Spread Spectrum System With DoS Attack Properties in Wireless Sensor Networks

Wireless Sensor Networks can be implementing with compromised nodes communication. In compromised nodes to launch DDoS attacks. Using DDoS attacks characteristics to identify the authorized user's communication process. All authorized users reports of information can be available in server. Legitimate reports verify the client's communication reports. In previous system there is no specification of strong filtering scheme representation process. Present system introduces hash chain specification process with dynamic wireless sensor networks. Every port contains individual hash function. Hash Function can be allocating each and every node itself.

Provided by: International Journal of Electronics Communication and Computer Engineering Topic: Mobility Date Added: Jan 2012 Format: PDF

Find By Topic