Wireless sensor network have risen as an essential utilization of the ad-hoc networks model for example, for checking physical condition of an environment. These sensor systems have restrictions of framework assets like battery control, communication range and preparing capacity These sensor systems have restrictions of framework assets like battery control, communication range and preparing capacity. Low handling power and wireless connectivity make such systems helpless against different kinds of system assaults. Due to the limitations of WSN they are susceptible to different types of attack. Denial of service attack (DOS attack) or flooding attack is one of them. In this paper, we are simulating and analysing RREQ flooding DOS attacks. The study is based on a generic NS2-based WSN model. The routing protocol code is changed in the specified WSN simulation model to simulate RREQ Flooding attack.
CITATION STYLE
Lakshmi, H. N., Anand, S., & Sinha, S. (2019). Flooding attack in wireless sensor network-analysis and prevention. International Journal of Engineering and Advanced Technology, 8(5), 1792–1796.
Mendeley helps you to discover research relevant for your work.