Detection and Prevention of UDP Protocol Exploiting and Smurf Attack in WSN Using Sequential Probability Ratio Test Algorithm

NK Singh, SK BJ - … Conference on Data Science and Network …, 2023 - ieeexplore.ieee.org
Wireless sensor networks (WSNs) have gained popularity in diverse areas such as military
surveillance, patient monitoring, traffic control, environmental and structural monitoring …

Detection and prevention of UDP reflection amplification attack in WSN using cumulative sum algorithm

BJS Kumar, VSS Gowda - 2022 IEEE International Conference …, 2022 - ieeexplore.ieee.org
Wireless sensor networks are used in many areas such as war field surveillance, monitoring
of patient, controlling traffic, environmental and building surveillance. Wireless technology …

Wireless Sensing Network's Cyber Security Procedures: A Research

H Singh, N Dhiman - 2022 5th International Conference on …, 2022 - ieeexplore.ieee.org
Because WSNs (wireless sensor networks) are connected to the internet, they are an
effective network for solving practical issues. A lightweight, equipment sensor with …

Security Techniques of Wireless Sensor Networks: A Study

H Sharma, B Shajahan - 2022 2nd International Conference on …, 2022 - ieeexplore.ieee.org
WSNs (wireless sensor networks) are linked to the internet, making them a powerful network
for dealing with real-world problems. As revolutionary technologies grow swiftly, a …

DoS Attack Detection in Wireless Sensor Networks (WSN) Using Hybrid Machine Learning Model

GS Rao, M Harshitha, VR Joshitha… - 2023 10th …, 2023 - ieeexplore.ieee.org
Wireless sensor networks (WSNs) are utilized in a variety of applications where distant data
gathering is required, such as environmental monitoring, military applications, traffic control …

Detection and Prevention of TCP SYN Flooding Attack in WSN Using Protocol Dependent Detection and Classification System

BJS Kumar, KRK Gowda - 2022 IEEE International Conference …, 2022 - ieeexplore.ieee.org
In the wireless context, present research has focused on security challenges at various
network stacking levels. Dos attacks are one among the most popular serious problems …

Security assessment model to analysis DOS attacks in WSN

A Aborujilah, RM Nassr, T Al-Hadhrami… - Emerging Trends in …, 2020 - Springer
Abstract Internet of Things (IoT) technology is getting more importance as many
organizations from different sectors are moving toward adopting this technology. It …

Detecting and preventing of DOS attacks in an IOT based Wireless Sensor Network

P Vinayagam, PC Kumar, PV Teja… - 2023 Third International …, 2023 - ieeexplore.ieee.org
WSN are more susceptible to various types of attacks due to their remote wireless nature
and humanunattended environment. Intruders may visit these networks intentionally or …

RSSI vector attack detection method for wireless sensor networks

Y Guoqiang, D Weijun, M Chao… - 2011 IEEE 3rd …, 2011 - ieeexplore.ieee.org
In contrast to traditional networks, Wireless Sensor networks (WSN) are more vulnerable to
attacks such as DOS, eavesdropping, tampering, node compromise, wormhole and Sibyl. To …

[PDF][PDF] DoS attacks on different layers of WSN: A review

K Kaushal, V Sahni - International Journal of Computer Applications, 2015 - Citeseer
WSNs plays an important role in many of the applications like patient health monitoring,
battlefields surveillance, traffic control, environmental observation, home automation and …