Abstract | ||
---|---|---|
One of the most critical damaging effects on most wireless sensor networks is a flooding attack. Flooding threat occurs not only from spoofed packets generators launched by intruders but also from the inherent behavior of the network protocols. Flooding harm can be categorized into two types as follows. First, a sensor cannot provide required services when it receives a lot of packets. An essential part of packets are rejected and packets delay becomes inadmissible. And second, if a sensor transmits many packets then the sensor battery is quickly exhausted. Energy harvesting technologies offers the potential of reducing the second vulnerability. This paper explores the operation of wireless sensor networks with energy harvesting capability taking into account both flooding negative effects above. We consider the feasibility and threats of the attacks and their impacts. We then propose a theoretical analysis of the flooding attacks. The corresponding mathematical model is offered. Counteracting methods against such intrusions is discussed. |
Year | DOI | Venue |
---|---|---|
2013 | 10.1145/2448556.2448605 | ICUIMC |
Keywords | Field | DocType |
sensor transmits,corresponding mathematical model,critical damaging effect,counteracting method,wireless sensor network,packets delay,flooding attack,spoofed packets generator,essential part,sensor battery,energy harvesting | Key distribution in wireless sensor networks,Spoofing attack,Computer security,Computer science,Network packet,Computer network,Energy harvesting,Flooding (psychology),Wireless sensor network,Energy consumption,Communications protocol | Conference |
Citations | PageRank | References |
1 | 0.35 | 16 |
Authors | ||
3 |
Name | Order | Citations | PageRank |
---|---|---|---|
Vladimir V. Shakhov | 1 | 28 | 8.55 |
Sang-Yep Nam | 2 | 7 | 1.51 |
Hyunseung Choo | 3 | 1364 | 195.25 |