“…In a word, SEND has many limitations including computation, deployment and security (Ahmed et al, 2017;Gelogo et al, 2011). Proposals to enhance SEND and make it applicable were introduced in (Sarma, 2014;Rafiee et al, 2011;Doja and Saggar, 2012;Kempf et al, 2006;Park et al, 2007;Cheneau and Laurent, 2011;Huang et al, 2009;Oh and Chae, 2007;Vasić et al, 2011;Lu et al, 2017). A small test bed consists of three computers; switch and router were used to implement DoS attacks against SeND.…”