作者
SG Hymlin Rose, T Jayasree
发表日期
2017/3/23
研讨会论文
2017 IEEE International Conference on Intelligent Techniques in Control, Optimization and Signal Processing (INCOS)
页码范围
1-6
出版商
IEEE
简介
Wireless Sensor Networks have a scattered nature and the sensor nodes are resource constraints and are remotely deployed. They are vulnerable to several attacks, which creates security issues in transmission of data. The Denial of Service attack is one of the prevailing attack, which creates jamming among the sensor nodes. There exists many techniques to prevent jamming in the sensor nodes. Some of the techniques are based on cryptographic algorithms, which are too complex to use and if it is an simple algorithm it is easy for the attacker to intrude in to the deployed environment. A new technique based on clustering approach and timestamp is proposed which includes two main contributions. One is based on the grouping of sensor nodes and the other is based on the timestamp calculated for one node to another node. If the timestamp exceeds the time limit, it is declared that there are some malicious …
引用总数
学术搜索中的文章
SGH Rose, T Jayasree - 2017 IEEE International Conference on Intelligent …, 2017