International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 107 | Views: 252 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Survey Paper | Computer Science & Engineering | India | Volume 5 Issue 3, March 2016 | Popularity: 6.9 / 10


     

Survey of Prevention Techniques for Denial Service Attacks (DoS) in Wireless Sensor Network

Jitendra R. Patil, Manish Sharma


Abstract: Wireless sensors are very small embedded devices with low memory, low computing power and low battery life. Various applications such as continuous connectivity, weather monitoring, industry and instantly -deployable communication for first responders and armed. These networks already consider environmental conditions, factory performance, and troop deployment, to name some applications. Wireless ad-hoc sensor network is gaining popularity in all organization and it is basic means for communication. Wireless ad-hoc sensor network is defenseless to Denial of Service (DOS) attack. DOS attack create the network resources is absent to users. In DOS attack it creates the node to consume more battery power and reduces the network performance. Different techniques are used for detection and avoidance of DOS attack such as packet leash, lightweight Secure Mechanism, spread spectrum and energy weight monitoring scheme (EMWA) but DOS attack cannot fully legitimate using this techniques. This paper survey of various types of DOS attacks and its Detection and Prevention methods


Keywords: Network Security, DoS attacks, Vampire Attack, EMWA


Edition: Volume 5 Issue 3, March 2016


Pages: 1065 - 1069



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Jitendra R. Patil, Manish Sharma, "Survey of Prevention Techniques for Denial Service Attacks (DoS) in Wireless Sensor Network", International Journal of Science and Research (IJSR), Volume 5 Issue 3, March 2016, pp. 1065-1069, https://www.ijsr.net/getabstract.php?paperid=NOV162074, DOI: https://www.doi.org/10.21275/NOV162074



Similar Articles

Downloads: 102

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2832 - 2836

Minimization of DDoS Attack using Firecol an Intrusion Prevention System

Bhagyashri Kotame, Shrinivas Sonkar

Share this Article

Downloads: 102

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 10, October 2015

Pages: 1612 - 1616

Survey Paper on Mitigation Mechanisms for Distributed Denial of Service Attacks

Vishal Mahale, Deepali Gothawal

Share this Article

Downloads: 103

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1368 - 1371

Spam and Zombie Detection System with Machine Learned Spot Algorithm

Manishankar.S, Sobin E. S

Share this Article

Downloads: 104

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 590 - 595

Defending Against Resource Depletion Attacks in Wireless Sensor Networks

Cauvery Raju

Share this Article

Downloads: 104

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 1747 - 1751

Identification and Avoidance of DDoS Attack for Secured Data Communicationin Cloud

Aaqib Iqbal Wani, Janaki Raman V., N. Priya

Share this Article



Top