Denial-of-Service Attacks on Wireless Sensor Network and Defense Techniques


The basic characteristic of a wireless sensor network is to sense the environment and to gather different types of data. It is used in various vital sectors, such as military, health-care, traffic monitoring, and so on. This provides many helpful data about these fields, which is used in implementing new technologies for them. However, there are numerous challenges and risks, regarding the security vulnerability of a wireless sensor network. This is because the resources of a wireless sensor network are very low (for example, low power, low computational resources, low storage, etc.). These constraints make them susceptible to different kinds of security attacks, especially the denial of service attacks. In this survey, we have outlined different kinds of DoS attacks in different layers of the hybrid layering model. We have also presented different defense mechanisms to protect/mitigate these attacks at different layers. Layer by layer analysis makes it easy to distinguish among different types of attacks and their defense techniques, along with the characteristics of the layers. Analysis of the critical issues of these attacks and defenses are finally presented with possible measures. This survey work can be very beneficial for the researchers and engineers in designing WSN topology with ensured security.

This is a preview of subscription content, access via your institution.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13


  1. 1.

    Dargie, W., & Poellabauer, C. (2010). Fundamentals of wireless sensor networks: Theory and practice. Hoboken: Wiley.

    Google Scholar 

  2. 2.

    Alaba, F. A., Othman, M., Hashem, I. A. T., & Alotaibi, F. (2017). Internet of things security: A survey. Journal of Network and Computer Applications, 88, 10–28.

    Google Scholar 

  3. 3.

    Akyildiz, I. F., Su, W., Sankarasubramaniam, Y., & Cayirci, E. (2002). Wireless sensor networks: A survey. Computer Networks, 38(4), 393–422.

    Google Scholar 

  4. 4.

    Lewis, F. L., et al. (2004). Wireless sensor networks. Smart Environments: Technologies, Protocols, and Applications, 11, 46.

    Google Scholar 

  5. 5.

    Raghavendra, C. S., Sivalingam, K. M., & Znati, T. (2006). Wireless sensor networks. Berlin: Springer.

    MATH  Google Scholar 

  6. 6.

    Akyildiz, I. F., & Vuran, M. C. (2010). Wireless sensor networks (Vol. 4). Hoboken: Wiley.

    MATH  Google Scholar 

  7. 7.

    Yick, J., Mukherjee, B., & Ghosal, D. (2008). Wireless sensor network survey. Computer Networks, 52(12), 2292–2330.

    Google Scholar 

  8. 8.

    Sicari, S., Rizzardi, A., Grieco, L. A., & Coen-Porisini, A. (2015). Security, privacy and trust in internet of things: The road ahead. Computer Networks, 76, 146–164.

    Google Scholar 

  9. 9.

    Ozdemir, S., & Xiao, Y. (2009). Secure data aggregation in wireless sensor networks: A comprehensive overview. Computer Networks, 53(12), 2022–2037.

    MATH  Google Scholar 

  10. 10.

    Hasan, M. Z., Al-Rizzo, H., & Al-Turjman, F. (2017). A survey on multipath routing protocols for QOS assurances in real-time wireless multimedia sensor networks. IEEE Communications Surveys & Tutorials, 19(3), 1424–1456.

    Google Scholar 

  11. 11.

    Tanenbaum, A. S., & Wetherall, D. J. (2011). Computer networks. London: Pearson.

    Google Scholar 

  12. 12.

    Sun, B., Gui, C., Song, Y., & Chen, H. (2014). A novel network coding and multi-path routing approach for wireless sensor network. Wireless Personal Communications, 77(1), 87–99.

    Google Scholar 

  13. 13.

    Anand, C., & Gnanamurthy, R. (2016). Localized dos attack detection architecture for reliable data transmission over wireless sensor network. Wireless Personal Communications, 90(2), 847–859.

    Google Scholar 

  14. 14.

    Buschmann, C., Pfisterer, D., Fischer, S., Fekete, S. P., & Kröller, A. (2005). Spyglass: A wireless sensor network visualizer. ACM Sigbed Review, 2(1), 1–6.

    Google Scholar 

  15. 15.

    Bhushan, B., & Sahoo, G. (2018). Recent advances in attacks, technical challenges, vulnerabilities and their countermeasures in wireless sensor networks. Wireless Personal Communications, 98(2), 2037–2077.

    Google Scholar 

  16. 16.

    Kim, D., Jung, S., Hwang, D. J., & Kim, S. (2016). Mobile-based dos attack security agent in sensor networking. Wireless Personal Communications, 86(1), 91–107.

    Google Scholar 

  17. 17.

    Wood, A. D., & Stankovic, J. A. (2002). Denial of service in sensor networks. Computer, 35(10), 54–62.

    Google Scholar 

  18. 18.

    Raymond, D. R., & Midkiff, S. F. (2008). Denial-of-service in wireless sensor networks: Attacks and defenses. IEEE Pervasive Computing, 7(1), 74–81.

    Google Scholar 

  19. 19.

    Wang, Y., Attebury, G., & Ramamurthy, B. (2006). A survey of security issues in wireless sensor networks. IEEE Communications Surveys & Tutorials, 8(2), 2–23.

    Google Scholar 

  20. 20.

    Zhou, Y., Fang, Y., & Zhang, Y. (2008). Securing wireless sensor networks: A survey. IEEE Communications Surveys & Tutorials, 10(3), 6–28.

    Google Scholar 

  21. 21.

    Padmavathi, D.G., & Shanmugapriya, M., et al. (2009). A survey of attacks, security mechanisms and challenges in wireless sensor networks. arXiv preprint arXiv:0909.0576.

  22. 22.

    Kavitha, T., & Sridharan, D. (2010). Security vulnerabilities in wireless sensor networks: A survey. Journal of Information Assurance and Security, 5(1), 31–44.

    Google Scholar 

  23. 23.

    Sharma, K., & Ghose, M. (2010). Wireless sensor networks: An overview on its security threats. IJCA, Special Issue on “Mobile Ad-hoc Networks” MANETs (pp. 42–45).

  24. 24.

    Xing, K., Srinivasan, S.S.R., Jose, M., Li, J., & Cheng, X., et al. (2010). Attacks and countermeasures in sensor networks: A survey. In Network security (pp. 251–272). Boston, MA: Springer.

  25. 25.

    Singh, S. K., Singh, M., & Singh, D. (2011). A survey on network security and attack defense mechanism for wireless sensor networks. International Journal of Computer Trends and Technology, 1(2), 9–17.

    Google Scholar 

  26. 26.

    Zhao, G. (2011). Wireless sensor networks for industrial process monitoring and control: A survey. Network Protocols and Algorithms, 3(1), 46–63.

    Google Scholar 

  27. 27.

    Islam, K., Shen, W., & Wang, X. (2012). Wireless sensor network reliability and security in factory automation: A survey. IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews), 42(6), 1243–1256.

    Google Scholar 

  28. 28.

    ĐJurišić, M.P., Tafa, Z., Dimić, G., & Milutinović, V. (2012). A survey of military applications of wireless sensor networks. In Mediterranean conference on embedded computing (MECO) (pp. 196–199). IEEE, Bar, Montenegro.

  29. 29.

    Alemdar, H., & Ersoy, C. (2010). Wireless sensor networks for healthcare: A survey. Computer Networks, 54(15), 2688–2710.

    Google Scholar 

  30. 30.

    Kumar, P., & Lee, H. J. (2011). Security issues in healthcare applications using wireless medical sensor networks: A survey. Sensors, 12(1), 55–91.

    Google Scholar 

  31. 31.

    Christin, D., Mogre, P. S., & Hollick, M. (2010). Survey on wireless sensor network technologies for industrial automation: The security and quality of service perspectives. Future Internet, 2(2), 96–125.

    Google Scholar 

  32. 32.

    Kulkarni, R. V., Forster, A., & Venayagamoorthy, G. K. (2011). Computational intelligence in wireless sensor networks: A survey. IEEE Communications Surveys & Tutorials, 13(1), 68–96.

    Google Scholar 

  33. 33.

    Bi, S., & Zhang, Y. J. (2018). Computation rate maximization for wireless powered mobile-edge computing with binary computation offloading. IEEE Transactions on Wireless Communications, 17(6), 4177–4190.

    Google Scholar 

  34. 34.

    Ayyildiz, C., Erdem, H. E., Dirikgil, T., Dugenci, O., Kocak, T., Altun, F., et al. (2019). Structure health monitoring using wireless sensor networks on structural elements. Ad Hoc Networks, 82, 68–76.

    Google Scholar 

  35. 35.

    Tolani, M., Singh, R. K., et al. (2019). Lifetime improvement of wireless sensor network by information sensitive aggregation method for railway condition monitoring. Ad Hoc Networks, 87, 128–145.

    Google Scholar 

  36. 36.

    Boukerche, A., & Sun, P. (2018). Connectivity and coverage based protocols for wireless sensor networks. Ad Hoc Networks, 80, 54–69.

    Google Scholar 

  37. 37.

    Zhou, Y., Yang, B., Mu, Y., & Xia, Z. (2018). Continuous leakage-resilient access control for wireless sensor networks. Ad Hoc Networks, 80, 41–53.

    Google Scholar 

  38. 38.

    Swain, R. R., Khilar, P. M., & Bhoi, S. K. (2018). Heterogeneous fault diagnosis for wireless sensor networks. Ad Hoc Networks, 69, 15–37.

    Google Scholar 

  39. 39.

    Granjal, J., Monteiro, E., & Silva, J. S. (2015). Security in the integration of low-power wireless sensor networks with the internet: A survey. Ad Hoc Networks, 24, 264–287.

    Google Scholar 

  40. 40.

    Pesko, M., Smolnikar, M., Vučnik, M., Javornik, T., Pejanović-Djurišić, M., & Mohorčič, M. (2014). Smartphone with augmented gateway functionality as opportunistic wsn gateway device. Wireless Personal Communications, 78(3), 1811–1826.

    Google Scholar 

  41. 41.

    Singh, V. K., Singh, V. K., & Kumar, M. (2017). In-network data processing based on compressed sensing in WSN: A survey. Wireless Personal Communications, 96(2), 2087–2124.

    Google Scholar 

  42. 42.

    Akyildiz, I. F., Su, W., Sankarasubramaniam, Y., & Cayirci, E. (2002). A survey on sensor networks. IEEE Communications Magazine, 40(8), 102–114.

    Google Scholar 

  43. 43.

    Sohrabi, K., Gao, J., Ailawadhi, V., & Pottie, G. J. (2000). Protocols for self-organization of a wireless sensor network. IEEE Personal Communications, 7(5), 16–27.

    Google Scholar 

  44. 44.

    Xu, W., Ma, K., Trappe, W., & Zhang, Y. (2006). Jamming sensor networks: Attack and defense strategies. IEEE Network, 20(3), 41–47.

    Google Scholar 

  45. 45.

    Xu, W., Trappe, W., Zhang, Y., & Wood, T. (2005). The feasibility of launching and detecting jamming attacks in wireless networks. In Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing (pp. 46–57). ACM, Urbana-Champaign, IL, USA.

  46. 46.

    Hamamreh, J. M., Furqan, H. M., & Arslan, H. (2018). Classifications and applications of physical layer security techniques for confidentiality: A comprehensive survey. IEEE Communications Surveys & Tutorials, 21(2), 1773–1828.

    Google Scholar 

  47. 47.

    Raymond, D. R., Marchany, R. C., Brownfield, M. I., & Midkiff, S. F. (2009). Effects of denial-of-sleep attacks on wireless sensor network MAC protocols. IEEE Transactions on Vehicular Technology, 58(1), 367–380.

    Google Scholar 

  48. 48.

    Ye, W., Heidemann, J., & Estrin, D. (2004). Medium access control with coordinated adaptive sleeping for wireless sensor networks. IEEE/ACM Transactions on Networking (ToN), 12(3), 493–506.

    Google Scholar 

  49. 49.

    Song, W. M., Liu, Y. M., & Zhang, S. E. (2008). Research on SMAC protocol for WSN. In International conference on wireless communications, networking and mobile computing (pp. 1–4). IEEE, Dalian, China.

  50. 50.

    Polastre, J., Hill, J., & Culler, D. (2004). Versatile low power media access for wireless sensor networks. In Proceedings of the 2nd international conference on Embedded networked sensor systems (pp. 95–107). ACM, Baltimore, MD, USA.

  51. 51.

    Raza, U., Kulkarni, P., & Sooriyabandara, M. (2017). Low power wide area networks: An overview. IEEE Communications Surveys & Tutorials, 19(2), 855–873.

    Google Scholar 

  52. 52.

    Van Dam, T., Langendoen, K. (2003). An adaptive energy-efficient mac protocol for wireless sensor networks. In Proceedings of the 1st international conference on embedded networked sensor systems (pp. 171–180). ACM, Los Angeles, California, USA.

  53. 53.

    Srinivas, V. B., & Umar, S. (2013). Spoofing attacks in wireless sensor networks. International Journal of Science, Engineering and Computer Technology, 3(6), 201.

    Google Scholar 

  54. 54.

    Karlof, C., & Wagner, D. (2003). Secure routing in wireless sensor networks: Attacks and countermeasures. Ad Hoc Networks, 1(2), 293–315.

    Google Scholar 

  55. 55.

    Mao, Y., You, C., Zhang, J., Huang, K., & Letaief, K. B. (2017). A survey on mobile edge computing: The communication perspective. IEEE Communications Surveys & Tutorials, 19(4), 2322–2358.

    Google Scholar 

  56. 56.

    Singh, V. P., Jain, S., & Singhai, J. (2010). Hello flood attack and its countermeasures in wireless sensor networks. IJCSI International Journal of Computer Science Issues, 7(11), 23–27.

    Google Scholar 

  57. 57.

    Deng, J., Han, R., & Mishra, S. (2005). Defending against path-based dos attacks in wireless sensor networks. In Proceedings of the 3rd ACM workshop on security of ad hoc and sensor networks (pp. 89–96). ACM, Alexandria, VA, USA.

  58. 58.

    Woo, A., Tong, T., & Culler, D. (2003). Taming the underlying challenges of reliable multihop routing in sensor networks. In Proceedings of the 1st international conference on embedded networked sensor systems (pp. 14–27). ACM, Los Angeles, California, USA.

  59. 59.

    Anderson, R., & Kuhn, M. (1996). Tamper resistance-a cautionary note. In Proceedings of the second Usenix workshop on electronic commerce (vol. 2, pp. 1–11). Oakland, California.

  60. 60.

    Zou, Y., Zhu, J., Wang, X., & Hanzo, L. (2016). A survey on wireless security: Technical challenges, recent advances, and future trends. Proceedings of the IEEE, 104(9), 1727–1765.

    Google Scholar 

  61. 61.

    Bhattasali, T., Chaki, R., Sanyal, S.: Sleep deprivation attack detection in wireless sensor network. CoRR abs/1203.0231 (2012),

  62. 62.

    Yu, Y., Govindan, R., Estrin, D.: Geographical and energy aware routing: A recursive data dissemination protocol for wireless sensor networks (2001).

  63. 63.

    Al-Fuqaha, A., Guizani, M., Mohammadi, M., Aledhari, M., & Ayyash, M. (2015). Internet of things: A survey on enabling technologies, protocols, and applications. IEEE Communications Surveys & Tutorials, 17(4), 2347–2376.

    Google Scholar 

  64. 64.

    Sun, K., Peng, P., Ning, P., & Wang, C. (2006). Secure distributed cluster formation in wireless sensor networks. In 22nd annual computer security applications conference (pp. 131–140). IEEE, Miami Beach, FL, USA.

  65. 65.

    Tyagi, S., & Kumar, N. (2013). A systematic review on clustering and routing techniques based upon leach protocol for wireless sensor networks. Journal of Network and Computer Applications, 36(2), 623–645.

    Google Scholar 

  66. 66.

    Mohi, M., Movaghar, A., & Zadeh, P. M. (2009). A bayesian game approach for preventing dos attacks in wireless sensor networks. In International conference on communications and mobile computing (vol. 3, pp. 507–511). IEEE, Yunnan, China.

  67. 67.

    Chakeres, I. D., Belding-Royer, E. M. (2004). Aodv routing protocol implementation design. In International conference on distributed computing systems workshops (pp. 698–703). IEEE, Hachioji, Tokyo, Japan.

  68. 68.

    Patil, S., & Chaudhari, S. (2016). Dos attack prevention technique in wireless sensor networks. Procedia Computer Science, 79, 715–721.

    Google Scholar 

  69. 69.

    Li, X. M., Zhou, Q., Li, P., Li, H., & Lu, R. (2019). Event-triggered consensus control for multi-agent systems against false data-injection attacks. IEEE Transactions on Cybernetics, 50(5), 1856–1866.

    Google Scholar 

  70. 70.

    Aura, T., Nikander, P., Leiwo, J. (2000). Dos-resistant authentication with client puzzles. In International workshop on security protocols (pp. 170–177). Springer, Berlin.

  71. 71.

    Zhang, Y. Y., Li, X. Z., & Liu, Y. A. (2012). The detection and defence of DoS attack for wireless sensor network. The Journal of China Universities of Posts and Telecommunications, 19, 52–56.

    Google Scholar 

Download references

Author information



Corresponding author

Correspondence to Md. Shohrab Hossain.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and Permissions

About this article

Verify currency and authenticity via CrossMark

Cite this article

Islam, M.N.U., Fahmin, A., Hossain, M.S. et al. Denial-of-Service Attacks on Wireless Sensor Network and Defense Techniques. Wireless Pers Commun 116, 1993–2021 (2021).

Download citation


  • Denial-of-service
  • Wireless sensor network
  • Attacks
  • Defense
  • Analysis