Skip navigation

Please use this identifier to cite or link to this item: http://10.10.120.238:8080/xmlui/handle/123456789/133
Title: Flooding in Secure Wireless Sensor Networks
Authors: Bondu J.
Laxmi V.
Mishra A.
Gaur M.S.
Keywords: Blackhole attack
Flooding algorithm
Network simulator-3
Wireless Sensor Networks
Issue Date: 2017
Publisher: Association for Computing Machinery
Abstract: The flooding algorithm remains one of the simplest and most effective ways to quickly disseminate information across all nodes in a Wireless Sensor Network. Though fast, this algorithm remains unsecure as the packets can be intercepted by malice agents to reveal the information. In this paper, simulations of a flooding algorithm in Sensor Networks secured by a Random Key Pre-distribution model are presented. We conducted these simulations on ns-3 over a theoretical Peer-to-peer and a standard based IEEE 802.15.4 network. This is followed by a demonstration of the robustness of the network through a random black hole attack. © 2017 Copyright held by the owner/author(s).
URI: https://dx.doi.org/10.1145/3136825.3136867
http://localhost:8080/xmlui/handle/123456789/133
ISBN: 978-1450353038
Appears in Collections:Conference Paper

Files in This Item:
There are no files associated with this item.
Show full item record


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.