Log in
Language:

MERAL Myanmar Education Research and Learning Portal

  • Top
  • Universities
  • Ranking
To
lat lon distance
To

Field does not validate



Index Link

Index Tree

Please input email address.

WEKO

One fine body…

WEKO

One fine body…

Item

{"_buckets": {"deposit": "9a6ac0bb-6408-4352-8b2b-03fc38e22761"}, "_deposit": {"id": "4817", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "4817"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/4817", "sets": ["user-ucsy"]}, "communities": ["ucsy"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "Mitigation for Flooding Attack in Cluster-Based Wireless Sensor Network using Authentication Technique", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "Today’s world is experiencing many natural disasters like earthquakes, flooding, Tsunamis and forest firing, etc. Therefore, it is not only necessary to use widely Wireless Sensor Networks in the hostile environments all over the world but also necessary security in these environments to obtain important and exact information in time in order to be great effect on our real life. However, there are security problems in WSNs because of resources constraints. The most vulnerable attack in terms of exhaustion of resources is Denial of Service attacks (DOS). This research proposes a scheme for mitigation of DOS attacks (flooding attack) by using reactive approach in WSNs based on the fact “Although resource a constraint is one of the limitations of WSN, security is also vital and should consider trade-off between them”. The proposed scheme will use modified LEACH (Low Energy Adaptive Clustering Hierarchy) routing protocol and some symmetric encryption techniques in order to mitigate the flooding attack by minimizing resource consumption and maximizing security in any Wireless Sensor Network applications."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value": []}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value": []}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "", "subitem_journal_title": "Eleventh International Conference On Computer Applications (ICCA 2013)", "subitem_pages": "", "subitem_volume": ""}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Maw, Tin Win"}, {"subitem_authors_fullname": "Zaw, Myo Hein"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Article"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2013-02-26"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "http://onlineresource.ucsy.edu.mm/handle/123456789/717"}, "item_title": "Mitigation for Flooding Attack in Cluster-Based Wireless Sensor Network using Authentication Technique", "item_type_id": "21", "owner": "1", "path": ["1597824273898"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000004817", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2019-07-11"}, "publish_date": "2019-07-11", "publish_status": "0", "recid": "4817", "relation": {}, "relation_version_is_last": true, "title": ["Mitigation for Flooding Attack in Cluster-Based Wireless Sensor Network using Authentication Technique"], "weko_shared_id": -1}
  1. University of Computer Studies, Yangon
  2. Conferences

Mitigation for Flooding Attack in Cluster-Based Wireless Sensor Network using Authentication Technique

http://hdl.handle.net/20.500.12678/0000004817
http://hdl.handle.net/20.500.12678/0000004817
3dfd11ff-66bf-460a-83ed-d7e8f7b4c818
9a6ac0bb-6408-4352-8b2b-03fc38e22761
Back
0
0
views
downloads
See details
Views Downloads

Versions

Ver.1 2020-09-01 15:22:32.895334
Show All versions

Share

Mendeley Twitter Facebook Print Addthis

Export

OAI-PMH
  • OAI-PMH DublinCore
Other Formats
  • JSON

Confirm


Back to MERAL


Back to MERAL