{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T19:11:58Z","timestamp":1772910718208,"version":"3.50.1"},"reference-count":121,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/OAPA.html"}],"funder":[{"name":"Advanced Sensor Networks SARChI Chair Program"},{"name":"University of Pretoria and the Council for Scientific and Industrial Research, through the National Research Foundation of South Africa"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2018]]},"DOI":"10.1109\/access.2018.2793841","type":"journal-article","created":{"date-parts":[[2018,1,23]],"date-time":"2018-01-23T14:18:08Z","timestamp":1516717088000},"page":"6975-7004","source":"Crossref","is-referenced-by-count":114,"title":["Denial of Service Defence for Resource Availability in Wireless Sensor Networks"],"prefix":"10.1109","volume":"6","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0832-307X","authenticated-orcid":false,"given":"Opeyemi A.","family":"Osanaiye","sequence":"first","affiliation":[]},{"given":"Attahiru S.","family":"Alfa","sequence":"additional","affiliation":[]},{"given":"Gerhard P.","family":"Hancke","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1109\/MNET.2006.1637931","article-title":"Jamming sensor networks: Attack and defense strategies","volume":"20","author":"xu","year":"2006","journal-title":"IEEE Netw"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijpe.2015.11.008"},{"key":"ref33","doi-asserted-by":"crossref","first-page":"1119","DOI":"10.1109\/TMC.2010.75","article-title":"Optimal jamming attack strategies and network defense policies in wireless sensor networks","volume":"9","author":"li","year":"2010","journal-title":"IEEE Trans Mobile Comput"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/IECON.2009.5415233"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2011.274"},{"key":"ref30","doi-asserted-by":"crossref","first-page":"941","DOI":"10.1109\/TMC.2010.36","article-title":"Secure data collection in wireless sensor networks using randomized dispersive routes","volume":"9","author":"shu","year":"2010","journal-title":"IEEE Trans Mobile Comput"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/AINAW.2007.255"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2014.03.007"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/j.measurement.2017.05.034"},{"key":"ref34","first-page":"430","article-title":"Storm control mechanism in wireless sensor networks","author":"rughini?","year":"2010","journal-title":"Proc 9th Roedunet Int Conference (RoEduNet"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1080\/00207217.2017.1279230"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1155\/2014\/240217"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/CEEC.2016.7835914"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2010.02.015"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"356","DOI":"10.1109\/IconSpace.2013.6599495","article-title":"Security in wireless sensor networks: Issues and challanges","author":"salehi","year":"2013","journal-title":"Proc IEEE Int Conf Space Sci Commun (IconSpace)"},{"key":"ref21","first-page":"1811","article-title":"Security and attacks in wireless sensor networks","author":"al ameen","year":"2012","journal-title":"Wireless Technologies Concepts Methodologies Tools and Applications"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2010.5718158"},{"key":"ref23","author":"sen","year":"2010","journal-title":"A Survey on Wireless Sensor Network Security"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0139513"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2009.02.023"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1002\/dac.2670"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03829-7_10"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-36511-9_8"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/EUROCON.2015.7313736"},{"key":"ref59","first-page":"1","article-title":"Towards intrusion detection in wireless sensor networks","author":"ioannis","year":"2007","journal-title":"Proc 13th Eur Wireless Conf"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/ISSNIP.2007.4496866"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/ICON.2007.4444082"},{"key":"ref56","author":"mamun","year":"2012","journal-title":"Hierarchical design based intrusion detection system for wireless ad hoc network"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSIT.2010.5563886"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.4304\/jetwi.5.1.18-27"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1007\/s10776-012-0179-z"},{"key":"ref52","first-page":"2507","article-title":"Using mobile agents to detect node compromise in path-based DoS attacks on wireless sensor networks","author":"li","year":"2007","journal-title":"Proc Int Conf Wireless Commun Netw Mobile comput (WiCOM)"},{"key":"ref40","first-page":"22","article-title":"Vulnerabilities and attacks in wireless sensor networks","author":"benenson","year":"2008","journal-title":"Wireless Sensors Networks Security"},{"key":"ref4","first-page":"265","article-title":"A zero-sum game theoretic framework for jamming detection and avoidance in wireless sensor networks","author":"xu","year":"2012","journal-title":"Proc Int Conf Comput Sci Inf Process (CSIP)"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2016.12.011"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2016.01.001"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2011.03.004"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2012.121912.00006"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-36511-9_7"},{"key":"ref7","first-page":"739","article-title":"A taxonomy for denial-of-service attacks in wireless sensor networks","author":"wood","year":"2004","journal-title":"Handbook of Sensor Networks Compact Wireless and Wired Sensing Systems"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.050113.00191"},{"key":"ref46","first-page":"180","article-title":"Main types of attacks in wireless sensor networks","author":"lupu","year":"2009","journal-title":"Proc WSEAS Int Conf Recent Adv Comput Eng"},{"key":"ref45","author":"bhattasali","year":"2012","journal-title":"Sleep deprivation attack detection in wireless sensor network"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-11194-0_53"},{"key":"ref47","author":"baadache","year":"2010","journal-title":"Avoiding black hole and cooperative black hole attacks in wireless ad hoc networks"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2008.6"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1007\/11734666_9"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2008.921621"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2002.1039518"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1145\/1541880.1541882"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-015-2734-2"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.3390\/s131215863"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/BROADNETS.2004.52"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2011.09.006"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2012.2223531"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.052213.00046"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2008.08.003"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13315-2_16"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2011.03.014"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2010.04.008"},{"key":"ref62","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1201\/9780849379253-8","article-title":"Intrusion detection in wireless sensor networks","author":"amini","year":"2007","journal-title":"Security in Distributed Grid Mobile and Pervasive Computing"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2014.03.012"},{"key":"ref63","first-page":"39","article-title":"Extended watchdog mechanism for wireless sensor networks","volume":"3","author":"huang","year":"2008","journal-title":"J Inf Comput Sci"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC.2006.1593102"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2010.2051556"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2012.09.004"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/SUTC.2008.39"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1145\/1089761.1089765"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2012.01.002"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2013.04.010"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1155\/2016\/4731953"},{"key":"ref109","first-page":"150","article-title":"Intrusion detection of sinkhole attacks in wireless sensor networks","author":"krontiris","year":"2007","journal-title":"Proc Int Symp Algorithms Experim Sensor Syst Wireless Netw Distrib Robot"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1109\/ISSNIP.2009.5416818"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1109\/ICCIT.2009.290"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38789-0_1"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-012-0529-y"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1155\/2016\/6047023"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2014.01.012"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1002\/sec.74"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2014.01.015"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2014.02.001"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1109\/CMC.2009.172"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2010.2051543"},{"key":"ref103","first-page":"109","article-title":"Artificial neural network based detection of energy exhaustion attacks in wireless sensor networks capable of energy harvesting","volume":"22","author":"alrajeh","year":"2014","journal-title":"Ad Hoc Sensor Wireless Netw"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-19853-3_54"},{"key":"ref111","first-page":"18","article-title":"A hybrid intrusion detection system of cluster-based wireless sensor networks","volume":"1","author":"yan","year":"2009","journal-title":"Proc Int Multiconf Eng Comput Sci"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2011.05.076"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1007\/978-90-481-3662-9_41"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1109\/CONFLUENCE.2014.6949343"},{"key":"ref99","doi-asserted-by":"crossref","first-page":"87","DOI":"10.3233\/ICA-2010-0334","article-title":"Distributed intrusion detection system for wireless sensor networks based on a reputation system coupled with kernel self-organizing maps","volume":"17","author":"bankovi?","year":"2010","journal-title":"Integr Comput -Aided Eng"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1016\/j.measurement.2014.04.034"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2013.6554905"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/DASC.2011.52"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.3390\/s17051084"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2008.04.002"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2002.1024422"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2006.04.003"},{"key":"ref15","article-title":"Underwater sensor networking: Research challenges and potential applications","author":"heidemann","year":"2005"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1109\/CASoN.2012.6412414"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2006.10.002"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1109\/WIMOB.2005.1512911"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1109\/MASS.2013.18"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2011.03.005"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/icc.2011.5963250"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.3390\/s121114887"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/IKT.2015.7288749"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1186\/s13638-016-0623-3"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2692960"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2603961"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74477-1_36"},{"key":"ref113","first-page":"374","article-title":"DIDS: A dynamic model of intrusion detection system in wireless sensor networks","author":"huo","year":"2008","journal-title":"Proc IEEE Int Conf Inf Autom (ICIA)"},{"key":"ref116","author":"sedjelmaci","year":"2011","journal-title":"Hybrid Intrusion Detection System for Wireless Sensor Networks"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1002\/sec.630"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1109\/CompEng.2012.6242969"},{"key":"ref120","article-title":"DDoS defence for service availability in cloud computing","author":"osanaiye","year":"2016"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-014-0858-z"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2010.021510.00088"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1155\/2015\/812613"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1016\/j.jcss.2013.06.016"},{"key":"ref87","first-page":"v7-414","article-title":"Anomaly event detection in temporal sensor network data of intelligent environments","volume":"7","author":"ye","year":"2010","journal-title":"Proc 2nd Int Conf Comput Eng Technol (ICCET)"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1109\/UIC-ATC-ScalCom.2014.133"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8274985\/08267211.pdf?arnumber=8267211","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T11:39:38Z","timestamp":1641987578000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8267211\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"references-count":121,"URL":"https:\/\/doi.org\/10.1109\/access.2018.2793841","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018]]}}}