MERAL Myanmar Education Research and Learning Portal
Item
{"_buckets": {"deposit": "9a6ac0bb-6408-4352-8b2b-03fc38e22761"}, "_deposit": {"id": "4817", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "4817"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/4817", "sets": ["user-ucsy"]}, "communities": ["ucsy"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "Mitigation for Flooding Attack in Cluster-Based Wireless Sensor Network using Authentication Technique", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "Today’s world is experiencing many natural disasters like earthquakes, flooding, Tsunamis and forest firing, etc. Therefore, it is not only necessary to use widely Wireless Sensor Networks in the hostile environments all over the world but also necessary security in these environments to obtain important and exact information in time in order to be great effect on our real life. However, there are security problems in WSNs because of resources constraints. The most vulnerable attack in terms of exhaustion of resources is Denial of Service attacks (DOS). This research proposes a scheme for mitigation of DOS attacks (flooding attack) by using reactive approach in WSNs based on the fact “Although resource a constraint is one of the limitations of WSN, security is also vital and should consider trade-off between them”. The proposed scheme will use modified LEACH (Low Energy Adaptive Clustering Hierarchy) routing protocol and some symmetric encryption techniques in order to mitigate the flooding attack by minimizing resource consumption and maximizing security in any Wireless Sensor Network applications."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value": []}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value": []}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "", "subitem_journal_title": "Eleventh International Conference On Computer Applications (ICCA 2013)", "subitem_pages": "", "subitem_volume": ""}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Maw, Tin Win"}, {"subitem_authors_fullname": "Zaw, Myo Hein"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Article"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2013-02-26"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "http://onlineresource.ucsy.edu.mm/handle/123456789/717"}, "item_title": "Mitigation for Flooding Attack in Cluster-Based Wireless Sensor Network using Authentication Technique", "item_type_id": "21", "owner": "1", "path": ["1597824273898"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000004817", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2019-07-11"}, "publish_date": "2019-07-11", "publish_status": "0", "recid": "4817", "relation": {}, "relation_version_is_last": true, "title": ["Mitigation for Flooding Attack in Cluster-Based Wireless Sensor Network using Authentication Technique"], "weko_shared_id": -1}
Mitigation for Flooding Attack in Cluster-Based Wireless Sensor Network using Authentication Technique
http://hdl.handle.net/20.500.12678/0000004817
http://hdl.handle.net/20.500.12678/0000004817