2016
DOI: 10.5120/ijca2016912423
|View full text |Cite
|
Sign up to set email alerts
|

Cluster Head Authentication Technique against Hello Flood Attack in Wireless Sensor Networks

Abstract: The need for more effective security mechanisms is increasing with the growth of Wireless Sensor Network applications in different fields as there is an increase in the number of attacks that can be launched on them. Hello flood is one of such attack in the network layer of wireless sensor network in which an attacker with high transmission power can send or replay hello packets which are used for neighbor discovery. In this way, the attacker creates an illusion of being a neighbor to other sensor nodes and un… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0
1

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(6 citation statements)
references
References 0 publications
0
5
0
1
Order By: Relevance
“…A few examples of such assaults include node replication attacks, Sybil attacks, wormhole attacks, and compromised nodes. During an external attack like a Sybil attack or wormhole attack, a non-participating node can first listen in on packets sent or received by regular participating nodes to maliciously tamper with, interfere with, guess, or spam the data and then inject invalid packets to obstruct the network's operations [31].…”
Section: Active Attacksmentioning
confidence: 99%
“…A few examples of such assaults include node replication attacks, Sybil attacks, wormhole attacks, and compromised nodes. During an external attack like a Sybil attack or wormhole attack, a non-participating node can first listen in on packets sent or received by regular participating nodes to maliciously tamper with, interfere with, guess, or spam the data and then inject invalid packets to obstruct the network's operations [31].…”
Section: Active Attacksmentioning
confidence: 99%
“…Lalu ada satu lagi jenis serangan yang menyerupai Sybil attack, serangan tersebut adalah Hello Flood Attack. Dalam serangan ini penyerang menggunakan malicious node untuk menyerang dengan cara mengirim hello request ke node yang asli dalam jaringan secara terus menerus yang akan menyebabkan gangguan pada sistem keamanan [4]. Kedua jenis serangan ini dapat disimulasikan dengan menggunakan tools atau aplikasi bernama Network Simulator.…”
Section: Pendahuluanunclassified
“…Flooding Attack [8]: The principle of flooding attack is that the attacker sends a large number of communication requests or data to a node or several nodes in the network. As a result, the attacked node cannot process normal data sending and receiving in the network due to resource exhaustion.…”
Section: Jamming Communicationmentioning
confidence: 99%