{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T03:02:41Z","timestamp":1742958161404,"version":"3.40.3"},"publisher-location":"Cham","reference-count":43,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031079689"},{"type":"electronic","value":"9783031079696"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-07969-6_8","type":"book-chapter","created":{"date-parts":[[2022,7,2]],"date-time":"2022-07-02T22:02:29Z","timestamp":1656799349000},"page":"100-115","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Denial of Service Attack Detection in Wireless Sensor Networks and Software Defined Wireless Sensor Networks: A Brief Review"],"prefix":"10.1007","author":[{"given":"Hamza","family":"Belkhiri","sequence":"first","affiliation":[]},{"given":"Abderraouf","family":"Messai","sequence":"additional","affiliation":[]},{"given":"Andr\u00e9-Luc","family":"Beylot","sequence":"additional","affiliation":[]},{"given":"Farhi","family":"Haider","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,7,3]]},"reference":[{"issue":"6","key":"8_CR1","doi-asserted-by":"publisher","first-page":"160","DOI":"10.1109\/MNET.2018.1700460","volume":"32","author":"N Cheng","year":"2018","unstructured":"Cheng, N., et al.: Big data driven vehicular networks. IEEE Network 32(6), 160\u2013167 (2018)","journal-title":"IEEE Network"},{"issue":"15","key":"8_CR2","doi-asserted-by":"publisher","first-page":"2787","DOI":"10.1016\/j.comnet.2010.05.010","volume":"54","author":"L Atzori","year":"2010","unstructured":"Atzori, L., Iera, A., Morabito, G.: The internet of things: a survey. Comput. Netw. 54(15), 2787\u20132805 (2010)","journal-title":"Comput. Netw."},{"key":"8_CR3","unstructured":"Alsace, H., Domaine, F., Math, L.M.D., Fili, I., Sp, I.: T h\u00e8se de D octorat 3 \u00e8me Cycle M r K amel SADDIKI D enial of services attack in wireless networks. 2018\u20132019 (2019)"},{"key":"8_CR4","doi-asserted-by":"publisher","first-page":"700","DOI":"10.1016\/j.procs.2016.03.092","volume":"79","author":"P Amish","year":"2016","unstructured":"Amish, P., Vaghela, V.B.: Detection and prevention of wormhole attack in wireless sensor network using AOMDV protocol. Procedia Comput. Sci. 79, 700\u2013707 (2016)","journal-title":"Procedia Comput. Sci."},{"key":"8_CR5","doi-asserted-by":"publisher","first-page":"1872","DOI":"10.1109\/ACCESS.2017.2666200","volume":"5","author":"HI Kobo","year":"2017","unstructured":"Kobo, H.I., Abu-Mahfouz, A.M., Hancke, G.P.: A survey on software-defined wireless sensor networks: challenges and design requirements. IEEE Access 5, 1872\u20131899 (2017)","journal-title":"IEEE Access"},{"issue":"5:1031","key":"8_CR6","first-page":"1","volume":"17","author":"M Ndiaye","year":"2017","unstructured":"Ndiaye, M., Hancke, G.P., Abu-Mahfouz, A.M.: Software defined working for improved wireless sensor network management: a survey. Sensors. 17(5:1031), 1\u201332 (2017)","journal-title":"Sensors."},{"issue":"12","key":"8_CR7","doi-asserted-by":"publisher","first-page":"155014771988990","DOI":"10.1177\/1550147719889906","volume":"15","author":"M Saqib","year":"2019","unstructured":"Saqib, M., Khan, F.Z., Ahmed, M., Mehmood, R.M.: A critical review on security approaches to software-defined wireless sensor networking. Int. J. Distrib. Sens. Netw. 15(12), 155014771988990 (2019)","journal-title":"Int. J. Distrib. Sens. Netw."},{"key":"8_CR8","doi-asserted-by":"crossref","unstructured":"Pritchard, S.W., et al.: Security in software-defined wireless sensor networks: threats, challenges and potential solutions. In: Proceedings \u2013 2017 IEEE 15th International Conference on Industrial Informatics, vol. 2017, pp. 168\u201373 (2017)","DOI":"10.1109\/INDIN.2017.8104765"},{"key":"8_CR9","first-page":"2231","volume":"31","author":"K Venkatraman","year":"2013","unstructured":"Venkatraman, K., Daniel, J.V., Murugaboopathi, G.: Various attacks in wireless sensor network: survey. Int. J. Soft Comput. Eng. 31, 2231\u20132307 (2013)","journal-title":"Int. J. Soft Comput. Eng."},{"key":"8_CR10","doi-asserted-by":"crossref","unstructured":"Patel, M.M., Aggarwal, A.: Security attacks in wireless sensor networks: a survey. In: 2013 International Conference Intelligent System Signal Processing ISSP 2013, pp. 329\u2013333 (2013)","DOI":"10.1109\/ISSP.2013.6526929"},{"issue":"3","key":"8_CR11","first-page":"2","volume":"3","author":"R Dubey","year":"2012","unstructured":"Dubey, R., Jain, V., Thakur, R.S., Choubey, S.D.: Attacks in wireless sensor networks. Comput. Sci. 3(3), 2\u20135 (2012)","journal-title":"Comput. Sci."},{"key":"8_CR12","doi-asserted-by":"crossref","unstructured":"Manuel, M., Isong, B., Esiefarienrhe, M., Abu-Mahfouz, A.M.: Analysis of notable security issues in SDWSN. In: IECON 2018-44th Annual Conference of the IEEE Industrial Electronics Society, pp. 4706\u20134711. IEEE (2018)","DOI":"10.1109\/IECON.2018.8591230"},{"issue":"21","key":"8_CR13","doi-asserted-by":"publisher","first-page":"6106","DOI":"10.3390\/s20216106","volume":"20","author":"A Derhab","year":"2020","unstructured":"Derhab, A., Bouras, A., Belaoued, M., Maglaras, L., Khan, F.A.: Two-hop monitoring mechanism based on relaxed flow conservation constraints against selective routing attacks in wireless sensor networks. Sensors 20(21), 6106 (2020)","journal-title":"Sensors"},{"key":"8_CR14","unstructured":"Lehsaini, M.: Th\u00e8se de Doctorat Diffusion et couverture bas\u00e9es sur le clustering dans les r\u00e9seaux de capteurs\u202f: application \u00e0 la domotique. Universit\u00e9 A.B Tlemcen (2009)"},{"key":"8_CR15","doi-asserted-by":"publisher","DOI":"10.5772\/49376","volume-title":"Wireless Sensor Networks \u2013 Technology and Protocols","author":"MA Matin","year":"2012","unstructured":"Matin, M.A., Islam, M.M.: Overview of wireless sensor network. In: Matin, M. (ed.) Wireless Sensor Networks \u2013 Technology and Protocols. InTech (2012). https:\/\/doi.org\/10.5772\/49376"},{"key":"8_CR16","doi-asserted-by":"crossref","unstructured":"Bull, P., Austin, R., Popov, E., Sharma, M., Watson, R.: Flow based security for IoT devices using an SDN gateway. In: Proceedings of the 2016 IEEE 4th International Conference Future Internet Things Cloud, pp157\u2013163. FiCloud (2016)","DOI":"10.1109\/FiCloud.2016.30"},{"key":"8_CR17","unstructured":"Fraser, B., et al.: Introduction: What Is Software Defined Networking? pp. 36\u201343 (2013)"},{"issue":"5","key":"8_CR18","doi-asserted-by":"publisher","first-page":"1031","DOI":"10.3390\/s17051031","volume":"17","author":"M Ndiaye","year":"2017","unstructured":"Ndiaye, M., Hancke, G., Abu-Mahfouz, A.: Software defined networking for improved wireless sensor network management: a survey. Sensors 17(5), 1031 (2017)","journal-title":"Sensors"},{"issue":"12","key":"8_CR19","doi-asserted-by":"publisher","first-page":"1872","DOI":"10.1109\/ACCESS.2017.2666200","volume":"5","author":"HI Kobo","year":"2017","unstructured":"Kobo, H.I., Abu-Mahfouz, A.M., Hancke, G.P.: A survey on software-defined wireless sensor networks: challenges and design requirements. IEEE Access 5(12), 1872\u20131899 (2017)","journal-title":"IEEE Access"},{"key":"8_CR20","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1016\/j.jnca.2018.06.016","volume":"119","author":"H Mostafaei","year":"2018","unstructured":"Mostafaei, H., Menth, M.: Software-defined wireless sensor networks: a survey. J. Netw. Comput. Appl. 119, 42\u201356 (2018)","journal-title":"J. Netw. Comput. Appl."},{"issue":"2","key":"8_CR21","doi-asserted-by":"publisher","first-page":"10","DOI":"10.11648\/j.awcn.20170302.11","volume":"3","author":"MA Hassan","year":"2017","unstructured":"Hassan, M.A., Vien, Q.-T., Aiash, M.: Software defined networkingfor wireless sensor networks: a survey. Adv. Wireless Commun. Netw. 3(2), 10\u201322 (2017)","journal-title":"Adv. Wireless Commun. Netw."},{"key":"8_CR22","doi-asserted-by":"crossref","unstructured":"Egidius, P.M., Abu-Mahfouz, A.M., Hancke, G.P.: Programmable node in software-defined wireless sensor networks: a review. In: Proceedings of the IECON 2018 \u2013 44th Annual Conference IEEE Industrial Electronics Society, pp. 4672\u20134677 (2018)","DOI":"10.1109\/IECON.2018.8591169"},{"key":"8_CR23","doi-asserted-by":"crossref","unstructured":"Kipongo, J., Olwal, T.O., Abu-Mahfouz, A.M.: Topology discovery protocol for software defined wireless sensor network: solutions and open issues. In: IEEE International Symposium on Industrial Electronics, vol. 2018, pp. 1282\u20131287 (2018)","DOI":"10.1109\/ISIE.2018.8433653"},{"key":"8_CR24","doi-asserted-by":"crossref","unstructured":"Kobo, H.I., Hancke, G.P., Abu-Mahfouz, A.M.: Towards a distributed control system for software defined wireless sensor networks. In: IECON 2017 \u2013 43rd Annual Conference IEEE Industrial Electronic Society, vol. 2, pp. 6125\u20136130 (2017)","DOI":"10.1109\/IECON.2017.8217064"},{"key":"8_CR25","doi-asserted-by":"crossref","unstructured":"Belkhiri, H., et al.: Security in the internet of things\u202f: recent challenges and solutions. In: Fourth International Conference on Electrical Engineering And Control Applications ICEECA. Constantine (2019)","DOI":"10.1007\/978-981-15-6403-1_79"},{"issue":"1","key":"8_CR26","doi-asserted-by":"publisher","first-page":"130","DOI":"10.15446\/ing.investig.v38n1.65453","volume":"38","author":"Z Gavric","year":"2018","unstructured":"Gavric, Z., Simic, D.: Overview of DOS attacks on wireless sensor networks and experimental results for simulation of interference attacks Visi\u00f3n general de los ataques de DOS en redes de sensores de ataques de interfrencia. Ing. Invest. 38(1), 130\u2013138 (2018)","journal-title":"Ing. Invest."},{"key":"8_CR27","unstructured":"Maylyn, B.: What Is the Difference Between DoS and DDoS Attacks?, Bisend. https:\/\/www.bisend.com\/blog\/difference-between-dos-and-ddos-attack (2019)"},{"key":"8_CR28","doi-asserted-by":"publisher","first-page":"1188","DOI":"10.1016\/j.procs.2018.04.297","volume":"131","author":"T Yang","year":"2018","unstructured":"Yang, T., et al.: Intrusion detection system for hybrid attack using energy trust in wireless sensor networks. Procedio Comput. Sci. 131, 1188\u20131195 (2018)","journal-title":"Procedio Comput. Sci."},{"key":"8_CR29","first-page":"166","volume":"22","author":"CK Marigowda","year":"2018","unstructured":"Marigowda, C.K., Thriveni, J., et al.: An efficient secure algorithms to mitigate DoS, replay andjamming attacks in wireless sensor network. Lect. Notes Eng. Comput. Sci. 22, 166\u2013171 (2018)","journal-title":"Lect. Notes Eng. Comput. Sci."},{"issue":"2","key":"8_CR30","doi-asserted-by":"publisher","first-page":"461","DOI":"10.3390\/s20020461","volume":"20","author":"A Amouri","year":"2020","unstructured":"Amouri, A., Alaparthy, V.T., Morgera, S.D.: A machine learning based intrusion detection system for mobile internet of things. Sensors 20(2), 461 (2020)","journal-title":"Sensors"},{"key":"8_CR31","doi-asserted-by":"crossref","unstructured":"Al-issa, A.I., et al.: Using machine learning to detect DoS attacks in wireless sensor networks. In: 2019 IEEE Jordan International Joint Conference on Electrical Engineering and Information Technology, pp. 107\u2013112 (2019)","DOI":"10.1109\/JEEIT.2019.8717400"},{"key":"8_CR32","doi-asserted-by":"publisher","first-page":"32853","DOI":"10.1109\/ACCESS.2019.2903816","volume":"7","author":"H Chen","year":"2019","unstructured":"Chen, H., Meng, C., Shan, Z., Fu, Z., Bhargava, B.K.: A novel low-rate denial of service attack detection approach in ZigBee wireless sensor network by combining hilbert-huang transformation and trust evaluation. IEEE Access 7, 32853\u201332866 (2019)","journal-title":"IEEE Access"},{"key":"8_CR33","doi-asserted-by":"crossref","unstructured":"Afianti, F., Wirawan, Suryani, T.: Lightweight and DoS resistant multiuser authentication in wireless sensor networks for smart grid environments. IEEE Access 7, 67107\u201367122 (2019)","DOI":"10.1109\/ACCESS.2019.2918199"},{"key":"8_CR34","doi-asserted-by":"publisher","first-page":"31068","DOI":"10.1109\/ACCESS.2019.2902843","volume":"7","author":"C Lyu","year":"2019","unstructured":"Lyu, C., Zhang, X., Liu, Z., Chi, C.H.: Selective authentication based geographic opportunistic routing in wireless sensor networks for internet of things against DoS attacks. IEEE Access 7, 31068\u201331082 (2019)","journal-title":"IEEE Access"},{"key":"8_CR35","doi-asserted-by":"crossref","unstructured":"Nayak, P.: A Review on DoS attack for WSN: defense and detection mechanisms. In: 2017 International Conference on Energy, Communication Data Analytics and Soft Computing, pp. 453\u2013461 (2018)","DOI":"10.1109\/ICECDS.2017.8390208"},{"key":"8_CR36","unstructured":"Cao, Y., Han, L., Zhao, X., Pan, X.: AccFlow\u202f: defending against the low-rate TCP DoSAttack in wireless sensor networks. Comput. Sci. X(XX), 1\u201314 (2018)"},{"key":"8_CR37","doi-asserted-by":"publisher","unstructured":"Guerrero-Sanchez, A.E., Rivas-Araiza, E.A., Gonzalez-Cordoba, J.L., Toledano-Ayala, M., Takacs, A.: Blockchain mechanism and symmetric encryption in a wireless sensor network. Sensors (Switzerland) (2020). https:\/\/doi.org\/10.3390\/s2010279","DOI":"10.3390\/s2010279"},{"key":"8_CR38","doi-asserted-by":"publisher","first-page":"2602","DOI":"10.1109\/TIFS.2020.2973875","volume":"15","author":"C Miranda","year":"2020","unstructured":"Miranda, C., Kaddoum, G., Bou-Harb, E., Garg, S., Kaur, K.: A collaborative security framework for software-defined wireless sensor networks. IEEE Trans. Inf. Forensics Secur. 15, 2602\u20132615 (2020)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"8_CR39","unstructured":"Nunez Segura, G.A., et al.: Denial of Service Attacks Detection in Software-Defined Wireless Sensor Networks. http:\/\/www.larc.usp.br\/users\/cbmargi\/w\/it-sdn\/"},{"issue":"7","key":"8_CR40","first-page":"3671","volume":"13","author":"M Huang","year":"2019","unstructured":"Huang, M., Yu, B.: Fuzzyguard: a ddos attack prevention exte-nsion in software-defined wireless sensor networks. KSII Trans. Internet Inf. Syst. 13(7), 3671\u20133689 (2019)","journal-title":"KSII Trans. Internet Inf. Syst."},{"issue":"14","key":"8_CR41","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1002\/dac.4020","volume":"32","author":"VM Vishnu","year":"2019","unstructured":"Vishnu, V.M., Manjunath, P.: SeC-SDWSN: secure cluster-based SDWSN environment for QoS guaranteed routing in three-tier architecture. Int. J. Commun. Syst. 32(14), 1\u201322 (2019)","journal-title":"Int. J. Commun. Syst."},{"key":"8_CR42","doi-asserted-by":"crossref","unstructured":"Rawat, D., Reddy, S.: Recent advances on software defined wireless networking. In: IEEE SoutheastCon, pp. 1\u20138 (2016)","DOI":"10.1109\/SECON.2016.7506770"},{"key":"8_CR43","doi-asserted-by":"publisher","first-page":"14329","DOI":"10.1109\/ACCESS.2020.2966321","volume":"8","author":"M Belaoued","year":"2020","unstructured":"Belaoued, M., Derhab, A., Mazouzi, S., Khan, F.A.: MACoMal: a multi-agent based collaborative mechanism for anti-malware assistance. IEEE Access 8, 14329\u201314343 (2020)","journal-title":"IEEE Access"}],"container-title":["Lecture Notes in Networks and Systems","Proceedings of the 5th International Conference on Big Data and Internet of Things"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-07969-6_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,2]],"date-time":"2022-07-02T22:03:34Z","timestamp":1656799414000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-07969-6_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031079689","9783031079696"],"references-count":43,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-07969-6_8","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"type":"print","value":"2367-3370"},{"type":"electronic","value":"2367-3389"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"3 July 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"BDIoT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference On Big Data and Internet of Things","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Mohammed V University in Rabat","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Morocco","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 March 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 March 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"bdiot2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.amers.org\/bdiot21\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}