2009)

    Google Scholar 

  15. Matin, M.A., Islam, M.M.: Overview of wireless sensor network. In: Matin, M. (ed.) Wireless Sensor Networks – Technology and Protocols. InTech (2012). https://doi.org/10.5772/49376

    Chapter  Google Scholar 

  16. Bull, P., Austin, R., Popov, E., Sharma, M., Watson, R.: Flow based security for IoT devices using an SDN gateway. In: Proceedings of the 2016 IEEE 4th International Conference Future Internet Things Cloud, pp157–163. FiCloud (2016)

    Google Scholar 

  17. Fraser, B., et al.: Introduction: What Is Software Defined Networking? pp. 36–43 (2013)

    Google Scholar 

  18. Ndiaye, M., Hancke, G., Abu-Mahfouz, A.: Software defined networking for improved wireless sensor network management: a survey. Sensors 17(5), 1031 (2017)

    Article  Google Scholar 

  19. Kobo, H.I., Abu-Mahfouz, A.M., Hancke, G.P.: A survey on software-defined wireless sensor networks: challenges and design requirements. IEEE Access 5(12), 1872–1899 (2017)

    Article  Google Scholar 

  20. Mostafaei, H., Menth, M.: Software-defined wireless sensor networks: a survey. J. Netw. Comput. Appl. 119, 42–56 (2018)

    Article  Google Scholar 

  21. Hassan, M.A., Vien, Q.-T., Aiash, M.: Software defined networkingfor wireless sensor networks: a survey. Adv. Wireless Commun. Netw. 3(2), 10–22 (2017)

    Article  Google Scholar 

  22. Egidius, P.M., Abu-Mahfouz, A.M., Hancke, G.P.: Programmable node in software-defined wireless sensor networks: a review. In: Proceedings of the IECON 2018 – 44th Annual Conference IEEE Industrial Electronics Society, pp. 4672–4677 (2018)

    Google Scholar 

  23. Kipongo, J., Olwal, T.O., Abu-Mahfouz, A.M.: Topology discovery protocol for software defined wireless sensor network: solutions and open issues. In: IEEE International Symposium on Industrial Electronics, vol. 2018, pp. 1282–1287 (2018)

    Google Scholar 

  24. Kobo, H.I., Hancke, G.P., Abu-Mahfouz, A.M.: Towards a distributed control system for software defined wireless sensor networks. In: IECON 2017 – 43rd Annual Conference IEEE Industrial Electronic Society, vol. 2, pp. 6125–6130 (2017)

    Google Scholar 

  25. Belkhiri, H., et al.: Security in the internet of things : recent challenges and solutions. In: Fourth International Conference on Electrical Engineering And Control Applications ICEECA. Constantine (2019)

    Google Scholar 

  26. Gavric, Z., Simic, D.: Overview of DOS attacks on wireless sensor networks and experimental results for simulation of interference attacks Visión general de los ataques de DOS en redes de sensores de ataques de interfrencia. Ing. Invest. 38(1), 130–138 (2018)

    Article  Google Scholar 

  27. Maylyn, B.: What Is the Difference Between DoS and DDoS Attacks?, Bisend. https://www.bisend.com/blog/difference-between-dos-and-ddos-attack (2019)

  28. Yang, T., et al.: Intrusion detection system for hybrid attack using energy trust in wireless sensor networks. Procedio Comput. Sci. 131, 1188–1195 (2018)

    Article  Google Scholar 

  29. Marigowda, C.K., Thriveni, J., et al.: An efficient secure algorithms to mitigate DoS, replay andjamming attacks in wireless sensor network. Lect. Notes Eng. Comput. Sci. 22, 166–171 (2018)

    Google Scholar 

  30. Amouri, A., Alaparthy, V.T., Morgera, S.D.: A machine learning based intrusion detection system for mobile internet of things. Sensors 20(2), 461 (2020)

    Article  Google Scholar 

  31. Al-issa, A.I., et al.: Using machine learning to detect DoS attacks in wireless sensor networks. In: 2019 IEEE Jordan International Joint Conference on Electrical Engineering and Information Technology, pp. 107–112 (2019)

    Google Scholar 

  32. Chen, H., Meng, C., Shan, Z., Fu, Z., Bhargava, B.K.: A novel low-rate denial of service attack detection approach in ZigBee wireless sensor network by combining hilbert-huang transformation and trust evaluation. IEEE Access 7, 32853–32866 (2019)

    Article  Google Scholar 

  33. Afianti, F., Wirawan, Suryani, T.: Lightweight and DoS resistant multiuser authentication in wireless sensor networks for smart grid environments. IEEE Access 7, 67107–67122 (2019)

    Google Scholar 

  34. Lyu, C., Zhang, X., Liu, Z., Chi, C.H.: Selective authentication based geographic opportunistic routing in wireless sensor networks for internet of things against DoS attacks. IEEE Access 7, 31068–31082 (2019)

    Article  Google Scholar 

  35. Nayak, P.: A Review on DoS attack for WSN: defense and detection mechanisms. In: 2017 International Conference on Energy, Communication Data Analytics and Soft Computing, pp. 453–461 (2018)

    Google Scholar 

  36. Cao, Y., Han, L., Zhao, X., Pan, X.: AccFlow : defending against the low-rate TCP DoSAttack in wireless sensor networks. Comput. Sci. X(XX), 1–14 (2018)

    Google Scholar 

  37. Guerrero-Sanchez, A.E., Rivas-Araiza, E.A., Gonzalez-Cordoba, J.L., Toledano-Ayala, M., Takacs, A.: Blockchain mechanism and symmetric encryption in a wireless sensor network. Sensors (Switzerland) (2020). https://doi.org/10.3390/s2010279

  38. Miranda, C., Kaddoum, G., Bou-Harb, E., Garg, S., Kaur, K.: A collaborative security framework for software-defined wireless sensor networks. IEEE Trans. Inf. Forensics Secur. 15, 2602–2615 (2020)

    Article  Google Scholar 

  39. Nunez Segura, G.A., et al.: Denial of Service Attacks Detection in Software-Defined Wireless Sensor Networks. http://www.larc.usp.br/users/cbmargi/w/it-sdn/

  40. Huang, M., Yu, B.: Fuzzyguard: a ddos attack prevention exte-nsion in software-defined wireless sensor networks. KSII Trans. Internet Inf. Syst. 13(7), 3671–3689 (2019)

    Google Scholar 

  41. Vishnu, V.M., Manjunath, P.: SeC-SDWSN: secure cluster-based SDWSN environment for QoS guaranteed routing in three-tier architecture. Int. J. Commun. Syst. 32(14), 1–22 (2019)

    Article  Google Scholar 

  42. Rawat, D., Reddy, S.: Recent advances on software defined wireless networking. In: IEEE SoutheastCon, pp. 1–8 (2016)

    Google Scholar 

  43. Belaoued, M., Derhab, A., Mazouzi, S., Khan, F.A.: MACoMal: a multi-agent based collaborative mechanism for anti-malware assistance. IEEE Access 8, 14329–14343 (2020)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hamza Belkhiri .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Belkhiri, H., Messai, A., Beylot, AL., Haider, F. (2022). Denial of Service Attack Detection in Wireless Sensor Networks and Software Defined Wireless Sensor Networks: A Brief Review. In: Lazaar, M., Duvallet, C., Touhafi, A., Al Achhab, M. (eds) Proceedings of the 5th International Conference on Big Data and Internet of Things. BDIoT 2021. Lecture Notes in Networks and Systems, vol 489. Springer, Cham. https://doi.org/10.1007/978-3-031-07969-6_8

Download citation

Publish with us

Policies and ethics