@incollection{, FFCAB1939D4835BDF96D7188EE2D090D , author={{RupinderSingh} and {Dr. JatinderSingh} and {RupinderSingh} and {Khalsa College, Amritsar}}, journal={{Global Journal of Computer Science and Technology}}, journal={{GJCST}}0975-41720975-435010.34257/gjcst, address={Cambridge, United States}, publisher={Global Journals Organisation}1673140 } @incollection{b0, , title={{Hello flood attack Countermeasures in Wireless Sensor Networks}} , author={{ RupinderSingh } and { DrJatinderSingh } and { Dr. RavinderSingh }} , journal={{International Journal of Computer Science and Mobile Applications}} 4 5 , year={April 2016} } @incollection{b1, , title={{Energy-efficient communication protocol for wireless microsensor networks}} , author={{ WRHeinzelman } and { AChandrakasan } and { HBalakrishnan }} , booktitle={{the proceedings of the 33rd Annual Hawaii International Conference on System Sciences}} , year={Jan. 2000} 2 } @incollection{b2, , title={{On the security of cluster-based communication protocols for wireless sensor networks}} , author={{ ACFerreira } and { MAVilaca } and { LBOliveira } and { EHabib } and { HCWong } and { AALoureiro }} , booktitle={{Proc. of 4th IEEE Int'l Conf. on Networking}} of 4th IEEE Int'l Conf. on NetworkingReunion Island, France , year={Apr. 17-21, 2005} } @incollection{b3, , title={{SPINS: Security Protocols for Sensor Networks}} , author={{ APerrig }} , journal={{Wireless Networks}} 8 5 , year={Sep. 2002} } @incollection{b4, , title={{SecLEACH-a random key distribution solution for securing clustered sensor networks}} , author={{ LBOliveira } and { HCWong } and { MWBern } and { RDahab } and { AALoureiro }} , booktitle={{Proc. of 5th IEEE Int'l Symp. on Network Computing and Applications}} of 5th IEEE Int'l Symp. on Network Computing and ApplicationsCambridge, Massachusetts, USA , year={Jul. 24-26, 2006} } @incollection{b5, , title={{Detection of Hello Flood Attack Caused by Malicious Cluster Heads on LEACH Protocol}} , author={{ YayaShen } and { SanyangLiu } and { ZhaohuiZhang }} , journal={{International Journal of Advancements in Computing Technology (IJACT)}} 7 2 , year={March 2015} } @incollection{b6, , title={{Distance Based Thresholds for Cluster Head Selection in Wireless Sensor Networks}} , author={{ SKang } and { TNguyen }} , journal={{IEEE Communications Letters}} 16 9 , year={Sep. 2012} } @incollection{b7, , title={{SecDEACH: Secure and Resilient Dynamic Clustering Protocol Preserving Data Privacy in WSNs}} , author={{ YHan } and { MPark } and { TChung }} , booktitle={{Proc. of the}} of the , year={2010} } @incollection{b8, , author={{ Int'l Conf }} , booktitle={{On Computational Science and Its Applications}} , year={2010} 6018 } @incollection{b9, , title={{Improvement in LEACH Protocol for Large-scale Wireless Sensor Networks}} , author={{ VKatiyar } and { NCand } and { GCGautam } and { AKumar }} , booktitle={{Proc. of Int'l Conf. On Emerging Trends in Electrical and Computer Technology}} of Int'l Conf. On Emerging Trends in Electrical and Computer Technology , year={Mar. 2011} } @incollection{b10, , title={{Improving Threshold Assignment for Cluster Head Selection in Hierarchical Wireless Sensor Networks}} , author={{ MSaadat } and { RSaadat } and { GMirjality }} , booktitle={{Proc. of Int'l Symposium on Telecommunications}} of Int'l Symposium on Telecommunications , year={Dec. 2010} } @incollection{b11, , title={{Unequal Clustering Scheme based LEACH for Wireless Sensor Networks}} , author={{ PRen } and { JQian } and { LLi } and { ZZhao } and { XLi }} , booktitle={{Proc. of Fourth Int'l Conf. on Genetic and Evolutionary Computing}} of Fourth Int'l Conf. on Genetic and Evolutionary Computing , year={Dec. 2010} } @incollection{b12, , title={{Hello Flood Attack Using BAP in Wireless Sensor Network}} , author={{ GayatriDevi } and { RajeebSankar Bal } and { NibeditaSahoo }} , journal={{International Journal of Advanced Engineering Research and Science}} 2349-6495 2 1 , year={Jan. 2015} } @incollection{b13, , title={{Resilient Cluster Formation for Sensor Networks}} , author={{ DLiu }} , booktitle={{Proc. of 27th Int'l Conf. on Distributed Computing Systems (ICDCS '07)}} of 27th Int'l Conf. on Distributed Computing Systems (ICDCS '07) , year={2007} } @incollection{b14, , title={{Secure Distributed Cluster Formation in Wireless Sensor Networks}} , author={{ KSun }} , booktitle={{Proc. of 22nd Annual Computer Security Applications Conference (ACSAC'06)}} of 22nd Annual Computer Security Applications Conference (ACSAC'06) , year={2006} } @incollection{b15, , title={{Security Enhancement on LEACH Protocol From HELLO Flood Attack in WSN Using LDK Scheme}} , author={{ SMayur } and { HDRanjith }} ISSN (Print): 2347 -6710 , journal={{International Journal of Innovative Research in Science, Engineering and Technology}} (Online): 2319 - 8753 4 , year={March 2015} } @incollection{b16, , title={{Intrusion Detection of Hello Flood Attack in WSNs Using Location Verification Scheme}} , author={{ SRawan } and { MSuhare } and { A }} , journal={{International Journal of Computer and Communication Engineering}} 4 3 , year={May 2015} } @incollection{b17, , title={{Energy level based Hello Flood attack Mitigation on WSN}} , author={{ DilpreetKaur } and { RupinderpalSingh }} , journal={{International Journal of Embedded Systems and Computer Engineering}} 23213361 , year={July 2015} } @incollection{b18, , title={{Detection of Hello Flood Attack on Leach Protocol Based on Energy of Attacker Node}} , author={{ AshuJyoti } and { Bansal }} , journal={{International Journal of Innovations & Advancement in Computer Science}} 2347 -8616 4 , year={September 2015} } @incollection{b19, , title={{A Secure Cluster Formation Scheme in Wireless Sensor Networks}} , author={{ GWang } and { DKim } and { GCho }} ID 301750 , journal={{Int'l Journal of Distributed Sensor Networks}} 2012 14 , year={2012} } @incollection{b20, , title={{A Fair and Secure Cluster Formation Process for Ad Hoc Networks}} , author={{ HRifà-Pous } and { JHerrera-Joancomartí }} , journal={{Wireless Communications}} 56 3 , year={2011} } @incollection{b21, , title={{Cluster-based Reputation and Trust for Wireless Sensor Networks}} , author={{ GVCrosby } and { NPissinou }} , booktitle={{Proc. of the 4th IEEE Consumer Communications and Networking Conference (CCNC '07)}} of the 4th IEEE Consumer Communications and Networking Conference (CCNC '07) , year={2007} } @incollection{b22, , title={{Private Cluster Head Election in Wireless Sensor Networks}} , author={{ LButtyan } and { THolczer }} , booktitle={{Proc. of the Fifth IEEE Int'l Workshop on Wireless and Sensor Network Security (WSN '09)}} of the Fifth IEEE Int'l Workshop on Wireless and Sensor Network Security (WSN '09) , publisher={IEEE} , year={2009} } @incollection{b23, , title={{Detection of HELLO flood Attack on LEACH Protocol}} , author={{ ShikhaMagotra } and { KrishanKumar }} , booktitle={{IEEE International Advance Computing Conference (IACC)}} , year={2014} } @incollection{b24, , title={{Non-manipulable Aggregator Node Election Protocols for Wireless Sensor Networks}} , author={{ MSirivianos }} , booktitle={{Proc. of IEEE 6th Annual Comm. Society Conf. on Sensor, Mesh and Ad Hoc Communications and Networks(SECON)}} of IEEE 6th Annual Comm. Society Conf. on Sensor, Mesh and Ad Hoc Communications and Networks(SECON)Cyprus , year={Apr. 2007. 2009} , note={Proc. of Int'l Sympo. on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt '07)} } @incollection{b25, , title={{Secure Clustering for Building Certificate Mangement Nodes in Ad-Hoc Networks}} , author={{ INishimura } and { TNagase } and { YTakehana } and { YYoshioka }} , booktitle={{Proc. of 14th Int'l Conf. On Network-Based Information Systems (NBiS)}} of 14th Int'l Conf. On Network-Based Information Systems (NBiS)Tirana, Albania , year={Sep. 07-09, 2011} } @incollection{b26, , title={{Attacks and countermeasures in WSN}} , author={{ JSteffi } and { AginoPriyanka } and { STephillah } and { AMBalamurugan }} , journal={{International Journal of Electronics & Communication}} 23215984 2 1 , year={January 2014} } @incollection{b27, , title={{Detection of Malicious Cluster Head causing Hello Flood Attack in LEACH Protocol in Wireless Sensor Networks}} , author={{ Satwinder Kaur } and { MansiSaini } and { Gupta }} , journal={{International Journal of Application or Innovation in Engineering & Management (IJAIEM)}} 2319 -4847 3 5 , year={May 2014} } @incollection{b28, , title={{A Survey in Hello Flood Attack in Wireless Sensor Networks}} , author={{ AkhilDubey } and { DeepakMeena } and { ShailiGaur }} , journal={{International Journal of Engineering Research & Technology (IJERT)}} 2278- 0181 3 1 , year={January 2014} } @incollection{b29, , title={{Signal Strength based Hello Flood Attack Detection and Prevention in Wireless Sensor Networks}} , author={{ Virendra Pal } and { SSingh } and { AnandAishwarya } and { SwetaUkey } and { Jain }} , journal={{International Journal of Computer Applications}} 62 15 , year={January 2013} } @incollection{b30, , title={{Attacks and counterattacks on wireless sensor networks}} , author={{ NusratFatema } and { RemusBrad }} , booktitle={{Sensor & Ubiquitous Computing (IJASUC)}} , year={December 2013} 4 } @incollection{b31, , title={{Evading Flooding Attack in MANET Using Node Authentication}} , author={{ AAnup Wanjari } and { VidyaDhamdhere }} , journal={{International Journal of Science and Research}} 3 , year={December 2014} } @book{b32, , title={{}} , author={{ KamalMohammad Sayad Haghighi } and { VijayMohamedpour } and { BarryGVaradharajan }} } @incollection{b33, , title={{Stochastic Modeling of Hello Flooding in Slotted CSMA/CA Wireless Sensor Networks}} , author={{ Quinn }} , booktitle={{IEEE transactions on information forensics and security}} , year={December 2011} 6 } @incollection{b34, , title={{Hello Flood Attack and its Countermeasures in Wireless Sensor Networks}} , author={{ Virendra Pal } and { SwetaSingh } and { JyotiJain } and { Singhai }} , journal={{International Journal of Computer Science Issues}} 1694-0814 7 11 , year={May 2010} } @incollection{b35, , title={{Security in wireless sensor networks}} , author={{ CVenkata } and { MukeshSinghal } and { JamesRoyalty } and { SrilekhaVaranasi }} , booktitle={{Wireless communications and mobile computing Published online in Wiley Inder Science}} , year={2006} } @incollection{b36, , title={{Hello Flood Counter Measure for Wireless Sensor Network}} , author={{ MohamedOsama } and { Khozium }} , journal={{International Journal of Computer Science and Security}} 2 3 , year={May 2008} } @incollection{b37, , title={{Defense against lap-top class attacker in wireless sensor network}} , author={{ AHamid } and { MamunRashid }} , booktitle={{The 8th International Conference Advanced Communication Technology}} , publisher={IEEE} , year={2006} , note={Print ISBN} , note={Choong Seon Hong} } @incollection{b38, , title={{A MAC Layer Based Defense Architecture for Reduction-of-Quality (RoQ) Attacks in Wireless LAN}} , author={{ HWaldir Ribeiro Pires J´ Unior Thiago } and { ChiDe Paula Figueiredo Hao } and { Wong }} , booktitle={{18th International Parallel and Distributed Processing Symposium}} , editor={ DrSavitaSingh DrGupta Lakhwinder Kaur } , year={2010} 7 , note={Print} , note={Malicious Node Detection in Wireless Sensor Networks} } @incollection{b39, , title={{A Cross-Layer Based Intrusion Detection Technique for Wireless Networks}} , author={{ JatinderSingh } and { DrSavitaGupta } and { DrLakhwinder Kaur }} , journal={{The International Arab Journal of Information Technology}} 9 3 , year={May 2012} }