“…Despite the different focus between such schemes and STONE , it is still possible to note how STONE is able to overcome some of their limitations, as discussed in the following. Sahu & Pandey (2015) discuss a defense scheme for wireless sensor networks. In this case, the proposed detection and mitigation methods are based on monitoring of the frequency with which clients connect to a given entity (the possible target of a DDoS attack).…”