2013
DOI: 10.1002/sec.630
|View full text |Cite
|
Sign up to set email alerts
|

Modeling tools for detecting DoS attacks in WSNs

Abstract: International audienc

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
20
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
6
1

Relationship

2
5

Authors

Journals

citations
Cited by 21 publications
(20 citation statements)
references
References 33 publications
0
20
0
Order By: Relevance
“…The dynamic Cnode election is another solution to maintain good balancing load in the clustered networks. Thus, the nodes are not always designated Cnodes; they are renewed periodically during the network partition, choosing in each iteration a new batch of Cnodes . As in the static election, Cnodes consume more power than normal nodes because they must constantly remain listening to transmissions that surround them and analyze the flow of each of their neighbors.…”
Section: Related Workmentioning
confidence: 99%
“…The dynamic Cnode election is another solution to maintain good balancing load in the clustered networks. Thus, the nodes are not always designated Cnodes; they are renewed periodically during the network partition, choosing in each iteration a new batch of Cnodes . As in the static election, Cnodes consume more power than normal nodes because they must constantly remain listening to transmissions that surround them and analyze the flow of each of their neighbors.…”
Section: Related Workmentioning
confidence: 99%
“…Quentin et al introduced in [14] a dynamic approach to detect DoS attacks in hierarchically clustered WSNs. The solution is based on using special control nodes (Cnodes) whose main function is monitoring the throughput of traffic in clusters.…”
Section: Related Workmentioning
confidence: 99%
“…Cnodes are periodically elected among ordinary nodes of each atomic cluster, in order to ensure a better energy balance, while maintaining best detection coverage. In proposed solution in [14], two modeling approaches are presented. Firstly, stochastic modeling method based on Markov chains has been used to model sensor networks in order to detect the Denial of Service attacks.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Wireless sensor networks (WSNs) are often used to achieve this watch. In WSNs, we have a large number of sensor nodes which sensing their environment and sending the collected data to the base station (BS) [10].…”
Section: Introductionmentioning
confidence: 99%