• Corpus ID: 37329542

Secure Code Marking in Internet Protocol Header to Mitigate Distributed Denial of Service Attacks in Wireless Sensor Network

@inproceedings{Mahajan2014SecureCM,
  title={Secure Code Marking in Internet Protocol Header to Mitigate Distributed Denial of Service Attacks in Wireless Sensor Network},
  author={Sunita Mahajan and Khushneet Kaur},
  year={2014}
}
Wireless sensors are manufactured with small energy efficient microcontrollers to enhance their battery life. The small microcontrollers are equipped with smaller memory for embedded Operating System and smaller random access memory, which hinders them from installing effective and heavy security solutions. Taking this problem into account, we have proposed a new security model for wireless sensors, which equips less memory and does not affect their battery life. The proposed model is using… 

Figures and Tables from this paper

References

SHOWING 1-10 OF 15 REFERENCES

A survey of security issues in wireless sensor networks

This article outlines the constraints, security requirements, and attacks with their corresponding countermeasures in WSNs, and presents a holistic view of security issues, classified into five categories: cryptography, key management, secure routing, secure data aggregation, and intrusion detection.

Common Security Issues and Challenges in Wireless Sensor Networks and IEEE 802-11 Wireless Mesh Networks

  • T. NaeemJ. Loo
  • Computer Science
    J. Digit. Content Technol. its Appl.
  • 2009
The common limitations and vulnerable features of WMN and WSN are discussed, along with the associated security threats and possible countermeasures, and security mechanisms are proposed keeping in view the architecture and limitations of both.

SAD-SJ: A self-adaptive decentralized solution against Selective Jamming attack in Wireless Sensor Networks

SAD-SJ is presented, a self-adaptive and decentralized MAC-layer solution against selective jamming in TDMA-based WSNs that does not need a central entity, requires sensor nodes to rely only on local information, and allows them to join and leave the network without hindering other nodes activity.

Performance evaluation of a secure MAC protocol for vehicular networks

It is shown that the MAC protocol can achieve both QoS and security requirements for vehicular network safety applications, and is given an overview on a priority based secure MAC protocol for Vehicular networks and detailed security and performance analysis.

CBSRP: Cluster Based Secure Routing Protocol

  • M. MorshedM. R. Islam
  • Computer Science
    2013 3rd IEEE International Advance Computing Conference (IACC)
  • 2013
CBSRP ensures secure communication which will be energy efficient as it segmented the whole network into small set of clusters and proposed to use Digital Signature for Cluster-Cluster authentication.

Security for wireless sensor networks: A review

The threats and attacks faced by WSNs are reviewed and then the current state of the art of dedicated WSN security protocols are examined and compared, focusing on their relative strengths and weaknesses.

Effective security as an ill-defined problem in vehicular ad hoc networks (VANETs)

An effort is made to show that efficiency, security and traceability are the key qualities to consider while implementing an effective security mechanism, and the most suitable way to achieve this goal is by identifying the intersection point connecting their attributes.

Security in wireless sensor networks: issues and challenges

The security threats are identified, proposed security mechanisms are reviewed and the holistic view of security for ensuring layered and robust security in wireless sensor networks is discussed.

A survey on sensor networks

The current state of the art of sensor networks is captured in this article, where solutions are discussed under their related protocol stack layer sections.

Security in wireless sensor networks

They are susceptible to a variety of attacks, including node capture, physical tampering, and denial of service, while prompting a range of fundamental research challenges.