Transport Layer Attacks, Application Layer attacks and its solution in WSN

Published: 24 November 2022
on channel: deva Sena
962
13

The transport layer controls the reliability of a given link through flow control, segmentation and de-segmentation, and error control.
Some protocols are state- and connection-oriented.
This means that the transport layer can keep track of the segments and retransmit those that fail.
The attacks that can be launched on the transport layer in a WSN are
flooding attack and
de-synchronization attack
Flooding - Whenever a protocol is required to maintain state at either end of a connection,
It becomes vulnerable to memory exhaustion through flooding.
An attacker may repeatedly make new connection request
until the resources required by each connection are exhausted or reach a maximum limit.
In either case, further legitimate requests will be ignored.


Watch video Transport Layer Attacks, Application Layer attacks and its solution in WSN online without registration, duration hours minute second in high quality. This video was added by user deva Sena 24 November 2022, don't forget to share it with your friends and acquaintances, it has been viewed on our site 96 once and liked it 1 people.