Research challenges in wireless networks of biomedical sensors
Proceedings of the 7th annual international conference on Mobile computing and networking
Proceedings of the 3rd international conference on Embedded networked sensor systems
IEEE Transactions on Mobile Computing
Denial-of-Service in Wireless Sensor Networks: Attacks and Defenses
IEEE Pervasive Computing
Vineyard Computing: Sensor Networks in Agricultural Production
IEEE Pervasive Computing
Journal of Systems Architecture: the EUROMICRO Journal
Sensor network security: a survey
IEEE Communications Surveys & Tutorials
Securing wireless sensor networks: a survey
IEEE Communications Surveys & Tutorials
A survey of security issues in mobile ad hoc and sensor networks
IEEE Communications Surveys & Tutorials
Anomaly detection in wireless sensor networks
IEEE Wireless Communications
Novel defense mechanism against data flooding attacks in wireless ad hoc networks
IEEE Transactions on Consumer Electronics
IEEE Communications Magazine
Hi-index | 0.00 |
One of the most critical damaging effects on most wireless sensor networks is a flooding attack. Flooding threat occurs not only from spoofed packets generators launched by intruders but also from the inherent behavior of the network protocols. Flooding harm can be categorized into two types as follows. First, a sensor cannot provide required services when it receives a lot of packets. An essential part of packets are rejected and packets delay becomes inadmissible. And second, if a sensor transmits many packets then the sensor battery is quickly exhausted. Energy harvesting technologies offers the potential of reducing the second vulnerability. This paper explores the operation of wireless sensor networks with energy harvesting capability taking into account both flooding negative effects above. We consider the feasibility and threats of the attacks and their impacts. We then propose a theoretical analysis of the flooding attacks. The corresponding mathematical model is offered. Counteracting methods against such intrusions is discussed.