TAILIEUCHUNG - Detection and defense against distributed denial of service attack using packet filtration in wireless sensor networks

The most common possible threat is DDoS. These attacks flood target with plentiful fake packets in order to drain the battery, prevent the genuine packets to pass thru and thwart the legitimate user to get the desired response. In this research article, we propose a detection and defense mechanism using packet filtration which deploys mitigation constraints to save the wireless sensor networks from the causes of DDoS. | International Journal of Computer Networks and Communications Security VOL. 5, NO. 12, DECEMBER 2017, 277–284 Available online at: E-ISSN 2308-9830 (Online) / ISSN 2410-0595 (Print) Detection and Defense against Distributed Denial of Service Attack Using Packet Filtration in Wireless Sensor Networks Tariq Ahamed Ahanger1 and Abdullah Aljumah2 1, 2 College of Computer Engineering and Sciences, Prince Sattam Bin Abdulaziz University, Saudi Arabia 1 , 2aljumah@ ABSTRACT Ranging from household to health to battlefield plays a significant role in many useful applications. Due to the distinctive feature of region and selforganizing, WSN (regarded as resource constraint type of network), is formed by a group of sensor nodes to detect physical phenomenon like light, heat, pressure with processing ability. Due to their resource constraint characteristics of limited memory and energy they are vulnerable to many cyber threats and attacks. The most common possible threat is DDoS. These attacks flood target with plentiful fake packets in order to drain the battery, prevent the genuine packets to pass thru and thwart the legitimate user to get the desired response. In this research article, we propose a detection and defense mechanism using packet filtration which deploys mitigation constraints to save the wireless sensor networks from the causes of DDoS. Keywords: DDoS, WSN, Cyber Attack. 1 INTRODUCTION The Wireless Sensor Network or WSN as it is used frequently are easy to adopt, easy to customize and easy to maintain solution. Their lower cost of implementation and effectiveness has made them more useful in Armed Forces, Industrial Manufacturing, and Terrestrial Monitoring and even in Personal Health care, but these same features of WSN has made them vulnerable to various security threats [1]. Different deployments requires different security standards and mechanism notably confidentiality, integrity and .

TỪ KHÓA LIÊN QUAN
TAILIEUCHUNG - Chia sẻ tài liệu không giới hạn
Địa chỉ : 444 Hoang Hoa Tham, Hanoi, Viet Nam
Website : tailieuchung.com
Email : tailieuchung20@gmail.com
Tailieuchung.com là thư viện tài liệu trực tuyến, nơi chia sẽ trao đổi hàng triệu tài liệu như luận văn đồ án, sách, giáo trình, đề thi.
Chúng tôi không chịu trách nhiệm liên quan đến các vấn đề bản quyền nội dung tài liệu được thành viên tự nguyện đăng tải lên, nếu phát hiện thấy tài liệu xấu hoặc tài liệu có bản quyền xin hãy email cho chúng tôi.
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.