Affiliation:
1. SRM Institute of Science and Technology, Ramapuram, India
2. Dhaanish Ahmed College of Engineering, India
Abstract
The rapid evolution of the Internet and communication technologies has fueled the proliferation of wireless sensor network (WSN) technology, which is increasingly important in today's interconnected world. For a broad variety of industries and applications, an enormous number of sensing devices continuously create and/or gather copious amounts of sensory data. However, it has been shown that WSN is susceptible to security flaws. These networks' abrasive and unmanaged deployment, along with their limited resources and the amount of data produced, raise serious security issues. The development of trustworthy solutions that include quick and continuous processes for live data stream analysis allowing the identification of flooding assaults is crucial since WSN applications are of the utmost importance. To put it in plain words: The assault is carried out by repeatedly sending pointless requests to the target computer in an effort to overwhelm it, cause the systems to fail, and prevent people from accessing the network or machine.
Reference42 articles.
1. Abbassy, Mohamed M., & Ead, W. M. (2020). Intelligent Greenhouse Management System. 2020 6th International Conference on Advanced Computing and Communication Systems (ICACCS). IEEE.
2. Edge detection in images using modified bit-planes Sobel operator;R.Agarwal;Advances in Intelligent Systems and Computing,2014
3. Agarwal, R., Hariharan, S., Nagabhushana Rao, M., & Agarwal, A. (2021). Weed identification using K-means clustering with color spaces features in multi-spectral images taken by UAV. 2021 IEEE International Geoscience and Remote Sensing Symposium IGARSS. IEEE.
4. A novel approach towards realizing optimum data transfer and Automatic Variable Key(AVK);P.Chakrabarti;International Journal of Computer Science and Network Security,2008
Cited by
37 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献