SlideShare a Scribd company logo
1 of 3
Download to read offline
20 International Journal for Modern Trends in Science and Technology
Volume: 2 | Issue: 05 | May 2016 | ISSN: 2455-3778IJMTST
Secure & Energy Efficient Scheme against
Denial-of-Sleep Attack in WSN
Mr. Pavan A C1
| Mr. P Prasanna2
1PG Student, Department of CS&E, P.E.S College of Engineering, Mandya, Karnataka, India
2Assosiate Professor, Department of CS&E, P.E.S College of Engineering, Mandya, Karnataka, India
P
Security breaches and energy consumption issues are indispensable in WSN (wireless sensor networks).
Considering attacks like Denial-of-Service (DoS) where not only the service is not provided but in addition to
that unwanted power is also consumed.“Denial-of-Sleep attack" (type of DoS attack) also results in
unnecessary power exhaustion. This paper briefs about how energy consumption could be minimized in WSN
by using MAC algorithm in a risk free manner.
KEYWORDS: WSN, Key management in Network security, Denial-of-service attack, Denial-of-sleep
attack, MAC protocol
Copyright © 2015 International Journal for Modern Trends in Science and Technology
All rights reserved.
I. INTRODUCTION
Wireless sensor networks [1] are in continual
need where the physical environment requirements
are to be converted to readable data. Be it the area
of monitoring, heath care or earth sensing like air
pollution, WSN sensors are in major use in all such
applications. When considering duty-cycle based
WSN MAC protocols, the sensor nodes are either in
one of the two states namely awake/active and
sleep state. These states are switched periodically
and they enter sleep mode after certain idle period
hence, reducing energy consumption.
WSN often encounters various security attacks
like:
 Wormhole attack
 Hello attack
 Sybil attacks
 Dos attacks
One such attacks thus being DOS
(denial-of-service).In a DOS attack the legitimate
user node is sent certain unwanted data to process
sent by the attackers( in manner that data appears
to be sent by a genuine user). This leads to not
providing the actual service required to the user
who requested the service.
Common DOS attacks:
 Buffer overflow
 Ping of death
 Smurf attack
Denial of sleep [2] is a special type of DOS attack.
In denial of sleep attack the sensor nodes are kept
awake to consume more energy. An attacker
(anti-node) can send fake data packets to legitimate
node of unprotected WSNs. Leading to unnecessary
transmissions in a repeated manner. If the receiver
is unable to judge among the real and the fake
node, the receiver will receive and process the data
from the anti-node. This keeps the receiver awake
as long as the data transmission sustains, thus
exhausting the battery of nodes rapid manner.
Additionally, the fake node could also send fake
ACK in order to give a mask of being genuine .This
might lead the legitimate user node to provide all
the services to fake node repeatedly. Hence more
power consumed unnecessarily.
The data to be transmitted is basically encrypted
either with keyed symmetric or asymmetric
encryption algorithm. Symmetric algorithms are
usually preferred in order to avoid the complicated
computing and heavy energy consumption.
ABSTRACT
21 International Journal for Modern Trends in Science and Technology
Secure & Energy Efficient Scheme against Denial-of-Sleep Attack in WSN
Encrypted data exhausts the battery. Additionally
it becomes worse under Denial-of- Sleep attack. An
anti-node can send the encrypted “gibberish” data
to receiver. Receiver decrypts the data assuming it
to be a genuine data. The power is being consumed
as the receiver is decrypting the unwanted data
until realizing the data is “gibberish”. Also, the
sensor node are awake while these process goes on.
In order to overcome these problems a simpler
and fast mutual authentication scheme is required
that if integrated with MAC protocol it could
counter the Denial-of-Sleep attack.
The design principles and features of the
proposed secure scheme are:
 Energy conservation
 Low complexity
 Mutual authentication
 Capability to counter the Denial-of-Sleep
attack
 Integrating the MAC protocol
The paper structure is as follows. Firstly, a
literature survey upon the existing system is being
specified in “EXISTING SCHEME“ section which
also mentions the various types of encryption in
brief. Secondly, the proposed system in the
“ENHANCED SCHEME“, briefs about how when
MAC is being integrated the energy consumption is
reduced.
II. EXISTING SCHEME
While setting up a network, a group of sensors
are used and that sensors will be partition into
clusters. Before the cluster formation is done the
sensors should be authenticated and seen that the
sensors are normal sensor nodes or the anti-nodes.
The purpose of encryption is to ensure that only
those nodes who are authorized to access data will
be able to read it, using the decryption key. Some
other nodes that are not authorized can be
excluded, because they do not have the required
key, without which it is impossible to read the
encrypted information [3] [4].
A. Types of Encryption
a. Symmetric key encryption
In symmetric-key schemes, the encryption and
decryption keys are the same. Communicating
parties must have the same key before they can
achieve secure communication.
b. Public key encryption
In public-key encryption schemes, the
encryption key is published for anyone to use and
encrypt messages. However, only the receiving
party has access to the decryption key that enables
messages to be read.
In this mechanism (Fig-1) of forming a cluster, a
plaintext “Hello” message will be broadcasted. This
text will be encrypted by the pre-distributed key. If
the sensor cannot decrypt the received message
successfully, the sender is said to be an anti-node
and is it decrypts
Fig-1: Encryption and Decryption Mechanism.
successfully, the sender is said to be a normal
node. Thus, the normal nodes and the anti-nodes
can be differentiated. Therefore, we keep on the
network topology without anti-nodes in order to
make the network safe.
This encryption and decryption is not much
secure because the pre-distributed key can be
successfully hacked at some point of time by the
anti-node and it may start sending fake packets or
it can edit the original message and send to the
other nodes so that it will be awake for a longer
duration and its battery will be drained soon. This
process of keeping the sensor nodes awake for a
long duration in known as Denial-of-Sleep.
Therefore, to reduce the energy consumption, to
counter the power exhausting attacks, and
enhance the performance of sensor nodes, a
cross-layer design of secure scheme which
integrates the MAC protocol can be used.
22 International Journal for Modern Trends in Science and Technology
Volume: 2 | Issue: 05 | May 2016 | ISSN: 2455-3778IJMTST
III. ENHANCED SCHEME
In order to overcome the drawbacks of the above
discussed scheme, the enhanced scheme that is
the MAC protocol is used.
A message authentication code (MAC) [5]-[9] is a
short piece of information used to authenticate a
message. A MAC algorithm, accepts as input a
secret key and an arbitrary-length message to be
authenticated, and outputs a MAC. The MAC value
protects both a message's data integrity as well as
its authenticity, by allowing verifiers (who also
possess the secret key) to detect any changes to the
message content.
In MAC protocol, all the nodes will be having the
MAC algorithm. Here, the sender node will have a
key (k) and uses the message to run in the MAC
algorithm to get the MAC tag. The message and the
MAC tag are then sent to the receiver node. The
receiver node in turn runs the message portion of
the transmission through the same MAC algorithm
using the same key, producing another MAC tag.
The receiver then compares the first MAC tag
received in the transmission to the second
generated MAC tag. If they are matched, the
message was not altered during transmission and
it is not an anti-node. If the MAC function is not
matched (Fig-2).
Fig-2: MAC functioning
MAC protocol uses the hashing function so that
the authentication process takes places at a faster
rate, so that the system wake-up time will be less
and the energy will not be drained soon. Therefore
the normal nodes are kept as it is and the
anti-nodes are labeled malicious and are neglected
for further transmission.
IV. CONCLUSION
In this paper, an enhancement of MAC protocol
has been proposed to save the energy in the nodes
in a wireless sensor network. The main advantage
of this protocol is less power exhaustion and usage
of less energy. The involvement of MAC Algorithm
and its tag in every message transfer gives more
authenticity and also reduces wakeup time of the
node. Hence the proposed MAC protocol helps to
uphold the energy efficiency and power
exhaustions of the wireless sensor networks
REFERENCES
[1] Zheng, Jun, and Abbas Jamalipour. Wireless sensor
networks: a networking perspective. Wiley. com,
2009.
[2] Kaur, Simerpreet, MdAtaullah, and Monika Garg.
"Security from Denial of Sleep Attack in Wireless
SensorNetwork." INTERNATIONAL JOURNAL OF
COMPUTERS & TECHNOLOGY 4.2 (2013): 419-425.
[3] P. Ganesan, R. Venugopalan, P. Peddabachagari, A.
Dean, F. Mueller, and M. Sichitiu, “Analyzing and
modeling encryption overhead for sensor network
nodes,” in Proc. ACM 2nd ACM Int. Conf. Wireless
Sensor Netw. Appl. (WSNA), San Diego, CA, USA,
2003, pp. 151–159.
[4] W. Liu, R. Luo, and H. Yang, “Cryptography
overhead evaluation and analysis for wireless sensor
networks,” in Proc. WRI Int. Conf. Commun. Mobile
Comput. (CMC), Kunming, China, Jan. 2009, pp.
496–501.
[5] A. Bachir, M. Dohler, T. Watteyne, and K. K. Leung,
“MAC essentials for wireless sensor networks,” IEEE
Commun. Surv. Tuts., vol. 12, no. 2, pp. 222–248,
Second Quarter 2010.
[6] J. Kabara and M. Calle, “MAC protocols used by
wireless sensor networks and a general method of
performance evaluation,” Int. J. Distrib. Sensor
Netw., vol. 2012, pp. 1–11, 2012, Art. ID 834784.
[7] P. Huang, L. Xiao, S. Soltani, M.W. Mutka, and N. Xi,
“The evolution of MAC protocols in wireless sensor
networks: A survey,” IEEE commun. Surv. Tuts., vol.
15, no. 1, pp. 101–120, First Quarter 2013.
[8] W. Ye, J. Heidemann, and D. Estrin, “An
energy-efficient MAC protocol for wireless sensor
networks,” in Proc. 21st Annu. Joint Conf. IEEE
Comput. Commun. Soc. (INFOCOM), Los Angeles, CA,
USA, 2002, vol. 3, pp. 1567–1576.
[9] T. van Dam and K. Langendoen, “An adaptive
energy-efficient MAC protocol for wireless sensor
networks,” in Proc. 1st Int. Conf. embedded

More Related Content

What's hot

ENHANCED THREE TIER SECURITY ARCHITECTURE FOR WSN AGAINST MOBILE SINK REPLI...
ENHANCED THREE TIER SECURITY  ARCHITECTURE FOR WSN AGAINST MOBILE SINK  REPLI...ENHANCED THREE TIER SECURITY  ARCHITECTURE FOR WSN AGAINST MOBILE SINK  REPLI...
ENHANCED THREE TIER SECURITY ARCHITECTURE FOR WSN AGAINST MOBILE SINK REPLI...ijwmn
 
IRJET- Appraisal of Secure Data Aggregation protocol for Wireless Sensor ...
IRJET-  	  Appraisal of Secure Data Aggregation protocol for Wireless Sensor ...IRJET-  	  Appraisal of Secure Data Aggregation protocol for Wireless Sensor ...
IRJET- Appraisal of Secure Data Aggregation protocol for Wireless Sensor ...IRJET Journal
 
Enhancing the Security in WSN using Three Tier Security Architecture
Enhancing the Security in WSN using Three Tier Security ArchitectureEnhancing the Security in WSN using Three Tier Security Architecture
Enhancing the Security in WSN using Three Tier Security ArchitectureAM Publications,India
 
An Efficient Key Distribution Scheme for Wireless Sensor Networks using poly...
An Efficient Key Distribution Scheme for Wireless Sensor Networks  using poly...An Efficient Key Distribution Scheme for Wireless Sensor Networks  using poly...
An Efficient Key Distribution Scheme for Wireless Sensor Networks using poly...Deepti Dohare
 
Data Transfer Security solution for Wireless Sensor Network
Data Transfer Security solution for Wireless Sensor NetworkData Transfer Security solution for Wireless Sensor Network
Data Transfer Security solution for Wireless Sensor NetworkEditor IJCATR
 
Efficient security approaches in mobile ad hoc networks a survey
Efficient security approaches in mobile ad hoc networks a surveyEfficient security approaches in mobile ad hoc networks a survey
Efficient security approaches in mobile ad hoc networks a surveyeSAT Publishing House
 
Key Establishment using Selective Repeat Automatic Repeat Request Mechanism f...
Key Establishment using Selective Repeat Automatic Repeat Request Mechanism f...Key Establishment using Selective Repeat Automatic Repeat Request Mechanism f...
Key Establishment using Selective Repeat Automatic Repeat Request Mechanism f...ijceronline
 
A key management approach for wireless sensor networks
A key management approach for wireless sensor networksA key management approach for wireless sensor networks
A key management approach for wireless sensor networksZac Darcy
 
Intrusion detection in heterogeneous network by multipath routing based toler...
Intrusion detection in heterogeneous network by multipath routing based toler...Intrusion detection in heterogeneous network by multipath routing based toler...
Intrusion detection in heterogeneous network by multipath routing based toler...eSAT Journals
 
Intrusion detection in heterogeneous network by multipath routing based toler...
Intrusion detection in heterogeneous network by multipath routing based toler...Intrusion detection in heterogeneous network by multipath routing based toler...
Intrusion detection in heterogeneous network by multipath routing based toler...eSAT Publishing House
 
Protected Data Collection In WSN by Filtering Attackers Influence (Published ...
Protected Data Collection In WSN by Filtering Attackers Influence (Published ...Protected Data Collection In WSN by Filtering Attackers Influence (Published ...
Protected Data Collection In WSN by Filtering Attackers Influence (Published ...sangasandeep
 
SYMMETRIC KEY MANAGEMENT SCHEME FOR HIERARCHICAL WIRELESS SENSOR NETWORKS
SYMMETRIC KEY MANAGEMENT SCHEME FOR HIERARCHICAL WIRELESS SENSOR NETWORKSSYMMETRIC KEY MANAGEMENT SCHEME FOR HIERARCHICAL WIRELESS SENSOR NETWORKS
SYMMETRIC KEY MANAGEMENT SCHEME FOR HIERARCHICAL WIRELESS SENSOR NETWORKSIJNSA Journal
 
Network coding combined with onion routing for anonymous and secure communica...
Network coding combined with onion routing for anonymous and secure communica...Network coding combined with onion routing for anonymous and secure communica...
Network coding combined with onion routing for anonymous and secure communica...IJCNCJournal
 
Research on key predistribution scheme of wireless sensor networks
Research on key predistribution scheme of wireless sensor networksResearch on key predistribution scheme of wireless sensor networks
Research on key predistribution scheme of wireless sensor networksIAEME Publication
 
IMPLEMENTATION OF SECURITY PROTOCOL FOR WIRELESS SENSOR
IMPLEMENTATION OF SECURITY PROTOCOL FOR WIRELESS SENSORIMPLEMENTATION OF SECURITY PROTOCOL FOR WIRELESS SENSOR
IMPLEMENTATION OF SECURITY PROTOCOL FOR WIRELESS SENSORijcsa
 
A secure and energy saving protocol for wireless sensor networks
A secure and energy saving protocol for wireless sensor networksA secure and energy saving protocol for wireless sensor networks
A secure and energy saving protocol for wireless sensor networksjournalBEEI
 

What's hot (17)

ENHANCED THREE TIER SECURITY ARCHITECTURE FOR WSN AGAINST MOBILE SINK REPLI...
ENHANCED THREE TIER SECURITY  ARCHITECTURE FOR WSN AGAINST MOBILE SINK  REPLI...ENHANCED THREE TIER SECURITY  ARCHITECTURE FOR WSN AGAINST MOBILE SINK  REPLI...
ENHANCED THREE TIER SECURITY ARCHITECTURE FOR WSN AGAINST MOBILE SINK REPLI...
 
IRJET- Appraisal of Secure Data Aggregation protocol for Wireless Sensor ...
IRJET-  	  Appraisal of Secure Data Aggregation protocol for Wireless Sensor ...IRJET-  	  Appraisal of Secure Data Aggregation protocol for Wireless Sensor ...
IRJET- Appraisal of Secure Data Aggregation protocol for Wireless Sensor ...
 
Enhancing the Security in WSN using Three Tier Security Architecture
Enhancing the Security in WSN using Three Tier Security ArchitectureEnhancing the Security in WSN using Three Tier Security Architecture
Enhancing the Security in WSN using Three Tier Security Architecture
 
An Efficient Key Distribution Scheme for Wireless Sensor Networks using poly...
An Efficient Key Distribution Scheme for Wireless Sensor Networks  using poly...An Efficient Key Distribution Scheme for Wireless Sensor Networks  using poly...
An Efficient Key Distribution Scheme for Wireless Sensor Networks using poly...
 
Paper copy
Paper   copyPaper   copy
Paper copy
 
Data Transfer Security solution for Wireless Sensor Network
Data Transfer Security solution for Wireless Sensor NetworkData Transfer Security solution for Wireless Sensor Network
Data Transfer Security solution for Wireless Sensor Network
 
Efficient security approaches in mobile ad hoc networks a survey
Efficient security approaches in mobile ad hoc networks a surveyEfficient security approaches in mobile ad hoc networks a survey
Efficient security approaches in mobile ad hoc networks a survey
 
Key Establishment using Selective Repeat Automatic Repeat Request Mechanism f...
Key Establishment using Selective Repeat Automatic Repeat Request Mechanism f...Key Establishment using Selective Repeat Automatic Repeat Request Mechanism f...
Key Establishment using Selective Repeat Automatic Repeat Request Mechanism f...
 
A key management approach for wireless sensor networks
A key management approach for wireless sensor networksA key management approach for wireless sensor networks
A key management approach for wireless sensor networks
 
Intrusion detection in heterogeneous network by multipath routing based toler...
Intrusion detection in heterogeneous network by multipath routing based toler...Intrusion detection in heterogeneous network by multipath routing based toler...
Intrusion detection in heterogeneous network by multipath routing based toler...
 
Intrusion detection in heterogeneous network by multipath routing based toler...
Intrusion detection in heterogeneous network by multipath routing based toler...Intrusion detection in heterogeneous network by multipath routing based toler...
Intrusion detection in heterogeneous network by multipath routing based toler...
 
Protected Data Collection In WSN by Filtering Attackers Influence (Published ...
Protected Data Collection In WSN by Filtering Attackers Influence (Published ...Protected Data Collection In WSN by Filtering Attackers Influence (Published ...
Protected Data Collection In WSN by Filtering Attackers Influence (Published ...
 
SYMMETRIC KEY MANAGEMENT SCHEME FOR HIERARCHICAL WIRELESS SENSOR NETWORKS
SYMMETRIC KEY MANAGEMENT SCHEME FOR HIERARCHICAL WIRELESS SENSOR NETWORKSSYMMETRIC KEY MANAGEMENT SCHEME FOR HIERARCHICAL WIRELESS SENSOR NETWORKS
SYMMETRIC KEY MANAGEMENT SCHEME FOR HIERARCHICAL WIRELESS SENSOR NETWORKS
 
Network coding combined with onion routing for anonymous and secure communica...
Network coding combined with onion routing for anonymous and secure communica...Network coding combined with onion routing for anonymous and secure communica...
Network coding combined with onion routing for anonymous and secure communica...
 
Research on key predistribution scheme of wireless sensor networks
Research on key predistribution scheme of wireless sensor networksResearch on key predistribution scheme of wireless sensor networks
Research on key predistribution scheme of wireless sensor networks
 
IMPLEMENTATION OF SECURITY PROTOCOL FOR WIRELESS SENSOR
IMPLEMENTATION OF SECURITY PROTOCOL FOR WIRELESS SENSORIMPLEMENTATION OF SECURITY PROTOCOL FOR WIRELESS SENSOR
IMPLEMENTATION OF SECURITY PROTOCOL FOR WIRELESS SENSOR
 
A secure and energy saving protocol for wireless sensor networks
A secure and energy saving protocol for wireless sensor networksA secure and energy saving protocol for wireless sensor networks
A secure and energy saving protocol for wireless sensor networks
 

Viewers also liked

Healthcare Monitoring System by using iSense Device& IOT Platform
Healthcare Monitoring System by using iSense Device& IOT PlatformHealthcare Monitoring System by using iSense Device& IOT Platform
Healthcare Monitoring System by using iSense Device& IOT PlatformIJMTST Journal
 
SPCHS Construction for Expeditious Keyword Search in Cipher Text
SPCHS Construction for Expeditious Keyword Search in Cipher TextSPCHS Construction for Expeditious Keyword Search in Cipher Text
SPCHS Construction for Expeditious Keyword Search in Cipher TextIJMTST Journal
 
Securing the Data Communication between the Neighboring Sensor Nodes using Bi...
Securing the Data Communication between the Neighboring Sensor Nodes using Bi...Securing the Data Communication between the Neighboring Sensor Nodes using Bi...
Securing the Data Communication between the Neighboring Sensor Nodes using Bi...IJMTST Journal
 
A Flexible AC Distribution System for a Microgrid with a Photovoltaic System ...
A Flexible AC Distribution System for a Microgrid with a Photovoltaic System ...A Flexible AC Distribution System for a Microgrid with a Photovoltaic System ...
A Flexible AC Distribution System for a Microgrid with a Photovoltaic System ...IJMTST Journal
 
Easy Mobile Cable Management System Using Android Application
Easy Mobile Cable Management System Using Android ApplicationEasy Mobile Cable Management System Using Android Application
Easy Mobile Cable Management System Using Android ApplicationIJMTST Journal
 
Captiosus Voting System
Captiosus Voting SystemCaptiosus Voting System
Captiosus Voting SystemIJMTST Journal
 
Performance Analysis of MIMO Equalization Techniques with Highly Efficient Ch...
Performance Analysis of MIMO Equalization Techniques with Highly Efficient Ch...Performance Analysis of MIMO Equalization Techniques with Highly Efficient Ch...
Performance Analysis of MIMO Equalization Techniques with Highly Efficient Ch...IJMTST Journal
 
Artificial Neural Network Based Closed Loop Control of Multilevel Inverter
Artificial Neural Network Based Closed Loop Control of Multilevel InverterArtificial Neural Network Based Closed Loop Control of Multilevel Inverter
Artificial Neural Network Based Closed Loop Control of Multilevel InverterIJMTST Journal
 
Effective Identification of Packet Droppers and Modifiers in Wireless Sensor ...
Effective Identification of Packet Droppers and Modifiers in Wireless Sensor ...Effective Identification of Packet Droppers and Modifiers in Wireless Sensor ...
Effective Identification of Packet Droppers and Modifiers in Wireless Sensor ...IJMTST Journal
 
A Three Phase AC-AC ZCS Resonant Converter for Induction Heating
A Three Phase AC-AC ZCS Resonant Converter for Induction HeatingA Three Phase AC-AC ZCS Resonant Converter for Induction Heating
A Three Phase AC-AC ZCS Resonant Converter for Induction HeatingIJMTST Journal
 
Recognition by Using Image Processing for Different Size Distribution Schemes
Recognition by Using Image Processing for Different Size Distribution SchemesRecognition by Using Image Processing for Different Size Distribution Schemes
Recognition by Using Image Processing for Different Size Distribution SchemesIJMTST Journal
 
Using Homomorphism Linear Signature Auditing Detection of Routing Packet Drop...
Using Homomorphism Linear Signature Auditing Detection of Routing Packet Drop...Using Homomorphism Linear Signature Auditing Detection of Routing Packet Drop...
Using Homomorphism Linear Signature Auditing Detection of Routing Packet Drop...IJMTST Journal
 
Filter Based Solar Power Generation System with a Seven Level Inverter
Filter Based Solar Power Generation System with a Seven Level InverterFilter Based Solar Power Generation System with a Seven Level Inverter
Filter Based Solar Power Generation System with a Seven Level InverterIJMTST Journal
 
Optimal Placement and Sizing of Capacitor and Distributed Generator in Radial...
Optimal Placement and Sizing of Capacitor and Distributed Generator in Radial...Optimal Placement and Sizing of Capacitor and Distributed Generator in Radial...
Optimal Placement and Sizing of Capacitor and Distributed Generator in Radial...IJMTST Journal
 
An FPGA Based Floating Point Arithmetic Unit Using Verilog
An FPGA Based Floating Point Arithmetic Unit Using VerilogAn FPGA Based Floating Point Arithmetic Unit Using Verilog
An FPGA Based Floating Point Arithmetic Unit Using VerilogIJMTST Journal
 
A Three Phase D-STATCOM to Compensate AC and DC loads by using Fuzzy Logic DC...
A Three Phase D-STATCOM to Compensate AC and DC loads by using Fuzzy Logic DC...A Three Phase D-STATCOM to Compensate AC and DC loads by using Fuzzy Logic DC...
A Three Phase D-STATCOM to Compensate AC and DC loads by using Fuzzy Logic DC...IJMTST Journal
 
A Real Time Image Processing Based Fire Safety Intensive Automatic Assistance...
A Real Time Image Processing Based Fire Safety Intensive Automatic Assistance...A Real Time Image Processing Based Fire Safety Intensive Automatic Assistance...
A Real Time Image Processing Based Fire Safety Intensive Automatic Assistance...IJMTST Journal
 
Implementation of a Voltage Multiplier based on High Step-up Converter using FLC
Implementation of a Voltage Multiplier based on High Step-up Converter using FLCImplementation of a Voltage Multiplier based on High Step-up Converter using FLC
Implementation of a Voltage Multiplier based on High Step-up Converter using FLCIJMTST Journal
 
Secure Auditing and Deduplicating Data on Cloud
Secure Auditing and Deduplicating Data on CloudSecure Auditing and Deduplicating Data on Cloud
Secure Auditing and Deduplicating Data on CloudIJMTST Journal
 

Viewers also liked (19)

Healthcare Monitoring System by using iSense Device& IOT Platform
Healthcare Monitoring System by using iSense Device& IOT PlatformHealthcare Monitoring System by using iSense Device& IOT Platform
Healthcare Monitoring System by using iSense Device& IOT Platform
 
SPCHS Construction for Expeditious Keyword Search in Cipher Text
SPCHS Construction for Expeditious Keyword Search in Cipher TextSPCHS Construction for Expeditious Keyword Search in Cipher Text
SPCHS Construction for Expeditious Keyword Search in Cipher Text
 
Securing the Data Communication between the Neighboring Sensor Nodes using Bi...
Securing the Data Communication between the Neighboring Sensor Nodes using Bi...Securing the Data Communication between the Neighboring Sensor Nodes using Bi...
Securing the Data Communication between the Neighboring Sensor Nodes using Bi...
 
A Flexible AC Distribution System for a Microgrid with a Photovoltaic System ...
A Flexible AC Distribution System for a Microgrid with a Photovoltaic System ...A Flexible AC Distribution System for a Microgrid with a Photovoltaic System ...
A Flexible AC Distribution System for a Microgrid with a Photovoltaic System ...
 
Easy Mobile Cable Management System Using Android Application
Easy Mobile Cable Management System Using Android ApplicationEasy Mobile Cable Management System Using Android Application
Easy Mobile Cable Management System Using Android Application
 
Captiosus Voting System
Captiosus Voting SystemCaptiosus Voting System
Captiosus Voting System
 
Performance Analysis of MIMO Equalization Techniques with Highly Efficient Ch...
Performance Analysis of MIMO Equalization Techniques with Highly Efficient Ch...Performance Analysis of MIMO Equalization Techniques with Highly Efficient Ch...
Performance Analysis of MIMO Equalization Techniques with Highly Efficient Ch...
 
Artificial Neural Network Based Closed Loop Control of Multilevel Inverter
Artificial Neural Network Based Closed Loop Control of Multilevel InverterArtificial Neural Network Based Closed Loop Control of Multilevel Inverter
Artificial Neural Network Based Closed Loop Control of Multilevel Inverter
 
Effective Identification of Packet Droppers and Modifiers in Wireless Sensor ...
Effective Identification of Packet Droppers and Modifiers in Wireless Sensor ...Effective Identification of Packet Droppers and Modifiers in Wireless Sensor ...
Effective Identification of Packet Droppers and Modifiers in Wireless Sensor ...
 
A Three Phase AC-AC ZCS Resonant Converter for Induction Heating
A Three Phase AC-AC ZCS Resonant Converter for Induction HeatingA Three Phase AC-AC ZCS Resonant Converter for Induction Heating
A Three Phase AC-AC ZCS Resonant Converter for Induction Heating
 
Recognition by Using Image Processing for Different Size Distribution Schemes
Recognition by Using Image Processing for Different Size Distribution SchemesRecognition by Using Image Processing for Different Size Distribution Schemes
Recognition by Using Image Processing for Different Size Distribution Schemes
 
Using Homomorphism Linear Signature Auditing Detection of Routing Packet Drop...
Using Homomorphism Linear Signature Auditing Detection of Routing Packet Drop...Using Homomorphism Linear Signature Auditing Detection of Routing Packet Drop...
Using Homomorphism Linear Signature Auditing Detection of Routing Packet Drop...
 
Filter Based Solar Power Generation System with a Seven Level Inverter
Filter Based Solar Power Generation System with a Seven Level InverterFilter Based Solar Power Generation System with a Seven Level Inverter
Filter Based Solar Power Generation System with a Seven Level Inverter
 
Optimal Placement and Sizing of Capacitor and Distributed Generator in Radial...
Optimal Placement and Sizing of Capacitor and Distributed Generator in Radial...Optimal Placement and Sizing of Capacitor and Distributed Generator in Radial...
Optimal Placement and Sizing of Capacitor and Distributed Generator in Radial...
 
An FPGA Based Floating Point Arithmetic Unit Using Verilog
An FPGA Based Floating Point Arithmetic Unit Using VerilogAn FPGA Based Floating Point Arithmetic Unit Using Verilog
An FPGA Based Floating Point Arithmetic Unit Using Verilog
 
A Three Phase D-STATCOM to Compensate AC and DC loads by using Fuzzy Logic DC...
A Three Phase D-STATCOM to Compensate AC and DC loads by using Fuzzy Logic DC...A Three Phase D-STATCOM to Compensate AC and DC loads by using Fuzzy Logic DC...
A Three Phase D-STATCOM to Compensate AC and DC loads by using Fuzzy Logic DC...
 
A Real Time Image Processing Based Fire Safety Intensive Automatic Assistance...
A Real Time Image Processing Based Fire Safety Intensive Automatic Assistance...A Real Time Image Processing Based Fire Safety Intensive Automatic Assistance...
A Real Time Image Processing Based Fire Safety Intensive Automatic Assistance...
 
Implementation of a Voltage Multiplier based on High Step-up Converter using FLC
Implementation of a Voltage Multiplier based on High Step-up Converter using FLCImplementation of a Voltage Multiplier based on High Step-up Converter using FLC
Implementation of a Voltage Multiplier based on High Step-up Converter using FLC
 
Secure Auditing and Deduplicating Data on Cloud
Secure Auditing and Deduplicating Data on CloudSecure Auditing and Deduplicating Data on Cloud
Secure Auditing and Deduplicating Data on Cloud
 

Similar to Secure & Energy Efficient Scheme against Denial-of-Sleep Attack in WSN

Conservation Of Battery Power by Alleviating DOS Attacks in Wireless Sensor N...
Conservation Of Battery Power by Alleviating DOS Attacks in Wireless Sensor N...Conservation Of Battery Power by Alleviating DOS Attacks in Wireless Sensor N...
Conservation Of Battery Power by Alleviating DOS Attacks in Wireless Sensor N...IRJET Journal
 
Security in Wireless Sensor Networks Using Broadcasting
Security in Wireless Sensor Networks Using BroadcastingSecurity in Wireless Sensor Networks Using Broadcasting
Security in Wireless Sensor Networks Using BroadcastingIJMER
 
A-SURVEY SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORK
A-SURVEY SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKA-SURVEY SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORK
A-SURVEY SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKEditor IJMTER
 
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...CSCJournals
 
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...Certain Investigations on Security Issues in Smart Grid over Wireless Communi...
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...IJTET Journal
 
A Survey on Threats and Security schemes in Wireless Sensor Networks
A Survey on Threats and Security schemes in Wireless Sensor NetworksA Survey on Threats and Security schemes in Wireless Sensor Networks
A Survey on Threats and Security schemes in Wireless Sensor NetworksIJERA Editor
 
DSSS with ISAKMP Key Management Protocol to Secure Physical Layer for Mobile ...
DSSS with ISAKMP Key Management Protocol to Secure Physical Layer for Mobile ...DSSS with ISAKMP Key Management Protocol to Secure Physical Layer for Mobile ...
DSSS with ISAKMP Key Management Protocol to Secure Physical Layer for Mobile ...IJNSA Journal
 
Data Security via Public-Key Cryptography in Wireless Sensor Network
Data Security via Public-Key Cryptography in Wireless Sensor NetworkData Security via Public-Key Cryptography in Wireless Sensor Network
Data Security via Public-Key Cryptography in Wireless Sensor NetworkIJCI JOURNAL
 
SECURED knowledge TRANSMISSION By Using Minimal KEY EXCHANGE MECHANISM FOR WI...
SECURED knowledge TRANSMISSION By Using Minimal KEY EXCHANGE MECHANISM FOR WI...SECURED knowledge TRANSMISSION By Using Minimal KEY EXCHANGE MECHANISM FOR WI...
SECURED knowledge TRANSMISSION By Using Minimal KEY EXCHANGE MECHANISM FOR WI...IRJET Journal
 
2.espk external agent authentication and session key establishment using publ...
2.espk external agent authentication and session key establishment using publ...2.espk external agent authentication and session key establishment using publ...
2.espk external agent authentication and session key establishment using publ...EditorJST
 
Secure And Efficient Defense Strategy Against Energy Exhausting Attacks In Wsn
Secure And Efficient Defense Strategy Against Energy Exhausting Attacks In WsnSecure And Efficient Defense Strategy Against Energy Exhausting Attacks In Wsn
Secure And Efficient Defense Strategy Against Energy Exhausting Attacks In Wsnijcnes
 
Protocols for Wireless Sensor Networks and Its Security
Protocols for Wireless Sensor Networks and Its SecurityProtocols for Wireless Sensor Networks and Its Security
Protocols for Wireless Sensor Networks and Its SecurityIJERA Editor
 
Secure and Efficient DiDrip Protocol for Improving Performance of WSNs
Secure and Efficient DiDrip Protocol for Improving Performance of WSNsSecure and Efficient DiDrip Protocol for Improving Performance of WSNs
Secure and Efficient DiDrip Protocol for Improving Performance of WSNsINFOGAIN PUBLICATION
 
CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...
CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...
CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...cscpconf
 
Optimized rationalize security and efficient data gathering in wireless senso...
Optimized rationalize security and efficient data gathering in wireless senso...Optimized rationalize security and efficient data gathering in wireless senso...
Optimized rationalize security and efficient data gathering in wireless senso...ijmnct
 
TAM new report
TAM new reportTAM new report
TAM new reportSuzit Punk
 
CERTIFICATELESS SCHEME BASED NTRU CRYPTOSYSTEM FOR AD-HOC UWB-IR NETWORK
CERTIFICATELESS SCHEME BASED NTRU CRYPTOSYSTEM FOR AD-HOC UWB-IR NETWORKCERTIFICATELESS SCHEME BASED NTRU CRYPTOSYSTEM FOR AD-HOC UWB-IR NETWORK
CERTIFICATELESS SCHEME BASED NTRU CRYPTOSYSTEM FOR AD-HOC UWB-IR NETWORKijwmn
 
Enhancing Data Transmission and Protection in Wireless Sensor Node- A Review
Enhancing Data Transmission and Protection in Wireless Sensor Node- A ReviewEnhancing Data Transmission and Protection in Wireless Sensor Node- A Review
Enhancing Data Transmission and Protection in Wireless Sensor Node- A ReviewIRJET Journal
 

Similar to Secure & Energy Efficient Scheme against Denial-of-Sleep Attack in WSN (20)

Conservation Of Battery Power by Alleviating DOS Attacks in Wireless Sensor N...
Conservation Of Battery Power by Alleviating DOS Attacks in Wireless Sensor N...Conservation Of Battery Power by Alleviating DOS Attacks in Wireless Sensor N...
Conservation Of Battery Power by Alleviating DOS Attacks in Wireless Sensor N...
 
Security in Wireless Sensor Networks Using Broadcasting
Security in Wireless Sensor Networks Using BroadcastingSecurity in Wireless Sensor Networks Using Broadcasting
Security in Wireless Sensor Networks Using Broadcasting
 
A-SURVEY SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORK
A-SURVEY SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKA-SURVEY SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORK
A-SURVEY SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORK
 
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...
 
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...Certain Investigations on Security Issues in Smart Grid over Wireless Communi...
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...
 
A Survey on Threats and Security schemes in Wireless Sensor Networks
A Survey on Threats and Security schemes in Wireless Sensor NetworksA Survey on Threats and Security schemes in Wireless Sensor Networks
A Survey on Threats and Security schemes in Wireless Sensor Networks
 
Am03402220229
Am03402220229Am03402220229
Am03402220229
 
DSSS with ISAKMP Key Management Protocol to Secure Physical Layer for Mobile ...
DSSS with ISAKMP Key Management Protocol to Secure Physical Layer for Mobile ...DSSS with ISAKMP Key Management Protocol to Secure Physical Layer for Mobile ...
DSSS with ISAKMP Key Management Protocol to Secure Physical Layer for Mobile ...
 
Data Security via Public-Key Cryptography in Wireless Sensor Network
Data Security via Public-Key Cryptography in Wireless Sensor NetworkData Security via Public-Key Cryptography in Wireless Sensor Network
Data Security via Public-Key Cryptography in Wireless Sensor Network
 
SECURED knowledge TRANSMISSION By Using Minimal KEY EXCHANGE MECHANISM FOR WI...
SECURED knowledge TRANSMISSION By Using Minimal KEY EXCHANGE MECHANISM FOR WI...SECURED knowledge TRANSMISSION By Using Minimal KEY EXCHANGE MECHANISM FOR WI...
SECURED knowledge TRANSMISSION By Using Minimal KEY EXCHANGE MECHANISM FOR WI...
 
2.espk external agent authentication and session key establishment using publ...
2.espk external agent authentication and session key establishment using publ...2.espk external agent authentication and session key establishment using publ...
2.espk external agent authentication and session key establishment using publ...
 
Ijcnc050210
Ijcnc050210Ijcnc050210
Ijcnc050210
 
Secure And Efficient Defense Strategy Against Energy Exhausting Attacks In Wsn
Secure And Efficient Defense Strategy Against Energy Exhausting Attacks In WsnSecure And Efficient Defense Strategy Against Energy Exhausting Attacks In Wsn
Secure And Efficient Defense Strategy Against Energy Exhausting Attacks In Wsn
 
Protocols for Wireless Sensor Networks and Its Security
Protocols for Wireless Sensor Networks and Its SecurityProtocols for Wireless Sensor Networks and Its Security
Protocols for Wireless Sensor Networks and Its Security
 
Secure and Efficient DiDrip Protocol for Improving Performance of WSNs
Secure and Efficient DiDrip Protocol for Improving Performance of WSNsSecure and Efficient DiDrip Protocol for Improving Performance of WSNs
Secure and Efficient DiDrip Protocol for Improving Performance of WSNs
 
CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...
CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...
CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...
 
Optimized rationalize security and efficient data gathering in wireless senso...
Optimized rationalize security and efficient data gathering in wireless senso...Optimized rationalize security and efficient data gathering in wireless senso...
Optimized rationalize security and efficient data gathering in wireless senso...
 
TAM new report
TAM new reportTAM new report
TAM new report
 
CERTIFICATELESS SCHEME BASED NTRU CRYPTOSYSTEM FOR AD-HOC UWB-IR NETWORK
CERTIFICATELESS SCHEME BASED NTRU CRYPTOSYSTEM FOR AD-HOC UWB-IR NETWORKCERTIFICATELESS SCHEME BASED NTRU CRYPTOSYSTEM FOR AD-HOC UWB-IR NETWORK
CERTIFICATELESS SCHEME BASED NTRU CRYPTOSYSTEM FOR AD-HOC UWB-IR NETWORK
 
Enhancing Data Transmission and Protection in Wireless Sensor Node- A Review
Enhancing Data Transmission and Protection in Wireless Sensor Node- A ReviewEnhancing Data Transmission and Protection in Wireless Sensor Node- A Review
Enhancing Data Transmission and Protection in Wireless Sensor Node- A Review
 

Recently uploaded

Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2RajaP95
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZTE
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 

Recently uploaded (20)

Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 

Secure & Energy Efficient Scheme against Denial-of-Sleep Attack in WSN

  • 1. 20 International Journal for Modern Trends in Science and Technology Volume: 2 | Issue: 05 | May 2016 | ISSN: 2455-3778IJMTST Secure & Energy Efficient Scheme against Denial-of-Sleep Attack in WSN Mr. Pavan A C1 | Mr. P Prasanna2 1PG Student, Department of CS&E, P.E.S College of Engineering, Mandya, Karnataka, India 2Assosiate Professor, Department of CS&E, P.E.S College of Engineering, Mandya, Karnataka, India P Security breaches and energy consumption issues are indispensable in WSN (wireless sensor networks). Considering attacks like Denial-of-Service (DoS) where not only the service is not provided but in addition to that unwanted power is also consumed.“Denial-of-Sleep attack" (type of DoS attack) also results in unnecessary power exhaustion. This paper briefs about how energy consumption could be minimized in WSN by using MAC algorithm in a risk free manner. KEYWORDS: WSN, Key management in Network security, Denial-of-service attack, Denial-of-sleep attack, MAC protocol Copyright © 2015 International Journal for Modern Trends in Science and Technology All rights reserved. I. INTRODUCTION Wireless sensor networks [1] are in continual need where the physical environment requirements are to be converted to readable data. Be it the area of monitoring, heath care or earth sensing like air pollution, WSN sensors are in major use in all such applications. When considering duty-cycle based WSN MAC protocols, the sensor nodes are either in one of the two states namely awake/active and sleep state. These states are switched periodically and they enter sleep mode after certain idle period hence, reducing energy consumption. WSN often encounters various security attacks like:  Wormhole attack  Hello attack  Sybil attacks  Dos attacks One such attacks thus being DOS (denial-of-service).In a DOS attack the legitimate user node is sent certain unwanted data to process sent by the attackers( in manner that data appears to be sent by a genuine user). This leads to not providing the actual service required to the user who requested the service. Common DOS attacks:  Buffer overflow  Ping of death  Smurf attack Denial of sleep [2] is a special type of DOS attack. In denial of sleep attack the sensor nodes are kept awake to consume more energy. An attacker (anti-node) can send fake data packets to legitimate node of unprotected WSNs. Leading to unnecessary transmissions in a repeated manner. If the receiver is unable to judge among the real and the fake node, the receiver will receive and process the data from the anti-node. This keeps the receiver awake as long as the data transmission sustains, thus exhausting the battery of nodes rapid manner. Additionally, the fake node could also send fake ACK in order to give a mask of being genuine .This might lead the legitimate user node to provide all the services to fake node repeatedly. Hence more power consumed unnecessarily. The data to be transmitted is basically encrypted either with keyed symmetric or asymmetric encryption algorithm. Symmetric algorithms are usually preferred in order to avoid the complicated computing and heavy energy consumption. ABSTRACT
  • 2. 21 International Journal for Modern Trends in Science and Technology Secure & Energy Efficient Scheme against Denial-of-Sleep Attack in WSN Encrypted data exhausts the battery. Additionally it becomes worse under Denial-of- Sleep attack. An anti-node can send the encrypted “gibberish” data to receiver. Receiver decrypts the data assuming it to be a genuine data. The power is being consumed as the receiver is decrypting the unwanted data until realizing the data is “gibberish”. Also, the sensor node are awake while these process goes on. In order to overcome these problems a simpler and fast mutual authentication scheme is required that if integrated with MAC protocol it could counter the Denial-of-Sleep attack. The design principles and features of the proposed secure scheme are:  Energy conservation  Low complexity  Mutual authentication  Capability to counter the Denial-of-Sleep attack  Integrating the MAC protocol The paper structure is as follows. Firstly, a literature survey upon the existing system is being specified in “EXISTING SCHEME“ section which also mentions the various types of encryption in brief. Secondly, the proposed system in the “ENHANCED SCHEME“, briefs about how when MAC is being integrated the energy consumption is reduced. II. EXISTING SCHEME While setting up a network, a group of sensors are used and that sensors will be partition into clusters. Before the cluster formation is done the sensors should be authenticated and seen that the sensors are normal sensor nodes or the anti-nodes. The purpose of encryption is to ensure that only those nodes who are authorized to access data will be able to read it, using the decryption key. Some other nodes that are not authorized can be excluded, because they do not have the required key, without which it is impossible to read the encrypted information [3] [4]. A. Types of Encryption a. Symmetric key encryption In symmetric-key schemes, the encryption and decryption keys are the same. Communicating parties must have the same key before they can achieve secure communication. b. Public key encryption In public-key encryption schemes, the encryption key is published for anyone to use and encrypt messages. However, only the receiving party has access to the decryption key that enables messages to be read. In this mechanism (Fig-1) of forming a cluster, a plaintext “Hello” message will be broadcasted. This text will be encrypted by the pre-distributed key. If the sensor cannot decrypt the received message successfully, the sender is said to be an anti-node and is it decrypts Fig-1: Encryption and Decryption Mechanism. successfully, the sender is said to be a normal node. Thus, the normal nodes and the anti-nodes can be differentiated. Therefore, we keep on the network topology without anti-nodes in order to make the network safe. This encryption and decryption is not much secure because the pre-distributed key can be successfully hacked at some point of time by the anti-node and it may start sending fake packets or it can edit the original message and send to the other nodes so that it will be awake for a longer duration and its battery will be drained soon. This process of keeping the sensor nodes awake for a long duration in known as Denial-of-Sleep. Therefore, to reduce the energy consumption, to counter the power exhausting attacks, and enhance the performance of sensor nodes, a cross-layer design of secure scheme which integrates the MAC protocol can be used.
  • 3. 22 International Journal for Modern Trends in Science and Technology Volume: 2 | Issue: 05 | May 2016 | ISSN: 2455-3778IJMTST III. ENHANCED SCHEME In order to overcome the drawbacks of the above discussed scheme, the enhanced scheme that is the MAC protocol is used. A message authentication code (MAC) [5]-[9] is a short piece of information used to authenticate a message. A MAC algorithm, accepts as input a secret key and an arbitrary-length message to be authenticated, and outputs a MAC. The MAC value protects both a message's data integrity as well as its authenticity, by allowing verifiers (who also possess the secret key) to detect any changes to the message content. In MAC protocol, all the nodes will be having the MAC algorithm. Here, the sender node will have a key (k) and uses the message to run in the MAC algorithm to get the MAC tag. The message and the MAC tag are then sent to the receiver node. The receiver node in turn runs the message portion of the transmission through the same MAC algorithm using the same key, producing another MAC tag. The receiver then compares the first MAC tag received in the transmission to the second generated MAC tag. If they are matched, the message was not altered during transmission and it is not an anti-node. If the MAC function is not matched (Fig-2). Fig-2: MAC functioning MAC protocol uses the hashing function so that the authentication process takes places at a faster rate, so that the system wake-up time will be less and the energy will not be drained soon. Therefore the normal nodes are kept as it is and the anti-nodes are labeled malicious and are neglected for further transmission. IV. CONCLUSION In this paper, an enhancement of MAC protocol has been proposed to save the energy in the nodes in a wireless sensor network. The main advantage of this protocol is less power exhaustion and usage of less energy. The involvement of MAC Algorithm and its tag in every message transfer gives more authenticity and also reduces wakeup time of the node. Hence the proposed MAC protocol helps to uphold the energy efficiency and power exhaustions of the wireless sensor networks REFERENCES [1] Zheng, Jun, and Abbas Jamalipour. Wireless sensor networks: a networking perspective. Wiley. com, 2009. [2] Kaur, Simerpreet, MdAtaullah, and Monika Garg. "Security from Denial of Sleep Attack in Wireless SensorNetwork." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 4.2 (2013): 419-425. [3] P. Ganesan, R. Venugopalan, P. Peddabachagari, A. Dean, F. Mueller, and M. Sichitiu, “Analyzing and modeling encryption overhead for sensor network nodes,” in Proc. ACM 2nd ACM Int. Conf. Wireless Sensor Netw. Appl. (WSNA), San Diego, CA, USA, 2003, pp. 151–159. [4] W. Liu, R. Luo, and H. Yang, “Cryptography overhead evaluation and analysis for wireless sensor networks,” in Proc. WRI Int. Conf. Commun. Mobile Comput. (CMC), Kunming, China, Jan. 2009, pp. 496–501. [5] A. Bachir, M. Dohler, T. Watteyne, and K. K. Leung, “MAC essentials for wireless sensor networks,” IEEE Commun. Surv. Tuts., vol. 12, no. 2, pp. 222–248, Second Quarter 2010. [6] J. Kabara and M. Calle, “MAC protocols used by wireless sensor networks and a general method of performance evaluation,” Int. J. Distrib. Sensor Netw., vol. 2012, pp. 1–11, 2012, Art. ID 834784. [7] P. Huang, L. Xiao, S. Soltani, M.W. Mutka, and N. Xi, “The evolution of MAC protocols in wireless sensor networks: A survey,” IEEE commun. Surv. Tuts., vol. 15, no. 1, pp. 101–120, First Quarter 2013. [8] W. Ye, J. Heidemann, and D. Estrin, “An energy-efficient MAC protocol for wireless sensor networks,” in Proc. 21st Annu. Joint Conf. IEEE Comput. Commun. Soc. (INFOCOM), Los Angeles, CA, USA, 2002, vol. 3, pp. 1567–1576. [9] T. van Dam and K. Langendoen, “An adaptive energy-efficient MAC protocol for wireless sensor networks,” in Proc. 1st Int. Conf. embedded