Detecting Anomalies Based On Entropy-Estimation

Download Now
Provided by: Creative Commons
Topic: Networking
Format: PDF
The authors know the sensor nodes perform monitoring and data collection tasks. It requires substantial protection and is exposing to node compromise which paves way to attackers when it is arranged in less protected environment. They interrupt the network communication by induction attacks in two ways such as dropping packets and modifying packets. Specifically, concession nodes drop or adjust the packets that they are thought to forward to destination. Nodes observe the forwarding behaviors of their neighbours incessantly to find out if their neighbours are mischievous.
Download Now

Find By Topic