2006
DOI: 10.1080/15501320600642718
|View full text |Cite
|
Sign up to set email alerts
|

The Sleep Deprivation Attack in Sensor Networks: Analysis and Methods of Defense

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
63
0

Year Published

2007
2007
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 102 publications
(63 citation statements)
references
References 31 publications
0
63
0
Order By: Relevance
“…In sensor networks like the cloud based energy management system, the ability of the devices to enter powersaving modes (e.g various sleep and hibernation modes) is important to preserve the network's longevity, the lifetime of these devices, and reduce the overall power consumption [36,37,15]. In this section two major attacks that target this functionality of the devices will be discussed: sleep deprivation and barrage attack.…”
Section: Energy Bleedingmentioning
confidence: 99%
See 3 more Smart Citations
“…In sensor networks like the cloud based energy management system, the ability of the devices to enter powersaving modes (e.g various sleep and hibernation modes) is important to preserve the network's longevity, the lifetime of these devices, and reduce the overall power consumption [36,37,15]. In this section two major attacks that target this functionality of the devices will be discussed: sleep deprivation and barrage attack.…”
Section: Energy Bleedingmentioning
confidence: 99%
“…In sleep deprivation attack, malicious nodes on the network, send requests to the victim device only as often as necessary to keep it switched on. Although the goal of this attack is the same as the barrage attack, the sleep deprivation attack does not make the target nodes perform energy intense operations [36]. Barrage attack has been proven to exhaust faster the battery resources of the targeted nodes [36], but at the same time it is very easy to detect as opposed to sleep deprivation attack.…”
Section: Energy Bleedingmentioning
confidence: 99%
See 2 more Smart Citations
“…If sensors use techniques to save energy by powering down components, the advantage of these techniques can't be used anymore. This sleep-deprivation attack is studied in [13], [14], [15]. Some approaches can be made to lower the impact of discovery message injection.…”
Section: B Outside Attacks Against Arpdmentioning
confidence: 99%