Prevention of DoS attacks based on light weight dynamic key mechanism in hierarchical wireless sensor networks

Xi Luo, Yi Ying Zhang, Wen Cheng Yang, Myong Soon Park

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

Abstract

Denial of service (DoS) attack is an impelling inside attack in the form of interference or collision at the receiver side, which can causes serious damage to the functions of wireless sensor networks (WSNs). In this paper, we propose a solution using one-way hash function to generate dynamic keys ensuring that even if the adversaries may acquire the current or earlier keys, they have no ability to decrypt the next legitimate key. Therefore, adversaries can been prevent from injecting bogus packets or relayed packets in-cluster therefore defending against DoS attacks. Our proposed solution is lightweight, tolerates bursts of packet losses, and can easily be implemented in modern WSNs. Through security analyze and simulation, we can see that our proposed scheme can efficiently detect and defend against DoS attacks.

Original languageEnglish
Title of host publicationProceedings of the 2008 2nd International Conference on Future Generation Communication and Networking, FGCN 2008
Pages309-312
Number of pages4
DOIs
Publication statusPublished - 2008
Event2008 2nd International Conference on Future Generation Communication and Networking, FGCN 2008 - Hainan Island, China
Duration: 2008 Dec 132008 Dec 15

Publication series

NameProceedings of the 2008 2nd International Conference on Future Generation Communication and Networking, FGCN 2008
Volume1

Other

Other2008 2nd International Conference on Future Generation Communication and Networking, FGCN 2008
Country/TerritoryChina
CityHainan Island
Period08/12/1308/12/15

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'Prevention of DoS attacks based on light weight dynamic key mechanism in hierarchical wireless sensor networks'. Together they form a unique fingerprint.

Cite this