Detect and prevent HELLO FLOOD Attack using Centralized technique in WSN
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2016, Vol 7, Issue 8
Abstract
In wireless sensor networks, wirelessly nodes communicate with each other. WSN is a very large array of diverse sensor nodes that are interconnected by a communication network . The battery lifetime of nodes in wireless sensor networks have limited, the focus must always be given to conserve their energy so that they can work for longer duration of time. While some of the attacks such as black hole attack or worm hole attack focus on the dropping the data packets which are being transmitted in the network, other attacks such as hello flood attack focus on consuming up the resources of the network like battery power of the nodes etc. These kind of attacks prove to be very harmful to the network. In wireless sensor network, By the use of LEACH protocol nodes are usually clustered in the groups. This technique is applied in most of the cases to conserve the energy of the nodes. Hello flood attack is one common misbehaving activity which targets the cluster head which are formed in the clusters of the wireless sensor network. This study presents the detection and prevention of hello flood attacks by use cenetralized technique in wireless sensor networks.
Authors and Affiliations
Prabhjot Kaur , Er. Jasmeet Singh Gurm
Various Aspects of Minutia As a Fingerprint Feature
Biometrics is one of the biggest tendencies in human identification. The fingerprint is the most widely used biometric. Extracting minutiae from fingerprint images is one of the most important steps in automatic fingerpr...
Sign Language Recognition System to aid Deaf-dumb People Using PCA
The Sign Language is a method of communication for deaf-dumb people. Here vision based approach has been used. This paper presents design and implementation of real time Sign Language Recognition system to recognize 26 g...
Resolving Set-Streaming Stream-Shop Scheduling in Distributed System by mean of an aFOA
Recently, a new fruit fly optimization algorithm (FOA) is proposed to solve stream-shop scheduling. In this paper, we empirically study the performance of FOA. The experimental results illustrate that FOA cannot solve se...
DYNAMIC ANALYSIS OF LOCATION TRACKING USING MICROADDRESS RECORDER
The Location Tracking can be considered as one of the most advanced, innovative and practical Location based Services. A place is very important entity to a user with a semantic meaning such as “You are at your Home”,” Y...
A Survey on Hidden Markov Model for IT Service Management
Network management refers to the actions, techniques, proceedings, and tools that are related to the process, governance, upholding, and stipulating of networked systems. Network management is vital to rule and manage pr...