首页> 外文期刊>Computer Science & Information Technology >Simulation of Snooze Attack in Leach
【24h】

Simulation of Snooze Attack in Leach

机译:浸出中贪睡攻击的模拟

获取原文
           

摘要

Wireless Sensor Network (WSN) consists of large number of sensor nodes capable of forming instantaneous network with dynamic topology. Each node simultaneously as both router and host. Number of nodes in a WSN can vary either due to the mobility or death of nodes due to drained conditions. Low Energy Aware Cluster Hierarchy (LEACH ) is a most popular dynamic clustering protocol for WSN. Deployment in unattended environment, limited memory, limited power and low computational power of a sensor node make these networks susceptible to attacks launched by malicious nodes. This paper provides an overview of LEACH protocol and how LEACH can be compromised by malicious nodes. We propose a attack on LEACH – Snooze attack. This paper we present a way to simul ate this attack on NS-2 which is demonstrative on throughput. We observe that during simulation throughput drops as an effect of attack. It is observed that the effect of the attack gets aggregated as we increase the number of attackers
机译:无线传感器网络(WSN)由大量传感器节点组成,这些传感器节点能够形成具有动态拓扑的瞬时网络。每个节点同时作为路由器和主机。 WSN中节点的数量可能会因移动性或由于耗尽条件而导致的节点死亡而有所不同。低能耗感知集群层次结构(LEACH)是WSN最受欢迎的动态集群协议。在无人值守的环境中部署,有限的内存,有限的能力以及传感器节点的低计算能力使这些网络容易受到恶意节点发起的攻击。本文概述了LEACH协议以及恶意节点如何破坏LEACH。我们建议对LEACH进行攻击-贪睡攻击。本文我们提出了一种模拟NS-2攻击的方法,该方法在吞吐量上具有示范性。我们观察到,在仿真过程中,吞吐量下降是攻击的影响。可以看出,随着我们增加攻击者的数量,攻击的影响逐渐聚合

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号