dc.contributor.author |
Osanaiye, Opeyemi
|
|
dc.contributor.author |
Alfa, Attahiru Sule
|
|
dc.contributor.author |
Hancke, Gerhard P.
|
|
dc.date.accessioned |
2018-02-09T12:33:25Z |
|
dc.date.available |
2018-02-09T12:33:25Z |
|
dc.date.issued |
2018-01 |
|
dc.description.abstract |
Wireless sensor networks (WSN) over the years have become one of the most promising networking solutions with exciting new applications for the near future. Its deployment has been enhanced by its small, inexpensive and smart sensor nodes, which are easily deployed, depending on its application and coverage area. Common applications include its use for military operations, monitoring environmental conditions (such as volcano detection, agriculture and management), distributed control systems, healthcare and detection of radioactive sources. Notwithstanding its promising attributes, security in WSN is a big challenge and remains an ongoing research trend. Deployed sensor nodes are vulnerable to various security attacks due to its architecture, hostile deployment location and insecure routing protocol. Furthermore, the sensor nodes in WSNs are characterised by their resource constraints, such as, limited energy, low bandwidth, short communication range, limited processing and storage capacity which have made the sensor nodes an easy target. Therefore, in this work, we present a review of DoS attacks that affect resource availability in WSN and their countermeasure by presenting a taxonomy. Future research directions and open research issues are also discussed. |
en_ZA |
dc.description.department |
Electrical, Electronic and Computer Engineering |
en_ZA |
dc.description.librarian |
am2018 |
en_ZA |
dc.description.sponsorship |
This research is funded by the Advanced Sensor Networks SARChI Chair program, co-hosted by University of Pretoria (UP) and Council for Scientific and Industrial Research (CSIR), through the National Research Foundation (NRF) of South Africa. |
en_ZA |
dc.description.uri |
http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6287639 |
en_ZA |
dc.identifier.citation |
Osanaiye, O., Alfa, A.S. & Hancke, G.P. 2018, 'Denial of service (DoS) defence for resource availability in wireless sensor networks', IEEE Access, vol. 6, pp. 6975 - 7004. |
en_ZA |
dc.identifier.issn |
2169-3536 (online) |
|
dc.identifier.other |
10.1109/ACCESS.2018.2793841 |
|
dc.identifier.uri |
http://hdl.handle.net/2263/63915 |
|
dc.language.iso |
en |
en_ZA |
dc.publisher |
Institute of Electrical and Electronics Engineers |
en_ZA |
dc.rights |
© 2017 IEEE. This is an Open access paper. |
en_ZA |
dc.subject |
Denial of Service (DoS) |
en_ZA |
dc.subject |
Detection techniques |
en_ZA |
dc.subject |
Intrusion detection system (IDS) |
en_ZA |
dc.subject |
Resource availability |
en_ZA |
dc.subject |
Resource depletion |
en_ZA |
dc.subject |
Wireless sensor network (WSN) |
en_ZA |
dc.subject |
Security |
en_ZA |
dc.subject |
Network topology |
en_ZA |
dc.subject |
Topology |
en_ZA |
dc.subject |
Sensor nodes |
en_ZA |
dc.subject |
Routing protocols |
en_ZA |
dc.subject |
Network security |
en_ZA |
dc.subject |
Network protocols |
en_ZA |
dc.subject |
Network architecture |
en_ZA |
dc.subject |
Base stations |
en_ZA |
dc.subject |
Monitoring |
en_ZA |
dc.subject |
Military operations |
en_ZA |
dc.subject |
Military applications |
en_ZA |
dc.subject |
Internet protocols |
en_ZA |
dc.subject |
Distributed parameter control systems |
en_ZA |
dc.subject |
Computer crime |
en_ZA |
dc.subject |
Closed loop control systems |
en_ZA |
dc.title |
Denial of service (DoS) defence for resource availability in wireless sensor networks |
en_ZA |
dc.type |
Article |
en_ZA |