2009
DOI: 10.1109/tvt.2008.921621
|View full text |Cite
|
Sign up to set email alerts
|

Effects of Denial-of-Sleep Attacks on Wireless Sensor Network MAC Protocols

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
46
0
1

Year Published

2010
2010
2021
2021

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 177 publications
(47 citation statements)
references
References 17 publications
0
46
0
1
Order By: Relevance
“…David R. Raymond et al [13] classifies denial-of-sleep attacks on WSN MAC protocols. Secondly, it explores potential attacks from each attack classification, both modeling their impacts on sensor networks running four leading WSN MAC protocols and analyzing the efficiency of implementations of these attacks on these protocols.…”
Section: Background and Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…David R. Raymond et al [13] classifies denial-of-sleep attacks on WSN MAC protocols. Secondly, it explores potential attacks from each attack classification, both modeling their impacts on sensor networks running four leading WSN MAC protocols and analyzing the efficiency of implementations of these attacks on these protocols.…”
Section: Background and Related Workmentioning
confidence: 99%
“…Thus to effectively increase life of individual sensor nodes and in turn the whole sensor network the battery charge carried by these nodes must be conserved . If we fail to stop the attack, the network lifetime can be reduced from months or years to days [13]. To prevent this attack we have to authenticate nodes which are going to change the sleep time of the nodes so only synchronization messages coming from authenticated nodes are accepted.…”
Section: Introductionmentioning
confidence: 99%
“…These attacks prevent nodes from in-going a low-power sleep cycle and drain their batteries more rapidly. It's only those attacks at medium access control (MAC) layer [15]., that are considered in the latest research on "denial of sleep". There source exhaustion at the MAC and transport layers [10,13], are also mentioned, but offers rate limiting and removal of insider intruders as potential solutions.…”
Section: Related Workmentioning
confidence: 99%
“…This paper also considers the down fall of the routing protocols leading to lack in safety from vampire attacks as the node's energy is drained in the networks. Compared to the earlier -observed DoS, reduction of quality (RoQ), and routing infrastructure attacks, these attacks vary, as they work intentionally to disrupt the network completely, but they don't disrupt immediate availability.While a few attacks bound to be easy, and power-depleting and resource exhaustion attacks are described before [12,15,8], earlier effort are generally restricted to other stages of the protocol stack. These Vampire attacks are non-specific with respect to the protocols and are independent of the design properties and exploit protocol classes properties like distance-vector, link-state, source routing and geographic and beacon routing.…”
Section: Introductionmentioning
confidence: 99%
“…A number of literatures [9][10][11][12][13] have studied DoS attacks on wireless sensor networks, e.g., Raymond and Midkiff [11] provide a survey of DoS attacksin sensor networks. However, the security schemes designed for sensor networks cannot be directly applied to IMDs, because IMDs have much less resources than typical sensor nodes.…”
Section: Introductionmentioning
confidence: 99%