2016
DOI: 10.18178/ijfcc.2016.5.2.452
|View full text |Cite
|
Sign up to set email alerts
|

Adaptive Detection of Hello Flood Attack in Wireless Sensor Networks

Abstract: Abstract-Hello Flood attack is a type of attack in wireless sensor networks. In this attack, the malicious node is able to disturb the security of network by sending periodic hello packets with high signal strength. In this research, an intrusion detection system based on neighborhood is proposed. It is based on a principle that those sensor nodes which are close to each other spatially are tended to have similar behavior. If a node shows a significant difference in its behavior in comparison with other nodes … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 9 publications
0
2
0
Order By: Relevance
“…as increase in the time for all packets to reach their destination and in the number of lost packets). In addition, the delay is less in the proposed study, although there are more packets sent compared with that of H. Khosravi et al [22]. This study estimating better results can be used for overcoming HF attacks.…”
Section: Figure 8 Energy Consumption Of Non-malicious Nodes Figure 9mentioning
confidence: 67%
“…as increase in the time for all packets to reach their destination and in the number of lost packets). In addition, the delay is less in the proposed study, although there are more packets sent compared with that of H. Khosravi et al [22]. This study estimating better results can be used for overcoming HF attacks.…”
Section: Figure 8 Energy Consumption Of Non-malicious Nodes Figure 9mentioning
confidence: 67%
“…Is the Ad-hoc On-demand Distance Routing beside Hello flood Detection with Prevention which is proposed for detection of the node that generates a hello flood intrusion. Neighborhood based IDS [88] The detection of the malicious node is done based on a principle that the sensor nodes which are neighboring to each other spatially are tended to have similar behavior. If a node proves a vital variation in its behavior in contrast with other nodes in the region, it is considered as a malicious node.…”
Section: Detects the Intermediate Spoofing Attacks By Analyzing Abnormal Variations In The Receiver Signal Adaptive Intrusion Detection Smentioning
confidence: 99%