2013 Ieee Conference on Information and Communication Technologies 2013
DOI: 10.1109/cict.2013.6558065
|View full text |Cite
|
Sign up to set email alerts
|

Mechanisms for detecting and preventing denial of sleep attacks on wireless sensor networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
9
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 12 publications
(9 citation statements)
references
References 14 publications
0
9
0
Order By: Relevance
“…Secondly, it explores potential attacks from each attack classification, both modeling their impacts on sensor networks running four leading WSN MAC protocols and analyzing the efficiency of implementations of these attacks on these protocols. Manju.V.C et al [1] in her paper Proposed method to defend denial of sleep attack the method consists of two parts, Network organization and Selective level authentication. Kyung Choi et al [2] in the paper uses zigbee for security advanced encryption standard (AES) algorithm, adds to a security model provided by IEEE 802.15.4.…”
Section: Background and Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Secondly, it explores potential attacks from each attack classification, both modeling their impacts on sensor networks running four leading WSN MAC protocols and analyzing the efficiency of implementations of these attacks on these protocols. Manju.V.C et al [1] in her paper Proposed method to defend denial of sleep attack the method consists of two parts, Network organization and Selective level authentication. Kyung Choi et al [2] in the paper uses zigbee for security advanced encryption standard (AES) algorithm, adds to a security model provided by IEEE 802.15.4.…”
Section: Background and Related Workmentioning
confidence: 99%
“…The key factor one must keep in mind when designing wireless sensor network application are energy efficiency of MAC protocol. The MAC protocol must keep the radio in a low-power sleep mode as much as possible [1].…”
Section: Introductionmentioning
confidence: 99%
“…The comparison of SEF with the suggested method proved that the proposed method enhanced the energy savings than the SEF in sensor networks. Manju et al [1] suggested three steps such as network organization, malicious node detection, and selective authentication for detecting the denial-of-sleep attack in WSN. Experimental results proved that the suggested method was optimal for defending the attacker from performing the task.…”
Section: Detection Of Dos Attacks In Wsnmentioning
confidence: 99%
“…Wireless Sensor Network (WSN) contains a collection of self-governing sensors that monitors the conditions such as sound, temperature, pressure, and vibration [1]. The sensor nodes in the WSN are energized using the batteries.…”
Section: Introductionmentioning
confidence: 99%
“…The general principle of topology of WSN are the same for another network. The topology of WSN includes various topologies given [7][8]. In Star topology each node connects directly connect to the gateway.…”
Section: Introductionmentioning
confidence: 99%