Wireless ad-hoc sensor network is increasing popularity in all organization and it is useful for communication. Wireless ad-hoc sensor network is vulnerable to Denial of Service (DOS) attack. The network resources are unavailable to users due to DOS attack. In DOS attack affects the node to consume more battery power and degrades the network performance. Various techniques are used for detection and prevention of DOS attack such as spread spectrum, Secured lightweight Mechanism, packet leash and energy weight monitoring system but DOS attack cannot fully prevented using this techniques. The paper reviews various types of DOS attacks and its Detection techniques.
 A. Agah, K. Basu, and S. K. Das, “A game theory based approach for security in sensor networks,” International Performance Computing and Communications Conference (IPCCC), pp:259-263, Phoenix, AZ, Apr. 2004.  A. Agah, S. K. Das and K. Basu, “Preventing DoS attack in sensor and actor networks: A game theoretic approach,” IEEE International Conference on Communications (ICC), pp:3218-3222, Seoul, Korea, May 2005.  A. Agah, S. K. Das, and K. Basu, “Enforcing security for prevention of DoS attack in wireless sensor networks using economical modeling, ” Proceedings of 2nd IEEE International Conference on Mobile AdHoc and Sensor Systems (MASS), Washington, D.C., Nov. 2005.  I. F. Akyldiz, W. Su, Y. Sankarasubramaniam, E. Cayirci, “Wireless sensor networks: a survey,” Computer Networks, vol. 38, 2002, pp:393-422.  R. Bace and P. Mell, “Intrusion detection systems,” NIST Special Publication on Intrusion Detection systems, http://www.snort.org/docs/nistids.pdf.  G. E. Bolton, A. Ockenfels, “ERC a theory of equity, reciprocity, and competition,” The American Economic Review, vol. 90, 2000.  S. Buchegger and J. L. Boudec, “Performance Analysis of the CONFIDANT Protocol Cooperation Of Nodes-Fairness In Dynamic Ad-hoc NeTworks,” International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc), 2002.  S. Buchegger and J. L. Boudec, “Nodes bearing grudges: toward routing security, fairness and robustness in mobile ad hoc networks,” Proceedings of the 10th Euronicro Workshop on parallel, Distributed and Network-based Processing, Canary Islands, Spain, January 2002. International Journal of Network Security, Vol.5, No.2, PP.145–153, Sept. 2007 152  L. Blazevic, L. Buttyaan, S. Capkun, S. Giordano, J. P. Hubaux, J. LeBoudec, “Self-organization in mobile ad hoc networks: the approach of terminodes,” IEEE Commun.Mag., vol. 39, no. 6, 2001, pp:161- 174.  L. Buttyaan, J. P. Hubaux, “Report on a Working Session on Security in Wireless Ad Hoc Networks,” Mobile Computing and communications Review, vol.6, no.4, 2002.  L. Buttyaan, J. P. Hubaux, “Nuglets: a virtual currency to stimulate cooperation in selforganized mobile ad hoc networks, ” Technical Report DSC/2001/001, Department of Communication Systems, Swiss Federal Institute of Technology, 2001.
ad-hoc sensor network, Denial of Service (DOS) attack.