Flooding attack in energy harvesting wireless sensor networks

Vladimir Shakhov, Sangyep Nam, Hyunseung Choo

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

7 Scopus citations

Abstract

One of the most critical damaging effects on most wireless sensor networks is a flooding attack. Flooding threat occurs not only from spoofed packets generators launched by intruders but also from the inherent behavior of the network protocols. Flooding harm can be categorized into two types as follows. First, a sensor cannot provide required services when it receives a lot of packets. An essential part of packets are rejected and packets delay becomes inadmissible. And second, if a sensor transmits many packets then the sensor battery is quickly exhausted. Energy harvesting technologies offers the potential of reducing the second vulnerability. This paper explores the operation of wireless sensor networks with energy harvesting capability taking into account both flooding negative effects above. We consider the feasibility and threats of the attacks and their impacts. We then propose a theoretical analysis of the flooding attacks. The corresponding mathematical model is offered. Counteracting methods against such intrusions is discussed.

Original languageEnglish
Title of host publicationProceedings of the 7th International Conference on Ubiquitous Information Management and Communication, ICUIMC 2013
DOIs
StatePublished - 2013
Event7th International Conference on Ubiquitous Information Management and Communication, ICUIMC 2013 - Kota Kinabalu, Malaysia
Duration: 17 Jan 201319 Jan 2013

Publication series

NameProceedings of the 7th International Conference on Ubiquitous Information Management and Communication, ICUIMC 2013

Conference

Conference7th International Conference on Ubiquitous Information Management and Communication, ICUIMC 2013
Country/TerritoryMalaysia
CityKota Kinabalu
Period17/01/1319/01/13

Keywords

  • Energy consumption
  • Energy harvesting
  • Flooding attack
  • Wireless sensor network

Fingerprint

Dive into the research topics of 'Flooding attack in energy harvesting wireless sensor networks'. Together they form a unique fingerprint.

Cite this