Recursive-clustering-based approach for denial of service (DoS) attacks in wireless sensors networks
SUMMARYThis paper presents a novel approach for detecting denial of service attacks. In particular, the concern is on the sleeping deprivation attacks such as the malicious nodes that use flooding technique. Our approach is based on wireless sensor network (WSN) clustering. It consists in recursivel...
Saved in:
| Published in: | International journal of communication systems Vol. 28; no. 2; pp. 309 - 324 |
|---|---|
| Main Authors: | , , , |
| Format: | Journal Article |
| Language: | English |
| Published: |
Chichester
Blackwell Publishing Ltd
25.01.2015
Wiley Subscription Services, Inc Wiley |
| Subjects: | |
| ISSN: | 1074-5351, 1099-1131 |
| Online Access: | Get full text |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Abstract | SUMMARYThis paper presents a novel approach for detecting denial of service attacks. In particular, the concern is on the sleeping deprivation attacks such as the malicious nodes that use flooding technique. Our approach is based on wireless sensor network (WSN) clustering. It consists in recursively clustering sensors until a required granularity (chosen by the expert) is achieved. We apply our approach with two different clustering algorithms. Indeed, we use the common clustering WSN algorithm Low Energy Algorithm Adaptive Clustering Hierarchy and the general clustering method Fast and Flexible Unsupervised Clustering Algorithm (FFUCA) based on ultrametric properties. We discuss the behavior of the approach with the two algorithms. Also, we present numerical results that show the efficiency of recursive clustering using the FFUCA algorithm. Copyright © 2013 John Wiley & Sons, Ltd.
This paper presents a novel approach for detecting denial of service attacks in wireless sensor networks. The concern here is on the sleeping deprivation attacks such as malicious sensors that use flooding technique. The idea consists in clustering sensors recursively until a required granularity is achieved. We use here a generic clustering algorithm named Fast and Flexible Unsupervised Clustering Algorithm based on ultrametric properties. We present numerical results that show the efficiency of our approach using the Fast and Flexible Unsupervised Clustering Algorithm. |
|---|---|
| AbstractList | This paper presents a novel approach for detecting denial of service attacks. In particular, the concern is on the sleeping deprivation attacks such as the malicious nodes that use flooding technique. Our approach is based on wireless sensor network (WSN) clustering. It consists in recursively clustering sensors until a required granularity (chosen by the expert) is achieved. We apply our approach with two different clustering algorithms. Indeed, we use the common clustering WSN algorithm Low Energy Algorithm Adaptive Clustering Hierarchy and the general clustering method Fast and Flexible Unsupervised Clustering Algorithm (FFUCA) based on ultrametric properties. We discuss the behavior of the approach with the two algorithms. Also, we present numerical results that show the efficiency of recursive clustering using the FFUCA algorithm. Copyright © 2013 John Wiley & Sons, Ltd. This paper presents a novel approach for detecting denial of service attacks. In particular, the concern is on the sleeping deprivation attacks such as the malicious nodes that use flooding technique. Our approach is based on wireless sensor network (WSN) clustering. It consists in recursively clustering sensors until a required granularity (chosen by the expert) is achieved. We apply our approach with two different clustering algorithms. Indeed, we use the common clustering WSN algorithm Low Energy Algorithm Adaptive Clustering Hierarchy and the general clustering method Fast and Flexible Unsupervised Clustering Algorithm (FFUCA) based on ultrametric properties. We discuss the behavior of the approach with the two algorithms. Also, we present numerical results that show the efficiency of recursive clustering using the FFUCA algorithm. Copyright copyright 2013 John Wiley & Sons, Ltd. This paper presents a novel approach for detecting denial of service attacks in wireless sensor networks. The concern here is on the sleeping deprivation attacks such as malicious sensors that use flooding technique. The idea consists in clustering sensors recursively until a required granularity is achieved. We use here a generic clustering algorithm named Fast and Flexible Unsupervised Clustering Algorithm based on ultrametric properties. We present numerical results that show the efficiency of our approach using the Fast and Flexible Unsupervised Clustering Algorithm. SUMMARY This paper presents a novel approach for detecting denial of service attacks. In particular, the concern is on the sleeping deprivation attacks such as the malicious nodes that use flooding technique. Our approach is based on wireless sensor network (WSN) clustering. It consists in recursively clustering sensors until a required granularity (chosen by the expert) is achieved. We apply our approach with two different clustering algorithms. Indeed, we use the common clustering WSN algorithm Low Energy Algorithm Adaptive Clustering Hierarchy and the general clustering method Fast and Flexible Unsupervised Clustering Algorithm (FFUCA) based on ultrametric properties. We discuss the behavior of the approach with the two algorithms. Also, we present numerical results that show the efficiency of recursive clustering using the FFUCA algorithm. Copyright © 2013 John Wiley & Sons, Ltd. SUMMARYThis paper presents a novel approach for detecting denial of service attacks. In particular, the concern is on the sleeping deprivation attacks such as the malicious nodes that use flooding technique. Our approach is based on wireless sensor network (WSN) clustering. It consists in recursively clustering sensors until a required granularity (chosen by the expert) is achieved. We apply our approach with two different clustering algorithms. Indeed, we use the common clustering WSN algorithm Low Energy Algorithm Adaptive Clustering Hierarchy and the general clustering method Fast and Flexible Unsupervised Clustering Algorithm (FFUCA) based on ultrametric properties. We discuss the behavior of the approach with the two algorithms. Also, we present numerical results that show the efficiency of recursive clustering using the FFUCA algorithm. Copyright © 2013 John Wiley & Sons, Ltd. This paper presents a novel approach for detecting denial of service attacks in wireless sensor networks. The concern here is on the sleeping deprivation attacks such as malicious sensors that use flooding technique. The idea consists in clustering sensors recursively until a required granularity is achieved. We use here a generic clustering algorithm named Fast and Flexible Unsupervised Clustering Algorithm based on ultrametric properties. We present numerical results that show the efficiency of our approach using the Fast and Flexible Unsupervised Clustering Algorithm. |
| Author | Fouchal, S. Iouallalen, M. Mansouri, D. Mokdad, L. |
| Author_xml | – sequence: 1 givenname: S. surname: Fouchal fullname: Fouchal, S. organization: SAF Laboratory, Paris, France – sequence: 2 givenname: D. surname: Mansouri fullname: Mansouri, D. organization: LACL Laboratory, Créteil, France – sequence: 3 givenname: L. surname: Mokdad fullname: Mokdad, L. email: Correspondence to: Lynda Mokdad, LACL Laboratory, Créteil, France., lynda.mokdad@u-pec.fr organization: LACL Laboratory, Créteil, France – sequence: 4 givenname: M. surname: Iouallalen fullname: Iouallalen, M. organization: LSI Laboratory, Algiers, Algeria |
| BackLink | https://hal.u-pec.fr/hal-04030489$$DView record in HAL |
| BookMark | eNp10V1rFDEUBuBBKthWwZ8Q8Ka9mDVfk0wu1622yqJgKxVvQjY5Y9NNkzWZ2bX_3hlWK4pe5RCek5zDe1QdxBShqp4TPCMY05fO2BkVEj-qDglWqiaEkYOplrxuWEOeVEel3GKMWyqaw8p9BDvk4rdQ2zCUHrKPX-uVKeCQ2WxyMvYGdSkjB9GbgFKHCuStt4BOztLlKTJ9b-y6IB_RzmcIUMooYkm5oAj9LuV1eVo97kwo8OzneVx9evP6anFRLz-cv13Ml7XljOC6o45QJSU34BwoQS23klvsOF8x6tSKqI6B6ZhVlDS8taKhq0ZgwTrGlMPsuDrdv3tjgt5kf2fyvU7G64v5Uk93mGOGeau2ZLQnezvu-G2A0us7XyyEYCKkoWgiGsIkbaUc6Yu_6G0achw3GRUTgnNKp89ne2VzKiVDp63vTe9T7LPxQROsp4D0GJCeAvo9wUPDr5H_Qes93fkA9_91-my--NP7MdHvD97ktRaSyUZfvz_Xr8Tnq8v2-p3-wn4A_PyutA |
| CitedBy_id | crossref_primary_10_1002_dac_2993 crossref_primary_10_1016_j_simpat_2018_02_004 crossref_primary_10_1155_2019_6578406 crossref_primary_10_1002_dac_3505 crossref_primary_10_1080_20421338_2021_1958989 crossref_primary_10_1109_ACCESS_2019_2930408 crossref_primary_10_1186_s13638_020_01835_w crossref_primary_10_1002_dac_2805 crossref_primary_10_3390_electronics10111244 crossref_primary_10_1080_03081079_2015_1106730 crossref_primary_10_1049_ntw2_12011 crossref_primary_10_1002_dac_3024 crossref_primary_10_1002_dac_3265 crossref_primary_10_1109_ACCESS_2018_2793841 |
| Cites_doi | 10.1016/j.comcom.2007.04.008 10.1002/dac.1103 10.1109/TMC.2004.41 10.1016/j.comcom.2010.03.027 10.1109/ICC.2012.6364158 10.1109/ISCC.2011.5984038 10.1145/2069105.2069112 10.1109/WCNC.2013.6554905 10.1016/j.jocs.2011.11.004 10.1016/j.jnca.2010.03.004 10.1016/j.sigpro.2007.05.016 10.3390/s101110376 10.1002/dac.1285 10.1016/j.jnca.2008.02.017 10.1002/dac.1280 10.1002/dac.1289 10.1145/381677.381696 10.1002/dac.2438 10.1145/1062689.1062697 10.1016/j.adhoc.2003.09.009 10.1007/s11277-010-0048-y 10.1002/dac.2356 10.1016/j.comnet.2009.02.023 |
| ContentType | Journal Article |
| Copyright | Copyright © 2013 John Wiley & Sons, Ltd. Copyright © 2014 John Wiley & Sons, Ltd. Distributed under a Creative Commons Attribution 4.0 International License |
| Copyright_xml | – notice: Copyright © 2013 John Wiley & Sons, Ltd. – notice: Copyright © 2014 John Wiley & Sons, Ltd. – notice: Distributed under a Creative Commons Attribution 4.0 International License |
| DBID | BSCLL AAYXX CITATION 7SP 8FD JQ2 L7M 7SC L~C L~D 1XC |
| DOI | 10.1002/dac.2670 |
| DatabaseName | Istex CrossRef Electronics & Communications Abstracts Technology Research Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional Hyper Article en Ligne (HAL) |
| DatabaseTitle | CrossRef Technology Research Database Advanced Technologies Database with Aerospace Electronics & Communications Abstracts ProQuest Computer Science Collection Computer and Information Systems Abstracts – Academic Computer and Information Systems Abstracts Computer and Information Systems Abstracts Professional |
| DatabaseTitleList | CrossRef Technology Research Database Technology Research Database |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering Computer Science |
| EISSN | 1099-1131 |
| EndPage | 324 |
| ExternalDocumentID | oai:HAL:hal-04030489v1 3528647111 10_1002_dac_2670 DAC2670 ark_67375_WNG_B6XTS8WJ_Z |
| Genre | article |
| GroupedDBID | .3N .GA 05W 0R~ 10A 1L6 1OB 1OC 33P 3SF 3WU 4.4 50Y 50Z 51W 51X 52M 52N 52O 52P 52S 52T 52U 52W 52X 5GY 5VS 66C 702 7PT 8-0 8-1 8-3 8-4 8-5 8UM 930 A03 AAESR AAEVG AAHQN AAMMB AAMNL AANHP AANLZ AAONW AASGY AAXRX AAYCA AAZKR ABCQN ABCUV ABDBF ABIJN ABPVW ACAHQ ACBWZ ACCZN ACGFS ACIWK ACPOU ACRPL ACUHS ACXBN ACXQS ACYXJ ADBBV ADEOM ADIZJ ADKYN ADMGS ADNMO ADOZA ADXAS ADZMN AEFGJ AEIGN AEIMD AENEX AEUYR AEYWJ AFBPY AFFPM AFGKR AFWVQ AGQPQ AGXDD AGYGG AHBTC AIDQK AIDYY AITYG AIURR AJXKR ALAGY ALMA_UNASSIGNED_HOLDINGS ALVPJ AMBMR AMYDB ATUGU AUFTA AZBYB AZVAB BAFTC BFHJK BHBCM BMNLL BMXJE BNHUX BROTX BRXPI BSCLL BY8 CS3 D-E D-F DCZOG DPXWK DR2 DRFUL DRSTM DU5 EBS EJD ESX F00 F01 F04 G-S G.N GNP GODZA H.T H.X HGLYW HHY HZ~ I-F IX1 J0M JPC KQQ LATKE LAW LC2 LC3 LEEKS LITHE LOXES LP6 LP7 LUTES LYRES MEWTI MK4 MK~ ML~ MRFUL MRSTM MSFUL MSSTM MXFUL MXSTM N04 N05 N9A NF~ O66 O9- OIG P2W P2X P4D Q.N Q11 QB0 QRW R.K ROL RX1 RYL SUPJJ TUS UB1 V2E W8V W99 WBKPD WIH WIK WLBEL WOHZO WQJ WXSBR WYISQ XG1 XV2 ZZTAW ~IA ~WT AAHHS ACCFJ ADZOD AEEZP AEQDE AEUQT AFPWT AIWBW AJBDE ALUQN RWI WRC WWI AAYXX CITATION O8X 7SP 8FD JQ2 L7M 7SC L~C L~D 1XC |
| ID | FETCH-LOGICAL-c4310-f2d129774aedde962c4c74c0d44b32d9b19f3eaf3c921548c652b56063f339d03 |
| IEDL.DBID | DRFUL |
| ISICitedReferencesCount | 16 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000346496800008&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 1074-5351 |
| IngestDate | Tue Oct 14 20:48:08 EDT 2025 Fri Jul 11 16:29:43 EDT 2025 Fri Jul 25 12:26:35 EDT 2025 Sat Nov 29 03:54:47 EST 2025 Tue Nov 18 22:18:19 EST 2025 Wed Jan 22 16:22:02 EST 2025 Tue Nov 11 03:33:02 EST 2025 |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 2 |
| Language | English |
| License | http://onlinelibrary.wiley.com/termsAndConditions#vor Distributed under a Creative Commons Attribution 4.0 International License: http://creativecommons.org/licenses/by/4.0 |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c4310-f2d129774aedde962c4c74c0d44b32d9b19f3eaf3c921548c652b56063f339d03 |
| Notes | ark:/67375/WNG-B6XTS8WJ-Z ArticleID:DAC2670 istex:647FDEC3350FA619D25FD2462AB0F0B75DF78903 ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 content type line 23 |
| ORCID | 0000-0002-6182-4869 |
| PQID | 1636644220 |
| PQPubID | 996367 |
| PageCount | 16 |
| ParticipantIDs | hal_primary_oai_HAL_hal_04030489v1 proquest_miscellaneous_1651372877 proquest_journals_1636644220 crossref_citationtrail_10_1002_dac_2670 crossref_primary_10_1002_dac_2670 wiley_primary_10_1002_dac_2670_DAC2670 istex_primary_ark_67375_WNG_B6XTS8WJ_Z |
| PublicationCentury | 2000 |
| PublicationDate | 25 January 2015 |
| PublicationDateYYYYMMDD | 2015-01-25 |
| PublicationDate_xml | – month: 01 year: 2015 text: 25 January 2015 day: 25 |
| PublicationDecade | 2010 |
| PublicationPlace | Chichester |
| PublicationPlace_xml | – name: Chichester |
| PublicationTitle | International journal of communication systems |
| PublicationTitleAlternate | Int. J. Commun. Syst |
| PublicationYear | 2015 |
| Publisher | Blackwell Publishing Ltd Wiley Subscription Services, Inc Wiley |
| Publisher_xml | – name: Blackwell Publishing Ltd – name: Wiley Subscription Services, Inc – name: Wiley |
| References | Fouchal F, Ahat A, BenAmor S, Lavallée I, Bui M. Competitive clustering algorithms based on ultrametric properties. Journal of Computational Science (Elsevier) June 2012; 4(4):219-231. (JOCS-D-11-00136R1, IOD: 10.1016/j.jocs.2011.11.004). Hsieh MY, Huang YM, Chao HC. Adaptive security design with malicious node detection in cluster-based sensor networks. Computer Communications 2007; 30:2385-2400. Son JG, Jung S, Kim JH, Seo DI, Kim S. Research on a denial of service (DoS) detection system based on global interdependent behaviors in a sensor network environment. Sensors ISSN 2010; 10(11):10376-10386. Popescu AM, Tudorache GI, Peng B, Kemp AH. Surveying position based routing protocols for wireless sensor and ad-hoc networks. Computer and Mathematics with Applications 2012; 4(1). Le A, Loo J, Lasebae A, Aiash M, Luo Y. 6lowpan: a study on QoS security threats and countermeasures using intrusion detection system approach. International Journal of Communication Systems September 2012; 25(9):11891212. Agah A, Das SK. Preventing DoS attacks in wireless sensor networks: a repeated game theory approach. International Journal of Network Security 2007; 5(2):145-153. Hu F, Sharma N. Security considerations in ad hoc sensor networks. Ad Hoc Networks 2005; 3:69-89. Younis O, Fahmy S. HEED: a hybrid, energy-efficient distributed clustering approach for ad hoc sensor networks. IEEE Transactions on Mobile Computing 2004; 3(4):366-379. Castellano G, Fanelli AM, Torsello MA. A neuro-fuzzy collaborative filtering approach for web recommendation. International Journal of Communication Systems 2007; 1(1):27-39. Li B, Batten L. Using mobile agents to recover from node and database compromise in path-based DoS attacks in wireless sensor networks. Journal of Network and Computer Applications 2009; 32:337-387. Khan S, Loo J. Cross layer secure and resource-aware on-demand routing protocol for hybrid wireless mesh networks. Wireless Personal Communications January 2012; 62(1):201-214. Liming X, Xiaohua J, Kunxiao Z. QoS multicast routing in cognitive radio ad hoc networks. International Journal of Communication Systems January 2012; 25(1):30-46. Hamieh A, Ben-Othman J. Detection of jamming attacks in wireless ad hoc networks using error distribution. IEEE International Conference on Communications (ICC) June 2009: 1-6. Perrig A, Szewczyk R, Wen V, Culler D, Tygar JD. SPINS: Security Protocols for Sensor Networks. Mobile Computing and Networking 2001: 189-199. Oliviera LB, Ferreira A, Vilaça MA, Wong HC, Bern M, Dahab R, Loureiro AAF. SecLEACH-on the security of clustered sensor networks. Signal Processing 2007; 87:2882-2895. Islam MH, Nadeem K, Khan SA. Optimal sensor placement for detection against distributed denial of service attacks. Pakistan Journal of Engineering & Applied Sciences 2009; 4:80-92. Ozdemir S, Xiao Y. Secure data aggregation in wireless sensor networks: a comprehensive overview. Computer Networks 2009; 53:2022-2037. Ali Alrajeh N, Khan S, Lloret J, Loo J. Secure routing protocol using cross-layer design and energy harvesting in wireless sensor networks. IJDSN February 2013; 2013. Khan AUR, Madani SA, Hayat K, Khan SU, Sharma N. Clustering-based power-controlled routing for mobile wireless sensor networks. International Journal of Communication Systems April 2012; 25(4):529-542. Agah A, Das SK. Preventing DoS attacks in wireless sensor networks: a repeated game theory approach. International Journal of Network Security September 2007; 5(2):145-153. Fang S, Berber SM, Swain AK. Energy distribution-aware clustering algorithm for dense wireless sensor networks. International Journal of Communication Systems September-October 2010; 23(9-10):12231251. Ibriq J, Mahgoub I. Hikes: hierarchical key establishment scheme for wireless sensor networks. International Journal of Communication Systems November 2012. DOI: 10.1002/dac.2438. Son J-H, Luo H, Seo S-W. Denial of service attack-resistant flooding authentication in wireless sensor networks. Computer Communications 2010; 33:1531-1542. Chen R-M, Hsieh K-T. Effective allied network security system based on designed scheme with conditional legitimate probability against distributed network attacks and intrusions. International Journal of Communication Systems May 2012; 25(5):672-688. Hsin Lai G, Chen C-M. Detecting denial of service attacks in sensor networks. Journal of Computers January 2008; 4(18). Claycomb WR, Shin D. A novel node level security policy framework for wireless sensor networks. Journal of Network and Computer Applications 2011; 34:418-428. Shankar M, Sridar M, Rajani M. Performance evaluation of leach protocol in wireless network. International Journal of Scientific & Engineering Research January 2012; 3:281-283. 2010; 33 2010; 10 2012 2011 2009 2004; 3 2007 2006 2005 2011; 34 2008; 4 2007; 30 2002 1999 2010; 23 2012; 3 2009; 32 2009; 53 2001 2013; 2013 2000 2007; 5 2005; 3 2009; 4 2012; 25 2007; 87 2007; 1 2012; 4 2012; 62 e_1_2_7_6_1 Hamieh A (e_1_2_7_13_1) 2009 Agah A (e_1_2_7_11_1) 2007; 5 e_1_2_7_4_1 e_1_2_7_9_1 e_1_2_7_8_1 Ali Alrajeh N (e_1_2_7_5_1) 2013; 2013 e_1_2_7_7_1 e_1_2_7_19_1 e_1_2_7_18_1 e_1_2_7_17_1 e_1_2_7_2_1 e_1_2_7_14_1 e_1_2_7_12_1 Agah A (e_1_2_7_30_1) 2007; 5 e_1_2_7_10_1 e_1_2_7_27_1 Shankar M (e_1_2_7_15_1) 2012; 3 e_1_2_7_28_1 e_1_2_7_29_1 Islam MH (e_1_2_7_26_1) 2009; 4 Bayer K (e_1_2_7_34_1) 1999 Castellano G (e_1_2_7_35_1) 2007; 1 e_1_2_7_25_1 e_1_2_7_31_1 e_1_2_7_32_1 e_1_2_7_23_1 e_1_2_7_33_1 e_1_2_7_22_1 e_1_2_7_21_1 e_1_2_7_20_1 Perrig A (e_1_2_7_24_1) 2001 e_1_2_7_36_1 e_1_2_7_37_1 e_1_2_7_38_1 Popescu AM (e_1_2_7_3_1) 2012; 4 Hsin Lai G (e_1_2_7_16_1) 2008; 4 |
| References_xml | – reference: Khan S, Loo J. Cross layer secure and resource-aware on-demand routing protocol for hybrid wireless mesh networks. Wireless Personal Communications January 2012; 62(1):201-214. – reference: Li B, Batten L. Using mobile agents to recover from node and database compromise in path-based DoS attacks in wireless sensor networks. Journal of Network and Computer Applications 2009; 32:337-387. – reference: Son JG, Jung S, Kim JH, Seo DI, Kim S. Research on a denial of service (DoS) detection system based on global interdependent behaviors in a sensor network environment. Sensors ISSN 2010; 10(11):10376-10386. – reference: Younis O, Fahmy S. HEED: a hybrid, energy-efficient distributed clustering approach for ad hoc sensor networks. IEEE Transactions on Mobile Computing 2004; 3(4):366-379. – reference: Perrig A, Szewczyk R, Wen V, Culler D, Tygar JD. SPINS: Security Protocols for Sensor Networks. Mobile Computing and Networking 2001: 189-199. – reference: Fouchal F, Ahat A, BenAmor S, Lavallée I, Bui M. Competitive clustering algorithms based on ultrametric properties. Journal of Computational Science (Elsevier) June 2012; 4(4):219-231. (JOCS-D-11-00136R1, IOD: 10.1016/j.jocs.2011.11.004). – reference: Shankar M, Sridar M, Rajani M. Performance evaluation of leach protocol in wireless network. International Journal of Scientific & Engineering Research January 2012; 3:281-283. – reference: Ali Alrajeh N, Khan S, Lloret J, Loo J. Secure routing protocol using cross-layer design and energy harvesting in wireless sensor networks. IJDSN February 2013; 2013. – reference: Popescu AM, Tudorache GI, Peng B, Kemp AH. Surveying position based routing protocols for wireless sensor and ad-hoc networks. Computer and Mathematics with Applications 2012; 4(1). – reference: Liming X, Xiaohua J, Kunxiao Z. QoS multicast routing in cognitive radio ad hoc networks. International Journal of Communication Systems January 2012; 25(1):30-46. – reference: Le A, Loo J, Lasebae A, Aiash M, Luo Y. 6lowpan: a study on QoS security threats and countermeasures using intrusion detection system approach. International Journal of Communication Systems September 2012; 25(9):11891212. – reference: Agah A, Das SK. Preventing DoS attacks in wireless sensor networks: a repeated game theory approach. International Journal of Network Security 2007; 5(2):145-153. – reference: Chen R-M, Hsieh K-T. Effective allied network security system based on designed scheme with conditional legitimate probability against distributed network attacks and intrusions. International Journal of Communication Systems May 2012; 25(5):672-688. – reference: Ozdemir S, Xiao Y. Secure data aggregation in wireless sensor networks: a comprehensive overview. Computer Networks 2009; 53:2022-2037. – reference: Hsieh MY, Huang YM, Chao HC. Adaptive security design with malicious node detection in cluster-based sensor networks. Computer Communications 2007; 30:2385-2400. – reference: Khan AUR, Madani SA, Hayat K, Khan SU, Sharma N. Clustering-based power-controlled routing for mobile wireless sensor networks. International Journal of Communication Systems April 2012; 25(4):529-542. – reference: Oliviera LB, Ferreira A, Vilaça MA, Wong HC, Bern M, Dahab R, Loureiro AAF. SecLEACH-on the security of clustered sensor networks. Signal Processing 2007; 87:2882-2895. – reference: Ibriq J, Mahgoub I. Hikes: hierarchical key establishment scheme for wireless sensor networks. International Journal of Communication Systems November 2012. DOI: 10.1002/dac.2438. – reference: Hsin Lai G, Chen C-M. Detecting denial of service attacks in sensor networks. Journal of Computers January 2008; 4(18). – reference: Hu F, Sharma N. Security considerations in ad hoc sensor networks. Ad Hoc Networks 2005; 3:69-89. – reference: Son J-H, Luo H, Seo S-W. Denial of service attack-resistant flooding authentication in wireless sensor networks. Computer Communications 2010; 33:1531-1542. – reference: Hamieh A, Ben-Othman J. Detection of jamming attacks in wireless ad hoc networks using error distribution. IEEE International Conference on Communications (ICC) June 2009: 1-6. – reference: Castellano G, Fanelli AM, Torsello MA. A neuro-fuzzy collaborative filtering approach for web recommendation. International Journal of Communication Systems 2007; 1(1):27-39. – reference: Islam MH, Nadeem K, Khan SA. Optimal sensor placement for detection against distributed denial of service attacks. Pakistan Journal of Engineering & Applied Sciences 2009; 4:80-92. – reference: Agah A, Das SK. Preventing DoS attacks in wireless sensor networks: a repeated game theory approach. International Journal of Network Security September 2007; 5(2):145-153. – reference: Fang S, Berber SM, Swain AK. Energy distribution-aware clustering algorithm for dense wireless sensor networks. International Journal of Communication Systems September-October 2010; 23(9-10):12231251. – reference: Claycomb WR, Shin D. A novel node level security policy framework for wireless sensor networks. Journal of Network and Computer Applications 2011; 34:418-428. – year: 2012 article-title: Hikes: hierarchical key establishment scheme for wireless sensor networks publication-title: International Journal of Communication Systems – start-page: 173 year: 2012 end-page: 177 – volume: 4 start-page: 219 issue: 4 year: 2012 end-page: 231 article-title: Competitive clustering algorithms based on ultrametric properties publication-title: Journal of Computational Science (Elsevier) – volume: 1 start-page: 27 issue: 1 year: 2007 end-page: 39 article-title: A neuro‐fuzzy collaborative filtering approach for web recommendation publication-title: International Journal of Communication Systems – volume: 25 start-page: 672 issue: 5 year: 2012 end-page: 688 article-title: Effective allied network security system based on designed scheme with conditional legitimate probability against distributed network attacks and intrusions publication-title: International Journal of Communication Systems – start-page: 189 year: 2001 end-page: 199 article-title: SPINS: Security Protocols for Sensor Networks publication-title: Mobile Computing and Networking – volume: 53 start-page: 2022 year: 2009 end-page: 2037 article-title: Secure data aggregation in wireless sensor networks: a comprehensive overview publication-title: Computer Networks – start-page: 109 year: 2007 end-page: 115 – volume: 23 issue: 9‐10 year: 2010 article-title: Energy distribution‐aware clustering algorithm for dense wireless sensor networks publication-title: International Journal of Communication Systems – volume: 4 issue: 18 year: 2008 article-title: Detecting denial of service attacks in sensor networks publication-title: Journal of Computers – start-page: 8020 year: 2000 end-page: 8030 – volume: 3 start-page: 366 issue: 4 year: 2004 end-page: 379 article-title: HEED: a hybrid, energy‐efficient distributed clustering approach for ad hoc sensor networks publication-title: IEEE Transactions on Mobile Computing – volume: 3 start-page: 281 year: 2012 end-page: 283 article-title: Performance evaluation of leach protocol in wireless network publication-title: International Journal of Scientific & Engineering Research – year: 2012 – volume: 30 start-page: 2385 year: 2007 end-page: 2400 article-title: Adaptive security design with malicious node detection in cluster‐based sensor networks publication-title: Computer Communications – volume: 4 issue: 1 year: 2012 article-title: Surveying position based routing protocols for wireless sensor and ad‐hoc networks publication-title: Computer and Mathematics with Applications – volume: 62 start-page: 201 issue: 1 year: 2012 end-page: 214 article-title: Cross layer secure and resource‐aware on‐demand routing protocol for hybrid wireless mesh networks publication-title: Wireless Personal Communications – volume: 4 start-page: 80 year: 2009 end-page: 92 article-title: Optimal sensor placement for detection against distributed denial of service attacks publication-title: Pakistan Journal of Engineering & Applied Sciences – volume: 32 start-page: 337 year: 2009 end-page: 387 article-title: Using mobile agents to recover from node and database compromise in path‐based DoS attacks in wireless sensor networks publication-title: Journal of Network and Computer Applications – start-page: 368 year: 2002 end-page: 372 – volume: 25 start-page: 529 issue: 4 year: 2012 end-page: 542 article-title: Clustering‐based power‐controlled routing for mobile wireless sensor networks publication-title: International Journal of Communication Systems – volume: 10 start-page: 10376 issue: 11 year: 2010 end-page: 10386 article-title: Research on a denial of service (DoS) detection system based on global interdependent behaviors in a sensor network environment publication-title: Sensors ISSN – start-page: 1 year: 2009 end-page: 6 article-title: Detection of jamming attacks in wireless ad hoc networks using error distribution publication-title: IEEE International Conference on Communications (ICC) – volume: 87 start-page: 2882 year: 2007 end-page: 2895 article-title: SecLEACH—on the security of clustered sensor networks publication-title: Signal Processing – volume: 5 start-page: 145 issue: 2 year: 2007 end-page: 153 article-title: Preventing DoS attacks in wireless sensor networks: a repeated game theory approach publication-title: International Journal of Network Security – year: 2006 – volume: 33 start-page: 1531 year: 2010 end-page: 1542 article-title: Denial of service attack‐resistant flooding authentication in wireless sensor networks publication-title: Computer Communications – start-page: 35 year: 2011 end-page: 42 – volume: 3 start-page: 69 year: 2005 end-page: 89 article-title: Security considerations in ad hoc sensor networks publication-title: Ad Hoc Networks – volume: 34 start-page: 418 year: 2011 end-page: 428 article-title: A novel node level security policy framework for wireless sensor networks publication-title: Journal of Network and Computer Applications – start-page: 46 year: 2005 end-page: 57 – start-page: 123 year: 2011 end-page: 128 – start-page: 217 year: 1999 end-page: 235 – volume: 25 start-page: 30 issue: 1 year: 2012 end-page: 46 article-title: QoS multicast routing in cognitive radio ad hoc networks publication-title: International Journal of Communication Systems – volume: 2013 year: 2013 article-title: Secure routing protocol using cross‐layer design and energy harvesting in wireless sensor networks publication-title: IJDSN – volume: 25 issue: 9 year: 2012 article-title: 6lowpan: a study on QoS security threats and countermeasures using intrusion detection system approach publication-title: International Journal of Communication Systems – ident: e_1_2_7_28_1 doi: 10.1016/j.comcom.2007.04.008 – ident: e_1_2_7_37_1 – volume: 5 start-page: 145 issue: 2 year: 2007 ident: e_1_2_7_30_1 article-title: Preventing DoS attacks in wireless sensor networks: a repeated game theory approach publication-title: International Journal of Network Security – start-page: 217 volume-title: Proceedings of the 7th International Conference on Database Theory LNCS year: 1999 ident: e_1_2_7_34_1 – ident: e_1_2_7_29_1 – ident: e_1_2_7_18_1 doi: 10.1002/dac.1103 – ident: e_1_2_7_21_1 doi: 10.1109/TMC.2004.41 – ident: e_1_2_7_27_1 doi: 10.1016/j.comcom.2010.03.027 – volume: 4 issue: 18 year: 2008 ident: e_1_2_7_16_1 article-title: Detecting denial of service attacks in sensor networks publication-title: Journal of Computers – volume: 2013 year: 2013 ident: e_1_2_7_5_1 article-title: Secure routing protocol using cross‐layer design and energy harvesting in wireless sensor networks publication-title: IJDSN – ident: e_1_2_7_22_1 doi: 10.1109/ICC.2012.6364158 – ident: e_1_2_7_33_1 – volume: 4 start-page: 80 year: 2009 ident: e_1_2_7_26_1 article-title: Optimal sensor placement for detection against distributed denial of service attacks publication-title: Pakistan Journal of Engineering & Applied Sciences – volume: 1 start-page: 27 issue: 1 year: 2007 ident: e_1_2_7_35_1 article-title: A neuro‐fuzzy collaborative filtering approach for web recommendation publication-title: International Journal of Communication Systems – ident: e_1_2_7_36_1 doi: 10.1109/ISCC.2011.5984038 – ident: e_1_2_7_31_1 doi: 10.1145/2069105.2069112 – ident: e_1_2_7_23_1 doi: 10.1109/WCNC.2013.6554905 – ident: e_1_2_7_32_1 doi: 10.1016/j.jocs.2011.11.004 – ident: e_1_2_7_7_1 doi: 10.1016/j.jnca.2010.03.004 – start-page: 1 year: 2009 ident: e_1_2_7_13_1 article-title: Detection of jamming attacks in wireless ad hoc networks using error distribution publication-title: IEEE International Conference on Communications (ICC) – ident: e_1_2_7_25_1 doi: 10.1016/j.sigpro.2007.05.016 – ident: e_1_2_7_10_1 doi: 10.3390/s101110376 – ident: e_1_2_7_38_1 doi: 10.1002/dac.1285 – volume: 4 issue: 1 year: 2012 ident: e_1_2_7_3_1 article-title: Surveying position based routing protocols for wireless sensor and ad‐hoc networks publication-title: Computer and Mathematics with Applications – ident: e_1_2_7_6_1 doi: 10.1016/j.jnca.2008.02.017 – ident: e_1_2_7_4_1 doi: 10.1002/dac.1280 – ident: e_1_2_7_8_1 doi: 10.1002/dac.1289 – start-page: 189 year: 2001 ident: e_1_2_7_24_1 article-title: SPINS: Security Protocols for Sensor Networks publication-title: Mobile Computing and Networking doi: 10.1145/381677.381696 – ident: e_1_2_7_19_1 – ident: e_1_2_7_17_1 doi: 10.1002/dac.2438 – ident: e_1_2_7_12_1 doi: 10.1145/1062689.1062697 – ident: e_1_2_7_9_1 doi: 10.1016/j.adhoc.2003.09.009 – ident: e_1_2_7_14_1 doi: 10.1007/s11277-010-0048-y – ident: e_1_2_7_2_1 doi: 10.1002/dac.2356 – ident: e_1_2_7_20_1 doi: 10.1016/j.comnet.2009.02.023 – volume: 3 start-page: 281 year: 2012 ident: e_1_2_7_15_1 article-title: Performance evaluation of leach protocol in wireless network publication-title: International Journal of Scientific & Engineering Research – volume: 5 start-page: 145 issue: 2 year: 2007 ident: e_1_2_7_11_1 article-title: Preventing DoS attacks in wireless sensor networks: a repeated game theory approach publication-title: International Journal of Network Security |
| SSID | ssj0008265 |
| Score | 2.0994673 |
| Snippet | SUMMARYThis paper presents a novel approach for detecting denial of service attacks. In particular, the concern is on the sleeping deprivation attacks such as... This paper presents a novel approach for detecting denial of service attacks. In particular, the concern is on the sleeping deprivation attacks such as the... SUMMARY This paper presents a novel approach for detecting denial of service attacks. In particular, the concern is on the sleeping deprivation attacks such as... |
| SourceID | hal proquest crossref wiley istex |
| SourceType | Open Access Repository Aggregation Database Enrichment Source Index Database Publisher |
| StartPage | 309 |
| SubjectTerms | Algorithms Clustering Computer Science Denial of service attacks DoS attack FFUCA Flooding LEACH Mathematical models Remote sensors Sensors Wireless networks WSN |
| Title | Recursive-clustering-based approach for denial of service (DoS) attacks in wireless sensors networks |
| URI | https://api.istex.fr/ark:/67375/WNG-B6XTS8WJ-Z/fulltext.pdf https://onlinelibrary.wiley.com/doi/abs/10.1002%2Fdac.2670 https://www.proquest.com/docview/1636644220 https://www.proquest.com/docview/1651372877 https://hal.u-pec.fr/hal-04030489 |
| Volume | 28 |
| WOSCitedRecordID | wos000346496800008&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVWIB databaseName: Wiley Online Library - Journals customDbUrl: eissn: 1099-1131 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0008265 issn: 1074-5351 databaseCode: DRFUL dateStart: 19960101 isFulltext: true titleUrlDefault: https://onlinelibrary.wiley.com providerName: Wiley-Blackwell |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV3LbtQwFLVghgUsyrNiSkEGIR6LqBnbsePl0GGoUDVCfagjNpbtOGrFKEGTmYoln8A38iXcmxetBBISqyjxjWL5-l4fO8fHhLzkVuV5DsjNqTSORLBx5DLrIpsoxp32UihfHzah5vN0sdCfWlYl7oVp9CH6BTeMjDpfY4BbV-39Fg3N4HtMKpiuDxl0WzEgw-nR7PSwz8MAnJOOcZjwZNxJz8Zsr3v32mB08xypkENs3W_X8OZV1FoPO7O7_1Phe2SrBZt00vSO--RGKB6QO1ckCB-S8yNccEcO-8_vP_xyg7oJUAA3OL5ltNMcpwBuaYbMvCUtc1o1KYa-mZbHb6ldr3GrPr0oKEofLyF7gkVRlauKFg3PvHpETmfvT_YPovb0hcgDqIijnGWABQAd2gApUEvmhVfCx5kQjrNMu7HOebA595rhvMfLhDnAT5LnnOss5ttkUJRFeEyos14E6cATLhVcAEhVKmc69kHKhKt0RF53bjC-lSbHEzKWphFVZgbazmDbjcjz3vJrI8fxB5sX4Mm-GPWzDyaHBp9BxuKQsvTleERe1Y7uzezqC3LcVGLO5h_MO7k4OU7PPprPI7Lb9QTThndlAMRKAJKMYYX6YghM_Ntii1Bu0CYZcwUTUgXfqvvFX2tsppN9vO78q-ETchuAG7IuI5bsksF6tQlPyS1_ub6oVs_aQPgFFg0MgQ |
| linkProvider | Wiley-Blackwell |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1bb9MwFLZGiwQ8cEcrDDAIcXmIlvqaiKeyUgqUCm2dVvFi2U6iTasS1LQTj_wEfiO_hHOSJmwSSEg8RYlPZMvn4s_28WdCnnGrsywD5OZ0FAYitWHgEusCKzXjLvZKaF9dNqGn02g-jz9vkdfNWZiaH6JdcEPPqOI1OjguSO_-Zg1NoEKmNMzXuwKsSHZId7g_Opy0gRiQs2xSDiWX_YZ7NmS7zb8XRqNLx5gL2cXu_XYBcJ6HrdW4M7rxXy2-Sa5v4CYd1PZxi2yl-W1y7RwJ4R1yvI9L7pjF_vP7D79YI3MCFMALjnAJbVjHKcBbmmBu3oIWGS3rIENfDouDV9SuVnhYn57kFMmPFxA_QSIvi2VJ8zrTvLxLDkdvZ3vjYHP_QuABVoRBxhJAA4APbQpBMFbMC6-FDxMhHGdJ7PpxxlObcR8znPl4JZkDBKV4xnmchPwe6eRFnm4T6qwXqXKgChcJLgCmap2xOPSpUpLrqEdeNHowfkNOjndkLExNq8wM9J3BvuuRJ63k15qQ4w8yT0GVbTEyaI8HE4PfIGZxCFrxWb9HnleabsXs8hSz3LQ0R9N35o2azw6iow_mS4_sNKZgNg5eGoCxCqAkY9igthhcE_dbbJ4Wa5SRfa5hSqqhrsow_tpiMxzs4fP-vwo-JlfGs08TM3k__fiAXAUYhzmYAZM7pLNartOH5LI_W52Uy0cbr_gFHecQcQ |
| linkToPdf | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1bb9MwFLbGitB44I5WGGAQgvEQLbUTOxZPZaUMqKppF63ixXIcW5uokqlpJx75CfxGfgnn5MYmgYTEU5T4RLF8fI4_O58_E_KSG-m9B-SWyiQMImfCIM1MGphYMp4qKyJpq8Mm5HSazGZqf428bffC1PoQ3YIbRkaVrzHA3Xnmd36rhmbwQSYkzNd7UawERGVvdDA-nnSJGJBz3FIOYx4PWu3ZkO20714Zja6dIheyh8377QrgvAxbq3FnfPu_anyH3GrgJh3W_eMuWXP5PXLzkgjhfXJ6gEvuyGL_-f2Hna9QOQEK4AZHuIy2quMU4C3NkJs3p4WnZZ1k6PaoOHxDzXKJm_XpWU5R_HgO-RMs8rJYlDSvmeblA3I8fn-0uxc05y8EFmBFGHiWARoAfGgcJEElmI2sjGyYRVHKWabSgfLcGc-tYjjzsSJmKSAowT3nKgv5Q7KeF7nbJDQ1NnIiBVekScQjgKlSeqZC64SIuUz65HXrB20bcXI8I2Oua1llpqHtNLZdnzzvLM9rQY4_2LwAV3bFqKC9N5xofAY5i0PSUheDPnlVebozM4uvyHKTsT6ZftDvxOzoMDn5pL_0yVbbFXQT4KUGGCsASjKGFeqKITTxf4vJXbFCm3jAJUxJJXyr6hh_rbEeDXfx-uhfDZ-RG_ujsZ58nH5-TDYAxSEFM2DxFllfLlbuCbluL5Zn5eJpExS_AJHVD-w |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Recursive-clustering-based+approach+for+denial+of+service+%28DoS%29+attacks+in+wireless+sensors+networks&rft.jtitle=International+journal+of+communication+systems&rft.au=Fouchal%2C+S&rft.au=Mansouri%2C+D&rft.au=Mokdad%2C+L&rft.au=Iouallalen%2C+M&rft.date=2015-01-25&rft.issn=1074-5351&rft.eissn=1099-1131&rft.volume=28&rft.issue=2&rft.spage=309&rft.epage=324&rft_id=info:doi/10.1002%2Fdac.2670&rft.externalDBID=NO_FULL_TEXT |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1074-5351&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1074-5351&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1074-5351&client=summon |