A flooding attack in wireless sensor networks is a type of threat that shortens the lifetimes of the sensor networks. Although flooding attack prevention techniques have been proposed, if a continuous flooding attack occurs, the sensor node energy is depleted during detection. In this paper, we use multi-path routing to solve this problem. In order to balance the load of the sensor node, energy balancing of the sensor node is controlled by determining the number of pathways using fuzzy logic. By adjusting the energy balancing of the sensor nodes, the number of energy-exhausting sensor nodes can be reduced. As a result, when a flooding attack occurs, the energy efficiency of the sensor node is increased by determining the number of pathways
Wireless Sensor Networks (WSNs) facilitate efficient data gathering requirements occurring in indoor...
The wireless sensor network is an intelligent self-organizing network which consists of many sensor ...
Many sensor network applications are dependent on the secure operation of networks, and serious prob...
A flooding attack in wireless sensor networks is a type of threat that shortens the lifetimes of the...
A flooding attack in wireless sensor networks is a type of threat that shortens the lifetimes of the...
Selective forwarding attacks in mobile wireless sensor networks are classified as threat attacks bec...
ABSTRACT A selective forwarding attack in mobile wireless sensor networks is an attack that selecti...
Sensor nodes are easily compromised to malicious attackers due to an open environment. A false injec...
Wireless sensor networks are supplied with limited energy resources and are usually installed in una...
Network congestion is a key challenge in resource-constrained networks, particularly those with limi...
Wireless sensor networks (WSNs) are used in health monitoring, tracking and security applications. S...
Wireless Sensor networks play an important role in the safety and security of industrial zones, fore...
In many wireless sensor network applications, sensor nodes that have a limited battery power are dep...
Mobile sinks (MSs) are capable of collecting data along specified paths in wireless sensor networks ...
In sensor networks, nodes can be easily compromised by an adversary because of hostile environments....
Wireless Sensor Networks (WSNs) facilitate efficient data gathering requirements occurring in indoor...
The wireless sensor network is an intelligent self-organizing network which consists of many sensor ...
Many sensor network applications are dependent on the secure operation of networks, and serious prob...
A flooding attack in wireless sensor networks is a type of threat that shortens the lifetimes of the...
A flooding attack in wireless sensor networks is a type of threat that shortens the lifetimes of the...
Selective forwarding attacks in mobile wireless sensor networks are classified as threat attacks bec...
ABSTRACT A selective forwarding attack in mobile wireless sensor networks is an attack that selecti...
Sensor nodes are easily compromised to malicious attackers due to an open environment. A false injec...
Wireless sensor networks are supplied with limited energy resources and are usually installed in una...
Network congestion is a key challenge in resource-constrained networks, particularly those with limi...
Wireless sensor networks (WSNs) are used in health monitoring, tracking and security applications. S...
Wireless Sensor networks play an important role in the safety and security of industrial zones, fore...
In many wireless sensor network applications, sensor nodes that have a limited battery power are dep...
Mobile sinks (MSs) are capable of collecting data along specified paths in wireless sensor networks ...
In sensor networks, nodes can be easily compromised by an adversary because of hostile environments....
Wireless Sensor Networks (WSNs) facilitate efficient data gathering requirements occurring in indoor...
The wireless sensor network is an intelligent self-organizing network which consists of many sensor ...
Many sensor network applications are dependent on the secure operation of networks, and serious prob...