Recursive-clustering-based approach for denial of service (DoS) attacks in wireless sensors networks

SUMMARYThis paper presents a novel approach for detecting denial of service attacks. In particular, the concern is on the sleeping deprivation attacks such as the malicious nodes that use flooding technique. Our approach is based on wireless sensor network (WSN) clustering. It consists in recursivel...

Full description

Saved in:
Bibliographic Details
Published in:International journal of communication systems Vol. 28; no. 2; pp. 309 - 324
Main Authors: Fouchal, S., Mansouri, D., Mokdad, L., Iouallalen, M.
Format: Journal Article
Language:English
Published: Chichester Blackwell Publishing Ltd 25.01.2015
Wiley Subscription Services, Inc
Wiley
Subjects:
ISSN:1074-5351, 1099-1131
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Abstract SUMMARYThis paper presents a novel approach for detecting denial of service attacks. In particular, the concern is on the sleeping deprivation attacks such as the malicious nodes that use flooding technique. Our approach is based on wireless sensor network (WSN) clustering. It consists in recursively clustering sensors until a required granularity (chosen by the expert) is achieved. We apply our approach with two different clustering algorithms. Indeed, we use the common clustering WSN algorithm Low Energy Algorithm Adaptive Clustering Hierarchy and the general clustering method Fast and Flexible Unsupervised Clustering Algorithm (FFUCA) based on ultrametric properties. We discuss the behavior of the approach with the two algorithms. Also, we present numerical results that show the efficiency of recursive clustering using the FFUCA algorithm. Copyright © 2013 John Wiley & Sons, Ltd. This paper presents a novel approach for detecting denial of service attacks in wireless sensor networks. The concern here is on the sleeping deprivation attacks such as malicious sensors that use flooding technique. The idea consists in clustering sensors recursively until a required granularity is achieved. We use here a generic clustering algorithm named Fast and Flexible Unsupervised Clustering Algorithm based on ultrametric properties. We present numerical results that show the efficiency of our approach using the Fast and Flexible Unsupervised Clustering Algorithm.
AbstractList This paper presents a novel approach for detecting denial of service attacks. In particular, the concern is on the sleeping deprivation attacks such as the malicious nodes that use flooding technique. Our approach is based on wireless sensor network (WSN) clustering. It consists in recursively clustering sensors until a required granularity (chosen by the expert) is achieved. We apply our approach with two different clustering algorithms. Indeed, we use the common clustering WSN algorithm Low Energy Algorithm Adaptive Clustering Hierarchy and the general clustering method Fast and Flexible Unsupervised Clustering Algorithm (FFUCA) based on ultrametric properties. We discuss the behavior of the approach with the two algorithms. Also, we present numerical results that show the efficiency of recursive clustering using the FFUCA algorithm. Copyright © 2013 John Wiley & Sons, Ltd.
This paper presents a novel approach for detecting denial of service attacks. In particular, the concern is on the sleeping deprivation attacks such as the malicious nodes that use flooding technique. Our approach is based on wireless sensor network (WSN) clustering. It consists in recursively clustering sensors until a required granularity (chosen by the expert) is achieved. We apply our approach with two different clustering algorithms. Indeed, we use the common clustering WSN algorithm Low Energy Algorithm Adaptive Clustering Hierarchy and the general clustering method Fast and Flexible Unsupervised Clustering Algorithm (FFUCA) based on ultrametric properties. We discuss the behavior of the approach with the two algorithms. Also, we present numerical results that show the efficiency of recursive clustering using the FFUCA algorithm. Copyright copyright 2013 John Wiley & Sons, Ltd. This paper presents a novel approach for detecting denial of service attacks in wireless sensor networks. The concern here is on the sleeping deprivation attacks such as malicious sensors that use flooding technique. The idea consists in clustering sensors recursively until a required granularity is achieved. We use here a generic clustering algorithm named Fast and Flexible Unsupervised Clustering Algorithm based on ultrametric properties. We present numerical results that show the efficiency of our approach using the Fast and Flexible Unsupervised Clustering Algorithm.
SUMMARY This paper presents a novel approach for detecting denial of service attacks. In particular, the concern is on the sleeping deprivation attacks such as the malicious nodes that use flooding technique. Our approach is based on wireless sensor network (WSN) clustering. It consists in recursively clustering sensors until a required granularity (chosen by the expert) is achieved. We apply our approach with two different clustering algorithms. Indeed, we use the common clustering WSN algorithm Low Energy Algorithm Adaptive Clustering Hierarchy and the general clustering method Fast and Flexible Unsupervised Clustering Algorithm (FFUCA) based on ultrametric properties. We discuss the behavior of the approach with the two algorithms. Also, we present numerical results that show the efficiency of recursive clustering using the FFUCA algorithm. Copyright © 2013 John Wiley & Sons, Ltd.
SUMMARYThis paper presents a novel approach for detecting denial of service attacks. In particular, the concern is on the sleeping deprivation attacks such as the malicious nodes that use flooding technique. Our approach is based on wireless sensor network (WSN) clustering. It consists in recursively clustering sensors until a required granularity (chosen by the expert) is achieved. We apply our approach with two different clustering algorithms. Indeed, we use the common clustering WSN algorithm Low Energy Algorithm Adaptive Clustering Hierarchy and the general clustering method Fast and Flexible Unsupervised Clustering Algorithm (FFUCA) based on ultrametric properties. We discuss the behavior of the approach with the two algorithms. Also, we present numerical results that show the efficiency of recursive clustering using the FFUCA algorithm. Copyright © 2013 John Wiley & Sons, Ltd. This paper presents a novel approach for detecting denial of service attacks in wireless sensor networks. The concern here is on the sleeping deprivation attacks such as malicious sensors that use flooding technique. The idea consists in clustering sensors recursively until a required granularity is achieved. We use here a generic clustering algorithm named Fast and Flexible Unsupervised Clustering Algorithm based on ultrametric properties. We present numerical results that show the efficiency of our approach using the Fast and Flexible Unsupervised Clustering Algorithm.
Author Fouchal, S.
Iouallalen, M.
Mansouri, D.
Mokdad, L.
Author_xml – sequence: 1
  givenname: S.
  surname: Fouchal
  fullname: Fouchal, S.
  organization: SAF Laboratory, Paris, France
– sequence: 2
  givenname: D.
  surname: Mansouri
  fullname: Mansouri, D.
  organization: LACL Laboratory, Créteil, France
– sequence: 3
  givenname: L.
  surname: Mokdad
  fullname: Mokdad, L.
  email: Correspondence to: Lynda Mokdad, LACL Laboratory, Créteil, France., lynda.mokdad@u-pec.fr
  organization: LACL Laboratory, Créteil, France
– sequence: 4
  givenname: M.
  surname: Iouallalen
  fullname: Iouallalen, M.
  organization: LSI Laboratory, Algiers, Algeria
BackLink https://hal.u-pec.fr/hal-04030489$$DView record in HAL
BookMark eNp10V1rFDEUBuBBKthWwZ8Q8Ka9mDVfk0wu1622yqJgKxVvQjY5Y9NNkzWZ2bX_3hlWK4pe5RCek5zDe1QdxBShqp4TPCMY05fO2BkVEj-qDglWqiaEkYOplrxuWEOeVEel3GKMWyqaw8p9BDvk4rdQ2zCUHrKPX-uVKeCQ2WxyMvYGdSkjB9GbgFKHCuStt4BOztLlKTJ9b-y6IB_RzmcIUMooYkm5oAj9LuV1eVo97kwo8OzneVx9evP6anFRLz-cv13Ml7XljOC6o45QJSU34BwoQS23klvsOF8x6tSKqI6B6ZhVlDS8taKhq0ZgwTrGlMPsuDrdv3tjgt5kf2fyvU7G64v5Uk93mGOGeau2ZLQnezvu-G2A0us7XyyEYCKkoWgiGsIkbaUc6Yu_6G0achw3GRUTgnNKp89ne2VzKiVDp63vTe9T7LPxQROsp4D0GJCeAvo9wUPDr5H_Qes93fkA9_91-my--NP7MdHvD97ktRaSyUZfvz_Xr8Tnq8v2-p3-wn4A_PyutA
CitedBy_id crossref_primary_10_1002_dac_2993
crossref_primary_10_1016_j_simpat_2018_02_004
crossref_primary_10_1155_2019_6578406
crossref_primary_10_1002_dac_3505
crossref_primary_10_1080_20421338_2021_1958989
crossref_primary_10_1109_ACCESS_2019_2930408
crossref_primary_10_1186_s13638_020_01835_w
crossref_primary_10_1002_dac_2805
crossref_primary_10_3390_electronics10111244
crossref_primary_10_1080_03081079_2015_1106730
crossref_primary_10_1049_ntw2_12011
crossref_primary_10_1002_dac_3024
crossref_primary_10_1002_dac_3265
crossref_primary_10_1109_ACCESS_2018_2793841
Cites_doi 10.1016/j.comcom.2007.04.008
10.1002/dac.1103
10.1109/TMC.2004.41
10.1016/j.comcom.2010.03.027
10.1109/ICC.2012.6364158
10.1109/ISCC.2011.5984038
10.1145/2069105.2069112
10.1109/WCNC.2013.6554905
10.1016/j.jocs.2011.11.004
10.1016/j.jnca.2010.03.004
10.1016/j.sigpro.2007.05.016
10.3390/s101110376
10.1002/dac.1285
10.1016/j.jnca.2008.02.017
10.1002/dac.1280
10.1002/dac.1289
10.1145/381677.381696
10.1002/dac.2438
10.1145/1062689.1062697
10.1016/j.adhoc.2003.09.009
10.1007/s11277-010-0048-y
10.1002/dac.2356
10.1016/j.comnet.2009.02.023
ContentType Journal Article
Copyright Copyright © 2013 John Wiley & Sons, Ltd.
Copyright © 2014 John Wiley & Sons, Ltd.
Distributed under a Creative Commons Attribution 4.0 International License
Copyright_xml – notice: Copyright © 2013 John Wiley & Sons, Ltd.
– notice: Copyright © 2014 John Wiley & Sons, Ltd.
– notice: Distributed under a Creative Commons Attribution 4.0 International License
DBID BSCLL
AAYXX
CITATION
7SP
8FD
JQ2
L7M
7SC
L~C
L~D
1XC
DOI 10.1002/dac.2670
DatabaseName Istex
CrossRef
Electronics & Communications Abstracts
Technology Research Database
ProQuest Computer Science Collection
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
Hyper Article en Ligne (HAL)
DatabaseTitle CrossRef
Technology Research Database
Advanced Technologies Database with Aerospace
Electronics & Communications Abstracts
ProQuest Computer Science Collection
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts
Computer and Information Systems Abstracts Professional
DatabaseTitleList CrossRef
Technology Research Database
Technology Research Database

DeliveryMethod fulltext_linktorsrc
Discipline Engineering
Computer Science
EISSN 1099-1131
EndPage 324
ExternalDocumentID oai:HAL:hal-04030489v1
3528647111
10_1002_dac_2670
DAC2670
ark_67375_WNG_B6XTS8WJ_Z
Genre article
GroupedDBID .3N
.GA
05W
0R~
10A
1L6
1OB
1OC
33P
3SF
3WU
4.4
50Y
50Z
51W
51X
52M
52N
52O
52P
52S
52T
52U
52W
52X
5GY
5VS
66C
702
7PT
8-0
8-1
8-3
8-4
8-5
8UM
930
A03
AAESR
AAEVG
AAHQN
AAMMB
AAMNL
AANHP
AANLZ
AAONW
AASGY
AAXRX
AAYCA
AAZKR
ABCQN
ABCUV
ABDBF
ABIJN
ABPVW
ACAHQ
ACBWZ
ACCZN
ACGFS
ACIWK
ACPOU
ACRPL
ACUHS
ACXBN
ACXQS
ACYXJ
ADBBV
ADEOM
ADIZJ
ADKYN
ADMGS
ADNMO
ADOZA
ADXAS
ADZMN
AEFGJ
AEIGN
AEIMD
AENEX
AEUYR
AEYWJ
AFBPY
AFFPM
AFGKR
AFWVQ
AGQPQ
AGXDD
AGYGG
AHBTC
AIDQK
AIDYY
AITYG
AIURR
AJXKR
ALAGY
ALMA_UNASSIGNED_HOLDINGS
ALVPJ
AMBMR
AMYDB
ATUGU
AUFTA
AZBYB
AZVAB
BAFTC
BFHJK
BHBCM
BMNLL
BMXJE
BNHUX
BROTX
BRXPI
BSCLL
BY8
CS3
D-E
D-F
DCZOG
DPXWK
DR2
DRFUL
DRSTM
DU5
EBS
EJD
ESX
F00
F01
F04
G-S
G.N
GNP
GODZA
H.T
H.X
HGLYW
HHY
HZ~
I-F
IX1
J0M
JPC
KQQ
LATKE
LAW
LC2
LC3
LEEKS
LITHE
LOXES
LP6
LP7
LUTES
LYRES
MEWTI
MK4
MK~
ML~
MRFUL
MRSTM
MSFUL
MSSTM
MXFUL
MXSTM
N04
N05
N9A
NF~
O66
O9-
OIG
P2W
P2X
P4D
Q.N
Q11
QB0
QRW
R.K
ROL
RX1
RYL
SUPJJ
TUS
UB1
V2E
W8V
W99
WBKPD
WIH
WIK
WLBEL
WOHZO
WQJ
WXSBR
WYISQ
XG1
XV2
ZZTAW
~IA
~WT
AAHHS
ACCFJ
ADZOD
AEEZP
AEQDE
AEUQT
AFPWT
AIWBW
AJBDE
ALUQN
RWI
WRC
WWI
AAYXX
CITATION
O8X
7SP
8FD
JQ2
L7M
7SC
L~C
L~D
1XC
ID FETCH-LOGICAL-c4310-f2d129774aedde962c4c74c0d44b32d9b19f3eaf3c921548c652b56063f339d03
IEDL.DBID DRFUL
ISICitedReferencesCount 16
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000346496800008&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 1074-5351
IngestDate Tue Oct 14 20:48:08 EDT 2025
Fri Jul 11 16:29:43 EDT 2025
Fri Jul 25 12:26:35 EDT 2025
Sat Nov 29 03:54:47 EST 2025
Tue Nov 18 22:18:19 EST 2025
Wed Jan 22 16:22:02 EST 2025
Tue Nov 11 03:33:02 EST 2025
IsPeerReviewed true
IsScholarly true
Issue 2
Language English
License http://onlinelibrary.wiley.com/termsAndConditions#vor
Distributed under a Creative Commons Attribution 4.0 International License: http://creativecommons.org/licenses/by/4.0
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c4310-f2d129774aedde962c4c74c0d44b32d9b19f3eaf3c921548c652b56063f339d03
Notes ark:/67375/WNG-B6XTS8WJ-Z
ArticleID:DAC2670
istex:647FDEC3350FA619D25FD2462AB0F0B75DF78903
ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
content type line 23
ORCID 0000-0002-6182-4869
PQID 1636644220
PQPubID 996367
PageCount 16
ParticipantIDs hal_primary_oai_HAL_hal_04030489v1
proquest_miscellaneous_1651372877
proquest_journals_1636644220
crossref_citationtrail_10_1002_dac_2670
crossref_primary_10_1002_dac_2670
wiley_primary_10_1002_dac_2670_DAC2670
istex_primary_ark_67375_WNG_B6XTS8WJ_Z
PublicationCentury 2000
PublicationDate 25 January 2015
PublicationDateYYYYMMDD 2015-01-25
PublicationDate_xml – month: 01
  year: 2015
  text: 25 January 2015
  day: 25
PublicationDecade 2010
PublicationPlace Chichester
PublicationPlace_xml – name: Chichester
PublicationTitle International journal of communication systems
PublicationTitleAlternate Int. J. Commun. Syst
PublicationYear 2015
Publisher Blackwell Publishing Ltd
Wiley Subscription Services, Inc
Wiley
Publisher_xml – name: Blackwell Publishing Ltd
– name: Wiley Subscription Services, Inc
– name: Wiley
References Fouchal F, Ahat A, BenAmor S, Lavallée I, Bui M. Competitive clustering algorithms based on ultrametric properties. Journal of Computational Science (Elsevier) June 2012; 4(4):219-231. (JOCS-D-11-00136R1, IOD: 10.1016/j.jocs.2011.11.004).
Hsieh MY, Huang YM, Chao HC. Adaptive security design with malicious node detection in cluster-based sensor networks. Computer Communications 2007; 30:2385-2400.
Son JG, Jung S, Kim JH, Seo DI, Kim S. Research on a denial of service (DoS) detection system based on global interdependent behaviors in a sensor network environment. Sensors ISSN 2010; 10(11):10376-10386.
Popescu AM, Tudorache GI, Peng B, Kemp AH. Surveying position based routing protocols for wireless sensor and ad-hoc networks. Computer and Mathematics with Applications 2012; 4(1).
Le A, Loo J, Lasebae A, Aiash M, Luo Y. 6lowpan: a study on QoS security threats and countermeasures using intrusion detection system approach. International Journal of Communication Systems September 2012; 25(9):11891212.
Agah A, Das SK. Preventing DoS attacks in wireless sensor networks: a repeated game theory approach. International Journal of Network Security 2007; 5(2):145-153.
Hu F, Sharma N. Security considerations in ad hoc sensor networks. Ad Hoc Networks 2005; 3:69-89.
Younis O, Fahmy S. HEED: a hybrid, energy-efficient distributed clustering approach for ad hoc sensor networks. IEEE Transactions on Mobile Computing 2004; 3(4):366-379.
Castellano G, Fanelli AM, Torsello MA. A neuro-fuzzy collaborative filtering approach for web recommendation. International Journal of Communication Systems 2007; 1(1):27-39.
Li B, Batten L. Using mobile agents to recover from node and database compromise in path-based DoS attacks in wireless sensor networks. Journal of Network and Computer Applications 2009; 32:337-387.
Khan S, Loo J. Cross layer secure and resource-aware on-demand routing protocol for hybrid wireless mesh networks. Wireless Personal Communications January 2012; 62(1):201-214.
Liming X, Xiaohua J, Kunxiao Z. QoS multicast routing in cognitive radio ad hoc networks. International Journal of Communication Systems January 2012; 25(1):30-46.
Hamieh A, Ben-Othman J. Detection of jamming attacks in wireless ad hoc networks using error distribution. IEEE International Conference on Communications (ICC) June 2009: 1-6.
Perrig A, Szewczyk R, Wen V, Culler D, Tygar JD. SPINS: Security Protocols for Sensor Networks. Mobile Computing and Networking 2001: 189-199.
Oliviera LB, Ferreira A, Vilaça MA, Wong HC, Bern M, Dahab R, Loureiro AAF. SecLEACH-on the security of clustered sensor networks. Signal Processing 2007; 87:2882-2895.
Islam MH, Nadeem K, Khan SA. Optimal sensor placement for detection against distributed denial of service attacks. Pakistan Journal of Engineering & Applied Sciences 2009; 4:80-92.
Ozdemir S, Xiao Y. Secure data aggregation in wireless sensor networks: a comprehensive overview. Computer Networks 2009; 53:2022-2037.
Ali Alrajeh N, Khan S, Lloret J, Loo J. Secure routing protocol using cross-layer design and energy harvesting in wireless sensor networks. IJDSN February 2013; 2013.
Khan AUR, Madani SA, Hayat K, Khan SU, Sharma N. Clustering-based power-controlled routing for mobile wireless sensor networks. International Journal of Communication Systems April 2012; 25(4):529-542.
Agah A, Das SK. Preventing DoS attacks in wireless sensor networks: a repeated game theory approach. International Journal of Network Security September 2007; 5(2):145-153.
Fang S, Berber SM, Swain AK. Energy distribution-aware clustering algorithm for dense wireless sensor networks. International Journal of Communication Systems September-October 2010; 23(9-10):12231251.
Ibriq J, Mahgoub I. Hikes: hierarchical key establishment scheme for wireless sensor networks. International Journal of Communication Systems November 2012. DOI: 10.1002/dac.2438.
Son J-H, Luo H, Seo S-W. Denial of service attack-resistant flooding authentication in wireless sensor networks. Computer Communications 2010; 33:1531-1542.
Chen R-M, Hsieh K-T. Effective allied network security system based on designed scheme with conditional legitimate probability against distributed network attacks and intrusions. International Journal of Communication Systems May 2012; 25(5):672-688.
Hsin Lai G, Chen C-M. Detecting denial of service attacks in sensor networks. Journal of Computers January 2008; 4(18).
Claycomb WR, Shin D. A novel node level security policy framework for wireless sensor networks. Journal of Network and Computer Applications 2011; 34:418-428.
Shankar M, Sridar M, Rajani M. Performance evaluation of leach protocol in wireless network. International Journal of Scientific & Engineering Research January 2012; 3:281-283.
2010; 33
2010; 10
2012
2011
2009
2004; 3
2007
2006
2005
2011; 34
2008; 4
2007; 30
2002
1999
2010; 23
2012; 3
2009; 32
2009; 53
2001
2013; 2013
2000
2007; 5
2005; 3
2009; 4
2012; 25
2007; 87
2007; 1
2012; 4
2012; 62
e_1_2_7_6_1
Hamieh A (e_1_2_7_13_1) 2009
Agah A (e_1_2_7_11_1) 2007; 5
e_1_2_7_4_1
e_1_2_7_9_1
e_1_2_7_8_1
Ali Alrajeh N (e_1_2_7_5_1) 2013; 2013
e_1_2_7_7_1
e_1_2_7_19_1
e_1_2_7_18_1
e_1_2_7_17_1
e_1_2_7_2_1
e_1_2_7_14_1
e_1_2_7_12_1
Agah A (e_1_2_7_30_1) 2007; 5
e_1_2_7_10_1
e_1_2_7_27_1
Shankar M (e_1_2_7_15_1) 2012; 3
e_1_2_7_28_1
e_1_2_7_29_1
Islam MH (e_1_2_7_26_1) 2009; 4
Bayer K (e_1_2_7_34_1) 1999
Castellano G (e_1_2_7_35_1) 2007; 1
e_1_2_7_25_1
e_1_2_7_31_1
e_1_2_7_32_1
e_1_2_7_23_1
e_1_2_7_33_1
e_1_2_7_22_1
e_1_2_7_21_1
e_1_2_7_20_1
Perrig A (e_1_2_7_24_1) 2001
e_1_2_7_36_1
e_1_2_7_37_1
e_1_2_7_38_1
Popescu AM (e_1_2_7_3_1) 2012; 4
Hsin Lai G (e_1_2_7_16_1) 2008; 4
References_xml – reference: Khan S, Loo J. Cross layer secure and resource-aware on-demand routing protocol for hybrid wireless mesh networks. Wireless Personal Communications January 2012; 62(1):201-214.
– reference: Li B, Batten L. Using mobile agents to recover from node and database compromise in path-based DoS attacks in wireless sensor networks. Journal of Network and Computer Applications 2009; 32:337-387.
– reference: Son JG, Jung S, Kim JH, Seo DI, Kim S. Research on a denial of service (DoS) detection system based on global interdependent behaviors in a sensor network environment. Sensors ISSN 2010; 10(11):10376-10386.
– reference: Younis O, Fahmy S. HEED: a hybrid, energy-efficient distributed clustering approach for ad hoc sensor networks. IEEE Transactions on Mobile Computing 2004; 3(4):366-379.
– reference: Perrig A, Szewczyk R, Wen V, Culler D, Tygar JD. SPINS: Security Protocols for Sensor Networks. Mobile Computing and Networking 2001: 189-199.
– reference: Fouchal F, Ahat A, BenAmor S, Lavallée I, Bui M. Competitive clustering algorithms based on ultrametric properties. Journal of Computational Science (Elsevier) June 2012; 4(4):219-231. (JOCS-D-11-00136R1, IOD: 10.1016/j.jocs.2011.11.004).
– reference: Shankar M, Sridar M, Rajani M. Performance evaluation of leach protocol in wireless network. International Journal of Scientific & Engineering Research January 2012; 3:281-283.
– reference: Ali Alrajeh N, Khan S, Lloret J, Loo J. Secure routing protocol using cross-layer design and energy harvesting in wireless sensor networks. IJDSN February 2013; 2013.
– reference: Popescu AM, Tudorache GI, Peng B, Kemp AH. Surveying position based routing protocols for wireless sensor and ad-hoc networks. Computer and Mathematics with Applications 2012; 4(1).
– reference: Liming X, Xiaohua J, Kunxiao Z. QoS multicast routing in cognitive radio ad hoc networks. International Journal of Communication Systems January 2012; 25(1):30-46.
– reference: Le A, Loo J, Lasebae A, Aiash M, Luo Y. 6lowpan: a study on QoS security threats and countermeasures using intrusion detection system approach. International Journal of Communication Systems September 2012; 25(9):11891212.
– reference: Agah A, Das SK. Preventing DoS attacks in wireless sensor networks: a repeated game theory approach. International Journal of Network Security 2007; 5(2):145-153.
– reference: Chen R-M, Hsieh K-T. Effective allied network security system based on designed scheme with conditional legitimate probability against distributed network attacks and intrusions. International Journal of Communication Systems May 2012; 25(5):672-688.
– reference: Ozdemir S, Xiao Y. Secure data aggregation in wireless sensor networks: a comprehensive overview. Computer Networks 2009; 53:2022-2037.
– reference: Hsieh MY, Huang YM, Chao HC. Adaptive security design with malicious node detection in cluster-based sensor networks. Computer Communications 2007; 30:2385-2400.
– reference: Khan AUR, Madani SA, Hayat K, Khan SU, Sharma N. Clustering-based power-controlled routing for mobile wireless sensor networks. International Journal of Communication Systems April 2012; 25(4):529-542.
– reference: Oliviera LB, Ferreira A, Vilaça MA, Wong HC, Bern M, Dahab R, Loureiro AAF. SecLEACH-on the security of clustered sensor networks. Signal Processing 2007; 87:2882-2895.
– reference: Ibriq J, Mahgoub I. Hikes: hierarchical key establishment scheme for wireless sensor networks. International Journal of Communication Systems November 2012. DOI: 10.1002/dac.2438.
– reference: Hsin Lai G, Chen C-M. Detecting denial of service attacks in sensor networks. Journal of Computers January 2008; 4(18).
– reference: Hu F, Sharma N. Security considerations in ad hoc sensor networks. Ad Hoc Networks 2005; 3:69-89.
– reference: Son J-H, Luo H, Seo S-W. Denial of service attack-resistant flooding authentication in wireless sensor networks. Computer Communications 2010; 33:1531-1542.
– reference: Hamieh A, Ben-Othman J. Detection of jamming attacks in wireless ad hoc networks using error distribution. IEEE International Conference on Communications (ICC) June 2009: 1-6.
– reference: Castellano G, Fanelli AM, Torsello MA. A neuro-fuzzy collaborative filtering approach for web recommendation. International Journal of Communication Systems 2007; 1(1):27-39.
– reference: Islam MH, Nadeem K, Khan SA. Optimal sensor placement for detection against distributed denial of service attacks. Pakistan Journal of Engineering & Applied Sciences 2009; 4:80-92.
– reference: Agah A, Das SK. Preventing DoS attacks in wireless sensor networks: a repeated game theory approach. International Journal of Network Security September 2007; 5(2):145-153.
– reference: Fang S, Berber SM, Swain AK. Energy distribution-aware clustering algorithm for dense wireless sensor networks. International Journal of Communication Systems September-October 2010; 23(9-10):12231251.
– reference: Claycomb WR, Shin D. A novel node level security policy framework for wireless sensor networks. Journal of Network and Computer Applications 2011; 34:418-428.
– year: 2012
  article-title: Hikes: hierarchical key establishment scheme for wireless sensor networks
  publication-title: International Journal of Communication Systems
– start-page: 173
  year: 2012
  end-page: 177
– volume: 4
  start-page: 219
  issue: 4
  year: 2012
  end-page: 231
  article-title: Competitive clustering algorithms based on ultrametric properties
  publication-title: Journal of Computational Science (Elsevier)
– volume: 1
  start-page: 27
  issue: 1
  year: 2007
  end-page: 39
  article-title: A neuro‐fuzzy collaborative filtering approach for web recommendation
  publication-title: International Journal of Communication Systems
– volume: 25
  start-page: 672
  issue: 5
  year: 2012
  end-page: 688
  article-title: Effective allied network security system based on designed scheme with conditional legitimate probability against distributed network attacks and intrusions
  publication-title: International Journal of Communication Systems
– start-page: 189
  year: 2001
  end-page: 199
  article-title: SPINS: Security Protocols for Sensor Networks
  publication-title: Mobile Computing and Networking
– volume: 53
  start-page: 2022
  year: 2009
  end-page: 2037
  article-title: Secure data aggregation in wireless sensor networks: a comprehensive overview
  publication-title: Computer Networks
– start-page: 109
  year: 2007
  end-page: 115
– volume: 23
  issue: 9‐10
  year: 2010
  article-title: Energy distribution‐aware clustering algorithm for dense wireless sensor networks
  publication-title: International Journal of Communication Systems
– volume: 4
  issue: 18
  year: 2008
  article-title: Detecting denial of service attacks in sensor networks
  publication-title: Journal of Computers
– start-page: 8020
  year: 2000
  end-page: 8030
– volume: 3
  start-page: 366
  issue: 4
  year: 2004
  end-page: 379
  article-title: HEED: a hybrid, energy‐efficient distributed clustering approach for ad hoc sensor networks
  publication-title: IEEE Transactions on Mobile Computing
– volume: 3
  start-page: 281
  year: 2012
  end-page: 283
  article-title: Performance evaluation of leach protocol in wireless network
  publication-title: International Journal of Scientific & Engineering Research
– year: 2012
– volume: 30
  start-page: 2385
  year: 2007
  end-page: 2400
  article-title: Adaptive security design with malicious node detection in cluster‐based sensor networks
  publication-title: Computer Communications
– volume: 4
  issue: 1
  year: 2012
  article-title: Surveying position based routing protocols for wireless sensor and ad‐hoc networks
  publication-title: Computer and Mathematics with Applications
– volume: 62
  start-page: 201
  issue: 1
  year: 2012
  end-page: 214
  article-title: Cross layer secure and resource‐aware on‐demand routing protocol for hybrid wireless mesh networks
  publication-title: Wireless Personal Communications
– volume: 4
  start-page: 80
  year: 2009
  end-page: 92
  article-title: Optimal sensor placement for detection against distributed denial of service attacks
  publication-title: Pakistan Journal of Engineering & Applied Sciences
– volume: 32
  start-page: 337
  year: 2009
  end-page: 387
  article-title: Using mobile agents to recover from node and database compromise in path‐based DoS attacks in wireless sensor networks
  publication-title: Journal of Network and Computer Applications
– start-page: 368
  year: 2002
  end-page: 372
– volume: 25
  start-page: 529
  issue: 4
  year: 2012
  end-page: 542
  article-title: Clustering‐based power‐controlled routing for mobile wireless sensor networks
  publication-title: International Journal of Communication Systems
– volume: 10
  start-page: 10376
  issue: 11
  year: 2010
  end-page: 10386
  article-title: Research on a denial of service (DoS) detection system based on global interdependent behaviors in a sensor network environment
  publication-title: Sensors ISSN
– start-page: 1
  year: 2009
  end-page: 6
  article-title: Detection of jamming attacks in wireless ad hoc networks using error distribution
  publication-title: IEEE International Conference on Communications (ICC)
– volume: 87
  start-page: 2882
  year: 2007
  end-page: 2895
  article-title: SecLEACH—on the security of clustered sensor networks
  publication-title: Signal Processing
– volume: 5
  start-page: 145
  issue: 2
  year: 2007
  end-page: 153
  article-title: Preventing DoS attacks in wireless sensor networks: a repeated game theory approach
  publication-title: International Journal of Network Security
– year: 2006
– volume: 33
  start-page: 1531
  year: 2010
  end-page: 1542
  article-title: Denial of service attack‐resistant flooding authentication in wireless sensor networks
  publication-title: Computer Communications
– start-page: 35
  year: 2011
  end-page: 42
– volume: 3
  start-page: 69
  year: 2005
  end-page: 89
  article-title: Security considerations in ad hoc sensor networks
  publication-title: Ad Hoc Networks
– volume: 34
  start-page: 418
  year: 2011
  end-page: 428
  article-title: A novel node level security policy framework for wireless sensor networks
  publication-title: Journal of Network and Computer Applications
– start-page: 46
  year: 2005
  end-page: 57
– start-page: 123
  year: 2011
  end-page: 128
– start-page: 217
  year: 1999
  end-page: 235
– volume: 25
  start-page: 30
  issue: 1
  year: 2012
  end-page: 46
  article-title: QoS multicast routing in cognitive radio ad hoc networks
  publication-title: International Journal of Communication Systems
– volume: 2013
  year: 2013
  article-title: Secure routing protocol using cross‐layer design and energy harvesting in wireless sensor networks
  publication-title: IJDSN
– volume: 25
  issue: 9
  year: 2012
  article-title: 6lowpan: a study on QoS security threats and countermeasures using intrusion detection system approach
  publication-title: International Journal of Communication Systems
– ident: e_1_2_7_28_1
  doi: 10.1016/j.comcom.2007.04.008
– ident: e_1_2_7_37_1
– volume: 5
  start-page: 145
  issue: 2
  year: 2007
  ident: e_1_2_7_30_1
  article-title: Preventing DoS attacks in wireless sensor networks: a repeated game theory approach
  publication-title: International Journal of Network Security
– start-page: 217
  volume-title: Proceedings of the 7th International Conference on Database Theory LNCS
  year: 1999
  ident: e_1_2_7_34_1
– ident: e_1_2_7_29_1
– ident: e_1_2_7_18_1
  doi: 10.1002/dac.1103
– ident: e_1_2_7_21_1
  doi: 10.1109/TMC.2004.41
– ident: e_1_2_7_27_1
  doi: 10.1016/j.comcom.2010.03.027
– volume: 4
  issue: 18
  year: 2008
  ident: e_1_2_7_16_1
  article-title: Detecting denial of service attacks in sensor networks
  publication-title: Journal of Computers
– volume: 2013
  year: 2013
  ident: e_1_2_7_5_1
  article-title: Secure routing protocol using cross‐layer design and energy harvesting in wireless sensor networks
  publication-title: IJDSN
– ident: e_1_2_7_22_1
  doi: 10.1109/ICC.2012.6364158
– ident: e_1_2_7_33_1
– volume: 4
  start-page: 80
  year: 2009
  ident: e_1_2_7_26_1
  article-title: Optimal sensor placement for detection against distributed denial of service attacks
  publication-title: Pakistan Journal of Engineering & Applied Sciences
– volume: 1
  start-page: 27
  issue: 1
  year: 2007
  ident: e_1_2_7_35_1
  article-title: A neuro‐fuzzy collaborative filtering approach for web recommendation
  publication-title: International Journal of Communication Systems
– ident: e_1_2_7_36_1
  doi: 10.1109/ISCC.2011.5984038
– ident: e_1_2_7_31_1
  doi: 10.1145/2069105.2069112
– ident: e_1_2_7_23_1
  doi: 10.1109/WCNC.2013.6554905
– ident: e_1_2_7_32_1
  doi: 10.1016/j.jocs.2011.11.004
– ident: e_1_2_7_7_1
  doi: 10.1016/j.jnca.2010.03.004
– start-page: 1
  year: 2009
  ident: e_1_2_7_13_1
  article-title: Detection of jamming attacks in wireless ad hoc networks using error distribution
  publication-title: IEEE International Conference on Communications (ICC)
– ident: e_1_2_7_25_1
  doi: 10.1016/j.sigpro.2007.05.016
– ident: e_1_2_7_10_1
  doi: 10.3390/s101110376
– ident: e_1_2_7_38_1
  doi: 10.1002/dac.1285
– volume: 4
  issue: 1
  year: 2012
  ident: e_1_2_7_3_1
  article-title: Surveying position based routing protocols for wireless sensor and ad‐hoc networks
  publication-title: Computer and Mathematics with Applications
– ident: e_1_2_7_6_1
  doi: 10.1016/j.jnca.2008.02.017
– ident: e_1_2_7_4_1
  doi: 10.1002/dac.1280
– ident: e_1_2_7_8_1
  doi: 10.1002/dac.1289
– start-page: 189
  year: 2001
  ident: e_1_2_7_24_1
  article-title: SPINS: Security Protocols for Sensor Networks
  publication-title: Mobile Computing and Networking
  doi: 10.1145/381677.381696
– ident: e_1_2_7_19_1
– ident: e_1_2_7_17_1
  doi: 10.1002/dac.2438
– ident: e_1_2_7_12_1
  doi: 10.1145/1062689.1062697
– ident: e_1_2_7_9_1
  doi: 10.1016/j.adhoc.2003.09.009
– ident: e_1_2_7_14_1
  doi: 10.1007/s11277-010-0048-y
– ident: e_1_2_7_2_1
  doi: 10.1002/dac.2356
– ident: e_1_2_7_20_1
  doi: 10.1016/j.comnet.2009.02.023
– volume: 3
  start-page: 281
  year: 2012
  ident: e_1_2_7_15_1
  article-title: Performance evaluation of leach protocol in wireless network
  publication-title: International Journal of Scientific & Engineering Research
– volume: 5
  start-page: 145
  issue: 2
  year: 2007
  ident: e_1_2_7_11_1
  article-title: Preventing DoS attacks in wireless sensor networks: a repeated game theory approach
  publication-title: International Journal of Network Security
SSID ssj0008265
Score 2.0994673
Snippet SUMMARYThis paper presents a novel approach for detecting denial of service attacks. In particular, the concern is on the sleeping deprivation attacks such as...
This paper presents a novel approach for detecting denial of service attacks. In particular, the concern is on the sleeping deprivation attacks such as the...
SUMMARY This paper presents a novel approach for detecting denial of service attacks. In particular, the concern is on the sleeping deprivation attacks such as...
SourceID hal
proquest
crossref
wiley
istex
SourceType Open Access Repository
Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 309
SubjectTerms Algorithms
Clustering
Computer Science
Denial of service attacks
DoS attack
FFUCA
Flooding
LEACH
Mathematical models
Remote sensors
Sensors
Wireless networks
WSN
Title Recursive-clustering-based approach for denial of service (DoS) attacks in wireless sensors networks
URI https://api.istex.fr/ark:/67375/WNG-B6XTS8WJ-Z/fulltext.pdf
https://onlinelibrary.wiley.com/doi/abs/10.1002%2Fdac.2670
https://www.proquest.com/docview/1636644220
https://www.proquest.com/docview/1651372877
https://hal.u-pec.fr/hal-04030489
Volume 28
WOSCitedRecordID wos000346496800008&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVWIB
  databaseName: Wiley Online Library - Journals
  customDbUrl:
  eissn: 1099-1131
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0008265
  issn: 1074-5351
  databaseCode: DRFUL
  dateStart: 19960101
  isFulltext: true
  titleUrlDefault: https://onlinelibrary.wiley.com
  providerName: Wiley-Blackwell
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV3LbtQwFLVghgUsyrNiSkEGIR6LqBnbsePl0GGoUDVCfagjNpbtOGrFKEGTmYoln8A38iXcmxetBBISqyjxjWL5-l4fO8fHhLzkVuV5DsjNqTSORLBx5DLrIpsoxp32UihfHzah5vN0sdCfWlYl7oVp9CH6BTeMjDpfY4BbV-39Fg3N4HtMKpiuDxl0WzEgw-nR7PSwz8MAnJOOcZjwZNxJz8Zsr3v32mB08xypkENs3W_X8OZV1FoPO7O7_1Phe2SrBZt00vSO--RGKB6QO1ckCB-S8yNccEcO-8_vP_xyg7oJUAA3OL5ltNMcpwBuaYbMvCUtc1o1KYa-mZbHb6ldr3GrPr0oKEofLyF7gkVRlauKFg3PvHpETmfvT_YPovb0hcgDqIijnGWABQAd2gApUEvmhVfCx5kQjrNMu7HOebA595rhvMfLhDnAT5LnnOss5ttkUJRFeEyos14E6cATLhVcAEhVKmc69kHKhKt0RF53bjC-lSbHEzKWphFVZgbazmDbjcjz3vJrI8fxB5sX4Mm-GPWzDyaHBp9BxuKQsvTleERe1Y7uzezqC3LcVGLO5h_MO7k4OU7PPprPI7Lb9QTThndlAMRKAJKMYYX6YghM_Ntii1Bu0CYZcwUTUgXfqvvFX2tsppN9vO78q-ETchuAG7IuI5bsksF6tQlPyS1_ub6oVs_aQPgFFg0MgQ
linkProvider Wiley-Blackwell
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1bb9MwFLZGiwQ8cEcrDDAIcXmIlvqaiKeyUgqUCm2dVvFi2U6iTasS1LQTj_wEfiO_hHOSJmwSSEg8RYlPZMvn4s_28WdCnnGrsywD5OZ0FAYitWHgEusCKzXjLvZKaF9dNqGn02g-jz9vkdfNWZiaH6JdcEPPqOI1OjguSO_-Zg1NoEKmNMzXuwKsSHZId7g_Opy0gRiQs2xSDiWX_YZ7NmS7zb8XRqNLx5gL2cXu_XYBcJ6HrdW4M7rxXy2-Sa5v4CYd1PZxi2yl-W1y7RwJ4R1yvI9L7pjF_vP7D79YI3MCFMALjnAJbVjHKcBbmmBu3oIWGS3rIENfDouDV9SuVnhYn57kFMmPFxA_QSIvi2VJ8zrTvLxLDkdvZ3vjYHP_QuABVoRBxhJAA4APbQpBMFbMC6-FDxMhHGdJ7PpxxlObcR8znPl4JZkDBKV4xnmchPwe6eRFnm4T6qwXqXKgChcJLgCmap2xOPSpUpLrqEdeNHowfkNOjndkLExNq8wM9J3BvuuRJ63k15qQ4w8yT0GVbTEyaI8HE4PfIGZxCFrxWb9HnleabsXs8hSz3LQ0R9N35o2azw6iow_mS4_sNKZgNg5eGoCxCqAkY9igthhcE_dbbJ4Wa5SRfa5hSqqhrsow_tpiMxzs4fP-vwo-JlfGs08TM3k__fiAXAUYhzmYAZM7pLNartOH5LI_W52Uy0cbr_gFHecQcQ
linkToPdf http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1bb9MwFLbGitB44I5WGGAQgvEQLbUTOxZPZaUMqKppF63ixXIcW5uokqlpJx75CfxGfgnn5MYmgYTEU5T4RLF8fI4_O58_E_KSG-m9B-SWyiQMImfCIM1MGphYMp4qKyJpq8Mm5HSazGZqf428bffC1PoQ3YIbRkaVrzHA3Xnmd36rhmbwQSYkzNd7UawERGVvdDA-nnSJGJBz3FIOYx4PWu3ZkO20714Zja6dIheyh8377QrgvAxbq3FnfPu_anyH3GrgJh3W_eMuWXP5PXLzkgjhfXJ6gEvuyGL_-f2Hna9QOQEK4AZHuIy2quMU4C3NkJs3p4WnZZ1k6PaoOHxDzXKJm_XpWU5R_HgO-RMs8rJYlDSvmeblA3I8fn-0uxc05y8EFmBFGHiWARoAfGgcJEElmI2sjGyYRVHKWabSgfLcGc-tYjjzsSJmKSAowT3nKgv5Q7KeF7nbJDQ1NnIiBVekScQjgKlSeqZC64SIuUz65HXrB20bcXI8I2Oua1llpqHtNLZdnzzvLM9rQY4_2LwAV3bFqKC9N5xofAY5i0PSUheDPnlVebozM4uvyHKTsT6ZftDvxOzoMDn5pL_0yVbbFXQT4KUGGCsASjKGFeqKITTxf4vJXbFCm3jAJUxJJXyr6hh_rbEeDXfx-uhfDZ-RG_ujsZ58nH5-TDYAxSEFM2DxFllfLlbuCbluL5Zn5eJpExS_AJHVD-w
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Recursive-clustering-based+approach+for+denial+of+service+%28DoS%29+attacks+in+wireless+sensors+networks&rft.jtitle=International+journal+of+communication+systems&rft.au=Fouchal%2C+S&rft.au=Mansouri%2C+D&rft.au=Mokdad%2C+L&rft.au=Iouallalen%2C+M&rft.date=2015-01-25&rft.issn=1074-5351&rft.eissn=1099-1131&rft.volume=28&rft.issue=2&rft.spage=309&rft.epage=324&rft_id=info:doi/10.1002%2Fdac.2670&rft.externalDBID=NO_FULL_TEXT
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1074-5351&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1074-5351&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1074-5351&client=summon