Abstract
Wireless sensor networks are particularly exposed to several kinds of attacks. Due to resources constrained property in WSN, Denial of sleep attacks is recognized as one of the most serious threats. Attacks of this type exhaust power supply of sensor nodes and reduce the sensor lifetime. Most of existing researches propose authentication and encryption solutions to protect the network from denial of sleep attacks. However, it is more efficient to use simpler solutions to the same security challenges due to limited processing capability, memory storage, and energy capacity. In this paper we propose a cross layer energy-efficient security mechanism to protect the network from these attacks. Simulation reveals that our proposal is energy efficient and able to achieve significant performance in term of preventing network nodes from different denial of sleep attacks.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Stajano, F., Anderson, R.: The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks. In: ICISC. Springer (2000)
Wei, Y., Heidemann, J., Estrin, D.: An Energy- Efficient MAC Protocol for Wireless Sensor Networks. In: IEEE INFOCOM, New York, vol. 2, pp. 1567–1576 (2002)
Pirretti, M., Zhu, S., Vijaykrishnan, N., Mcdaniel, P.: Kandemir. M.: The Sleep Deprivation Attack in Sensor Networks: Analysis and Methods of Defense. International Journal of Distributed Sensor Networks 2, 267–287 (2006)
Xiaoming, L., Spear, M., Levitt, K., Matloff, N.S., Wu, S.F.: A Synchronization Attack and Defense in Energy-Efficient Listen-Sleep Slotted MAC Protocols. In: SECURWARE 2008, Second International Conference on Emerging Security Information, Systems and Technologies, pp. 403–411 (2008)
Brownfield, M., Gupta, Y., Davis, N.: Wireless sensor network denial of sleep attack. In: Proc. 6th Annual IEEE SMC Inf. Assurance Workshop, pp. 356–364 (2005)
Law, Y.l.: Link-layer Jamming Attacks on SMAC. Technical Paper, Univ. of Twente, NL (2005)
Stahlberg, M.: Radio Jamming attacks against two popular mobile networks. In: Seminar on Network Security, Helsinki University of Tech (2000)
3Com IEEE802.11b Wireless LANs Technical Paper (2000)
Chen, C., Hui, L., Pei, Q., Ning, L., Peng, Q.: An Effective Scheme for Defending Denial-of-Sleep Attack in Wireless Sensor Networks. In: Fifth International Conference on Information Assurance and Security, pp. 446–449 (2009)
Raymond, D.R., Marchany, R.C., Brownfield, M.I., Midkiff, S.F.: Effects of Denial-of-Sleep Attacks on Wireless Sensor Network MAC Protocols. IEEE Transactions on Vehicular Technology 58(1), 367–380 (2009)
Rainer, F., Hans-Joachim, H.: Fighting Insomnia: A Secure Wake-Up Scheme for Wireless Sensor Networks. In: Third International Conference on Emerging Security Information, Systems and Technologies, pp. 191–196 (2009)
Zhao, J., Nygard, K.E.: A Two-Phase Security Algorithm for Hierarchical Sensor Networks. In: The Third International Conference on Future Computational Technologies and Applications, pp. 144–120 (2011)
Gabrielli, A., Mancini, L.V., Setia, S., Jajodia, S.: Securing Topology Maintenance Protocols for Sensor Networks: Attacks and Countermeasures. IEEE Transactions on Dependable and Secure Computing, 450–465 (2011)
Bhuse, V., Gupta, A.: Anomaly intrusion detection in wireless sensor networks. Journal of High Speed Networks 15(1), 33–51 (2006)
Boubiche, D., Bilami, A.: HEEP (Hybrid Energy Efficiency Protocol) Based on Chain Clustering. Int. J. Sensor Networks 10(1/2), 25–35 (2011)
Heinzelman, W.R., Chandrakasan, A., Balakrishnan, H.: An Application-Specific Protocol Architecture for Wireless Micro sensor Networks. IEEE Transactions on the Wireless Communications 1(4), 660–670 (2002)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Boubiche, D.E., Bilami, A., Athmani, S. (2012). A Cross Layer Energy Efficient Security Mechanism for Denial of Sleep Attacks on Wireless Sensor Network. In: Benlamri, R. (eds) Networked Digital Technologies. NDT 2012. Communications in Computer and Information Science, vol 294. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-30567-2_13
Download citation
DOI: https://doi.org/10.1007/978-3-642-30567-2_13
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-30566-5
Online ISBN: 978-3-642-30567-2
eBook Packages: Computer ScienceComputer Science (R0)