Research Article
WSN-DS: A Dataset for Intrusion Detection Systems in Wireless Sensor Networks
Algorithm 4
Model of Scheduling attack.
N Network Size | SN Sensor Node | MN Malicious Node | CH Cluster Head | BS Base Station | CM Cluster Member | NC Cluster Heads list | x Integer value between 0 and | , compute | IF THEN | | ELSE | | ENDIF | , NC | | CH broadcasts the advertisement message (ADV_CH) | x CMs will join CH | IF CH = MN THEN | CH performs the attack by creating the TDMA schedule and give all nodes | same time slot to send data | ELSE | CH creates normal TDMA schedule | ENDIF | x CMs send data to CH in the corresponding TDMA time slot | CH sends aggregated data to BS | |
|