Research Article
WSN-DS: A Dataset for Intrusion Detection Systems in Wireless Sensor Networks
Algorithm 3
Model of Flooding attack.
N Network Size | SN Sensor Node | MN Malicious Node | CH Cluster Head | BS Base Station | CM Cluster Member | NC Cluster Heads list | x Integer value between 0 and | , compute | IF THEN | | ELSE | | ENDIF | , NC | | IF CH = MN THEN | CH broadcasts a lot of advertisement messages (ADV_CH) with | high transmitting power. | ELSE | CH broadcasts normal advertisement message (ADV_CH) | ENDIF | x CMs will join CH | CH creates TDMA schedule | x CMs send data to CH in the corresponding TDMA time slot | |
|