# I. Introduction ireless Sensor Network (WSN) is an infrastructure-less and self-configured wireless networks which is used to monitor physical conditions or environment such as sound, humidity, temperature, pressure, speed, pollutant levels etc. and so on. Sensors in WSN pass the data gathered to Base Station (BS) so that it can be further analyzed for further processing to take different decisions. Figure 1 shows the structure of a typical WSN. Sensor nodes in a WSN are very resource constrained and are susceptible to various attacks due to limited capacity of data processing, speed, storage, communication bandwidth etc. The complication of the implemented security algorithms also adds to the trouble of providing security to WSNs.The past proposed security techniques for WS Ns assumed that almost all sensor nodes are reliable and helpful, but the same is not true for most of the cases for many sensor network applications today. A large number of attacks are possible in WSN including jamming, tampering, exhausting, hello flood, collision, sinkhole, Sybil, denial-of-service, flooding, cloning etc. Hello flood attack is a network layer attack in WSN caused when hello packets used for neighbour discovery are sent or replayed by an attacker with high transmission power. In this way, the attacker creates an illusion of being a neighbour to other sensor nodes so that the underlying routing protocol can be disrupted, which smooth the progress of launching further types of attacks. The attacker broadcast packets with such a high transmission power that a large number of sensor nodes in the WSN choose it as the parent node or cluster head (CH) in case of clustered implementation. All messages to be broadcasted in the WSN are routed through this parent sensor node that increases delay. The attacker broadcast these hello messages to a large number of sensor nodes in a wide area of the WSN. These sensor nodes are then forced to be convinced that the attacker node in the network is their neighbour. All the sensor nodes are going to reply to this HELLO message from the attacker and are going to waste their energy. This usually results in a confusion state in the WSN. Heinzelman et al. [2] introduced a dynamic hierarchical clustering protocol called LEACH (Low Energy Adaptive LEACH divides the WSN into small clusters of which one is the CH head and others sensor nodes are the cluster members. The cluster sensor node members send their gathered data to the CH, which in turn send it to the BS W by aggregating all the received data from its cluster members so as to reduce the redundancy. In LEACH the CH sensor nodes are periodically re-elected so that the same sensor node is not repeatedly used for the high energy job of the CH. LEACH operations are divided into two phases of Setup phase and Steady phase. In the setup phase, the formation of clusters with CH and cluster members is done for the WSN while in the steady phase; data are sensed and sent to the BS. The steady phase is longer than the setup phase and is done in order to minimize the overhead cost. LEACH protocol is a more secure protocol as compared to the conventional multi-hop protocols as in conventional multi-hop protocols, the sensor nodes around the BS are more attractive to compromise as they are the major points of aggregation and forwarders of all packets to the BS. While in LEACH protocol, the CH are the only node that directly communicate with the BS and the location of these CH can be anywhere in the WSN irrespective of the BS. More over these CHs are regularly randomly changed. Therefore, spotting these CHs is very hard for the adversary in WSN. However, as LEACH is a cluster-based protocol, depending exclusively on the CHs for aggregation of data and its routing, attacks on the CH are the most harmful. If any adversary node becomes a CH, then it can make possible attacks like HELLO flood attack, Sybil attack, selective forwarding etc. Hello packets in WSN are used for neighbour discovery but they can be used by a malicious node with high transmission power to launch Hello flood attack on CHs in WSN. A number of countermeasures against Hello flood attack in WSN have been proposed in the literature that we discussed in our previous work [1]. Most of the proposed countermeasures have limitation and need improvement for producing more efficient one. In this paper, we propose a HRSRP (Hello flood attack Resistant Secure Routing Protocol), an extension to LEACH protocol and is base on encryption using Armstrong number and decryption using AES algorithm to verify the identity of the CH so as to prevent the WSN from Hello flood attack. The remaining paper is organised as follows: In section II, we discuss related works; the section III describes the working of HRSRP. In section IV, we provide the simulation of proposed protocol in NS2 while we end with the conclusion in section V. # II. Related Works In this section of the paper, we discuss the work proposed in the past for providing secure formation of clusters by LEACH protocol in WSN, and the proposed work for selecting CHs in a secure way. Heinzelman et al. [2] proposed LEACH in which every sensor has a probability of becoming a CH without message exchange. This technique attempted to extend the network life time by making all sensor nodes play a role of CH. In LEACH, some sensor nodes with a high chance declare themselves as CHs and other sensor nodes join in one of them. Since, this method assumes no compromised sensor nodes in the WSN; it has no method to protect the cluster formation from the malicious sensor nodes. F-LEACH [3] was proposed in order to defend the cluster formation in LEACH protocol. In this proposal, when a sensor node declares itself as a CH, it employs the use of common keys shared with the BS so as to check the authentication of the CH declaration to the BS. Then, the sink securely broadcasts the authenticated CHs using ?TESLA [4]. Normal sensor nodes in WSN join in only one legitimate CH. However, this method has no means to validate the normal sensor nodes which join in any cluster. To resolve this problem, Oliveira et al. [5] proposed SecLEACH in which the BS authenticates the CH nodes and further the CHs authenticate the joining sensor nodes. In both F-LEACH and SecLEACH, sensors nodes are pre-assigned some keys for verification before their deployment. However, both F-LEACH and SecLEACH can help in preventing only external attackers from joining of the process of cluster formation i.e. they cannot avoid internal attacks from capturing CHs. Many extensions to LEACH [7][8][9][10][11] have been proposed in the past but, most of them focus on balancing the consumption of energy over all sensor nodes and extending the lifetime of the network. A few of them [8] deals with electing a CH securely. However, this technique cannot prevent a malicious node from declaring itself as a CH as it can defraud other nodes that it has a short distance to the BS along with a large amount of residual energy. Liu proposed a cluster formation method in which only pre-determined nodes can declare themselves as CHs while other nodes can join any cluster either directly or via a relay node [13]. As any CH declaration or cluster join is authenticated by some pre-assigned polynomial share, the method avoids any external attacker from participating in the process of cluster formation. In this method, a compromised relay node can invoke a Denial of Service (DoS) attack by removing the connection between CH and its serving nodes. Pre-determined CHs become the targets of attackers because their roles are fixed. Sun et al. [14] proposed a protected scheme for cluster formation which checks the protocol conformity of nodes in order to discriminate mean nodes from usual nodes. In this method, physical network is transformed into cliques and members are openly connected to each other in a clique. After the formation of clique, each node checks that all members have the similar view of the clique membership. Even though the method of [19] has enhanced the safety of [14], it supposed that no collisions are possible during the cluster formation. This assumption is difficult to satisfy without the use of any special measure such as TDMA schedule assignment and code separation. Nishimura et al. [21] proposed a method where all nodes allocate a trust value to each candidate of CH and the most trusted nodes are allowed to become CH. Otherwise, the nodes join a close cluster to form clusters in the network. The drawback of this scheme is that it produces a lot of communication overhead for the building of trust evaluation system. So, this method is not appropriate for resource-constrained WSNs. Rifà-Pous et al. [20] proposed a protected cluster formation method that is based on public key cryptography. The scheme is composed of three phases; cluster discovery phase, CH designation phase, and cluster maintenance phase. In the phase of cluster discovery, all nodes in a cluster have the same view on the membership of cluster with each other. In the phase of cluster designation, a CH is elected considering the number times it performed the CH and number of its neighbours. In the phase of cluster maintenance, the elected CHs provide an authorization certificate to every member in the cluster. But, this method assumes that no nodes depart from the cluster discovery protocol. For example, if a malicious node transmits its message to part nodes in the phase of cluster discovery, the sufferers have a dissimilar view on the membership of cluster. Consequently, it divides a cluster into multiple clusters, and the divided clusters elect their CH respectively in the phase of CH designation. That is to say, this method can produce a lot of clusters under the selective transmission attack. Crosby et al. [21] proposed a trust based CH election design where every node provides a trust value to other nodes according to their behaviour and extremely trustworthy nodes become CHs. Every node's behaviour is calculated by counting the occurrence of successful node transmissions and the occurrence of unsuccessful node transmissions. That is, the more a node succeeds in its transmission, the superior reputation value the node has. During the election of new CH, nodes with a more reputation value are suggested for the role of CH by cluster members and one of these is selected as a new CH. A malicious CH can put in a not guilty victim into a blacklist to take away its candidacy for CH in the cluster that is, with the number of blameless victims rises up, a malicious node can enlarge its winning chance. Buttyan et al. [22] also proposed a CH selection method which conceals the process of election from outside nodes using cryptographic techniques. However, the concealment works only for external attackers as a compromised node can with no trouble expose the selection result. Moreover, the malicious node can announce itself as a CH even though it is not eligible. Sirivianos et al. [24] proposed the Secure Aggregator Node Election (SANE) protocol in which all eligible CH members in a cluster contribute to the production of a random value and a CH is elected randomly using this random value. SANE is classified into further three sub-schemes according to generating and distributing the random value. They are based on Merkle's puzzle scheme, commitment based scheme, and seed based scheme. Dong et al. [25] proposed a method that prevents outside attackers from taking part in a CH election process through its ID assignment scheme, which firmly binds a node's ID, its commitments, and its polynomial shares. In this scheme, the nodes that do not broadcast participation message for CH election or explicitly transmit a nonparticipation message are excluded from the CH candidates. The final CH is selected by arbitrarily selecting one node amongst the rest of the candidates. However, an inside attacker can change CH election result by avoiding the distribution of its participation message; it can also generate numerous CH election results by the process of distributing its contribution message only to a subset of CH candidates. Even though this method has a recovery system to combine numerous election results into one result, it requires the voluntary co-operation of the CH candidates. # III. Framework and Working of HRSRP In this section of the paper, we describe our proposed HRSRP for the detection and isolation of Hello flood attack in WSN. We first discuss the WSN model and assumption and then we describe the working of proposed protocol. # a) Network Model The clustered sensor network selected in the paper consists of N static sensor nodes, including CH, member nodes, and BS. CHs are responsible for collecting the information within their clusters and passing it to the BS so as to make decisions and judgments. The formation of clusters is based on LEACH protocol. Every sensor node has a unique identity (ID). Following assumptions of the WSN are used in the proposed protocol HRSRP. 1. Hello flooding attack node, formed by the compromise of CH. 2. The compromised node has a high transmission power. 3. Except the malicious sensor node, all the nodes in wireless sensor network are isomorphic with the same initial energy, transmission power, computing power and internal storage structure. 4. Once each node's ID is allocated, it cannot be changed. 5. Each sensor node is allocated unique Armstrong number. 6. The sensor nodes of the network consume the same energy in the same stage of the work, e.g. the transmission and reception of data packets in the process of detection. # b) Implementation of HRSRP The HRSRP is an improved secure extension to the LEACH protocol, so the implementation of the Year 2016 ( ) proposed protocol has to take advantage of the characteristic of LEACH clustering. LEACH protocol is mainly divided into two phases of set-up phase and stable phase. In the set-up phase, all the sensor nodes have to follow the two guidelines of fairness criterion and randomness criterion. In fairness criteria all sensor nodes in the network have same probability to become a CH. While in randomness criterion, the election of the CH is done in a random way. The chance for a sensor node to become a CH in the round entirely depends on whether the sensor node has ever been elected as CH in the recent rounds and the percentage of the CH sensor in the WSN. When the election of the CH is over, every member node chooses the cluster to join on the basis of the maximum received signal strength until all the clusters are completed. In general, the implementation of LEACH has a longer stabilization phase. Each member sensor node is responsible for sensing the surrounding environment and forwarding the data to their respective CHs. After collecting information from cluster member nodes, each CH forwards it to the BS. It is vulnerable for LEACH against Hello flood attack due to these characteristics of clustering. Hello flood attack is a common routing attack in the network, which broadcasts a large number of hello message with higher transmission power to nodes in the network. Any sensor node that receives the hello message with high signal will consider the malicious node as CH. This malicious node may damage the network by selectively modifying, discarding information received from its neighbours. # c) Determination of malicious CH The BS maintains record of CHs, cluster members, malicious nodes in the registration table as different sets. The values are updated as per the changes in the clusters and CHs. The initial values of these sets are Set CH node = {null}, the CHs in the network. Set CH member = {null}, the members of each cluster in the network. Set CH malicious = {null}, which means the malicious nodes in the network. Each sensor node with a certain probability (p) try for becoming CH based on the criterion of randomness and fairness. The sensor node that becomes a CH broadcasts the message of selfclustering in order to attract neighbouring sensor nodes so as to join it. The cluster head CH(i) is selected according to the level of the Received Signal Strength (RSS) to join in a certain range of area. The members of the cluster as calculated by each CH are added to the set CH member . i # . Allocation of unique ID The BS allocates a unique ID to each sensor in the network. Whenever any sensor node request for becoming CH, it has to send this ID to the BS so that the node identification can be validated. ii # . Allocation of unique Armstrong number The BS also allocates a unique Armstrong number against each ID for each of the sensor node in the network. An Armstrong number is an m-digit base n number such that the sum of its (base n) digits raised to the power m is the number itself. For example number 371 is an Armstrong number as 3 3 +7 3 +1 3 =27 + 343 +1 = 371 which is equals to number itself. Whenever any sensor node request for becoming CH, it has to send encrypted hello message with this Armstrong number. Table 1 shows example registration table maintained at BS. The flowchart in figure 2 describes the working of HRSRP for authentication of CH by the BS. As LEACH is fragile to hello flooding attacks because of its characteristics and nature. The compromised non-cluster head sensor nodes have less effect on the performance of network with limit range. But, once it becomes a CH with higher transmission power, a large number of sensor nodes will be appealed for becoming one of its members in a cluster. If the malicious node discards or alters the packets, the circumstances would seriously smash the honesty and precision of the information in the network. The HRSRP can detect the presence of malicious node with fewer energy and small error rate, which can efficiently get better the network performance. # IV. Simulation Results In this section of the paper, we present the results of the simulation to show the effectiveness of HRSRP. The simulation is carried out in ns2. 35 throughput as this is one of the crucial network parameters. Network throughput refers to the average rate of successfully delivered packets. Throughput is calculated depending on a total number of packets received at the destination in sensor network per unit of time. Throughput is calculated as Throughput = (Total number of packets received at the destination) / (simulation time) Figure 3 shows the throughput analysis in the case of the sensor network without Hello flood attack, under Hello flood attack, and after implementation of proposed HRSRP. The figure clearly shows that the proposed protocol after the isolation of the Hello flood attack results in the increase of throughput. # b) Packet delivery ratio Packet delivery ratio (PDR) of a network is defined as the ratio of the total received packets at the destination to total packets generated by the source node. PDR is calculated as PDR = (Packets received/packets generated) * 100 Figure 4 shows the PDR analysis in the case of the sensor network without Hello flood attack, under Hello flood attack, and after implementation of HRSRP. The figure clearly shows that the proposed protocol after the isolation of the Hello flood attack results in the increase of PDR. A high value of PDR is an indication that there is less packet loss in the sensor network. # c) Delay The delay is defined as the average time taken by a packet (data) to arrive at the destination. The delay also includes any delay that is caused by the process of route discovery along with queue in data packet transmission. The data packets successfully delivered to the destinations are only counted. It is calculated as: Delay = ? (arrive time -send time) / ? Number of connections The lesser value of delay is an indicator of the better performance of the protocol. Figure 5 shows the end to end delay in the case of sensor network without Hello flood attack, under Hello flood attack, and after # d) Overhead Overhead is the excess time taken by the protocol to deliver the packets to the destination. Hello flood attack increases the overhead in the sensor network. The routing overhead is defined as the count of packets used for routing in the sensor network. Figure 6 shows overhead in the case of sensor network without Hello flood attack, under Hello flood attack, and after implementation of HRSRP. The proposed protocol results in decreasing the overhead of the network as shown in figure 6. # V. Conclusion Cluster head selection in a secure way in clustered implementation of wireless sensor network is vital as all the cluster sensor members data to the base station is communicated through cluster head. Hello flood attack in wireless sensor network can be used for making a cluster head compromised by making use of high transmission power used for sending or replaying hello packets which are used for neighbour discovery. LEACH protocol is hard to attack by adversary excluding the case when it can become cluster head. In this paper, a approach to detect and prevent HELLO Flood attack in LEACH protocol in wireless sensor networks is proposed. We propose a HRSRP (Hello flood attack Resistant Secure Routing Protocol) extension to LEACH protocol base on encryption using Armstrong number and decryption using AES algorithm to verify the identity of cluster head. HRSRP improves the network performance by early discovery of adversary and preventing the sensor nodes from associating with such a malicious cluster head. The implementation of the proposed technique in NS2 shows its efficiency for the factors of throughput, packet delivery ratio, delay, overhead. The simulation results prove that HRSRP expels more compromised nodes from clusters and suppresses the separation of clusters. Other simulation results also represent that HRSRP raises the quality of clusters and more energy efficient than an opponent scheme. Additional simulation will be done in the future by increasing the number of sensor nodes. # VI. Acknowledgement 1![Figure 1: A typical WSN Clustering Hierarchy) protocol for sensor networks. LEACH divides the WSN into small clusters of which one is the CH head and others sensor nodes are the cluster members. The cluster sensor node members send their gathered data to the CH, which in turn send it to the BS](image-2.png "Figure 1 :") 1SensorAllocatedAllocated RandomnumberuniqueArmstrongIDNumber001S0001153002S0002407......N54748 2with the © 2016 Global Journals Inc. (US) Authors are highly thankful to the Department of RIC, IKG Punjab Technical University, Kapurthala, Punjab for providing opportunity to conduct this research work. * Hello flood attack Countermeasures in Wireless Sensor Networks RupinderSingh DrJatinderSingh Dr. RavinderSingh International Journal of Computer Science and Mobile Applications 4 5 April 2016 * Energy-efficient communication protocol for wireless microsensor networks WRHeinzelman AChandrakasan HBalakrishnan the proceedings of the 33rd Annual Hawaii International Conference on System Sciences Jan. 2000 2 * On the security of cluster-based communication protocols for wireless sensor networks ACFerreira MAVilaca LBOliveira EHabib HCWong AALoureiro Proc. of 4th IEEE Int'l Conf. on Networking of 4th IEEE Int'l Conf. on NetworkingReunion Island, France Apr. 17-21, 2005 * SPINS: Security Protocols for Sensor Networks APerrig Wireless Networks 8 5 Sep. 2002 * SecLEACH-a random key distribution solution for securing clustered sensor networks LBOliveira HCWong MWBern RDahab AALoureiro Proc. of 5th IEEE Int'l Symp. on Network Computing and Applications of 5th IEEE Int'l Symp. on Network Computing and ApplicationsCambridge, Massachusetts, USA Jul. 24-26, 2006 * Detection of Hello Flood Attack Caused by Malicious Cluster Heads on LEACH Protocol YayaShen SanyangLiu ZhaohuiZhang International Journal of Advancements in Computing Technology (IJACT) 7 2 March 2015 * Distance Based Thresholds for Cluster Head Selection in Wireless Sensor Networks SKang TNguyen IEEE Communications Letters 16 9 Sep. 2012 * SecDEACH: Secure and Resilient Dynamic Clustering Protocol Preserving Data Privacy in WSNs YHan MPark TChung Proc. of the of the 2010 * Int'l Conf On Computational Science and Its Applications 2010 6018 * Improvement in LEACH Protocol for Large-scale Wireless Sensor Networks VKatiyar NCand GCGautam AKumar Proc. of Int'l Conf. On Emerging Trends in Electrical and Computer Technology of Int'l Conf. On Emerging Trends in Electrical and Computer Technology Mar. 2011 * Improving Threshold Assignment for Cluster Head Selection in Hierarchical Wireless Sensor Networks MSaadat RSaadat GMirjality Proc. of Int'l Symposium on Telecommunications of Int'l Symposium on Telecommunications Dec. 2010 * Unequal Clustering Scheme based LEACH for Wireless Sensor Networks PRen JQian LLi ZZhao XLi Proc. of Fourth Int'l Conf. on Genetic and Evolutionary Computing of Fourth Int'l Conf. on Genetic and Evolutionary Computing Dec. 2010 * Hello Flood Attack Using BAP in Wireless Sensor Network GayatriDevi RajeebSankar Bal NibeditaSahoo International Journal of Advanced Engineering Research and Science 2349-6495 2 1 Jan. 2015 * Resilient Cluster Formation for Sensor Networks DLiu Proc. of 27th Int'l Conf. on Distributed Computing Systems (ICDCS '07) of 27th Int'l Conf. on Distributed Computing Systems (ICDCS '07) 2007 * Secure Distributed Cluster Formation in Wireless Sensor Networks KSun Proc. of 22nd Annual Computer Security Applications Conference (ACSAC'06) of 22nd Annual Computer Security Applications Conference (ACSAC'06) 2006 * Security Enhancement on LEACH Protocol From HELLO Flood Attack in WSN Using LDK Scheme SMayur HDRanjith ISSN (Print): 2347 -6710 International Journal of Innovative Research in Science, Engineering and Technology (Online): 2319 - 8753 4 March 2015 * Intrusion Detection of Hello Flood Attack in WSNs Using Location Verification Scheme SRawan MSuhare A International Journal of Computer and Communication Engineering 4 3 May 2015 * Energy level based Hello Flood attack Mitigation on WSN DilpreetKaur RupinderpalSingh International Journal of Embedded Systems and Computer Engineering 23213361 July 2015 * Detection of Hello Flood Attack on Leach Protocol Based on Energy of Attacker Node AshuJyoti Bansal International Journal of Innovations & Advancement in Computer Science 2347 -8616 4 September 2015 * A Secure Cluster Formation Scheme in Wireless Sensor Networks GWang DKim GCho ID 301750 Int'l Journal of Distributed Sensor Networks 2012 14 2012 * A Fair and Secure Cluster Formation Process for Ad Hoc Networks HRifà-Pous JHerrera-Joancomartí Wireless Communications 56 3 2011 * Cluster-based Reputation and Trust for Wireless Sensor Networks GVCrosby NPissinou Proc. of the 4th IEEE Consumer Communications and Networking Conference (CCNC '07) of the 4th IEEE Consumer Communications and Networking Conference (CCNC '07) 2007 * Private Cluster Head Election in Wireless Sensor Networks LButtyan THolczer Proc. of the Fifth IEEE Int'l Workshop on Wireless and Sensor Network Security (WSN '09) of the Fifth IEEE Int'l Workshop on Wireless and Sensor Network Security (WSN '09) IEEE 2009 * Detection of HELLO flood Attack on LEACH Protocol ShikhaMagotra KrishanKumar IEEE International Advance Computing Conference (IACC) 2014 * Non-manipulable Aggregator Node Election Protocols for Wireless Sensor Networks MSirivianos Proc. of IEEE 6th Annual Comm. Society Conf. on Sensor, Mesh and Ad Hoc Communications and Networks(SECON) of IEEE 6th Annual Comm. Society Conf. on Sensor, Mesh and Ad Hoc Communications and Networks(SECON)Cyprus Apr. 2007. 2009 Proc. of Int'l Sympo. on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt '07) * Secure Clustering for Building Certificate Mangement Nodes in Ad-Hoc Networks INishimura TNagase YTakehana YYoshioka Proc. of 14th Int'l Conf. On Network-Based Information Systems (NBiS) of 14th Int'l Conf. On Network-Based Information Systems (NBiS)Tirana, Albania Sep. 07-09, 2011 * Attacks and countermeasures in WSN JSteffi AginoPriyanka STephillah AMBalamurugan International Journal of Electronics & Communication 23215984 2 1 January 2014 * Detection of Malicious Cluster Head causing Hello Flood Attack in LEACH Protocol in Wireless Sensor Networks Satwinder Kaur MansiSaini Gupta International Journal of Application or Innovation in Engineering & Management (IJAIEM) 2319 -4847 3 5 May 2014 * A Survey in Hello Flood Attack in Wireless Sensor Networks AkhilDubey DeepakMeena ShailiGaur International Journal of Engineering Research & Technology (IJERT) 2278- 0181 3 1 January 2014 * Signal Strength based Hello Flood Attack Detection and Prevention in Wireless Sensor Networks Virendra Pal SSingh AnandAishwarya SwetaUkey Jain International Journal of Computer Applications 62 15 January 2013 * Attacks and counterattacks on wireless sensor networks NusratFatema RemusBrad Sensor & Ubiquitous Computing (IJASUC) December 2013 4 * Evading Flooding Attack in MANET Using Node Authentication AAnup Wanjari VidyaDhamdhere International Journal of Science and Research 3 December 2014 * KamalMohammad Sayad Haghighi VijayMohamedpour BarryGVaradharajan * Stochastic Modeling of Hello Flooding in Slotted CSMA/CA Wireless Sensor Networks Quinn IEEE transactions on information forensics and security December 2011 6 * Hello Flood Attack and its Countermeasures in Wireless Sensor Networks Virendra Pal SwetaSingh JyotiJain Singhai International Journal of Computer Science Issues 1694-0814 7 11 May 2010 * Security in wireless sensor networks CVenkata MukeshSinghal JamesRoyalty SrilekhaVaranasi Wireless communications and mobile computing Published online in Wiley Inder Science 2006 * Hello Flood Counter Measure for Wireless Sensor Network MohamedOsama Khozium International Journal of Computer Science and Security 2 3 May 2008 * Defense against lap-top class attacker in wireless sensor network AHamid MamunRashid The 8th International Conference Advanced Communication Technology IEEE 2006 Print ISBN Choong Seon Hong * A MAC Layer Based Defense Architecture for Reduction-of-Quality (RoQ) Attacks in Wireless LAN HWaldir Ribeiro Pires J´ Unior Thiago ChiDe Paula Figueiredo Hao Wong 18th International Parallel and Distributed Processing Symposium DrSavitaSingh DrGupta Lakhwinder Kaur 2010 7 Print Malicious Node Detection in Wireless Sensor Networks * A Cross-Layer Based Intrusion Detection Technique for Wireless Networks JatinderSingh DrSavitaGupta DrLakhwinder Kaur The International Arab Journal of Information Technology 9 3 May 2012