2017
DOI: 10.1002/dac.3265
|View full text |Cite
|
Sign up to set email alerts
|

Dynamic and adaptive detection method for flooding in wireless sensor networks

Abstract: Summary In recent years, wireless sensor networks (WSNs) have attracted an increasing attention in several fields. However, WSNs must be treated with significant challenges in their design due to their special characteristics such as limited energy, processing power, and data storage that make the energy consumption saving a real challenge. Also, regarding their distributed deployment in open radio frequency and lack of physical security, these networks are vulnerable and exposed to several attacks: passive ea… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2018
2018
2019
2019

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 25 publications
0
1
0
Order By: Relevance
“…Indeed, one or several malicious nodes propagate many connection requests and carry out a regular massive sending to a strong emission power until exhausting the resources required the connection or reaching a maximum limit in order to saturate the network and prevent legitimate nodes from establishing communications which exhaust the resources (memory and energy) and reduce availability. One proposed solution to this attack is to demonstrate the commitment to this connection or to put a limit on the number of connections from a particular node [74] [75].…”
Section: The Most Known Attacksmentioning
confidence: 99%
“…Indeed, one or several malicious nodes propagate many connection requests and carry out a regular massive sending to a strong emission power until exhausting the resources required the connection or reaching a maximum limit in order to saturate the network and prevent legitimate nodes from establishing communications which exhaust the resources (memory and energy) and reduce availability. One proposed solution to this attack is to demonstrate the commitment to this connection or to put a limit on the number of connections from a particular node [74] [75].…”
Section: The Most Known Attacksmentioning
confidence: 99%