Flooding attack in wireless sensor network-analysis and prevention

ISSN: 22498958
20Citations
Citations of this article
22Readers
Mendeley users who have this article in their library.

Abstract

Wireless sensor network have risen as an essential utilization of the ad-hoc networks model for example, for checking physical condition of an environment. These sensor systems have restrictions of framework assets like battery control, communication range and preparing capacity These sensor systems have restrictions of framework assets like battery control, communication range and preparing capacity. Low handling power and wireless connectivity make such systems helpless against different kinds of system assaults. Due to the limitations of WSN they are susceptible to different types of attack. Denial of service attack (DOS attack) or flooding attack is one of them. In this paper, we are simulating and analysing RREQ flooding DOS attacks. The study is based on a generic NS2-based WSN model. The routing protocol code is changed in the specified WSN simulation model to simulate RREQ Flooding attack.

Author supplied keywords

Cite

CITATION STYLE

APA

Lakshmi, H. N., Anand, S., & Sinha, S. (2019). Flooding attack in wireless sensor network-analysis and prevention. International Journal of Engineering and Advanced Technology, 8(5), 1792–1796.

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free