Author : Pallavi Vijay Dongardive 1
Date of Publication :27th December 2017
Abstract: Wireless Sensor Networks (WSNs) growing rapidly with a huge interest from both academia and industry as they are potentially low cost and effective. WSN is made of hundreds of constraints dependent sensors for solving real world sensitive applications. The nodes are dispersed over an area to watch and record the data as needed by the application and to forward same data to the centre node for further observation, which may generate an alert to control the situation. As it is growing rapidly there is more demand for security, like other networks, WSN is also vulnerable to malicious attacks, such as power exhausting attacks, especially the denial-of-sleep attacks. DoS attacks can exhaust the battery of the sensor node and rapidly decreases the lifespan of the wireless sensor network. To save these power and to increase the lifespan of WSNs, various media access control (MAC) protocols are proposed. But the present designs are insufficient to secure the dos attacks in MAC layer. This paper will propose the scheme which enhances the security in wireless sensor network through energy analysis scheme.
Reference :
-
- MAC Essentials for Wireless Sensor Networks Abdelmalik Bachir, IEEE Member, Mischa Dohler, IEEE Senior Member Thomas Watteyne, IEEE Member, Kin K. Leung, IEEE Fellow
- MAC Protocols Used byWireless Sensor Networks and a General Method of Performance Evaluation Joseph Kabara1 and Maria Calle21School of Information Sciences, University of Pittsburgh, Pittsburgh, PA 15260, USA Department of Electrical and Electronic Engineering,Universidad del Norte, Barranquilla, Colombia
- Security in Wireless Sensor Networks Jaydip Sen Department of Computer Science & Engineering, National Institute of Science & Technology, INDIA
- A Secure Scheme Against Power Exhausting Attacks in Hierarchical Wireless Sensor Networks. Ching-Tsung Hsueh, Chih-Yu Wen, Member, IEEE, and Yen-Chieh Ouyang, Member, IEEE
- X-MAC: A short preamble MAC protocol for duty-cycled wireless sensor networks M. Buettner, G. V. Yee, E. Anderson, and R. Han.
- R. E. Sorace, V. S. Reinhardt, and S. A. Vaughn, “High-speed digital-to-RF converter,” U.S. Patent 5 668 842, Sept. 16, 1997.
- V. Srivastava and M. Motani, “Cross-layer design: A survey and the road ahead,” IEEE Commun. Mag., vol. 43, no. 12, pp. 112–119, Dec. 2005.
- K.-T. Chu, C.-Y. Wen, Y.-C. Ouyang, and W. A. Sethares, “Adaptive distributed topology control for wireless ad-hoc sensor networks,” in Proc. Int. Conf. Sensor Technol. Appl(SensorComm), Valencia, Spain, 2007, pp. 378–386
- Aparna s. Kalaskar, prof. G.d.gulhane “result on energy efficient security scheme for wireless sensor network” Department of Computer Science & Engg., Dr. R. G. I. T. & R., Amravati.
- M. Buettner, G. V. Yee, E. Anderson, and R. Han, “X-MAC: A short preamble MAC protocol for dutycycled wireless sensor networks,” in Proc. 4th Int. Conf. Embedded Netw. Sensor Syst. (SenSys), Boulder, CO, USA, 2006, pp. 307–320