Advertisement

Security Assessment Model to Analysis DOS Attacks in WSN

  • Abdulaziz AborujilahEmail author
  • Rasheed Mohammad Nassr
  • Tawfik Al-Hadhrami
  • Mohd Nizam Husen
  • Nor Azlina Ali
  • AbdulAleem Al-Othmani
  • Nur Syahela
  • Hideya Ochiai
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 1073)

Abstract

Internet of Things (IoT) technology is getting more importance as many organizations from different sectors are moving toward adopting this technology. It introduces an efficient ways of collecting, processing and distributing data. Wireless sensor networks (WSNs) play a vital role in the expanding growth of internet of things (IoT). However, DoS (denial-of-service) attacks are a major threat of WSNs. In this study, graph theory based model has been proposed to analyse the security of WSN under DoS attacks. The proposed model describes and assesses the security of WSN when it encounter DoS attacks by finding the attacks success probability, attack cost, attack impact, mean-time-to-compromise, attack risk and return-on-attack values. The impact of mitigation methods toward strengthening the WSN security has been described. smart home scenario WSN has been tacking as an example. The results showed that the capability of the proposed model to analysis the effects of DoS attacks in WSN. Also it showed the impact of mitigation methods in improving WSN security.

Keywords

IoT security assessment WSN DoS attacks 

References

  1. 1.
    Hoque, N., Bhattacharyya, D.K., Kalita, J.K.: Botnet in DDoS attacks: trends and challenges. IEEE Commun. Surv. Tutorials 17(4), 2242–2270 (2015)CrossRefGoogle Scholar
  2. 2.
    Ge, M., Hong, J.B., Guttmann, W., Kim, D.S.: A framework for automating security analysis of the internet of things. J. Netw. Comput. Appl. 83, 12–27 (2017)CrossRefGoogle Scholar
  3. 3.
    Lazarescu, M.T.: Design of a WSN platform for long-term environmental monitoring for IoT applications. IEEE J. Emerg. Sel. Top. Circ. Syst. 3(1), 45–54 (2013)CrossRefGoogle Scholar
  4. 4.
    Kinney, P.: Zigbee technology: wireless control that simply works. Commun. Des. Conf. 2, 1–7 (2003)Google Scholar
  5. 5.
    Durkota, K., Lisý, V., Bošanský, B., Kiekintveld, C.: Optimal network security hardening using attack graph games. In: Twenty-Fourth International Joint Conference on Artificial Intelligence (2015)Google Scholar
  6. 6.
    Ruijters, E., Stoelinga, M.: Fault tree analysis: a survey of the state-of-the-art in modeling, analysis and tools. Comput. Sci. Rev. 15, 29–62 (2015)MathSciNetCrossRefGoogle Scholar
  7. 7.
    Cayirci, E.: Wireless sensor networks. In: Wireless Information Highways, IGI Global, pp. 273–301 (2005)Google Scholar
  8. 8.
    Brodsy, J., McConnell, A.: Jamming and interference induced denial-of-service attacks on IEEE 802.15. 4-based wireless networks. In: Proceedings of the SCADA Security Scientific Symposium, pp. 1–2 (2009)Google Scholar
  9. 9.
    Brodsky, J., McConnell, A.: Jamming and interference induced denial-of-service attacks. In: IEEE 802.15. 4-Based Wireless Networks, Proc. SCADA Security Scientific Symp. 2009 (S4), pp. 1–2 (2009)Google Scholar
  10. 10.
    Mpitziopoulos, A., Gavalas, D., Konstantopoulos, C., Pantziou, G.: A survey on jamming attacks and countermeasures in WSNs. IEEE Commun. Surv. Tutorials 11(4), 42–56 (2009)CrossRefGoogle Scholar
  11. 11.
    Radmand, P., et al.: ZigBee/ZigBee PRO security assessment based on compromised cryptographic keys. In: 2010 International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, pp. 465–470 (2010)Google Scholar
  12. 12.
    Cao, X., Shila, D.M., Cheng, Y., Yang, Z., Zhou, Y., Chen, J.: Ghost-in-zigbee: Energy depletion attack on zigbee-based wireless networks. IEEE Internet Things J. 3(5), 816–829 (2016)CrossRefGoogle Scholar
  13. 13.
    Sisodia, D., Mergendahl, S., Li, J., Cam, H.: Securing the smart home via a two-mode security framework. In: International Conference on Security and Privacy in Communication Systems, pp. 22–42 (2018)Google Scholar
  14. 14.
    Sahner, R.A., Trivedi, K., Puliafito, A.: Performance and Reliability Analysis of Computer Systems: An Example-Based Approach Using the SHARPE Software Package. Springer, Cham (2012)zbMATHGoogle Scholar
  15. 15.
    Egli, P., Netmodule, A.G.: Susceptibility of Wireless Devices to Denial of Service Attacks. Technical White Paper. Netmodule AG, Bern (2006)Google Scholar
  16. 16.
    Scott-Hayward, S., Callaghan, G.O., Sezer, S.: SDN security: a survey. In: 2013 IEEE SDN For Future Networks and Services (SDN4FNS), pp. 1–7 (2013)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  • Abdulaziz Aborujilah
    • 1
    Email author
  • Rasheed Mohammad Nassr
    • 1
  • Tawfik Al-Hadhrami
    • 2
  • Mohd Nizam Husen
    • 1
  • Nor Azlina Ali
    • 1
  • AbdulAleem Al-Othmani
    • 1
  • Nur Syahela
    • 1
  • Hideya Ochiai
    • 3
  1. 1.University Kuala LumpurKuala LumpurMalaysia
  2. 2.Nottingham Trent UniversityNottinghamUK
  3. 3.Graduate School of Information Science and TechnologyUniversity of TokyoTokyoJapan

Personalised recommendations