Skip to Main content Skip to Navigation
Journal articles

Understanding the Performance of Software Defined Wireless Sensor Networks Under Denial of Service Attack

Abstract : Wireless sensor networks (WSN) are formed from restricted devices and are known to be vulnerable to denial of service (DoS) security attacks. In parallel, software-defined networking has been identified as a solution for many WSN challenges with respect to flexibility and reuse. Conversely, the SDN control plane centralization may bring about new security threats and vulnerabilities. In this work, we perform a traffic analysis of software-defined WSN (SDWSN) in order to gain understanding of the network's performance when it is under certain types of DoS attacks. In particular, we consider three different DoS scenarios of increasing aggressiveness: (i) false flow requests DoS, (ii) false data flow forwarding DoS, and, (iii) false neighbor information passing DoS. Our simulation results for the latter two types of attack showed significant changes both in the average value and the variance of the delivery rate and the overall overhead. These results demonstrate that it is possible to identify when a SDWSN is under a particular type of DoS, by monitoring the respective quantities.
Complete list of metadatas

Cited literature [25 references]  Display  Hide  Download

https://hal.archives-ouvertes.fr/hal-02882103
Contributor : Arsenia Chorti <>
Submitted on : Friday, June 26, 2020 - 1:24:29 PM
Last modification on : Friday, July 3, 2020 - 3:41:27 AM

File

VLIoT_2019.pdf
Files produced by the author(s)

Identifiers

  • HAL Id : hal-02882103, version 1

Collections

Citation

Gustavo Nunez, Cintia Borges, Arsenia Chorti. Understanding the Performance of Software Defined Wireless Sensor Networks Under Denial of Service Attack. Open Journal of Internet of Things, RonPub UG, 2019, 5 (1). ⟨hal-02882103⟩

Share

Metrics

Record views

19

Files downloads

18