2015
DOI: 10.1016/j.procs.2015.03.164
|View full text |Cite
|
Sign up to set email alerts
|

Conservation of Energy in Wireless Sensor Network by Preventing Denial of Sleep Attack

Abstract: Wireless Sensor Networks (WSNs) can be used to monitor environments, and therefore have broad range of interesting applications. The applications which may use WSN can be of sensitive nature and therefore might require enhanced secured environment. As sensors are used to monitor sensitive areas therefore Security and energy efficiency is essential consideration when designing wireless sensor networks (WSNs). The Sensor nodes get their power from batteries. Since the sensor nodes are deployed in harsh environme… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
15
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 23 publications
(15 citation statements)
references
References 20 publications
0
15
0
Order By: Relevance
“…The authors of [30] [31], [32], [33], [34]. developed allows the values from all leaves to be stored outside the memory space which is regarded as a resource intensive and inefficient process [37].…”
Section: Related Workmentioning
confidence: 99%
“…The authors of [30] [31], [32], [33], [34]. developed allows the values from all leaves to be stored outside the memory space which is regarded as a resource intensive and inefficient process [37].…”
Section: Related Workmentioning
confidence: 99%
“…Experimental results proved that the suggested method was optimal for defending the attacker from performing the task. Naik and Shekokar [12] addressed the denial-of-sleep attack using zero knowledge protocol and interlock protocol. Experimental results proved that the suggested protocols prevented the replay attack and man-in-the-middle attack and also minimized the resource consumption.…”
Section: Detection Of Dos Attacks In Wsnmentioning
confidence: 99%
“…Denial-of-Sleep (DoS) attacks consist in exhausting the batteries of the devices by increasing their duty cycle. By forcing nodes to awake at unnecessary times or by inducing additional duty (e.g., listening, retransmissions), these attacks aim at reducing the expected lifetime of the constituted IoT network [7]. Detecting abnormal uses of highly energy-consuming tasks (e.g., idle listening, overhearing, retransmissions) yet remains challenging [8].…”
Section: Introductionmentioning
confidence: 99%