2017
DOI: 10.1080/00207217.2017.1279230
|View full text |Cite
|
Sign up to set email alerts
|

A hybrid protection approaches for denial of service (DoS) attacks in wireless sensor networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 16 publications
0
4
0
Order By: Relevance
“…Based on the trained features, incoming new network feature is analyzed and detected by applying the sigmoid activation function that is computed as follows. (7) Then the final classification is evaluated by applying the inverse operation technique to the output of the hidden layer. From the output, the network status has been identified easily also the neural network is trained by effective method which used to detect the intermediate attack with effective manner.…”
Section: Energy Efficient Extreme Learning Neural Network (Eeelnn) Based Dos Detectionmentioning
confidence: 99%
See 1 more Smart Citation
“…Based on the trained features, incoming new network feature is analyzed and detected by applying the sigmoid activation function that is computed as follows. (7) Then the final classification is evaluated by applying the inverse operation technique to the output of the hidden layer. From the output, the network status has been identified easily also the neural network is trained by effective method which used to detect the intermediate attack with effective manner.…”
Section: Energy Efficient Extreme Learning Neural Network (Eeelnn) Based Dos Detectionmentioning
confidence: 99%
“…The main legacy of the paper is to eliminate DoS attack from the network by applying the effective technique because the resource and CIA security policy [7] must be managed while making the information broadcast due to the importance of the DoS attack in sensor network. So, in this paper analyze the energy efficiency routing protocol along with the extreme neural network [8] for analyzing the resources of the sensor nodes in sensor networks.…”
Section: Introductionmentioning
confidence: 99%
“…Since these sensors are battery‐operated devices, they are vulnerable to Denial of Service (DoS), which is caused by malicious attacks such as vampire attack, black hole attack, directional attack, and selective forwarding attack. The prevention techniques of these attacks are studied in Gunasekaran and Periakaruppan and Osanaiye et al Vampire attacks are not protocoled specific, hence difficult to detect.…”
Section: Introductionmentioning
confidence: 99%
“…For the limited resource of sensor nodes, DoS attack has been the main threat and challenge for the security of WSN. There are many kinds of DoS attacks in WSN, such as Jamming, Node destruction, Spoofing, replaying, Denial of sleep, Hello floods, Homing, SYN flood, Reprogramming attacks [1]. In WSN, most routing protocols are simple and efficient, so the routing protocol of WSN is vulnerable to DoS attacks.…”
Section: Introductionmentioning
confidence: 99%