Abstract | ||
---|---|---|
The flooding algorithm remains one of the simplest and most effective ways to quickly disseminate information across all nodes in a Wireless Sensor Network. Though fast, this algorithm remains un-secure as the packets can be intercepted by malice agents to reveal the information. In this paper, simulations of a flooding algorithm in Sensor Networks secured by a Random Key Pre-distribution model are presented. We conducted these simulations on ns-3 over a theoretical Peer-to-peer and a standard based IEEE 802.15.4 network. This is followed by a demonstration of the robustness of the network through a random black hole attack. |
Year | DOI | Venue |
---|---|---|
2017 | 10.1145/3136825.3136867 | SIN'17: PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON SECURITY OF INFORMATION AND NETWORKS |
Keywords | Field | DocType |
Wireless Sensor Networks,Flooding algorithm,Blackhole attack,Network simulator-3 | Packet drop attack,Computer science,Network packet,Computer network,Robustness (computer science),Dissemination,Flooding algorithm,Flooding (psychology),Malice,Wireless sensor network | Conference |
Citations | PageRank | References |
0 | 0.34 | 9 |
Authors | ||
4 |
Name | Order | Citations | PageRank |
---|---|---|---|
Jimmy Bondu | 1 | 0 | 0.34 |
Anupal Mishra | 2 | 0 | 0.34 |
V. Laxmi | 3 | 43 | 8.19 |
Manoj S. Gaur | 4 | 501 | 63.38 |