Downloads: 107 | Views: 234 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Survey Paper | Computer Science & Engineering | India | Volume 5 Issue 3, March 2016 | Popularity: 6.9 / 10
Survey of Prevention Techniques for Denial Service Attacks (DoS) in Wireless Sensor Network
Jitendra R. Patil, Manish Sharma
Abstract: Wireless sensors are very small embedded devices with low memory, low computing power and low battery life. Various applications such as continuous connectivity, weather monitoring, industry and instantly -deployable communication for first responders and armed. These networks already consider environmental conditions, factory performance, and troop deployment, to name some applications. Wireless ad-hoc sensor network is gaining popularity in all organization and it is basic means for communication. Wireless ad-hoc sensor network is defenseless to Denial of Service (DOS) attack. DOS attack create the network resources is absent to users. In DOS attack it creates the node to consume more battery power and reduces the network performance. Different techniques are used for detection and avoidance of DOS attack such as packet leash, lightweight Secure Mechanism, spread spectrum and energy weight monitoring scheme (EMWA) but DOS attack cannot fully legitimate using this techniques. This paper survey of various types of DOS attacks and its Detection and Prevention methods
Keywords: Network Security, DoS attacks, Vampire Attack, EMWA
Edition: Volume 5 Issue 3, March 2016
Pages: 1065 - 1069
Similar Articles
Downloads: 2 | Weekly Hits: ⮙2 | Monthly Hits: ⮙2
Informative Article, Computer Science & Engineering, India, Volume 11 Issue 8, August 2022
Pages: 1497 - 1500Innovative Approach to Mitigate Man-in-the-Middle Attacks in Secure Communication Channels
Arnab Dey
Downloads: 4 | Weekly Hits: ⮙2 | Monthly Hits: ⮙4
Research Paper, Computer Science & Engineering, India, Volume 13 Issue 8, August 2024
Pages: 779 - 789Machine Learning-Based Detection of Synonymous IP Flood Attacks on Server Infrastructure
Surbhi Batra, Chandra Sekhar Dash
Downloads: 5 | Weekly Hits: ⮙5 | Monthly Hits: ⮙5
Analysis Study Research Paper, Computer Science & Engineering, Saudi Arabia, Volume 13 Issue 3, March 2024
Pages: 1927 - 1929Optimizing Network Security through Inline Sandbox Deployment: A Practical Approach with Trellix
Tahir Bashir
Downloads: 8 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Review Papers, Computer Science & Engineering, India, Volume 13 Issue 3, March 2024
Pages: 882 - 886Maximizing Cyber Security through Machine Learning and Data Analysis for Advanced Threat Detection and Mitigation
Manupreet Kaur
Downloads: 103 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1728 - 1731Key Management in Wireless Sensor Networks - A Review
Majida C V, Sandhya V