Research Article

WSN-DS: A Dataset for Intrusion Detection Systems in Wireless Sensor Networks

Algorithm 3

Model of Flooding attack.
N Network Size
SN Sensor Node
MN  Malicious Node
CH Cluster Head
BS Base Station
CM Cluster Member
NC Cluster Heads list
x Integer value between 0 and 
, compute 
IF THEN
  
ELSE
    
ENDIF
, NC
   IF CH = MN THEN
  CH broadcasts a lot of advertisement messages (ADV_CH) with
  high transmitting power.
   ELSE
    CH broadcasts normal advertisement message (ADV_CH)
   ENDIF
x CMs will join CH
   CH creates TDMA schedule
   x CMs send data to CH in the corresponding TDMA time slot