2014
DOI: 10.5815/ijmecs.2014.01.07
View full text |Buy / Rent full text
|
Sign up to set email alerts
|

Abstract: A wireless sensor network (WSN) is a wireless network consisting of spatially distributed autonomous devices using sensors to monitor physical or environmental conditions.WSN is a fluorishing network that has numerous applications and could be used in diverse scenarios. DDoS (Distributed Denial of Service) is an attack where a number of compromised systems attack a single target, thereby causing denial of service for users of the targeted system. The flood of incoming messages to the target system essentially … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2016
2016
2020
2020

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 18 publications
(3 citation statements)
references
References 18 publications
(3 reference statements)
0
3
0
Order By: Relevance
“…The main focus of this study is to examine how such attacks can be prevented for WSNs by creating a sound understanding of various kinds of attacks in WSNs. In [4] the authors have conducted a review on DDoS attack to present its impact on networks and to present various defensive, detection and preventive measures which can be adopted in order to mitigate attacks on WSNs. Various parameters related to methods used for selection of clusters [5] need of re-clustering [6] and study of the QoS parameters such as performance [7] of nodes in WSN.…”
Section: Related Workmentioning
confidence: 99%
“…The main focus of this study is to examine how such attacks can be prevented for WSNs by creating a sound understanding of various kinds of attacks in WSNs. In [4] the authors have conducted a review on DDoS attack to present its impact on networks and to present various defensive, detection and preventive measures which can be adopted in order to mitigate attacks on WSNs. Various parameters related to methods used for selection of clusters [5] need of re-clustering [6] and study of the QoS parameters such as performance [7] of nodes in WSN.…”
Section: Related Workmentioning
confidence: 99%
“…In [6] Authors are conducting a review on DDoS attack to show its impact on networks and to present various defensive, detection and preventive measures adopted by researchers till now.…”
Section: Data Floodingmentioning
confidence: 99%
“…The attacker flooded the incoming messages to the targeted node resulting in congestion into the network. Many researchers have been done on DDoS attack for the detection and prevention from of it [3]. The service request attacks are repeated on targeted node as to drain the energy consumption.…”
Section: Introductionmentioning
confidence: 99%