Flooding Attack in Wireless Sensor Network-Analysis and Prevention
Lakshmi HN1, Santosh Anand2, Somnath Sinha3
1Lakshmi HN, Department of Computer Science, Amrita School of Arts & Sciences, Amrita Vishwa Vidyapeetham, Mysuru (Karnataka), India.
2Santosh Anand, Department of Computer Science, Amrita School of Arts & Sciences, Amrita Vishwa Vidyapeetham, Mysuru (Karnataka), India.
3Somnath Sinha, Department of Computer Science, Amrita School of Arts & Sciences, Amrita Vishwa Vidyapeetham, Mysuru (Karnataka), India.
Manuscript received on 18 June 2019 | Revised Manuscript received on 25 June 2019 | Manuscript published on 30 June 2019 | PP: 1792-1796 | Volume-8 Issue-5, June 2019 | Retrieval Number: E7608068519/19©BEIESP
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: Wireless sensor network have risen as an essential utilization of the ad-hoc networks model for example, for checking physical condition of an environment. These sensor systems have restrictions of framework assets like battery control, communication range and preparing capacity These sensor systems have restrictions of framework assets like battery control, communication range and preparing capacity. Low handling power and wireless connectivity make such systems helpless against different kinds of system assaults. Due to the limitations of WSN they are susceptible to different types of attack. Denial of service attack (DOS attack) or flooding attack is one of them. In this paper, we are simulating and analysing RREQ flooding DOS attacks. The study is based on a generic NS2-based WSN model. The routing protocol code is changed in the specified WSN simulation model to simulate RREQ Flooding attack.
Keywords: AODV, DOS, Flooding Attack, NS2, WSN.
Scope of the Article: WSN