IJERT-EMS
IJERT-EMS

Comparative Analysis of Flooding and Jamming Attacks in Wireless Sensor Networks


Comparative Analysis of Flooding and Jamming Attacks in Wireless Sensor Networks
Authors : Shikha Jindal, Raman Maini
Publication Date: 10-04-2014

Authors

Author(s):  Shikha Jindal, Raman Maini

Published in:   International Journal of Engineering Research & Technology

License:  This work is licensed under a Creative Commons Attribution 4.0 International License.

Website: www.ijert.org

Volume/Issue:   Vol. 3 - Issue 4 (April- 2014)

e-ISSN:   2278-0181

Abstract

In the development of the computer networks Wireless Sensor Network (WSN) plays an important role. In recent time, there are many out-of-doors applications like medical and military examination in which wireless sensor networks (WSNs) have been generally used. Therefore it is important to give surety up to the required level of security. Due to some weaknesses like limited processing capability, memory, and because of the broadcast transmission medium Wireless Sensor Networks are mostly susceptible to Denial of Service attacks like jamming and flooding. Since sensor nodes are very resource controlled so security is one of the primary issues in sensor networks. In this paper, we have done comparative analysis of flooding and jamming attack in wireless sensor networks using NS2 simulator. In analysis we found that jamming attacks are harder to detect as compared to flooding attacks because jamming attacks targets or jams a particular region or area.

Citations

Number of Citations for this article:  Data not Available

Keywords

Key Word(s):    

Downloads

Number of Downloads:     466
Similar-Paper

Call for Papers - May - 2017

        

 

                 Call for Thesis - 2017 

     Publish your Ph.D/Master's Thesis Online

              Publish Ph.D Master Thesis Online as Book