Book Details


Sri Vasavi College, Erode Self-Finance Wing, 3rd February 2017. National Conference on Computer and Communication, NCCC’17. International Journal of Computer Science (IJCS) Published by SK Research Group of Companies (SKRGC)

Download this PDF format


Wireless ad-hoc sensor network is increasing popularity in all organization and it is useful for communication. Wireless ad-hoc sensor network is vulnerable to Denial of Service (DOS) attack. The network resources are unavailable to users due to DOS attack. In DOS attack affects the node to consume more battery power and degrades the network performance. Various techniques are used for detection and prevention of DOS attack such as spread spectrum, Secured lightweight Mechanism, packet leash and energy weight monitoring system but DOS attack cannot fully prevented using this techniques. The paper reviews various types of DOS attacks and its Detection techniques.


[1] A. Agah, K. Basu, and S. K. Das, “A game theory based approach for security in sensor networks,” International Performance Computing and Communications Conference (IPCCC), pp:259-263, Phoenix, AZ, Apr. 2004.

[2] A. Agah, S. K. Das and K. Basu, “Preventing DoS attack in sensor and actor networks: A game theoretic approach,” IEEE International Conference on Communications (ICC), pp:3218-3222, Seoul, Korea, May 2005.

[3] A. Agah, S. K. Das, and K. Basu, “Enforcing security for prevention of DoS attack in wireless sensor networks using economical modeling, ” Proceedings of 2nd IEEE International Conference on Mobile AdHoc and Sensor Systems (MASS), Washington, D.C., Nov. 2005.

[4] I. F. Akyldiz, W. Su, Y. Sankarasubramaniam, E. Cayirci, “Wireless sensor networks: a survey,” Computer Networks, vol. 38, 2002, pp:393-422.

[5] R. Bace and P. Mell, “Intrusion detection systems,” NIST Special Publication on Intrusion Detection systems,

[6] G. E. Bolton, A. Ockenfels, “ERC a theory of equity, reciprocity, and competition,” The American Economic Review, vol. 90, 2000.

[7] S. Buchegger and J. L. Boudec, “Performance Analysis of the CONFIDANT Protocol Cooperation Of Nodes-Fairness In Dynamic Ad-hoc NeTworks,” International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc), 2002.

[8] S. Buchegger and J. L. Boudec, “Nodes bearing grudges: toward routing security, fairness and robustness in mobile ad hoc networks,” Proceedings of the 10th Euronicro Workshop on parallel, Distributed and Network-based Processing, Canary Islands, Spain, January 2002. International Journal of Network Security, Vol.5, No.2, PP.145–153, Sept. 2007 152

[9] L. Blazevic, L. Buttyaan, S. Capkun, S. Giordano, J. P. Hubaux, J. LeBoudec, “Self-organization in mobile ad hoc networks: the approach of terminodes,” IEEE Commun.Mag., vol. 39, no. 6, 2001, pp:161- 174.

[10] L. Buttyaan, J. P. Hubaux, “Report on a Working Session on Security in Wireless Ad Hoc Networks,” Mobile Computing and communications Review, vol.6, no.4, 2002.

[11] L. Buttyaan, J. P. Hubaux, “Nuglets: a virtual currency to stimulate cooperation in selforganized mobile ad hoc networks, ” Technical Report DSC/2001/001, Department of Communication Systems, Swiss Federal Institute of Technology, 2001.

[12] H. Chan and A. Perrig, “Security and Privacy in Sensor Networks,” IEEE Computer, vol.36, no.10, 2003, pp:103-105.

[13] C. Chong and S. P. Kumar, “Sensor networks: evolution, opportunities, and challenge,” Proceedings of the IEEE, special issue on sensor networks and application, vol. 91, no. 8, 2003, pp:1247-1256.

[14] J. Deng, R. Han, S. Mishra, “INSENS:Intrusiontolerant routing in wireless sensor networks,” Technical Report TR CU-CS-939-02, Dept. of Computer Science, University of Colorado, 2002.


ad-hoc sensor network, Denial of Service (DOS) attack.

  • Format Volume 5, Issue 1, No 9, 2017
  • Copyright All Rights Reserved ©2017
  • Year of Publication 2017
  • Author Dr.A.MariMuthu, N.Geetha Lakshmi
  • Reference IJCS-200
  • Page No 1228-1237

Copyright 2021 SK Research Group of Companies. All Rights Reserved.