2018 UKSim-AMSS 20th International Conference on Computer Modelling and Simulation (UKSim) 2018
DOI: 10.1109/uksim.2018.00038
|View full text |Cite
|
Sign up to set email alerts
|

Performance Analysis of Denial-of-Sleep Attack-Prone MAC Protocols in Wireless Sensor Networks

Abstract: Wireless sensor networks which form part of the core for the Internet of Things consist of resource constrained sensors that are usually powered by batteries. Therefore, careful energy awareness is essential when working with these devices. On the other hand, the presence as well as the absence of security features implemented in resource constrained sensors can have negative effects on their energy consumption. Indeed, the introduction of security techniques such as authentication and encryption, to ensure co… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
9
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
2
2
1
1

Relationship

1
5

Authors

Journals

citations
Cited by 11 publications
(9 citation statements)
references
References 15 publications
0
9
0
Order By: Relevance
“…Naik et al [98] Zero-knowledge protocol based authentication. Udoh et al [99] AI-based intelligent agents. Bhattasali and Chaki [100] Stochastic model monitoring sensor node behavior.…”
Section: Defenses Against Denial Of Sleepmentioning
confidence: 99%
See 1 more Smart Citation
“…Naik et al [98] Zero-knowledge protocol based authentication. Udoh et al [99] AI-based intelligent agents. Bhattasali and Chaki [100] Stochastic model monitoring sensor node behavior.…”
Section: Defenses Against Denial Of Sleepmentioning
confidence: 99%
“…Udoh et al [99] proposed an architecture that propagates relevant knowledge via intelligent agents for mitigating denialof-sleep attacks. The authors explained that each sensor can become an agent to sense data and take responsive action with the workload dynamically distributed among them.…”
Section: Desnitsky Et Al [101]mentioning
confidence: 99%
“…We evaluate, compare, and analyze the received signal strength and the link quality indicators for each of these protocols. 35…”
Section: Related Workmentioning
confidence: 99%
“…This paper focuses on denial-of-sleep attacks by simulating three Media Access Control (MAC) protocols -Sensor-MAC, Timeout-MAC, and TunableMAC -under different network sizes. We evaluate, compare, and analyse the received signal strength and the link quality indicators for each of these protocols [62].…”
Section: Related Workmentioning
confidence: 99%
“…However, this is mainly aimed at clustering and routing protocols. In [22], the relationship between node density and certain network parameters such as received signal strength indicator (RSSI) and Link quality indicator (LQI) are analysed, with reference to DOS attacks.…”
Section: Related Workmentioning
confidence: 99%