DOS ATTACK TYPES

:
DoS attack on the Physical layer:
-

Jamming: occupies the communication channel between the Wireless Sensor
Network (WSN) nodes, thus preventing them from communicating with each
other.

-

Tempering: Attackers can take advantage of the limited memory and
processing power of IoT device to attack them with brute force and extract
sensitive information or damage the device.

DoS attack at Link layer
-

Exhaustion: attacker may disrupt the channel by continuously requesting and
transmitting over it.

-

Collision: two nodes simultaneously transmit data packets on the same
channel. That causes mismatch identification at the receiving end.

-

Unfairness: attacker repeatedly cause collisions to degrade the service.

DoS attack on Network layer
-

Spoofing, replaying and misdirection of traffic.

-

Hello flood attack: congesting channel with an unusually high number of
useless message.

-

Homing attack: attacking to vital nodes such as cluster heads or key
managers to shut down the entire network.

-

Selective forwarding: attacker forwards a few selected traffic and drops the
rest. Black hole attack is when the attacker drops all traffic coming to it.

-

Sybil: attackers replicates a single node and presents it with multiple
identities to the other nodes.

-

Wormhole: attacker receives packets at one location in the network, then
moves to other location and replays the packet there.

DoS attack on the Transport layer
-

Flooding: attacker repeatedly establishes new connection requests until the
resources are exhausted.

-

De-Synchronization: attacker disrupted the connection between two
endpoints by forges messages to either or both endpoints.

and periodically send authentication packet to each node and wait for a fixed period.Distributed Detection of Flooding and Gray Hole Attacks in Wireless Sensor Network The method will detect the abnormal energy consumption of a sensor node. A cluster head will be elected for each cluster. First. 2.Detection of Jamming Style DoS attack in Wireless Sensor Network For each node.DoS attack on the Application layer: - Reprogramming attack: attacker modifies the source code such that application goes into infinite loop or keep sending bogus messages. collect Received Signal Strength Indicator (RSSI). Then cluster coordinator is elected and it becomes the responsibility of the cluster. The node consuming significantly high energy is identifies as the attacker and will be isolated from the network. and computes weight value for each node. The cluster head periodically checks energy consumption of each member nodes. 3. The monitor node collects RSSI and PDR from its neighbors periodically. Nodes that have high RE value are selected as monitor nodes. 2012 IEEE . - Path based DoS: flooding a multi-hop end-to-end communication path with either replayed packets or injected spurious packets. . Initial energy of each cluster member is known. If the computed weight is greater than a threshold. The cluster coordination manages each nodes in cluster with ID. the corresponding node is marked as jammer. 2013 Detection and Prevention Mechanism for blackhole attack in WSN The method builds clusters from sensor nodes. If a node does not respond in time. IoT DOS DETECTION 1. Packet Deliver Ratio (PDR) and Residual Energy (RE). 2015 ICSTM . Cluster contains nodes which are in the communication range of each other. it means the node has failed or has been compromised. it divides nodes into clusters. so that the application becomes inaccessible.