2015 IEEE International Conference on Communications (ICC) 2015
DOI: 10.1109/icc.2015.7248786
|View full text |Cite
|
Sign up to set email alerts
|

Preventing Denial of Service attacks in Wireless Sensor Networks

Abstract: Sensor networks are tiny independent devices which are characterized by limiting battery, processing power and storage memory, that makes saving consumption energy as real challenge power. Morever, there are many techniques used used to conserve energy in Wireless Sensor Networks (WSNs) the clustering technique is one of them. In terms of security, WSNs are more vulnerable to attacks than wired networks. However, radio frequencies used in WSNs are open, making the eavesdropping fairly easy. By considering ener… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
12
0
1

Year Published

2017
2017
2021
2021

Publication Types

Select...
7
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 14 publications
(13 citation statements)
references
References 15 publications
0
12
0
1
Order By: Relevance
“…i) Denial of Service Attack In this attack, the network is flooded by a large amount of traffic. This result in genuine users not having access to the service [30,31].…”
Section: Network Layer Attacks A) Traffic Analysis Attackmentioning
confidence: 99%
“…i) Denial of Service Attack In this attack, the network is flooded by a large amount of traffic. This result in genuine users not having access to the service [30,31].…”
Section: Network Layer Attacks A) Traffic Analysis Attackmentioning
confidence: 99%
“…Mansouri et al [4] proposed a clustering technique for addressing the DoS attacks. The suggested technique exploited the energy consumption of the nodes.…”
Section: Detection Of Dos Attacks In Wsnmentioning
confidence: 99%
“…A few techniques for detecting misdirection attack in WSN is reported in the current literature. The various techniques developed to detect the misdirection attack in wireless networks include cluster based detection methods [8], [9]including its variants such as using enhanced LEACH protocol [10] and recursive application of LEACH clustering techniques [11]. In cluster based detection method, a node having the highest energy is the cluster head.…”
Section: Introductionmentioning
confidence: 99%
“…A modified version of cluster head selection approach based on lifetime of battery and distance for detection of malicious nodes has been adopted. LEACH clustering techniques has been recursively applied for detection and prevention of DoS attacks in WSN [11]. Here the LEACH algorithm is used to construct clusters.…”
Section: Introductionmentioning
confidence: 99%