{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,1]],"date-time":"2022-04-01T19:36:16Z","timestamp":1648841776499},"reference-count":17,"publisher":"SAGE Publications","issue":"1","license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["International Journal of Distributed Sensor Networks"],"published-print":{"date-parts":[[2010,1,1]]},"abstract":"<jats:p> Existing end-to-end security mechanisms are vulnerable to path-based denial of service attacks (PDoS). If checking integrity and authenticity of a message is done only at the final destination, the intermediate nodes are going to forward bogus packets injected by an adversary many hops before they are detected. Therefore, the adversary can easily overwhelm intermediate nodes by bogus or replayed packets. This attack exhausts the nodes along the path. In addition, other downstream nodes that depend on the exhausted nodes as intermediate nodes will be isolated, and they have to find alternative paths. Regarding broadcast traffic that originated from the base station, if packets were injected by an adversary, the whole network's nodes will be exhausted. Therefore, there is a need to enable intermediate nodes to filter out bogus packets. We adopted a link layer security scheme to enable en route intermediate nodes to filter out any bogus or replayed packet as soon as it is injected into the network. Our scheme can handle different types of traffic. Simulation results show that our algorithm outperforms the one-way hash chain (OHC) algorithm and that it is more scalable. <\/jats:p>","DOI":"10.1155\/2010\/793981","type":"journal-article","created":{"date-parts":[[2010,12,29]],"date-time":"2010-12-29T06:42:51Z","timestamp":1293604971000},"page":"793981","source":"Crossref","is-referenced-by-count":1,"title":["A Novel Algorithm for Defending Path-Based Denial of Service Attacks in Sensor Networks"],"prefix":"10.1177","volume":"6","author":[{"given":"Ramzi","family":"Saifan","sequence":"first","affiliation":[{"name":"Department of Computer Engineering, Iowa State University, IA 50011, USA"},{"name":"Department of Computer Engineering, Jordan University of Science and Technology, Irbid 22110, Jordan"}]},{"given":"Omar","family":"Al-Jarrah","sequence":"additional","affiliation":[{"name":"Department of Computer Engineering, Iowa State University, IA 50011, USA"},{"name":"Department of Computer Engineering, Jordan University of Science and Technology, Irbid 22110, Jordan"}]}],"member":"179","published-online":{"date-parts":[[2010,12,14]]},"reference":[{"key":"B1-2010-793981","doi-asserted-by":"publisher","DOI":"10.1145\/1102219.1102235"},{"key":"B2-2010-793981","first-page":"259","volume-title":"Proceedings of IEEE Symposium on Security and Privacy","author":"Zhu S."},{"key":"B3-2010-793981","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2005.843561"},{"key":"B4-2010-793981","first-page":"162","volume-title":"Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems (SenSys \u203204)","author":"Karlof C."},{"key":"B5-2010-793981","first-page":"291","volume-title":"Proceedings of the 6th International Conference on Advances in Mobile Computing and Multimedia","author":"Al-Jarrah O."},{"key":"B6-2010-793981","doi-asserted-by":"publisher","DOI":"10.1145\/345910.345953"},{"key":"B7-2010-793981","first-page":"78","volume-title":"Proceedings of the 1st ACM International Workshop on Wireless Sensor Networks and Applications","author":"Ratnasamy S."},{"key":"B8-2010-793981","first-page":"96","volume-title":"Proceedings of the 9th Annual International Conference on Mobile Computing and Networking (MobiCom \u203203)","author":"Rao A."},{"key":"B9-2010-793981","first-page":"76","volume-title":"Proceedings of the 1st International Conference on Embedded Networked Sensor Systems (SenSys \u203203)","author":"Newsome J."},{"key":"B10-2010-793981","doi-asserted-by":"publisher","DOI":"10.1023\/A:1016598314198"},{"key":"B11-2010-793981","volume-title":"Proceedings of Workshop on Principles of Dependable Systems","author":"Naik V."},{"key":"B12-2010-793981","first-page":"437","volume-title":"Proceedings of IEEE International Symposium on Information Theory (ISIT \u203202)","author":"Jakobsson M."},{"key":"B13-2010-793981","first-page":"255","volume-title":"Proceedings of the 1st International Conference on Embedded Networked Sensor Systems (SenSys \u203203)","author":"Przydatek B."},{"key":"B14-2010-793981","first-page":"197","volume-title":"Proceedings of IEEE Symposium on Security and Privacy","author":"Chan H."},{"key":"B15-2010-793981","first-page":"41","volume-title":"Proceedings of the 9th ACM Conference on Computer and Communications Security","author":"Eschenauer L."},{"key":"B17-2010-793981","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2006.1678171"},{"key":"B19-2010-793981","first-page":"176","volume-title":"Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems (SenSys \u203204)","author":"Dai H."}],"container-title":["International Journal of Distributed Sensor Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1155\/2010\/793981","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/full-xml\/10.1155\/2010\/793981","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1155\/2010\/793981","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,6]],"date-time":"2020-11-06T07:56:06Z","timestamp":1604649366000},"score":1,"resource":{"primary":{"URL":"http:\/\/journals.sagepub.com\/doi\/10.1155\/2010\/793981"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,1,1]]},"references-count":17,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2010,1,1]]}},"alternative-id":["10.1155\/2010\/793981"],"URL":"https:\/\/doi.org\/10.1155\/2010\/793981","relation":{},"ISSN":["1550-1477","1550-1477"],"issn-type":[{"value":"1550-1477","type":"print"},{"value":"1550-1477","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010,1,1]]}}}