Denial-of-Service(DoS) detection through practical entropy estimation on hierarchical sensor networks

Mihui Kim, Inshil Doh, Kijoon Chae

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

10 Scopus citations

Abstract

Wireless sensor networks face acute security concerns in applications. To achieve security in sensor networks, it is important to be able to defend against Denial-of-Service (DoS) attack recently considered as an extremely threatening attack. In this paper, we propose a DoS detection method via practical entropy estimation on hierarchical sensor networks reflecting resource constraints of sensors. In order to enhance the accuracy of detection even in the various deployments of attack agents, we deploy hierarchically entropy estimators according to network topology, and a main estimator synthesizes localized computation. This entropy estimator is simplified by only multiplication calculation instead of logarithm, in addition to providing higher estimation precision of entropy compared to the conventional entropy estimation. Our simulation results indicate that this hierarchical defense is a feasible method.

Original languageEnglish
Title of host publication8th International Conference Advanced Communication Technology, ICACT 2006 - Proceedings
Pages1562-1566
Number of pages5
StatePublished - 2006
Event8th International Conference Advanced Communication Technology, ICACT 2006 - Phoenix Park, Korea, Republic of
Duration: 20 Feb 200622 Feb 2006

Publication series

Name8th International Conference Advanced Communication Technology, ICACT 2006 - Proceedings
Volume3

Conference

Conference8th International Conference Advanced Communication Technology, ICACT 2006
Country/TerritoryKorea, Republic of
CityPhoenix Park
Period20/02/0622/02/06

Keywords

  • Denial-of-Service (DoS) detection
  • Entropy estimation
  • Hierarchical sensor networks

Fingerprint

Dive into the research topics of 'Denial-of-Service(DoS) detection through practical entropy estimation on hierarchical sensor networks'. Together they form a unique fingerprint.

Cite this