Skip navigation

Please use this identifier to cite or link to this item: http://10.10.120.238:8080/xmlui/handle/123456789/133
Full metadata record
DC FieldValueLanguage
dc.contributor.authorBondu J.en_US
dc.contributor.authorLaxmi V.en_US
dc.contributor.authorMishra A.en_US
dc.contributor.authorGaur M.S.en_US
dc.date.accessioned2023-11-30T07:35:45Z-
dc.date.available2023-11-30T07:35:45Z-
dc.date.issued2017-
dc.identifier.isbn978-1450353038-
dc.identifier.otherEID(2-s2.0-85042094838)-
dc.identifier.urihttps://dx.doi.org/10.1145/3136825.3136867-
dc.identifier.urihttp://localhost:8080/xmlui/handle/123456789/133-
dc.description.abstractThe flooding algorithm remains one of the simplest and most effective ways to quickly disseminate information across all nodes in a Wireless Sensor Network. Though fast, this algorithm remains unsecure as the packets can be intercepted by malice agents to reveal the information. In this paper, simulations of a flooding algorithm in Sensor Networks secured by a Random Key Pre-distribution model are presented. We conducted these simulations on ns-3 over a theoretical Peer-to-peer and a standard based IEEE 802.15.4 network. This is followed by a demonstration of the robustness of the network through a random black hole attack. © 2017 Copyright held by the owner/author(s).en_US
dc.language.isoenen_US
dc.publisherAssociation for Computing Machineryen_US
dc.sourceACM International Conference Proceeding Seriesen_US
dc.subjectBlackhole attacken_US
dc.subjectFlooding algorithmen_US
dc.subjectNetwork simulator-3en_US
dc.subjectWireless Sensor Networksen_US
dc.titleFlooding in Secure Wireless Sensor Networksen_US
dc.typeConference Paperen_US
Appears in Collections:Conference Paper

Files in This Item:
There are no files associated with this item.
Show simple item record


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.