Special Issue Paper
Modeling tools for detecting DoS attacks in WSNs
Article first published online: 14 FEB 2013
Copyright © 2013 John Wiley & Sons, Ltd.
Security and Communication Networks
Volume 6, Issue 4, pages 420–436, April 2013
How to Cite
Ballarini, P., Mokdad, L. and Monnet, Q. (2013), Modeling tools for detecting DoS attacks in WSNs. Security Comm. Networks, 6: 420–436. doi: 10.1002/sec.630
- Issue published online: 26 MAR 2013
- Article first published online: 14 FEB 2013
- 1Energy conservation in wireless sensor networks: a survey. Ad Hoc Networks 2009; 7:537–668., , , .
- 3A novel node level security policy framework for wireless sensor networks. Journal of Network and Computer Applications 2011; 34:418–428., .
- 4Comparison of authenticated-encryption schemes in wireless sensor networks, 36th Annual IEEE Conference on Local Computer Networks, Bonn, Germany, 2011., , , , , .
- 5Security considerations in ad hoc sensor networks. Ad Hoc Networks 2005; 3:69–89., .
- 6A cluster-based energy balancing scheme in heterogeneous wireless sensor networks. Proceedings of International Conference on Networking, April 2005; 467–474., , .
- 7Energy-efficient communication protocol for wireless microsensor networks. Proceedings of the IEEE Hawaii International Conference on System Sciences, 2000., , .
- 8Secure data aggregation in wireless sensor networks: a comprehensive overview. Computer Networks 2009; 53:2022–2037., .
- 9HEED: a hybrid, energy-efficient distributed clustering approach for ad hoc sensor networks. IEEE Transactions on Mobile Computing 2004; 3(4):366–379., .
- 10Fast and flexible unsupervised clustering algorithm based on ultrametric properties. Proceedings of the 7th ACM Symposium on QoS and Security for Wireless and Mobile Networks, Miami, USA, 2011., .
- 11Efficient temporal compression in wireless sensor networks, 36th Annual IEEE Conference on Local Computer Networks, Bonn, Germany, 2011..
- 12Detecting denial of service attacks in sensor networks. Proceedings of the Fourth IASTED International Conference on Communication, Network and Information Security (CNIS'07); 109–115., .
- 13Dynamic solution for detecting denial of service attacks in wireless sensor networks. ICC June 2012., , .
- 15Energy efficient and QoS based routing protocol for wireless sensor networks. Journal of Parallel and Distributed Computing 2010; 70(8):849–857., .
- 16A Bayesian game approach for preventing DoS attacks in wireless sensor networks. International Conference on Communications and Mobile Computing, 2009., , .
- 17Distributed Detection of Node Capture Attacks in Wireless Networks. In Smart Wireless Sensor Networks, Chinh HD, Tan YK (eds). 2010. Available from: http://www.intechopen.com/books/smart-wireless-sensor-networks/distributed-detection-of-node-capture-attacks-in-wireless-sensor-networks.
- 18An adaptive learning routing protocol for the prevention of distributed denial of service attacks in wireless mesh networks. Computers and Mathematics with Applications 2010; 60:294–306., , , , .
- 19SPINS: security protocols for sensor networks. Mobile Computing and Networking: Rome, Italy, 2001., , , , .
- 20SecLEACH – on the security of clustered sensor networks. Signal Processing 2007; 87:2882–2895., , , et al.
- 21Optimal sensor placement for detection against distributed denial of service attacks. Pakistan Journal of Engineering and Applied Sciences 2009; 4:80–92., , .
- 22Denial of service attack-resistant flooding authentication in wireless sensor networks. Computer Communications 2010; 33:1531–1542., , .
- 23Adaptive security design with malicious node detection in cluster-based sensor networks. Computer Communications 2007; 30:2385–2400., , .
- 24Low energy adaptive clustering hierarchy with deterministic cluster-head selection. Proceedings of the 4th IEEE Conference on Mobile and Wireless Communications Networks, Stockholm, Sweden, 2002., , .
- 25HASL: an expressive language for statistical verification of stochastic models. Proceedings of the 5th International Conference on Performance Evaluation Methodologies and Tools (ValueTOOLS11), Cachan, France, 2011., , , , .
- 26The Network Simulator NS-2. http://www.isi.edu/nsnam/ns/
- 27Modelling with Generalized Stochastic Petri Nets. John Wiley & Sons, 1995. http://www.di.unito.it/~greatspn/GSPN-Wiley/, , , , .
- 28Self-stabilizing algorithm for efficient topology control in Wireless Sensor Networks. Elsevier, Journal of Computational Science (JOCS) In press., , , .
- 29Distributed backtracking algorithm based on tree decomposition over wireless sensor networks. Concurrency and Computation: Practice and Experience, September 2011. DOI: 10.1002/cpe.1804., .
- 30IBC-HWMP: a novel secure identity-based cryptography-based scheme for Hybrid Wireless Mesh Protocol for IEEE 802.11s. In Concurrency and Computation: Practice and Experience. Wiley, In press., .
- 31Anomaly detection with wireless sensor networks. The 9th IEEE International Symposium on Network Computing and Applications (NCA 2010), IEEE CS Press, Cambridge, MA, USA, July 2010., , , .
- 32A low energy consumption MAC protocol for WSN. IEEE ICC 2012, Ottawa, Canada, June 2012., .
- 33Stochastic model checking, In Formal Methods for the Design of Computer, Communication and Software Systems: Performance Evaluation (SFM'07), LNCS (Tutorial Volume): Bertinoro, Italy, Vol. 4486, 2007., , .
- 34Model Checking. MIT Press, 1999. http://mitpress.mit.edu/catalog/item/default.asp?ttype=2&tid=3730, , .