Impacts of Denial-of-Service Attack on Energy Efficiency Pulse Coupled Oscillator
نویسندگان
چکیده
The Pulse Coupled Oscillator (PCO) has attracted substantial attention and widely used in wireless sensor networks (WSNs), where it utilizes firefly synchronization to attract mating partners, similar artificial occurrences that mimic natural phenomena. However, the PCO model might not be applicable for simultaneous transmission data reception because of energy constraints. Thus, an energy-efficient pulse coupled oscillator (EEPCO) been proposed, which employs self-organizing method by combining biologically non-biologically inspired network systems proven reduce delay consumption nodes. EEPCO only experimented attack-free without considering security elements may cause malfunctioning cyber-attacks. This study extended experiments testing presence denial-of-service (DoS) attacks investigate efficiency attack-based networks. result shows poor performance DoS terms gathering efficiency, then concludes is vulnerable
منابع مشابه
Denial of Service Attack and Defense
In this chapter, we firstly review the short history of denial of service (DoS) and distributed denial of service (DDoS) attacks. We further explore the reasons why the current cyberspace is a heaven for cyber criminals, such as DDoS attackers. We present the challenges of the DDoS related research fields from various aspects, and discuss the possible research methods and strategies to serve th...
متن کاملSurvey On Detection Of Low Rate Denial Of Service Attack
Feedback control is the essential building block of many internet services. The performance controller act as the basic example in the web server. It adjusts the server’s configuration inn response to alteration between the current and desired states for meeting expected performance. Feedback control act as a crucial element in the QoS software. Low Rate Denial of Service is the attack where th...
متن کاملAnalysis of a Denial of Service Attack on TCP
This paper analyzes a network-based denial of service attack for IP (Internet Protocol) based networks. It is popularly called SYN flooding. It works by an attacker sending many TCP (Transmission Control Protocol) connection requests with spoofed source addresses to a victim’s machine. Each request causes the targeted host to instantiate data structures out of a limited pool of resources. Once ...
متن کاملA Denial of Service Attack on the Java Bytecode Verifier∗
Java Bytecode Verification was so far mostly approached from a correctness perspective. Security vulnerabilities have been found repeatedly and were corrected shortly thereafter. However, correctness is not the only potential point of failure in the verifier idea. In this paper we construct Java code, which is correct, but requires an excessive amount of time to prove safety. In contrast to pre...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Baghdad Science Journal
سال: 2023
ISSN: ['2078-8665', '2411-7986']
DOI: https://doi.org/10.21123/bsj.2023.7161