Intrusion Detection of Hello Flood Attack in WSNs Using Location Verification Scheme

Wireless Sensor Networks (WSNs) are type of networks that recently emerged to have many important applications. They are targeted against many attacks such as sinkhole, selective forwarding, hello flood and node replication attacks. Location verification algorithms are used to detect and verify nodes locations in WSN and can be used for Intrusion Detection System (IDS). In this paper, the authors purpose an IDS based on nodes location verification algorithm for WSNs to detect the locations of malicious nodes. In addition, IDS detects hello flood attack and report the attack and goal nodes.

Subscribe to the Developer Insider Newsletter

From the hottest programming languages to commentary on the Linux OS, get the developer and open source news and tips you need to know. Delivered Tuesdays and Thursdays

Subscribe to the Developer Insider Newsletter

From the hottest programming languages to commentary on the Linux OS, get the developer and open source news and tips you need to know. Delivered Tuesdays and Thursdays

Resource Details

Provided by:
International Academy Publishing (IAP)
Topic:
Networking
Format:
PDF