首页> 外文期刊>Procedia Computer Science >Design and Simulation of a Blacklisting Technique for Detection of Hello flood Attack on LEACH Protocol
【24h】

Design and Simulation of a Blacklisting Technique for Detection of Hello flood Attack on LEACH Protocol

机译:LEACH协议检测Hello Flood攻击黑名单技术的设计与仿真

获取原文
           

摘要

Wireless sensor networks consist of number of small, low power nodes with limited computational capabilities. In such networks, data is collected from various low power nodes by nodes with higher energy than others, called cluster heads. These cluster heads then send this data to a major node called sink. However, this aggregation is prone to many attacks. This paper intends to present a study of the algorithms, protocols and techniques for secure data aggregation in sensor networks. The Hello flood attack is explained and a novel algorithm for defense against Hello flood attack is proposed and simulated using Matlab.
机译:无线传感器网络由数量有限,计算能力有限的小型低功耗节点组成。在这样的网络中,通过能量比其他能量更高的节点(称为簇头)从各种低功率节点收集数据。然后,这些集群头将这些数据发送到称为接收器的主节点。但是,这种聚合容易受到许多攻击。本文旨在对传感器网络中安全数据聚合的算法,协议和技术进行研究。介绍了Hello Flood攻击,并提出了一种新的Hello Flood攻击防御算法,并利用Matlab进行了仿真。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号