CFP last date
20 December 2024
Reseach Article

Securing the Wireless Sensor Network from Denial of Sleep attack by isolating the Nodes

by Simerpreet Kaur, Md. Ataullah
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 103 - Number 1
Year of Publication: 2014
Authors: Simerpreet Kaur, Md. Ataullah
10.5120/18040-8920

Simerpreet Kaur, Md. Ataullah . Securing the Wireless Sensor Network from Denial of Sleep attack by isolating the Nodes. International Journal of Computer Applications. 103, 1 ( October 2014), 29-33. DOI=10.5120/18040-8920

@article{ 10.5120/18040-8920,
author = { Simerpreet Kaur, Md. Ataullah },
title = { Securing the Wireless Sensor Network from Denial of Sleep attack by isolating the Nodes },
journal = { International Journal of Computer Applications },
issue_date = { October 2014 },
volume = { 103 },
number = { 1 },
month = { October },
year = { 2014 },
issn = { 0975-8887 },
pages = { 29-33 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume103/number1/18040-8920/ },
doi = { 10.5120/18040-8920 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:33:27.061228+05:30
%A Simerpreet Kaur
%A Md. Ataullah
%T Securing the Wireless Sensor Network from Denial of Sleep attack by isolating the Nodes
%J International Journal of Computer Applications
%@ 0975-8887
%V 103
%N 1
%P 29-33
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The Wireless Sensor Network has gained advancement in new era technology. Beside a small size, sensors have the feature of sensing and collecting the data and small and are used in many areas ranging from detecting temperature to providing security for the home. Other than these, sensors are also used for traffic management and military applications. To extend the network lifetime, sensor nodes are placed in sleep mode. Denial of sleep is a type of denial of service attack which prevent nodes from going into sleep mode and resulting in short network lifetime. To secure the system, various techniques are used. This paper represents a more efficient and feasible solution to solve the problem of denial of sleep attack of isolating the nodes to be used in hierarchical clustering.

References
  1. Zheng, J. , &Jamalipour, A. (2009):Wireless sensor networks: a networking perspective. Wiley-IEEE Press (2009).
  2. David R. Raymond and Scott F. Midkiff Virginia tech : "Denial of service in wireless sensor networks; attacks and defenses", published by IEEE CS 2008(2008)
  3. Manju. V. C: "Analysis of Denial of Sleep Attack in WSN", International conference on Recent Development in Engineering and technology(2005). systems.
  4. Brownfield, M. , Gupta, Y. , & Davis, N. :Wireless sensor network denial of sleep attack. In Information Assurance Workshop, 2005. IAW'05. Proceedings from the Sixth Annual IEEE SMC (pp. 356-364). IEEE(2005, June).
  5. Raymond, D. R. , Marchany, R. C. , Brownfield, M. I. , &Midkiff, S. F. : Effects of denial-of-sleep attacks on wireless sensor network MAC protocols. Vehicular Technology, IEEE Transaction on, 58(1), 367-380(2009)
  6. Raymond D. R. , Midkiff S. F : Clustered Adaptive Rate Limiting: Defeating Denial-Of-Sleep Attacks In Wireless Sensor Networks, Military Communications Conference, 2007, MILCOM 2007, IEEE, pp. 1-7(2007)
  7. Chen, C. , Hui, L. , Pei, Q. , Ning, L. , &Qingquan, P. :An Effective Scheme for Defending Denial-of-Sleep Attack in Wireless Sensor Networks. In Information Assurance and Security, 2009. IAS'09. Fifth International Conference on (Vol. 2, pp. 446-449). IEEE(2009, August).
  8. Bhattasali, T. , Chaki, R. , &Sanyal, S. (2012). Sleep Deprivation Attack Detection in Wireless Sensor Network. arXiv preprint arXiv:1203. 0231(2012). Brown, L. D. , Hua, H. , and Gao, C. 2003. A widget framework for augmented interaction in SCAPE.
  9. Kaur, T. , &Baek, J. : A strategic deployment and cluster-header selection for wireless sensor networks. Consumer Electronics, IEEE Transactions on, 55(4), 1890-1897. (2009)
  10. Wu, F. J. , & Tseng, Y. C. : Distributed wake-up scheduling for data collection in tree-based wireless sensor networks. Communications Letters, IEEE, 13(11), 850-852(2009).
  11. Kaur, S. , Ataullah, M. , & Garg, M. Security from Denial of Sleep Attack in Wireless Sensor Network. International journal of computers & technology, 4(2), 419-425 (2013).
Index Terms

Computer Science
Information Sciences

Keywords

Denial of Sleep Attack Hierarchical Cluster Sleep Mode Wireless Sensor network.