UCSY's Research Repository

Mitigation for Flooding Attack in Cluster-Based Wireless Sensor Network using Authentication Technique

Show simple item record

dc.contributor.author Maw, Tin Win
dc.contributor.author Zaw, Myo Hein
dc.date.accessioned 2019-07-11T04:17:50Z
dc.date.available 2019-07-11T04:17:50Z
dc.date.issued 2013-02-26
dc.identifier.uri http://onlineresource.ucsy.edu.mm/handle/123456789/717
dc.description.abstract Today’s world is experiencing many natural disasters like earthquakes, flooding, Tsunamis and forest firing, etc. Therefore, it is not only necessary to use widely Wireless Sensor Networks in the hostile environments all over the world but also necessary security in these environments to obtain important and exact information in time in order to be great effect on our real life. However, there are security problems in WSNs because of resources constraints. The most vulnerable attack in terms of exhaustion of resources is Denial of Service attacks (DOS). This research proposes a scheme for mitigation of DOS attacks (flooding attack) by using reactive approach in WSNs based on the fact “Although resource a constraint is one of the limitations of WSN, security is also vital and should consider trade-off between them”. The proposed scheme will use modified LEACH (Low Energy Adaptive Clustering Hierarchy) routing protocol and some symmetric encryption techniques in order to mitigate the flooding attack by minimizing resource consumption and maximizing security in any Wireless Sensor Network applications. en_US
dc.language.iso en en_US
dc.publisher Eleventh International Conference On Computer Applications (ICCA 2013) en_US
dc.title Mitigation for Flooding Attack in Cluster-Based Wireless Sensor Network using Authentication Technique en_US
dc.type Article en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search Repository



Browse

My Account

Statistics