[PDF][PDF] Hello flood attack and its countermeasures in wireless sensor networks

VP Singh, S Jain, J Singhai - … Journal of Computer Science Issues (IJCSI), 2010 - Citeseer
Wireless sensor network have emerged as an important application of the ad-hoc networks
paradigm, such as for monitoring physical environment. These sensor networks have …

[PDF][PDF] Signal strength based hello flood attack detection and prevention in wireless sensor networks

VP Singh, ASA Ukey, S Jain - International Journal of Computer …, 2013 - researchgate.net
Wireless sensor network is a highly distributed network of small lightweight wireless sensor
nodes, deployed in large numbers to monitor the environment or system. These sensor …

My smart home is under attack

L Coppolino, V D'Alessandro… - 2015 IEEE 18th …, 2015 - ieeexplore.ieee.org
Home Automation is becoming more and more common in everyday life. In order to permit a
remote control of domestic devices a bridge between the Internet network and the Home …

The detection and defence of DoS attack for wireless sensor network

Y Zhang, X Li, Y Liu - The journal of china universities of posts and …, 2012 - Elsevier
Due to the limitations of energy, computation and storage for sensors etc, although the
wireless sensor networks (WSNs) have been widely deployed in many applications, it is a …

[PDF][PDF] A survey in hello flood attack in wireless sensor networks

A Dubey, D Meena, S Gaur - Int. J. Eng. Res. Technol, 2014 - academia.edu
Sensors are very useful and play a vital role in human life. Decade ago, wireless sensor
networks, since their inception have three important field in research area that is hardware & …

Stochastic modeling of hello flooding in slotted CSMA/CA wireless sensor networks

MS Haghighi, K Mohamedpour… - IEEE transactions on …, 2011 - ieeexplore.ieee.org
Broadcasting a request or challenge is a classic method of collecting local information in
distributed wireless networks. Neighbor discovery is known to be a fundamental element in …

[PDF][PDF] Security threats & issues in wireless sensor networks

DG Anand, HG Chandrakanth… - International Journal of …, 2012 - academia.edu
ABSTRACT The Wireless Sensor Network (WSN) increasingly becoming more practicable
solution to many challenging applications. One of the major applications of the sensor …

一种改进的动态用户认证协议

张明 - 电子科技, 2011 - cqvip.com
一种改进的动态用户认证协议-[维普官方网站]-www.cqvip.com-维普网  我的维普 购物车 充值
客服 首页 | 期刊大全 | 文献分类 | 优先出版 | 论文检测 | 论文选题 | 在线分享 | 会议平台 | 学术机构 …

Dos attack prevention using rule-based sniffing technique and firewall in cloud computing

KA Fidele, A Hartanto - E3S Web of Conferences, 2019 - e3s-conferences.org
Nowadays, we are entering an era where the internet has become a necessary
infrastructure and support that can be applied as a means of regular communication and …

Synoptic analysis techniques for intrusion detection in wireless networks

DT Hlavacek - 2015 - search.proquest.com
Current system administrators are missing intrusion alerts hidden by large numbers of false
positives. Rather than accumulation more data to identify true alerts, we propose an …