Mobility

Spread Spectrum System With DoS Attack Properties in Wireless Sensor Networks

Date Added: Jan 2012
Format: PDF

Wireless Sensor Networks can be implementing with compromised nodes communication. In compromised nodes to launch DDoS attacks. Using DDoS attacks characteristics to identify the authorized user's communication process. All authorized users reports of information can be available in server. Legitimate reports verify the client's communication reports. In previous system there is no specification of strong filtering scheme representation process. Present system introduces hash chain specification process with dynamic wireless sensor networks. Every port contains individual hash function. Hash Function can be allocating each and every node itself.