A Survey On The Prediction Of Exhaustion Attacks Over Wireless Networks Using Fuzzy Cluster Means (FCM)

 
 
 
  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract


    The transmission of digital data from source to destination over wireless networks is challenging one due to noise and interferences. The noises can be negligible one or it may be avoided by increasing the transmission power, carrier strength and channel capacity. However, the interferences like hacking the information called attacks in wireless networks are unable to be avoided. This paper proposes the survey on the exhaustion attacks and DDoS attacks in wireless networks and also discuss about the security threats and the solutions to avoid the attacks.

     

     


  • Keywords


    Wireless Networks, Exhaustion Attacks, DDoS Attacks, Fuzzy Cluster Means (FCM), Security Challenge and solutions

  • References


      [1] Balarengadurai C., Saraswathi S. (2013), A Fuzzy Logic System for Detecting Ping Pong Effect Attack in IEEE 802.15.4 Low Rate Wireless Personal Area Network, In: Abraham A., Thampi S. (eds), Intelligent Informatics, Advances in Intelligent Systems and Computing, vol 182, Springer, Berlin, Heidelberg, https://doi.org/10.1007/978-3-642-32063-7_43, Print ISBN978-3-642-32062-0, Online ISBN978-3-642-32063-7.

      [2] Adat, V. & Gupta, B.B. Telecommun Syst (2018) 67: 423. https://doi.org/10.1007/s11235-017-0345-9, Springer US, Print ISSN1018-4864, Online ISSN1572-9451.

      [3] Zhang, T., Yan, L. & Yang, Y. Wireless Netw (2018) 24: 777. https://doi.org/10.1007/s11276-016-1368-y, Springer US,Print ISSN1022-0038, Online ISSN1572-8196.

      [4] Ojuroye O., Torah R., Beeby S., Wilde A. (2017) Smart Textiles for Smart Home Control and Enriching Future Wireless Sensor Network Data. In: Postolache O., Mukhopadhyay S., Jayasundera K., Swain A. (eds) Sensors for Everyday Life. Smart Sensors, Measurement and Instrumentation, vol 22. Springer, Cham, https://doi.org/10.1007/978-3-319-47319-2_9, Print ISBN978-3-319-47318-5, Online ISBN978-3-319-47319-2

      [5] Bhushan, B. & Sahoo, G. Wireless Pers Commun (2018) 98: 2037. https://doi.org/10.1007/s11277-017-4962-0, Springer US, Print ISSN0929-6212, Online ISSN1572-834X.

      [6] Arif Sari*&Ahmed Alzubi* (2018), Chapter 13 – Path Loss Algorithms for Data Resilience in Wireless Body Area Networks for Healthcare Framework, A volume in Intelligent Data-Centric Systems 2018, Elsevier,https://doi.org/10.1016/B978-0-12-811373-8.00013-6 Pages 285–313

      [7] Zhihua Zhang, Shoushan Luo, Hongliang Zhu, and Yang Xin, “A Clone Detection Algorithm with Low Resource Expenditure for Wireless Sensor Networks,” Journal of Sensors, vol. 2018, Article ID 4396381, 16 pages, 2018. doi:10.1155/2018/4396381.

      [8] Xiuwen Fu, Yongsheng Yang, and Haiqing Yao, “Analysis on Invulnerability of Wireless Sensor Network towards Cascading Failures Based on Coupled Map Lattice,” Complexity, vol. 2018, Article ID 6386324, 14 pages, 2018. doi:10.1155/2018/6386324.

      [9] Leloglu, E. (2017) A Review of Security Concerns in Internet of Things. Journal of Computer and Communications, 5, 121-136. http://dx.doi.org/10.4236/jcc.2017.51010.

      [10] Sabah Alzahrani, Liang Hong (2018), A Survey of Cloud Computing Detection Techniques against DDoS Attacks, Journal of information security, Vol.9 No.1, January 2018, 10.4236/jis.2018.91005, pp.45-69.


 

View

Download

Article ID: 28559
 
DOI: 10.14419/ijet.v7i4.6.28559




Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.