Denial of Service Attacks in Wireless Sensor Networks with Proposed Countermeasures

  • Ademola Philip Abidoye
  • Elisha Oketch Ochola
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 738)


A wireless sensor network (WSN) is a network consisting of small nodes with constrained capabilities to sense, collect, and transmit sensed data in many application areas such as the healthcare system, the automotive industry, sports, and open space surveillance. WSNs communicate through wireless mediums and are accessible to anyone, which makes sensor nodes vulnerable to various forms of attack. Considering the energy-constrained nature of sensor nodes, denial of service (DoS) attacks on these nodes are popular. This paper examines DoS attacks and proposes countermeasures based on use of the clustering technique. The method is compared with other related protocols, and the results show that our method is able to effectively detect and defend against DoS attacks in WSNs.


Sensor networks Security Denial of service Malicious node Clustering Integrity  



Philip Abidoye acknowledges the support by University of South Africa, South Africa.


  1. 1.
    T. Amgoth, P.K. Jana, Energy-aware routing algorithm for wireless sensor networks. Comput. Electr. Eng. 41, 357–367 (2015)CrossRefGoogle Scholar
  2. 2.
    S.S. Iyengar, R.R. Brooks, Distributed Sensor Networks: Sensor Networking and Applications, 2nd edn. (CRC Press Taylor & Francis Group, Boca Raton, FL, 2016)zbMATHGoogle Scholar
  3. 3.
    S. Ghildiyal, A.K. Mishra, A. Gupta, N. Garg, Analysis of Denial of Service (DOS) attacks in wireless sensor networks. IJRET. 3, 2319–1163 (2014)Google Scholar
  4. 4.
    M.-L. Messai, Classification of attacks in wireless sensor networks, in Proceedings of Telecommunication and Application, (Bejaia, Algeria, 2014) Google Scholar
  5. 5.
    G. Han, W. Shen, T.Q. Duong, M. Guizani, T. Hara, A proposed security scheme against DoS attacks in cluster-based wireless sensor networks. Secur. Commun. Netw. 7, 2542–2554 (2014)CrossRefGoogle Scholar
  6. 6.
    D. Chen, Z. Zhang, F.-H. Tseng, H.-C. Chao, L.-D. Chou, A novel method defends against the path-based DOS for wireless sensor network. Int. J. Distrib. Sens. Netw. 2014, 205–216 (2014)Google Scholar
  7. 7.
    G. Kannan, T.S.R. Raja, Energy efficient distributed cluster head scheduling scheme for two tiered wireless sensor network. Egypt. Inf. J. 16, 167–174 (2015)CrossRefGoogle Scholar
  8. 8.
    A.P. Abidoye, N.A. Azeez, A.O. Adesina, K.K. Agbele, ANCAEE: a novel clustering algorithm for energy efficiency in wireless sensor networks. J. Wirel. Sens. Netw. 3, 307–312 (2011)CrossRefGoogle Scholar
  9. 9.
    C. Karlof, N. Sastry, D. Wagner, TinySec: a link layer security architecture for wireless sensor networks, in Proceedings of the 2nd Int’l Conf. on Embedded Networked Sensor Systems, 2004, pp. 162–175Google Scholar
  10. 10.
    W.R. Heinzelman, J. Kulik, H. Balakrishnan, Adaptive protocols for information dissemination in wireless sensor networks, in Proceedings of ACM MobiCom’99 (Seattle, Washington USA, 1999), pp. 174–185Google Scholar

Copyright information

© Springer International Publishing AG, part of Springer Nature 2018

Authors and Affiliations

  • Ademola Philip Abidoye
    • 1
  • Elisha Oketch Ochola
    • 1
  1. 1.School of Computing, University of South AfricaJohannesburgSouth Africa

Personalised recommendations