scholarly journals Security from Denial of Sleep Attack in Wireless Sensor Network

2005 ◽  
Vol 4 (2) ◽  
pp. 419-425 ◽  
Author(s):  
Simerpreet Kaur ◽  
Md. Ataullah ◽  
Monika Garg

With the advancement in Wireless Sensor Network (WSN) sensors are gaining importance in the physical world. Besides the low power of sensor nodes used, sensors are widely used in detecting temperature, pollution, pressure and other various applications. Energy-constrained sensor networks periodically place nodes to sleep in order to extend the network Lifetime. Denial of sleep attacks are a great threat to lifetime of sensor networks as it prevents the nodes from going into sleep mode. In this paper we are describing prevention against Denials of sleep attack. We have analyzed each of proposed solutions, identify their strengths and limitations.

2017 ◽  
Vol 16 (2) ◽  
pp. 7586-7590
Author(s):  
Amneet Kaur ◽  
Harpreet Kaur

A Wireless Sensor Network or WSN is supposed to be made up of a large number of sensors and at least one base station. The sensors are autonomous small devices with several constraints like the battery power, computation capacity, communication range and memory. They also are supplied with transceivers to gather information from its environment and pass it on up to a certain base station, where the measured parameters can be stored and available for the end user. In most cases, the sensors forming these networks are deployed randomly and left unattended to and are expected to perform their mission properly and efficiently. As a result of this random deployment, the WSN has usually varying degrees of node density along its area. Sensor networks are also energy constrained since the individual sensors, which the network is formed with, are extremely energy-constrained as well. Wireless sensor networks have become increasingly popular due to their wide range of application. Clustering sensor nodes organizing them hierarchically have proven to be an effective method to provide better data aggregation and scalability for the sensor network while conserving limited energy. Minimizing the energy consumption of a wireless sensor network application is crucial for effective realization of the intended application in terms of cost, lifetime, and functionality. However, the minimizing task is hardly possible as no overall energy cost function is available for optimization.


2013 ◽  
Vol 9 (2) ◽  
pp. 1063-1067
Author(s):  
Manju Vc ◽  
Dr.Sasi Kumar.

A wireless sensor network is a wireless network organized with a large number of sensor nodes with specialized sensors that can monitor various physical attributes such as temperature, pressure, vibration, and sound. Sensor nodes are powered up with batteries. Due to unattended nature of the deployment, the sensor nodes’ batteries cannot be recharged. In such conditions, the nodes must optimally consume power. Various protocols are designed to reduce the energy consumption of sensor nodes by keeping the antenna in sleep mode 90% of time, so that power is saved. MAC protocols are designed to adaptively vary the sleep time based on the communication need. But attackers use their knowledge of their underlying MAC protocol, to reduce the sleep time for the node, so that the lifetime of a node reduces. This problem is popularly known as Denial of sleep attack. In this paper, we propose an effective solution }to defend against such attacks in  a sensor network. Our proposed solution introduces communication overhead only when the attack is suspected and also the defending mechanism is triggered only in the area of attack. Also the analysis shows that our solution is very strong against SYNC replay attack and jamming attacks.


The emergence of sensor networks as one of the dominant technology trends in the coming decades has posed numerous unique challenges on their security to researchers. These networks are likely to be composed of thousands of tiny sensor nodes, which are low-cost devices equipped with limited memory, processing, radio, and in many cases, without access to renewable energy resources. While the set of challenges in sensor networks are diverse, we focus on security of Wireless Sensor Network in this paper. First, we propose some of the security goal for Wireless Sensor Network. To perform any task in WSN, the goal is to ensure the best possible utilization of sensor resources so that the network could be kept functional as long as possible. In contrast to this crucial objective of sensor network management, a Denial of Service (DoS) attack targets to degrade the efficient use of network resources and disrupts the essential services in the network. DoS attack could be considered as one of th


Sensors ◽  
2019 ◽  
Vol 19 (19) ◽  
pp. 4281
Author(s):  
Ngoc-Thanh Dinh ◽  
Younghan Kim

Wireless sensor network (WSN) studies have been carried out for multiple years. At this stage, many real WSNs have been deployed. Therefore, configuration and updating are critical issues. In this paper, we discuss the issues of configuring and updating a wireless sensor network (WSN). Due to a large number of sensor nodes, in addition to the limited resources of each node, manual configuring turns out to be impossible. Therefore, various auto-configuration approaches have been proposed to address the above challenges. In this survey, we present a comprehensive review of auto-configuration mechanisms with the taxonomy of classifications of the existing studies. For each category, we discuss and compare the advantages and disadvantages of related schemes. Lastly, future works are discussed for the remaining issues in this topic.


Author(s):  
Saloni Dhiman ◽  
Deepti Kakkar ◽  
Gurjot Kaur

Wireless sensor networks (WSNs) consist of several sensor nodes (SNs) that are powered by battery, so their lifetime is limited, which ultimately affects the lifespan and hence performance of the overall networks. Till now many techniques have been developed to solve this problem of WSN. Clustering is among the effective technique used for increasing the network lifespan. In this chapter, analysis of multi-hop routing protocol based on grid clustering with different selection criteria is presented. For analysis, the network is divided into equal-sized grids where each grid corresponds to a cluster and is assigned with a grid head (GH) responsible for collecting data from each SN belonging to respective grid and transferring it to the base station (BS) using multi-hop routing. The performance of the network has been analyzed for different position of BS, different number of grids, and different number of SNs.


2019 ◽  
Vol 29 (09) ◽  
pp. 2050141 ◽  
Author(s):  
Muhammed Enes Bayrakdar

In this paper, a monitoring technique based on the wireless sensor network is investigated. The sensor nodes used for monitoring are developed in a simulation environment. Accordingly, the structure and workflow of wireless sensor network nodes are designed. Time-division multiple access (TDMA) protocol has been chosen as the medium access technique to ensure that the designed technique operates in an energy-efficient manner and packet collisions are not experienced. Fading channels, i.e., no interference, Ricean and Rayleigh, are taken into consideration. Energy consumption is decreased with the help of ad-hoc communication of sensor nodes. Throughput performance for different wireless fading channels and energy consumption are evaluated. The simulation results show that the sensor network can quickly collect medium information and transmit data to the processing center in real time. Besides, the proposed technique suggests the usefulness of wireless sensor networks in the terrestrial areas.


2020 ◽  
Vol 16 (10) ◽  
pp. 155014772096435 ◽  
Author(s):  
Muhammad Ilyas ◽  
Zahid Ullah ◽  
Fakhri Alam Khan ◽  
Muhammad Hasanain Chaudary ◽  
Muhammad Sheraz Arshed Malik ◽  
...  

Internet of things grew swiftly and many services, software, sensors-embedded electronic devices and related protocols were developed and still in progress with full swing. Internet of things enabling physically existing things to see, hear, think and perform a notable task by allowing them to talk to each other and share useful information while making decision and caring-on/out their important tasks. Internet of things is greatly promoted by wireless sensor network as it becomes a perpetual layer for it. Wireless sensor network works as a base-stone for most of the Internet of things applications. There are severe general and specific threats and technical challenges to Internet of things–based sensor networks which must overcome to ensure adaptation and diffusion of it. Most of the limitations of wireless sensor networks are due to its resource constraint objects nature. The specified open research challenges in Internet of things–based sensor network are power consumption, network lifespan, network throughput, routing and network security. To overcome aforementioned problems, this work aimed to prolong network lifetime, improve throughput, decrease packet latency/packet loss and further improvise in encountering malicious nodes. To further tune the network lifetime in terms of energy, wireless harvesting energy is suggested in proposed three-layer cluster-based wireless sensor network routing protocol. The proposed mechanism is a three-tier clustering technique with implanted security mechanism to encounter malicious activities of sensor nodes and to slant them into blacklist. It is a centred-based clustering protocol, where selection of cluster head and grid head is carried out by sink node based on the value of its cost function. Moreover, hardware-based link quality estimators are used to check link effectiveness and to further improve routing efficiency. At the end, excessive experiments have been carried out to check efficacy of the proposed protocol. It outperforms most of its counterpart protocols such as fuzzy logic–based unequal clustering and ant colony optimization–based routing hybrid, Artificial Bee Colony-SD, enhanced three-layer hybrid clustering mechanism and energy aware multi-hop routing in terms of network lifetime, network throughput, average energy consumption and packet latency.


2012 ◽  
Vol 157-158 ◽  
pp. 503-506 ◽  
Author(s):  
Tao Yang ◽  
Pan Guo Fan ◽  
De Jun Mu

Wireless sensor network is always deployed in specific area for intrusion detection and environmental monitoring. The sensor nodes suffer mostly from their limited battery capacity.Maximizing the lifetime of the entire networks is mainly necessary considered in the design. Sliding the sensors in different barriers under the optimal barrier construction is a good solution for both maximizing network lifetime and providing predetermined coverage ratio. The simulation results demonstrate that the scheme can effectively reduce the energy consumption of the wireless sensor network and increase the network lifetime.


2011 ◽  
Vol 20 (06) ◽  
pp. 1051-1066 ◽  
Author(s):  
LINFENG LIU

Underwater sensor networks will find many oceanic applications in near future, and the deployment problem in 3D sensor networks has not been paid enough attention at present. In order to maximize the network lifetime, a deployment algorithm (UDA) for underwater sensor networks in ocean environment is proposed. UDA can determine and select the best cluster shape, then partition the space into layers and clusters while maintaining full coverage and full connectivity. In addition, nodes closer to sinks are possible to bear a heavier data-relaying mission. UDA sets different node deployment densities at different layers in response to the potential relay discrepancy. The simulation results suggest UDA can choose the proper cluster shape to get the maximum underwater wireless sensor network lifetime approximately.


Sign in / Sign up

Export Citation Format

Share Document