scholarly journals Defending Against Denial of Sleep Attack in Wireless Sensor Network

2013 ◽  
Vol 9 (2) ◽  
pp. 1063-1067
Author(s):  
Manju Vc ◽  
Dr.Sasi Kumar.

A wireless sensor network is a wireless network organized with a large number of sensor nodes with specialized sensors that can monitor various physical attributes such as temperature, pressure, vibration, and sound. Sensor nodes are powered up with batteries. Due to unattended nature of the deployment, the sensor nodes’ batteries cannot be recharged. In such conditions, the nodes must optimally consume power. Various protocols are designed to reduce the energy consumption of sensor nodes by keeping the antenna in sleep mode 90% of time, so that power is saved. MAC protocols are designed to adaptively vary the sleep time based on the communication need. But attackers use their knowledge of their underlying MAC protocol, to reduce the sleep time for the node, so that the lifetime of a node reduces. This problem is popularly known as Denial of sleep attack. In this paper, we propose an effective solution }to defend against such attacks in  a sensor network. Our proposed solution introduces communication overhead only when the attack is suspected and also the defending mechanism is triggered only in the area of attack. Also the analysis shows that our solution is very strong against SYNC replay attack and jamming attacks.

2005 ◽  
Vol 4 (2) ◽  
pp. 419-425 ◽  
Author(s):  
Simerpreet Kaur ◽  
Md. Ataullah ◽  
Monika Garg

With the advancement in Wireless Sensor Network (WSN) sensors are gaining importance in the physical world. Besides the low power of sensor nodes used, sensors are widely used in detecting temperature, pollution, pressure and other various applications. Energy-constrained sensor networks periodically place nodes to sleep in order to extend the network Lifetime. Denial of sleep attacks are a great threat to lifetime of sensor networks as it prevents the nodes from going into sleep mode. In this paper we are describing prevention against Denials of sleep attack. We have analyzed each of proposed solutions, identify their strengths and limitations.


2015 ◽  
Vol 15 (3) ◽  
pp. 584
Author(s):  
Raja Waseem Anwar ◽  
Majid Bakhtiari ◽  
Anazida Zainal ◽  
Kashif Naseer Qureshi

Wireless sensor network is a tremendous emerging technology provides communication services for environmental monitoring and target tracking for mass public and military. With increasing of this smart network popularity sensor network faced various challenges and threats. The inclusion of wireless sensor nodes also incurs different types of security threats in network. Mostly networks are using shared key approaches to make less communication overhead, but still network compromise with replay impersonation and compromise attacks. The existing proposed schemes are not fully addressed other network resources such as energy and speed, etc.  The intent of this paper is to provide a comprehensive security requirement, detail about security attacks in network and discuss the existing security schemes.


Author(s):  
Trilok C. Aseri ◽  
Neha Singla

The need for security in communications is in fact not new. This need has existed in military communications for thousands of years. In this paper, we focus on network protocols that provide security services. Wireless sensor network is an emerging technology that shows applications both for public as well as military purposes. Monitoring is one of the main applications. A large amount of redundant data is generated by sensor nodes. This paper compares all the protocols which are designed for security of wireless sensor network on the basis of security services and propose an improved protocol that reduces communication overhead by removing data redundancy from the network. By using the message sequence number we can check whether it is old message or new message. If the message is old then no need to send that message thereby reducing overhead. It also integrates security by data freshness in the protocol.


Author(s):  
Veerabadrappa Veerabadrappa ◽  
Booma Poolan Marikannan

Wireless sensor network (WSN) is a vital form of the underlying technology of the internet of things (IoT); WSN comprises several energy-constrained sensor nodes to monitor various physical parameters. Moreover, due to the energy constraint, load balancing plays a vital role considering the wireless sensor network as battery power. Although several clustering algorithms have been proposed for providing energy efficiency, there are chances of uneven load balancing and this causes the reduction in network lifetime as there exists inequality within the network. These scenarios occur due to the short lifetime of the cluster head. These cluster head (CH) are prime responsible for all the activity as it is also responsible for intra-cluster and inter-cluster communications. In this research work, a mechanism named lifetime centric load balancing mechanism (LCLBM) is developed that focuses on CH-selection, network design, and optimal CH distribution. Furthermore, under LCLBM, assistant cluster head (ACH) for balancing the load is developed. LCLBM is evaluated by considering the important metrics, such as energy consumption, communication overhead, number of failed nodes, and one-way delay. Further, evaluation is carried out by comparing with ES-Leach method, through the comparative analysis it is observed that the proposed model outperforms the existing model.


Author(s):  
Parag Verma ◽  
Ankur Dumka ◽  
Dhawal Vyas ◽  
Anuj Bhardwaj

A wireless sensor network is a collection of small sensor nodes that have limited energy and are usually not rechargeable. Because of this, the lifetime of wireless sensor networks has always been a challenging area. One of the basic problems of the network has been the ability of the nodes to effectively schedule the sleep and wake-up time to overcome this problem. The motivation behind node sleep or wake-up time scheduling is to take care of nodes in sleep mode for as long as possible (without losing data packet transfer efficiency) and thus extend their useful life. This research going to propose scheduling of nodes sleeps and wake-up time through reinforcement learning. This research is not based on the nodes' duty cycle strategy (which creates a compromise between data packet delivery and nodes energy saving delay) like other existing researches. It is based on the research of reinforcement learning which gives independence to each node to choose its own activity from the transmission of packets, tuning or sleep node in each time band which works in a decentralized way. The simulation results show the qualified performance of the proposed algorithm under different conditions.


Author(s):  
Chao Wang

Background: It is important to improve the quality of service by using congestion detection technology to find the potential congestion as early as possible in wireless sensor network. Methods: So an improved congestion control scheme based on traffic assignment and reassignment algorithm is proposed for congestion avoidance, detection and mitigation. The congestion area of the network is detected by predicting and setting threshold. When the congestion occurs, sensor nodes can be recovery quickly from congestion by adopting reasonable method of traffic reassignment. And the method can ensure the data in the congestion areas can be transferred to noncongestion areas as soon as possible. Results: The simulation results indicate that the proposed scheme can reduce the number of loss packets, improve the throughput, stabilize the average transmission rate of source node and reduce the end-to-end delay. Conclusion: : So the proposed scheme can enhance the overall performance of the network. Keywords: wireless sensor network; congestion control; congestion detection; congestion mitigation; traffic assignment; traffic reassignment.


2018 ◽  
Vol 14 (01) ◽  
pp. 4
Author(s):  
Wang Weidong

To improve the efficiency of the remote monitoring system for logistics transportation, we proposed a remote monitoring system based on wireless sensor network and GPRS communication. The system can collect information from the wireless sensor network and transmit the information to the ZigBee interpreter. The monitoring system mainly includes the following parts: Car terminal, GPRS transmission network and monitoring center. Car terminal mainly consists by the Zigbee microcontroller and peripherals, wireless sensor nodes, RFID reader, GPRS wireless communication module composed of a micro-wireless monitoring network. The information collected by the sensor communicates through the GPRS and the monitoring center on the network coordinator, sends the collected information to the monitoring center, and the monitoring center realizes the information of the logistics vehicle in real time. The system has high applicability, meets the design requirements in the real-time acquisition and information transmission of the information of the logistics transport vehicles and goods, and realizes the function of remote monitoring.


Author(s):  
Edison Pignaton de Freitas ◽  
Tales Heimfarth ◽  
Ivayr Farah Netto ◽  
Carlos Eduardo Pereira ◽  
Armando Morado Ferreira ◽  
...  

2014 ◽  
Vol 701-702 ◽  
pp. 1025-1028
Author(s):  
Yu Zhu Liang ◽  
Meng Jiao Wang ◽  
Yong Zhen Li

Clustering the sensor nodes and choosing the way for routing the data are two key elements that would affect the performance of a wireless sensor network (WSN). In this paper, a novel clustering method is proposed and a simple two-hop routing model is adopted for optimizing the network layer of the WSN. New protocol is characterized by simplicity and efficiency (SE). During the clustering stage, no information needs to be shared among the nodes and the position information is not required. Through adjustment of two parameters in SE, the network on any scale (varies from the area and the number of nodes) could obtain decent performance. This work also puts forward a new standard for the evaluation of the network performance—the uniformity of the nodes' death—which is a complement to merely taking the system lifetime into consideration. The combination of these two aspects provides a more comprehensive guideline for designing the clustering or routing protocols in WSN.


2011 ◽  
Vol 57 (3) ◽  
pp. 341-346 ◽  
Author(s):  
Safdar Khan ◽  
Boubaker Daachi ◽  
Karim Djouani

Overcoming Localization Errors due to Node Power Drooping in a Wireless Sensor NetworkReceived Signal Strength Indication (RSSI) plays a vital role in the range-free localization of sensor nodes in a wireless sensor network and a good amount of research has been made in this regard. One important factor is the battery voltage of the nodes (i.e., the MICAz sensors) which is not taken into account in the existing literature. As battery voltage level performs an indispensable role for the position estimation of sensor nodes through anchor nodes therefore, in this paper, we take into a account this crucial factor and propose an algorithm that overcomes the problem of decaying battery. We show the results, in terms of more precise localization of sensor nodes through simulation. This work is an extension to [1] and now we also use neural network to overcome the localization errors generated due to gradual battery voltage drooping.


Sign in / Sign up

Export Citation Format

Share Document