Impacts of Denial-of-Service Attack on Energy Efficiency Pulse Coupled Oscillator

نویسندگان

چکیده

The Pulse Coupled Oscillator (PCO) has attracted substantial attention and widely used in wireless sensor networks (WSNs), where it utilizes firefly synchronization to attract mating partners, similar artificial occurrences that mimic natural phenomena. However, the PCO model might not be applicable for simultaneous transmission data reception because of energy constraints. Thus, an energy-efficient pulse coupled oscillator (EEPCO) been proposed, which employs self-organizing method by combining biologically non-biologically inspired network systems proven reduce delay consumption nodes. EEPCO only experimented attack-free without considering security elements may cause malfunctioning cyber-attacks. This study extended experiments testing presence denial-of-service (DoS) attacks investigate efficiency attack-based networks. result shows poor performance DoS terms gathering efficiency, then concludes is vulnerable

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Denial of Service Attack and Defense

In this chapter, we firstly review the short history of denial of service (DoS) and distributed denial of service (DDoS) attacks. We further explore the reasons why the current cyberspace is a heaven for cyber criminals, such as DDoS attackers. We present the challenges of the DDoS related research fields from various aspects, and discuss the possible research methods and strategies to serve th...

متن کامل

Survey On Detection Of Low Rate Denial Of Service Attack

Feedback control is the essential building block of many internet services. The performance controller act as the basic example in the web server. It adjusts the server’s configuration inn response to alteration between the current and desired states for meeting expected performance. Feedback control act as a crucial element in the QoS software. Low Rate Denial of Service is the attack where th...

متن کامل

Analysis of a Denial of Service Attack on TCP

This paper analyzes a network-based denial of service attack for IP (Internet Protocol) based networks. It is popularly called SYN flooding. It works by an attacker sending many TCP (Transmission Control Protocol) connection requests with spoofed source addresses to a victim’s machine. Each request causes the targeted host to instantiate data structures out of a limited pool of resources. Once ...

متن کامل

A Denial of Service Attack on the Java Bytecode Verifier∗

Java Bytecode Verification was so far mostly approached from a correctness perspective. Security vulnerabilities have been found repeatedly and were corrected shortly thereafter. However, correctness is not the only potential point of failure in the verifier idea. In this paper we construct Java code, which is correct, but requires an excessive amount of time to prove safety. In contrast to pre...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Baghdad Science Journal

سال: 2023

ISSN: ['2078-8665', '2411-7986']

DOI: https://doi.org/10.21123/bsj.2023.7161