Hello Flood Attack and its Countermeasures in Wireless Sensor Networks

@inproceedings{Singh2010HelloFA,
  title={Hello Flood Attack and its Countermeasures in Wireless Sensor Networks},
  author={Virendra Pal Singh and Sweta Jain and J. Singhai},
  year={2010}
}
Wireless sensor network have emerged as an important application of the ad-hoc networks paradigm, such as for monitoring physical environment. These sensor networks have limitations of system resources like battery power, communication range and processing capability. Low processing power and wireless connectivity make such networks vulnerable to various types of network attacks. One of them is hello flood attack, in which an adversary, which is not a legal node in the network, can flood hello… CONTINUE READING

Similar Papers

Citations

Publications citing this paper.
SHOWING 1-10 OF 52 CITATIONS

A Game Theoretic Approach to Model Cyber Attack and Defense Strategies

  • 2018 IEEE International Conference on Communications (ICC)
  • 2018
VIEW 4 EXCERPTS
CITES BACKGROUND
HIGHLY INFLUENCED

AD HOC NETWORK SCENARIOS AND DIFFERENT TYPES OF ATTACKS

VIEW 4 EXCERPTS
CITES BACKGROUND & METHODS
HIGHLY INFLUENCED

Trust Mechanism in IoT Routing

  • 2018 Second International Conference on Intelligent Computing and Control Systems (ICICCS)
  • 2018
VIEW 1 EXCERPT

A Comprehensive Study of Security of Internet-of-Things

  • IEEE Transactions on Emerging Topics in Computing
  • 2017
VIEW 1 EXCERPT
CITES BACKGROUND

FILTER CITATIONS BY YEAR

2011
2019

CITATION STATISTICS

  • 2 Highly Influenced Citations

  • Averaged 5 Citations per year over the last 3 years

References

Publications referenced by this paper.
SHOWING 1-7 OF 7 REFERENCES

Garcia-Macias,(2008) Security in Wireless Sensor Networks

Luis E. Palafox, J. Antonio
  • IGI Global,
  • 2008
VIEW 1 EXCERPT

2007),Hello flood counter measure for wireless sensor network, International Journal of Computer Science and Security, volume

K. Dr. Moh. Osama
  • 2007
VIEW 1 EXCERPT

Defense against lap-top class attacker in wireless sensor network

  • 2006 8th International Conference Advanced Communication Technology
  • 2006
VIEW 1 EXCERPT

Enhancing Base Station Security Against DoS Attacks in Wireless Sensor Networks

  • 2006 International Conference on Wireless Communications, Networking and Mobile Computing
  • 2006
VIEW 1 EXCERPT

Prevention Techniques for Flooding Attacks in Ad Hoc

Bo-Cang Peng, Chiu-Kuo Liang
  • 2006
VIEW 1 EXCERPT

Lucknow, Uttar Pradesh (India

I Virendra Pal Singh
  • Electronics and Telecommunications deptt. Of MANIT, Bhopal. My research interests include Mobile Ad hoc Networks and Image processing
  • 2005
VIEW 1 EXCERPT