ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Study and analysis the impact of Denial of Service attacks on ZigBee networks (Tree Topology) compared to (Mesh Topology) according to the metrics (delay, load, and Throughput)

Journal: Tishreen University Journal , Engineering Sciences Series (Vol.40, No. 2)

Publication Date:

Authors : ; ;

Page : 325-341

Keywords : ZigBee; (WSN); Denial of Service; OPNET; Topology;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

ZigBee networks have revolutionized industrial control, remote data collection and intelligent home automation as they rely on ZigBee, a wireless data transmission technology designed to meet the unique needs of wireless sensor networks such as low power consumption and low transmission rates to maintain Battery life is longer, and is based on IEEE 802.15.4 Security is one of the fundamental issues of any network, and the study of attacks and their impact of the important and necessary, The most serious of these attacks Denial of Service Denial of Service, is an attack aimed at denial of service and attempt to make this service unavailable or delayed access to the users concerned. The aim of this study is to analyze the impact of denial-of-service attacks on ZigBee networks with tree topology and mesh topology, and compare them through criteria: delay, load, and throughput, as they are the most important metrics determining the performance and effectiveness of the network . The study was carried out using OPNET 14.5 simulation tool, which is one of the most important programs used in the modeling and simulation of wired and wireless networks, and to conduct many experiments and compare them through the mentioned metrics. The results showed that the attack on ZigBee network lead to different damages depending on the topology, so we have studied and analyzed the impact of denial of service attacks on two different types of topologies, Tree and mixed (Mesh), since these two topologies give certain results in the absence of an attack and different results in case of attack on them.

Last modified: 2018-12-23 04:17:22