Open Access Open Access  Restricted Access Subscription or Fee Access

A Secure Scheme for Denial-of-Service Attacks in Wireless Sensor Networks

K. Pandi Karthi Kanmani, E. Srie Vidhya Janani, Dr.P. Ganesh Kumar


A new type of denial of service attack: Distributed Jammer Network (DJN) has risen in real time in wireless networks, which is made of a large number of low-power, tiny radio jammers. In this paper, the DJN which is capable of causing a phase transition in the performance of the target network has been modeled and the impact of DJN on the connectivity of the target network is analyzed based on network parameters. The jammers are distributed inside the network so as to prohibit certain types of Denial-of-service attacks. It is demonstrated that the DJN can effectively combat against Denial-of-Service (DoS) attacks. The hybrid FHSS-DSSS scheme has been applied to the legitimate nodes in the network so as to defend against the jamming attack and the simulation results are presented


DJN, Hybrid FHSS-DSSS, Network Security.

Full Text:



Pandi Karthi Kanmani. K,” An effective scheme to overcome the effects of the distributed jammer network on the wireless sensor network”, International Conference on Computing and Control Engineering (ICCCE 2012), 12 & 13 April, 2012, ISBN 978-1-4675-2248-9 © 2012.

Network Hong Huang, Nihal Ahmed, and Pappu Karthik,”On a New Type of Denial of Service Attack in Wireless Networks: The Distributed Jammer”, IEEE Transactions On Wireless Communications, Vol. 10, NO. 7, JULY 2011.

Wood AD, Stankovic JA, Zhou G., “DEEJAM: defeating energy efficient jamming in IEEE 802.15.4-based wireless networks”, IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON), San Diego, CA., June 2007

Law Y, van Hoesel L, Doumen J, Hartel PH, Havinga PJM., “Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols”, Proceedings of SASN’2005, 76–88,2005.

Law Y, Havinga P., “How to secure a wireless sensor network”, In Proceedings of the 2005 International Conference on Intelligent Sensors, Sensor Networks and Information Processing, 89–95, December 2005.

XuW,Wood T, TrappeW, Zhang Y., “Channel surfing and spatial retreats: defenses against wireless denial of service”, InWiSe’04 Proceedings of the 2004 ACM Workshop on Wireless Security, New York, USA, 80–89, 2004.

David R. Raymond, Randy C. Marchany, Michael I. Brownfield, and Scott F. Midkiff, ” Effects of Denial-of-Sleep Attacks on Wireless Sensor Network MAC Protocols”, IEEE transactions on vehicular technology, vol. 58, no. 1, January 2009.

Issa M. Khalil,” ELMO: Energy Aware Local Monitoring in Sensor Networks”, IEEE transactions on dependable and secure computing, vol. 8, no.4, july/august 2011.

David R. Raymond and Scott F. Midkiff,” Clustered adaptive rate limiting: defeating denial-of-sleep attacks in wireless sensor networks”,IEEE, 2007.

David R. Raymond and Scott F. Midkiff,”Denial-of-Service in Wireless Sensor Networks: Attacks and Defenses”, Published by the IEEE CS, 1536-1268/08/,2008.

Aristides Mpitziopoulos, Damianos Gavalas, Charalampos Konstantopoulos, And Grammati Pantziou, “ A Survey On Jamming Attacks And Countermeasures In WSNs”, IEEE Communications Surveys & Tutorials, Vol. 11, No. 4, Fourth Quarter 2009.

Shio Kumar Singh , M P Singh and D K Singh, “ A Survey on Network Security and Attack Defense Mechanism For Wireless Sensor Networks”, IJCTT, ISSN- 2231-2803, june 2011.

Abhishek Pandey, R.C. Tripathi, “A Survey on Wireless Sensor Networks Security”, International Journal of Computer Applications Vol. 0975 – 8887, June 2010.

Ian Downard, “Simulating Sensor Networks In Ns-2”, Code 5523, Washington DC, 20375-5337, 2009.

Jaydip Sen, “A Survey on Wireless Sensor Network Security”, International Journal of Communication Networks and Information Security Vol. 1, No. 2, August 2009.


  • There are currently no refbacks.

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.