Intrusion Detection of Hello Flood Attack in WSNs Using Location Verification Scheme

Download Now
Provided by: International Academy Publishing (IAP)
Topic: Networking
Format: PDF
Wireless Sensor Networks (WSNs) are type of networks that recently emerged to have many important applications. They are targeted against many attacks such as sinkhole, selective forwarding, hello flood and node replication attacks. Location verification algorithms are used to detect and verify nodes locations in WSN and can be used for Intrusion Detection System (IDS). In this paper, the authors purpose an IDS based on nodes location verification algorithm for WSNs to detect the locations of malicious nodes. In addition, IDS detects hello flood attack and report the attack and goal nodes.
Download Now

Find By Topic