2014
DOI: 10.5120/17220-7458
|View full text |Cite
|
Sign up to set email alerts
|

An Efficient Technique for Detection of Flooding and Jamming Attacks in Wireless Sensor Networks

Abstract: Distributed denial of service attacks are a major threat for wireless sensor network. The aim of these attacks is that genuine users can not use network such as bandwidth, computing power and operating system data structures. Jamming and flooding attacks are one of the most popular attacks on WSN which cause DDoS. There is a requirement for the detection of these attacks rapidly and perfectly. For detection of these attacks, this paper suggests an efficient method. This method provides improved performance ove… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 10 publications
(10 reference statements)
0
2
0
Order By: Relevance
“…The simulation results represent the same performance in case of normal routing and in case of PPS scheme; it means that the PPS scheme is effective and showing 0% infection in presence of attacker. In [2]; two types of attacks on WSN that are jamming and flooding has been discussed and this paper provides an efficient technique for detection of flooding and jamming attacks. The method discussed in this paper provides improved performance over the existing methods.…”
Section: Data Floodingmentioning
confidence: 99%
“…The simulation results represent the same performance in case of normal routing and in case of PPS scheme; it means that the PPS scheme is effective and showing 0% infection in presence of attacker. In [2]; two types of attacks on WSN that are jamming and flooding has been discussed and this paper provides an efficient technique for detection of flooding and jamming attacks. The method discussed in this paper provides improved performance over the existing methods.…”
Section: Data Floodingmentioning
confidence: 99%
“…Another DoS attack is the jamming attack in which the attacker interferes the radio signal. The attacker performs this intentionally to disturb the message communication between the sender and the receiver or to jam the area [9]. Clone attack is also known as node replication attack which can be deployed directly into the operations of the sensor networks and claims an identity similar to the operations performed by the legitimate node.…”
Section: Introductionmentioning
confidence: 99%