sleep attack
Recently Published Documents


TOTAL DOCUMENTS

17
(FIVE YEARS 3)

H-INDEX

5
(FIVE YEARS 0)

Author(s):  
Vivekanadam B

A typical Wireless Sensor Network (WSN) comprises of multiple nodes that are used to control as well as monitor the environment and perform pre-described actions. Based on the network, the sensor nodes are distributed and their energy consumption proves to be challenging. When the nodes are located near the sink, they serve as the interface for data transfer between the sink and the node. Because of this, there is a decrease in the networks lifetime and further the energy consumption of the nodes increases significantly. Denial-of-sleep attack is a threat that sensor nodes face in WSNs. DoSA is the condition when there is much loss of energy at the nodes by preventing them from entering into sleep mode and power save mode. We propose a hybrid methodology of Hopfield neural network and firefly algorithm using leach to tackle this issue such that there is a significant increase in network lifetime and energy consumption patterns.


IBRO Reports ◽  
2019 ◽  
Vol 6 ◽  
pp. S475
Author(s):  
Hung Chijung ◽  
Daisuke Ono ◽  
Akihiro Yamanaka
Keyword(s):  

2018 ◽  
Vol 2 (2) ◽  
pp. 41-42 ◽  
Author(s):  
Aswathy R ◽  
Keyword(s):  

2017 ◽  
Vol 2017 ◽  
pp. 1-10 ◽  
Author(s):  
Mahalakshmi Gunasekaran ◽  
Subathra Periakaruppan

Denial-of-sleep (DoSL) attack is a special category of denial-of-service attack that prevents the battery powered sensor nodes from going into the sleep mode, thus affecting the network performance. The existing schemes used for the DoSL attack detection do not provide an optimal energy conservation and key pairing operation. Hence, in this paper, an efficient Genetic Algorithm (GA) based denial-of-sleep attack detection (GA-DoSLD) algorithm is suggested for analyzing the misbehaviors of the nodes. The suggested algorithm implements a Modified-RSA (MRSA) algorithm in the base station (BS) for generating and distributing the key pair among the sensor nodes. Before sending/receiving the packets, the sensor nodes determine the optimal route using Ad Hoc On-Demand Distance Vector Routing (AODV) protocol and then ensure the trustworthiness of the relay node using the fitness calculation. The crossover and mutation operations detect and analyze the methods that the attackers use for implementing the attack. On determining an attacker node, the BS broadcasts the blocked information to all the other sensor nodes in the network. Simulation results prove that the suggested algorithm is optimal compared to the existing algorithms such as X-MAC, ZKP, and TE2P schemes.


2013 ◽  
Vol 9 (2) ◽  
pp. 1063-1067
Author(s):  
Manju Vc ◽  
Dr.Sasi Kumar.

A wireless sensor network is a wireless network organized with a large number of sensor nodes with specialized sensors that can monitor various physical attributes such as temperature, pressure, vibration, and sound. Sensor nodes are powered up with batteries. Due to unattended nature of the deployment, the sensor nodes’ batteries cannot be recharged. In such conditions, the nodes must optimally consume power. Various protocols are designed to reduce the energy consumption of sensor nodes by keeping the antenna in sleep mode 90% of time, so that power is saved. MAC protocols are designed to adaptively vary the sleep time based on the communication need. But attackers use their knowledge of their underlying MAC protocol, to reduce the sleep time for the node, so that the lifetime of a node reduces. This problem is popularly known as Denial of sleep attack. In this paper, we propose an effective solution }to defend against such attacks in  a sensor network. Our proposed solution introduces communication overhead only when the attack is suspected and also the defending mechanism is triggered only in the area of attack. Also the analysis shows that our solution is very strong against SYNC replay attack and jamming attacks.


Sign in / Sign up

Export Citation Format

Share Document