SlideShare a Scribd company logo
1 of 4
Integrated Intelligent Research (IIR) International Journal of Business Intelligents
Volume: 05 Issue: 01 June 2016 Page No.8-11
ISSN: 2278-2400
8
Secure And Efficient Defense Strategy Against Energy
Exhausting Attacks In Wsn
Senbagavalli A1
,Vigneshwaran K.2
1
PG scholar, Dept. of CS, Pavendhar Bharathidasan College of Engineering and Technology, Trichy, Tamilnadu, India
2
Assistant professor, Dept. of CS, Pavendhar Bharathidasan College of Engineering and Technology, Trichy, Tamilnadu, India
Email: valliadsv318@gmail.com, vigneshwaran2489@gmail.com
Abstract- One of the most critical concerns in WSN design is
security and energy-efficiency problem and the wireless sensor
networks is resilience against malicious attacks. Since energy is
the most precious resource for these networks, Denial of sleep
attacks is recognized as one of the most serious threats. Such
attacks exhaust power supply of sensor nodes and can reduce the
sensor lifetime from years to days. Authentication and
encryption solutions have been proposed to protect the network
from denial of sleep attacks. Though, the resources constraint
motivates the use of simpler solutions to the same security
challenges. In this paper, we survey different types of denial of
sleep attacks and we propose a cross layer energy efficient
security mechanism to protect the network from these attacks.
The cross layer interaction between network Mac and physical
layers is mainly exploited to identify the intruders nodes and
prevent sensor nodes from energy exhaust attacks. Simulation
results indicate that our proposal is energy efficient and can
significantly reduce the effect of denial of sleep attacks.
Keywords: Wireless sensor networks, Cross layer security,
denial of sleep attacks
I. INTRODUCTION
Securing wireless sensor networks (WSNs) adds more
challenges to the research. This is because WSN properties make
it harder to be secured than other types of networks. In WSNs,
applying a high security level imposes more resource and
decreases the energy efficiency of network. Sensor networks are
vulnerable to several malicious attacks. Since sensor batteries are
severely limited, Denial of sleep attacks (DS attack) is
recognized as one of the most serious threats. The DS attack is a
specific type of denial-of-service (DoS) attack that targets a
battery powered device’s power supply in an effort to exhaust
this constrained resource and reduce the network life time.
Indeed, this attack tries to break in the device’s power
management system to reduce the opportunities to transition into
lower power states. Since Mac layer is responsible for managing
the radio transceiver, defensive strategies implemented at this
layer are the most effective in protecting radio usage. S-MAC
protocol represents the baseline energy-efficient sensor MAC
protocol designed to extend WSN network lifetime. In this
medium access control protocol, sensor node periodically goes to
the fixed listen/sleep cycle. A time frame in S-MAC is divided
into two parts: one for a listening session and the other for a
sleeping session. Only for a listen period, sensor nodes are able
to communicate with other nodes and send some control packets
such as SYNC, RTS (Request to Send), CTS (Clear to Send) and
ACK (Acknowledgement). Using a SYNC packet exchange, all
neighboring nodes can synchronize together. Radios in networks
which use this protocol will be asleep at 90% of the time,
thereby producing an almost tenfold improvement in node life. A
denial of sleep attacker can manipulate Mac protocol and cause
nodes to expend additional energy. For example, an attacking
node in a SMAC-based network could repeatedly send request-
to-send messages (RTS) and force the node listed in the RTS
destination field to respond with a clear-to-send (CTS) message
and remain awake waiting for the follow-on message. To provide
a defense against this attack, most of existing researches propose
authentication and encryption solutions or implement a complex
and energy inefficient mechanisms. However, WSNs require
simpler solutions to the same security challenges due to limited
processing capability, memory storage, and energy capacity. The
purpose of this article is to discuss different types of DS attack
and propose a defense strategy to protect the network from them.
Our basic idea is the use of the cross layer interaction concept to
prevent sensor nodes from energy exhaust attacks. In our
proposal, the MAC layer uses the cross layer information (one
hop routing table) from network layer in order to identify
attackers. Then all received RTS packets are rejected if the
sender does not belong to the routing path of receiver node.
II. RELATED WORKS
In [1] Joseph Polastre, Jason Hill, David Culler et al presents
To achieve low power operation, B-MAC employs an adaptive
preamble sampling scheme to reduce duty cycle and minimize
idle listening. B-MAC supports on-the-fly reconfiguration and
provides bidirectional interfaces for system services to optimize
performance, whether it be for throughput, latency, or power
conservation. We build an analytical model of a class of sensor
network applications. We use the model to show the effect of
changing B-MAC’s parameters and predict the behavior of
sensor network applications. By comparing B-MAC to
conventional 802.11- inspired protocols, specifically S-MAC, we
develop an experimental characterization of B-MAC over a wide
range of network conditions. We show that B-MAC’s flexibility
results in better packet delivery rates, throughput, latency, and
energy consumption than S-MAC.
In [2] Tijs van Dam, Koen Langendoen et al presents A
contention-based Medium Access Control protocol for wireless
Integrated Intelligent Research (IIR) International Journal of Business Intelligents
Volume: 05 Issue: 01 June 2016 Page No.8-11
ISSN: 2278-2400
9
sensor networks. Applications for these networks have some
characteristics (low message rate, insensitivity to latency)that
can be exploited to reduce energy consumption by introducing
an active/sleep duty cycle. To handle load variations in time and
location T-MAC introduces an adaptive duty cycle in a novel
way: by dynamically ending the active part of it. This reduces
the amount of energy wasted on idle listening, in which nodes
wait for potentially incoming messages, while still maintaining a
reasonable throughput. We discuss the design of T-MAC, and
provide a head-to head comparison with classic CSMA (no duty
cycle) and S-MAC (fixed duty cycle)thro ugh extensive
simulations. Under homogeneous load, T-MAC and S-MAC
achieve similar reductions in energy consumption (up to 98%)
compared to CSMA.
In [3] Wei Ye, John Heidemann, Deborah Estrin et al
presents Wireless sensor networks use battery-operated
computing and sensing devices. A network of these devi43ces
will collaborate for a common application such as environmental
monitoring. We expect sensor networks to be deployed in an ad
hoc fashion, with individual nodes remaining largely inactive for
long periods of time, but then becoming suddenly active when
something is detected. These characteristics of sensor networks
and applications motivate a MAC that is different from
traditional wireless MACs such as IEEE 802.11 in almost every
way: energy conservation and self-configuration are primary
goals, while per-node fairness and latency are less important. S-
MAC uses three novel techniques to reduce energy consumption
and support self-configuration.
In [4] Pei Huang, Li Xiao, Soroor Soltani, Soroor Soltani et al
presents Wireless Sensor Networks (WSNs) have become a
leading solution in many important applications such as intrusion
detection, target tracking, industrial automation, smart building
and so on. Typically, a WSN consists of a large number of small,
low-cost sensor nodes that are distributed in the target area for
collecting data of interest. For a WSN to provide high
throughput in an energy-efficient way, designing an efficient
Medium Access Control (MAC) protocol is of paramount
importance because the MAC layer coordinates nodes’ access to
the shared wireless medium. To show the evolution of WSN
MAC protocols, this article surveys the latest progresses in WSN
MAC protocol designs over the period 2002-2011. In the early
development stages, designers were mostly concerned with
energy efficiency because sensor nodes are usually limited in
power supply
In [5] Abdelmalik Bachir, Mischa Dohler, and Kin K. Leung
et al presents The wireless medium being inherently broadcast
in nature and hence prone to interferences requires highly
optimized medium access control (MAC) protocols. This holds
particularly true for wireless sensor networks (WSNs) consisting
of a large amount of miniaturized battery-powered wireless
networked sensors required to operate for years with no human
intervention. There has hence been a growing interest on
understanding and optimizing WSN MAC protocols in recent
years, where the limited and constrained resources have driven
research towards primarily reducing energy consumption of
MAC functionalities
III. SURVEY ON DENIAL OF SLEEP ATTACKS
Based on the attack strategy, we can classify denial of sleep
attacks in six categories: sleep deprivation attack, barrage attack,
synchronization attack, replay attack, broadcast attack and
collision attack.
Sleep Deprivation Attack
The Sleep deprivation attack is presented where target of the
intruder is to maximize the power consumption of sensor nodes,
so that their lifetime is minimized. By using lawful interactions,
attacker node can keep the victim node out of its power
conserving sleep mode. Thus, this attack can be used to
dramatically reduce the lifetime of the victim. Further, this attack
is difficult to detect given that it is carried out solely through the
use of seemingly innocent interactions.
Barrage Attack
Barrage attack [3] causes its victims to spend more energy by
bombarding them with legitimate requests. However, the
purpose of these requests is to waste the victim’s limited power
supply by causing it to stay out of its sleep mode and perform
energy intensive operations. In both the sleep deprivation attack
and the barrage attack the victim will never enter its low power
sleep mode. The difference between the two attacks is that the
victim of a barrage attack will be actively performing work,
whereas the victim of a sleep deprivation attack will, for the
most part, remain idle.
Synchronization Attack
The goal of this attack [4] is to cause relative time
synchronization problems at the MAC layer. The
synchronization attack is simple but hard to detect as it stays
within the confines of the protocol. In listen-sleep MAC
protocols, each node maintains a listen-sleep schedule, and
exchanges it periodically with neighbored node to synchronize
their clock drift and form a virtual cluster. That allows them to
Integrated Intelligent Research (IIR) International Journal of Business Intelligents
Volume: 05 Issue: 01 June 2016 Page No.8-11
ISSN: 2278-2400
10
listen and go to sleep at the same time. Updating schedule is
accomplished by sending a SYNC packet. The SYNC packet is
very short, and includes the address of the sender and the time of
its next sleep. When a node receives a SYNC packet from
another node on its same virtual cluster, it recalculates its next
sleep time to maintain synchronization.
Replay Attack A replay attack is a breach of security in which
information is stored without authorization and then
retransmitted to trick the receiver into energy exhaust operations.
In an unintelligent replay attack, recorded traffic is replayed into
the network, causing nodes to waste energy receiving and
processing these extra packets. If nodes in the network do not
implement an anti-replay mechanism, this attack causes the
replayed traffic to be forwarded through the network, consuming
power at each node on the path to the destination. Undetected
replay has the added benefit (to the attacker) of causing the
network to resend data that could subvert the network’s purpose.
For example, replaying traffic in a military sensor network
deployed to sense enemy movement could cause combat units to
be misdirected.
Low Power Listening (Lpl) Based Wsn Mac Protocol
In the Low Power Listening (LPL) based WSN MAC protocol,
such as B-MAC the receiver wakes up periodically to sense the
preamble from the sender and then to receive and process the
data. When the sender needs to send data, it sends a long
preamble to cover the sleep period to ensure the receiver waking
up and sensing. The LPL based MAC protocol is an
asynchronous protocol, which decouples the sender and receiver
with time synchronization. This long preamble design of LPL
based protocol consumes the major energy of both sender and
receiver.
Ri-Mac Protocol
RI-MAC protocol is one of the receiver-initiated schemes to
minimize the channel occupancy time of a pair of a sender and
receiver which allows the sender to send data to the receiver as
soon as it senses the beacon. However, current layer-2 protocol
designs are insufficient to protect a WSN from Denial-of-Sleep
attack. The energy conservation is one of the major goals of
WSN design, whereas the security scheme always consumes
more energy of system. There is no well decision rule to
compromise the requirements between energy conservation and
security scheme
Denial of service:
The Denial-of-Sleep is one of the power exhausting attacks of
WSNs. This attack is a special type of Denial-of-Service (DoS)
attack, which tries to keep the sensor nodes awake to consume
more energy of the constrained power supply. An anti-node can
send fake data packets to sensor node of unprotected WSNs to
initiate unnecessary transmissions repeatedly. It causes the
jamming of a node or set of nodes. The jamming of a network
can come in two forms: constant jamming, and intermittent
jamming. Constant jamming involves the complete jamming of
the entire network. No messages are able to be sent or received.
If the jamming is only intermittent, then nodes are able to
exchange messages periodically, but not consistently.
IV. PROPOSED DEFENDING STRATEGY
More complexity to link layer protocols and are generally energy
inefficient. Indeed it is not suitable to use energy inefficient
security solutions to prevent sensors networks from energy
exhaust attacks. Therefore we propose a simple and energy
efficient security mechanism to preserve the network from
different types of denial of sleep attacks. The new security
mechanism is based on cross layer architecture that exploits
interaction and collaboration of three adjacent layers in the OSI
model i.e. network, Mac and physical layers. The main goal of
our security mechanism is to detect attacker nodes when they
attempt to accomplish denial of sleep attacks and reject any
packets sent from them. By using the routing information at the
MAC layer, each sensor node knows previously the source of
packets that will be received. Thus, any node trying to
communicate (exchange controls or data packets) with the sensor
nodes is immediately detected as an attacker if it is not included
in the routing path.
Proposed process
The attacker node is malicious and it is hard to detect it.
Therefore it has knowledge of the Mac protocol and obeys Mac-
layer rules of collision, fragmentation, and communication
schedules. The attacker node can broadcast a long message to all
nodes in its radio range. Since in SMAC broadcast message there
is no RTS packets that precede data message, the receiver node
can't authenticate previously the followed broadcast message.
Therefore, the authentication and encryption solution proposed
in can't prevent this kind of attacks since targeted node must
receive broadcast message before it can be decrypted, which
affects its sleep period and then drains the energy reserve. The
solution pro-posed in mitigates the broadcast message; however
it radically proposes a new Mac protocol. In our proposed
mechanism, targeted node receives only the first data fragment
and rejects remaining fragment (by entering in the sleep mode)
of the broadcast message. Since the first fragment of the
broadcast message contains the identity of sender, the proposed
security mechanism can detect the intruder node and rejects then
the followed fragment of broadcast message. Therefore, the
effect of broadcast attack is significantly reduced as targeted
node receives one fragment and does not prolong its wake up
state to receive remaining fragments.
V. CONCLUSION
To secure network nodes from denial of sleep attacks, we
proposed a cross layer energy efficient security mechanism
where the cross layer interaction is heavily exploited. Our
approach reuses mainly the already available data generated by
network, Mac and physical layers to provide security scheme for
network node. We don’t claim that the proposed solution can
prevent all types of denial of sleep attacks; though our proposal
mitigates most of them. Simulation results demonstrate the
performance provided by our security mechanism in terms of
energy saving and network lifetime.
Integrated Intelligent Research (IIR) International Journal of Business Intelligents
Volume: 05 Issue: 01 June 2016 Page No.8-11
ISSN: 2278-2400
11
REFERENCE
[1] F. Stajano, R. Anderson, “The Resurrecting Duckling: Security Issues for
Ad-hoc Wireless Networks,” In ICISC, Springer-Verlag, 2000.
[2] Ye. Wei, J. Heidemann, and D. Estrin, “An Energy- Efficient MAC
Protocol for Wireless Sensor Networks,” IEEE INFOCOM, New York,
Vol. 2, pp. 1567-1576, June 2002.
[3] M. Pirretti, S. Zhu, N. Vijaykrishnan, P. Mcdaniel, and M. Kandemir,
“The Sleep Deprivation Attack in Sensor Networks: Analysis and Methods
of Defense,” International Journal of Distributed Sensor Networks, 2: 267–
287, 2006.
[4] L. Xiaoming, M. Spear, K. Levitt, N.S. Matloff, and S.F. Wu, “A
Synchronization Attack and Defense in Energy- Efficient Listen-Sleep
Slotted MAC Protocols,” SECURWARE '08. Second International
Conference on Emerging Security Information, Systems and Technologies,
pp. 403-411, 2008.
[5] M. Brownfield, Y. Gupta, and N. Davis, ”Wireless sensor network denial
of sleep attack,” In Proc. 6th Annu. IEEE SMC Inf. Assurance Workshop,
pp. 356–364. 2005.
[6] Y.l. Law, “Link-layer Jamming Attacks on SMAC,” Technical Paper,
Univ. of Twente, NL, 2005.
[7] M. Stahlberg, “Radio Jamming attacks against two popular mobile
networks,” In Helsinki University of Tech. Seminar on Network Security,
2000.
[8] 3Com IEEE802.11b Wireless LANs Technical Paper.13p., referred
10.10.2000.
[9] C.C. Li, H.Q. Pei, and L. P. Ning, Qingquan, “An Effective Scheme for
Defending Denial-of-Sleep Attack in Wireless Sensor Networks,” Fifth
International Conference on Information Assurance and Security. pp. 446-
449. 2009.
[10] D.R. Raymond, R.C. Marchany, M.I. Brownfield, and S.F. Midkiff,,
“Effects of Denial-of-Sleep Attacks on Wireless Sensor Network MAC
Protocols,” IEEE transactions on vehicular technology, VOL. 58, No. 1,
pp. 367-380, January 2009.

More Related Content

Similar to Secure And Efficient Defense Strategy Against Energy Exhausting Attacks In Wsn

Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor NetworksSRAVANIP22
 
Survey on energy efficiency in wireless sensor network using mac protocol wit...
Survey on energy efficiency in wireless sensor network using mac protocol wit...Survey on energy efficiency in wireless sensor network using mac protocol wit...
Survey on energy efficiency in wireless sensor network using mac protocol wit...Editor Jacotech
 
PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...
PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...
PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...IJCNCJournal
 
Wireless Sensor Network – Theoretical Findings and Applications
Wireless Sensor Network – Theoretical Findings and ApplicationsWireless Sensor Network – Theoretical Findings and Applications
Wireless Sensor Network – Theoretical Findings and ApplicationsAshishDPatel1
 
Survey and Analysis of Medium Access Control Protocols for Wireless Sensor Ne...
Survey and Analysis of Medium Access Control Protocols for Wireless Sensor Ne...Survey and Analysis of Medium Access Control Protocols for Wireless Sensor Ne...
Survey and Analysis of Medium Access Control Protocols for Wireless Sensor Ne...IOSR Journals
 
Secure and Efficient DiDrip Protocol for Improving Performance of WSNs
Secure and Efficient DiDrip Protocol for Improving Performance of WSNsSecure and Efficient DiDrip Protocol for Improving Performance of WSNs
Secure and Efficient DiDrip Protocol for Improving Performance of WSNsINFOGAIN PUBLICATION
 
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor NetworkA Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Networkpijans
 
WIRELESS SENSOR NETWORKS
WIRELESS SENSOR NETWORKSWIRELESS SENSOR NETWORKS
WIRELESS SENSOR NETWORKSnanocdac
 
A Review Paper On Communication Protocols For Wireless Sensor Networks
A Review Paper On Communication Protocols For Wireless Sensor NetworksA Review Paper On Communication Protocols For Wireless Sensor Networks
A Review Paper On Communication Protocols For Wireless Sensor NetworksBria Davis
 
Energy efficient mac protocols for wireless sensor network
Energy efficient mac protocols for wireless sensor networkEnergy efficient mac protocols for wireless sensor network
Energy efficient mac protocols for wireless sensor networkijcsa
 
Secured node detection technique based on artificial neural network for wirel...
Secured node detection technique based on artificial neural network for wirel...Secured node detection technique based on artificial neural network for wirel...
Secured node detection technique based on artificial neural network for wirel...IJECEIAES
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
De3211001104
De3211001104De3211001104
De3211001104IJMER
 

Similar to Secure And Efficient Defense Strategy Against Energy Exhausting Attacks In Wsn (20)

Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
 
01306496
0130649601306496
01306496
 
Survey on energy efficiency in wireless sensor network using mac protocol wit...
Survey on energy efficiency in wireless sensor network using mac protocol wit...Survey on energy efficiency in wireless sensor network using mac protocol wit...
Survey on energy efficiency in wireless sensor network using mac protocol wit...
 
PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...
PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...
PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...
 
Wireless Sensor Network – Theoretical Findings and Applications
Wireless Sensor Network – Theoretical Findings and ApplicationsWireless Sensor Network – Theoretical Findings and Applications
Wireless Sensor Network – Theoretical Findings and Applications
 
Survey and Analysis of Medium Access Control Protocols for Wireless Sensor Ne...
Survey and Analysis of Medium Access Control Protocols for Wireless Sensor Ne...Survey and Analysis of Medium Access Control Protocols for Wireless Sensor Ne...
Survey and Analysis of Medium Access Control Protocols for Wireless Sensor Ne...
 
Secure and Efficient DiDrip Protocol for Improving Performance of WSNs
Secure and Efficient DiDrip Protocol for Improving Performance of WSNsSecure and Efficient DiDrip Protocol for Improving Performance of WSNs
Secure and Efficient DiDrip Protocol for Improving Performance of WSNs
 
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor NetworkA Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
 
WIRELESS SENSOR NETWORKS
WIRELESS SENSOR NETWORKSWIRELESS SENSOR NETWORKS
WIRELESS SENSOR NETWORKS
 
A Review Paper On Communication Protocols For Wireless Sensor Networks
A Review Paper On Communication Protocols For Wireless Sensor NetworksA Review Paper On Communication Protocols For Wireless Sensor Networks
A Review Paper On Communication Protocols For Wireless Sensor Networks
 
Energy efficient mac protocols for wireless sensor network
Energy efficient mac protocols for wireless sensor networkEnergy efficient mac protocols for wireless sensor network
Energy efficient mac protocols for wireless sensor network
 
D010332935
D010332935D010332935
D010332935
 
Secured node detection technique based on artificial neural network for wirel...
Secured node detection technique based on artificial neural network for wirel...Secured node detection technique based on artificial neural network for wirel...
Secured node detection technique based on artificial neural network for wirel...
 
Chapter
ChapterChapter
Chapter
 
Vebek
VebekVebek
Vebek
 
40120140503011
4012014050301140120140503011
40120140503011
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Br33421423
Br33421423Br33421423
Br33421423
 
Br33421423
Br33421423Br33421423
Br33421423
 
De3211001104
De3211001104De3211001104
De3211001104
 

More from ijcnes

A Survey of Ontology-based Information Extraction for Social Media Content An...
A Survey of Ontology-based Information Extraction for Social Media Content An...A Survey of Ontology-based Information Extraction for Social Media Content An...
A Survey of Ontology-based Information Extraction for Social Media Content An...ijcnes
 
Economic Growth of Information Technology (It) Industry on the Indian Economy
Economic Growth of Information Technology (It) Industry on the Indian EconomyEconomic Growth of Information Technology (It) Industry on the Indian Economy
Economic Growth of Information Technology (It) Industry on the Indian Economyijcnes
 
An analysis of Mobile Learning Implementation in Shinas College of Technology...
An analysis of Mobile Learning Implementation in Shinas College of Technology...An analysis of Mobile Learning Implementation in Shinas College of Technology...
An analysis of Mobile Learning Implementation in Shinas College of Technology...ijcnes
 
A Survey on the Security Issues of Software Defined Networking Tool in Cloud ...
A Survey on the Security Issues of Software Defined Networking Tool in Cloud ...A Survey on the Security Issues of Software Defined Networking Tool in Cloud ...
A Survey on the Security Issues of Software Defined Networking Tool in Cloud ...ijcnes
 
Challenges of E-government in Oman
Challenges of E-government in OmanChallenges of E-government in Oman
Challenges of E-government in Omanijcnes
 
Power Management in Micro grid Using Hybrid Energy Storage System
Power Management in Micro grid Using Hybrid Energy Storage SystemPower Management in Micro grid Using Hybrid Energy Storage System
Power Management in Micro grid Using Hybrid Energy Storage Systemijcnes
 
Holistic Forecasting of Onset of Diabetes through Data Mining Techniques
Holistic Forecasting of Onset of Diabetes through Data Mining TechniquesHolistic Forecasting of Onset of Diabetes through Data Mining Techniques
Holistic Forecasting of Onset of Diabetes through Data Mining Techniquesijcnes
 
A Survey on Disease Prediction from Retinal Colour Fundus Images using Image ...
A Survey on Disease Prediction from Retinal Colour Fundus Images using Image ...A Survey on Disease Prediction from Retinal Colour Fundus Images using Image ...
A Survey on Disease Prediction from Retinal Colour Fundus Images using Image ...ijcnes
 
Feature Extraction in Content based Image Retrieval
Feature Extraction in Content based Image RetrievalFeature Extraction in Content based Image Retrieval
Feature Extraction in Content based Image Retrievalijcnes
 
Challenges and Mechanisms for Securing Data in Mobile Cloud Computing
Challenges and Mechanisms for Securing Data in Mobile Cloud ComputingChallenges and Mechanisms for Securing Data in Mobile Cloud Computing
Challenges and Mechanisms for Securing Data in Mobile Cloud Computingijcnes
 
Detection of Node Activity and Selfish & Malicious Behavioral Patterns using ...
Detection of Node Activity and Selfish & Malicious Behavioral Patterns using ...Detection of Node Activity and Selfish & Malicious Behavioral Patterns using ...
Detection of Node Activity and Selfish & Malicious Behavioral Patterns using ...ijcnes
 
Optimal Channel and Relay Assignment in Ofdmbased Multi-Relay Multi-Pair Two-...
Optimal Channel and Relay Assignment in Ofdmbased Multi-Relay Multi-Pair Two-...Optimal Channel and Relay Assignment in Ofdmbased Multi-Relay Multi-Pair Two-...
Optimal Channel and Relay Assignment in Ofdmbased Multi-Relay Multi-Pair Two-...ijcnes
 
An Effective and Scalable AODV for Wireless Ad hoc Sensor Networks
An Effective and Scalable AODV for Wireless Ad hoc Sensor NetworksAn Effective and Scalable AODV for Wireless Ad hoc Sensor Networks
An Effective and Scalable AODV for Wireless Ad hoc Sensor Networksijcnes
 
Secured Seamless Wi-Fi Enhancement in Dynamic Vehicles
Secured Seamless Wi-Fi Enhancement in Dynamic VehiclesSecured Seamless Wi-Fi Enhancement in Dynamic Vehicles
Secured Seamless Wi-Fi Enhancement in Dynamic Vehiclesijcnes
 
Virtual Position based Olsr Protocol for Wireless Sensor Networks
Virtual Position based Olsr Protocol for Wireless Sensor NetworksVirtual Position based Olsr Protocol for Wireless Sensor Networks
Virtual Position based Olsr Protocol for Wireless Sensor Networksijcnes
 
Mitigation and control of Defeating Jammers using P-1 Factorization
Mitigation and control of Defeating Jammers using P-1 FactorizationMitigation and control of Defeating Jammers using P-1 Factorization
Mitigation and control of Defeating Jammers using P-1 Factorizationijcnes
 
An analysis and impact factors on Agriculture field using Data Mining Techniques
An analysis and impact factors on Agriculture field using Data Mining TechniquesAn analysis and impact factors on Agriculture field using Data Mining Techniques
An analysis and impact factors on Agriculture field using Data Mining Techniquesijcnes
 
A Study on Code Smell Detection with Refactoring Tools in Object Oriented Lan...
A Study on Code Smell Detection with Refactoring Tools in Object Oriented Lan...A Study on Code Smell Detection with Refactoring Tools in Object Oriented Lan...
A Study on Code Smell Detection with Refactoring Tools in Object Oriented Lan...ijcnes
 
Priority Based Multi Sen Car Technique in WSN
Priority Based Multi Sen Car Technique in WSNPriority Based Multi Sen Car Technique in WSN
Priority Based Multi Sen Car Technique in WSNijcnes
 
Semantic Search of E-Learning Documents Using Ontology Based System
Semantic Search of E-Learning Documents Using Ontology Based SystemSemantic Search of E-Learning Documents Using Ontology Based System
Semantic Search of E-Learning Documents Using Ontology Based Systemijcnes
 

More from ijcnes (20)

A Survey of Ontology-based Information Extraction for Social Media Content An...
A Survey of Ontology-based Information Extraction for Social Media Content An...A Survey of Ontology-based Information Extraction for Social Media Content An...
A Survey of Ontology-based Information Extraction for Social Media Content An...
 
Economic Growth of Information Technology (It) Industry on the Indian Economy
Economic Growth of Information Technology (It) Industry on the Indian EconomyEconomic Growth of Information Technology (It) Industry on the Indian Economy
Economic Growth of Information Technology (It) Industry on the Indian Economy
 
An analysis of Mobile Learning Implementation in Shinas College of Technology...
An analysis of Mobile Learning Implementation in Shinas College of Technology...An analysis of Mobile Learning Implementation in Shinas College of Technology...
An analysis of Mobile Learning Implementation in Shinas College of Technology...
 
A Survey on the Security Issues of Software Defined Networking Tool in Cloud ...
A Survey on the Security Issues of Software Defined Networking Tool in Cloud ...A Survey on the Security Issues of Software Defined Networking Tool in Cloud ...
A Survey on the Security Issues of Software Defined Networking Tool in Cloud ...
 
Challenges of E-government in Oman
Challenges of E-government in OmanChallenges of E-government in Oman
Challenges of E-government in Oman
 
Power Management in Micro grid Using Hybrid Energy Storage System
Power Management in Micro grid Using Hybrid Energy Storage SystemPower Management in Micro grid Using Hybrid Energy Storage System
Power Management in Micro grid Using Hybrid Energy Storage System
 
Holistic Forecasting of Onset of Diabetes through Data Mining Techniques
Holistic Forecasting of Onset of Diabetes through Data Mining TechniquesHolistic Forecasting of Onset of Diabetes through Data Mining Techniques
Holistic Forecasting of Onset of Diabetes through Data Mining Techniques
 
A Survey on Disease Prediction from Retinal Colour Fundus Images using Image ...
A Survey on Disease Prediction from Retinal Colour Fundus Images using Image ...A Survey on Disease Prediction from Retinal Colour Fundus Images using Image ...
A Survey on Disease Prediction from Retinal Colour Fundus Images using Image ...
 
Feature Extraction in Content based Image Retrieval
Feature Extraction in Content based Image RetrievalFeature Extraction in Content based Image Retrieval
Feature Extraction in Content based Image Retrieval
 
Challenges and Mechanisms for Securing Data in Mobile Cloud Computing
Challenges and Mechanisms for Securing Data in Mobile Cloud ComputingChallenges and Mechanisms for Securing Data in Mobile Cloud Computing
Challenges and Mechanisms for Securing Data in Mobile Cloud Computing
 
Detection of Node Activity and Selfish & Malicious Behavioral Patterns using ...
Detection of Node Activity and Selfish & Malicious Behavioral Patterns using ...Detection of Node Activity and Selfish & Malicious Behavioral Patterns using ...
Detection of Node Activity and Selfish & Malicious Behavioral Patterns using ...
 
Optimal Channel and Relay Assignment in Ofdmbased Multi-Relay Multi-Pair Two-...
Optimal Channel and Relay Assignment in Ofdmbased Multi-Relay Multi-Pair Two-...Optimal Channel and Relay Assignment in Ofdmbased Multi-Relay Multi-Pair Two-...
Optimal Channel and Relay Assignment in Ofdmbased Multi-Relay Multi-Pair Two-...
 
An Effective and Scalable AODV for Wireless Ad hoc Sensor Networks
An Effective and Scalable AODV for Wireless Ad hoc Sensor NetworksAn Effective and Scalable AODV for Wireless Ad hoc Sensor Networks
An Effective and Scalable AODV for Wireless Ad hoc Sensor Networks
 
Secured Seamless Wi-Fi Enhancement in Dynamic Vehicles
Secured Seamless Wi-Fi Enhancement in Dynamic VehiclesSecured Seamless Wi-Fi Enhancement in Dynamic Vehicles
Secured Seamless Wi-Fi Enhancement in Dynamic Vehicles
 
Virtual Position based Olsr Protocol for Wireless Sensor Networks
Virtual Position based Olsr Protocol for Wireless Sensor NetworksVirtual Position based Olsr Protocol for Wireless Sensor Networks
Virtual Position based Olsr Protocol for Wireless Sensor Networks
 
Mitigation and control of Defeating Jammers using P-1 Factorization
Mitigation and control of Defeating Jammers using P-1 FactorizationMitigation and control of Defeating Jammers using P-1 Factorization
Mitigation and control of Defeating Jammers using P-1 Factorization
 
An analysis and impact factors on Agriculture field using Data Mining Techniques
An analysis and impact factors on Agriculture field using Data Mining TechniquesAn analysis and impact factors on Agriculture field using Data Mining Techniques
An analysis and impact factors on Agriculture field using Data Mining Techniques
 
A Study on Code Smell Detection with Refactoring Tools in Object Oriented Lan...
A Study on Code Smell Detection with Refactoring Tools in Object Oriented Lan...A Study on Code Smell Detection with Refactoring Tools in Object Oriented Lan...
A Study on Code Smell Detection with Refactoring Tools in Object Oriented Lan...
 
Priority Based Multi Sen Car Technique in WSN
Priority Based Multi Sen Car Technique in WSNPriority Based Multi Sen Car Technique in WSN
Priority Based Multi Sen Car Technique in WSN
 
Semantic Search of E-Learning Documents Using Ontology Based System
Semantic Search of E-Learning Documents Using Ontology Based SystemSemantic Search of E-Learning Documents Using Ontology Based System
Semantic Search of E-Learning Documents Using Ontology Based System
 

Recently uploaded

Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdfKamal Acharya
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxfenichawla
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...Call Girls in Nagpur High Profile
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduitsrknatarajan
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college projectTonystark477637
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfKamal Acharya
 

Recently uploaded (20)

Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdf
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 

Secure And Efficient Defense Strategy Against Energy Exhausting Attacks In Wsn

  • 1. Integrated Intelligent Research (IIR) International Journal of Business Intelligents Volume: 05 Issue: 01 June 2016 Page No.8-11 ISSN: 2278-2400 8 Secure And Efficient Defense Strategy Against Energy Exhausting Attacks In Wsn Senbagavalli A1 ,Vigneshwaran K.2 1 PG scholar, Dept. of CS, Pavendhar Bharathidasan College of Engineering and Technology, Trichy, Tamilnadu, India 2 Assistant professor, Dept. of CS, Pavendhar Bharathidasan College of Engineering and Technology, Trichy, Tamilnadu, India Email: valliadsv318@gmail.com, vigneshwaran2489@gmail.com Abstract- One of the most critical concerns in WSN design is security and energy-efficiency problem and the wireless sensor networks is resilience against malicious attacks. Since energy is the most precious resource for these networks, Denial of sleep attacks is recognized as one of the most serious threats. Such attacks exhaust power supply of sensor nodes and can reduce the sensor lifetime from years to days. Authentication and encryption solutions have been proposed to protect the network from denial of sleep attacks. Though, the resources constraint motivates the use of simpler solutions to the same security challenges. In this paper, we survey different types of denial of sleep attacks and we propose a cross layer energy efficient security mechanism to protect the network from these attacks. The cross layer interaction between network Mac and physical layers is mainly exploited to identify the intruders nodes and prevent sensor nodes from energy exhaust attacks. Simulation results indicate that our proposal is energy efficient and can significantly reduce the effect of denial of sleep attacks. Keywords: Wireless sensor networks, Cross layer security, denial of sleep attacks I. INTRODUCTION Securing wireless sensor networks (WSNs) adds more challenges to the research. This is because WSN properties make it harder to be secured than other types of networks. In WSNs, applying a high security level imposes more resource and decreases the energy efficiency of network. Sensor networks are vulnerable to several malicious attacks. Since sensor batteries are severely limited, Denial of sleep attacks (DS attack) is recognized as one of the most serious threats. The DS attack is a specific type of denial-of-service (DoS) attack that targets a battery powered device’s power supply in an effort to exhaust this constrained resource and reduce the network life time. Indeed, this attack tries to break in the device’s power management system to reduce the opportunities to transition into lower power states. Since Mac layer is responsible for managing the radio transceiver, defensive strategies implemented at this layer are the most effective in protecting radio usage. S-MAC protocol represents the baseline energy-efficient sensor MAC protocol designed to extend WSN network lifetime. In this medium access control protocol, sensor node periodically goes to the fixed listen/sleep cycle. A time frame in S-MAC is divided into two parts: one for a listening session and the other for a sleeping session. Only for a listen period, sensor nodes are able to communicate with other nodes and send some control packets such as SYNC, RTS (Request to Send), CTS (Clear to Send) and ACK (Acknowledgement). Using a SYNC packet exchange, all neighboring nodes can synchronize together. Radios in networks which use this protocol will be asleep at 90% of the time, thereby producing an almost tenfold improvement in node life. A denial of sleep attacker can manipulate Mac protocol and cause nodes to expend additional energy. For example, an attacking node in a SMAC-based network could repeatedly send request- to-send messages (RTS) and force the node listed in the RTS destination field to respond with a clear-to-send (CTS) message and remain awake waiting for the follow-on message. To provide a defense against this attack, most of existing researches propose authentication and encryption solutions or implement a complex and energy inefficient mechanisms. However, WSNs require simpler solutions to the same security challenges due to limited processing capability, memory storage, and energy capacity. The purpose of this article is to discuss different types of DS attack and propose a defense strategy to protect the network from them. Our basic idea is the use of the cross layer interaction concept to prevent sensor nodes from energy exhaust attacks. In our proposal, the MAC layer uses the cross layer information (one hop routing table) from network layer in order to identify attackers. Then all received RTS packets are rejected if the sender does not belong to the routing path of receiver node. II. RELATED WORKS In [1] Joseph Polastre, Jason Hill, David Culler et al presents To achieve low power operation, B-MAC employs an adaptive preamble sampling scheme to reduce duty cycle and minimize idle listening. B-MAC supports on-the-fly reconfiguration and provides bidirectional interfaces for system services to optimize performance, whether it be for throughput, latency, or power conservation. We build an analytical model of a class of sensor network applications. We use the model to show the effect of changing B-MAC’s parameters and predict the behavior of sensor network applications. By comparing B-MAC to conventional 802.11- inspired protocols, specifically S-MAC, we develop an experimental characterization of B-MAC over a wide range of network conditions. We show that B-MAC’s flexibility results in better packet delivery rates, throughput, latency, and energy consumption than S-MAC. In [2] Tijs van Dam, Koen Langendoen et al presents A contention-based Medium Access Control protocol for wireless
  • 2. Integrated Intelligent Research (IIR) International Journal of Business Intelligents Volume: 05 Issue: 01 June 2016 Page No.8-11 ISSN: 2278-2400 9 sensor networks. Applications for these networks have some characteristics (low message rate, insensitivity to latency)that can be exploited to reduce energy consumption by introducing an active/sleep duty cycle. To handle load variations in time and location T-MAC introduces an adaptive duty cycle in a novel way: by dynamically ending the active part of it. This reduces the amount of energy wasted on idle listening, in which nodes wait for potentially incoming messages, while still maintaining a reasonable throughput. We discuss the design of T-MAC, and provide a head-to head comparison with classic CSMA (no duty cycle) and S-MAC (fixed duty cycle)thro ugh extensive simulations. Under homogeneous load, T-MAC and S-MAC achieve similar reductions in energy consumption (up to 98%) compared to CSMA. In [3] Wei Ye, John Heidemann, Deborah Estrin et al presents Wireless sensor networks use battery-operated computing and sensing devices. A network of these devi43ces will collaborate for a common application such as environmental monitoring. We expect sensor networks to be deployed in an ad hoc fashion, with individual nodes remaining largely inactive for long periods of time, but then becoming suddenly active when something is detected. These characteristics of sensor networks and applications motivate a MAC that is different from traditional wireless MACs such as IEEE 802.11 in almost every way: energy conservation and self-configuration are primary goals, while per-node fairness and latency are less important. S- MAC uses three novel techniques to reduce energy consumption and support self-configuration. In [4] Pei Huang, Li Xiao, Soroor Soltani, Soroor Soltani et al presents Wireless Sensor Networks (WSNs) have become a leading solution in many important applications such as intrusion detection, target tracking, industrial automation, smart building and so on. Typically, a WSN consists of a large number of small, low-cost sensor nodes that are distributed in the target area for collecting data of interest. For a WSN to provide high throughput in an energy-efficient way, designing an efficient Medium Access Control (MAC) protocol is of paramount importance because the MAC layer coordinates nodes’ access to the shared wireless medium. To show the evolution of WSN MAC protocols, this article surveys the latest progresses in WSN MAC protocol designs over the period 2002-2011. In the early development stages, designers were mostly concerned with energy efficiency because sensor nodes are usually limited in power supply In [5] Abdelmalik Bachir, Mischa Dohler, and Kin K. Leung et al presents The wireless medium being inherently broadcast in nature and hence prone to interferences requires highly optimized medium access control (MAC) protocols. This holds particularly true for wireless sensor networks (WSNs) consisting of a large amount of miniaturized battery-powered wireless networked sensors required to operate for years with no human intervention. There has hence been a growing interest on understanding and optimizing WSN MAC protocols in recent years, where the limited and constrained resources have driven research towards primarily reducing energy consumption of MAC functionalities III. SURVEY ON DENIAL OF SLEEP ATTACKS Based on the attack strategy, we can classify denial of sleep attacks in six categories: sleep deprivation attack, barrage attack, synchronization attack, replay attack, broadcast attack and collision attack. Sleep Deprivation Attack The Sleep deprivation attack is presented where target of the intruder is to maximize the power consumption of sensor nodes, so that their lifetime is minimized. By using lawful interactions, attacker node can keep the victim node out of its power conserving sleep mode. Thus, this attack can be used to dramatically reduce the lifetime of the victim. Further, this attack is difficult to detect given that it is carried out solely through the use of seemingly innocent interactions. Barrage Attack Barrage attack [3] causes its victims to spend more energy by bombarding them with legitimate requests. However, the purpose of these requests is to waste the victim’s limited power supply by causing it to stay out of its sleep mode and perform energy intensive operations. In both the sleep deprivation attack and the barrage attack the victim will never enter its low power sleep mode. The difference between the two attacks is that the victim of a barrage attack will be actively performing work, whereas the victim of a sleep deprivation attack will, for the most part, remain idle. Synchronization Attack The goal of this attack [4] is to cause relative time synchronization problems at the MAC layer. The synchronization attack is simple but hard to detect as it stays within the confines of the protocol. In listen-sleep MAC protocols, each node maintains a listen-sleep schedule, and exchanges it periodically with neighbored node to synchronize their clock drift and form a virtual cluster. That allows them to
  • 3. Integrated Intelligent Research (IIR) International Journal of Business Intelligents Volume: 05 Issue: 01 June 2016 Page No.8-11 ISSN: 2278-2400 10 listen and go to sleep at the same time. Updating schedule is accomplished by sending a SYNC packet. The SYNC packet is very short, and includes the address of the sender and the time of its next sleep. When a node receives a SYNC packet from another node on its same virtual cluster, it recalculates its next sleep time to maintain synchronization. Replay Attack A replay attack is a breach of security in which information is stored without authorization and then retransmitted to trick the receiver into energy exhaust operations. In an unintelligent replay attack, recorded traffic is replayed into the network, causing nodes to waste energy receiving and processing these extra packets. If nodes in the network do not implement an anti-replay mechanism, this attack causes the replayed traffic to be forwarded through the network, consuming power at each node on the path to the destination. Undetected replay has the added benefit (to the attacker) of causing the network to resend data that could subvert the network’s purpose. For example, replaying traffic in a military sensor network deployed to sense enemy movement could cause combat units to be misdirected. Low Power Listening (Lpl) Based Wsn Mac Protocol In the Low Power Listening (LPL) based WSN MAC protocol, such as B-MAC the receiver wakes up periodically to sense the preamble from the sender and then to receive and process the data. When the sender needs to send data, it sends a long preamble to cover the sleep period to ensure the receiver waking up and sensing. The LPL based MAC protocol is an asynchronous protocol, which decouples the sender and receiver with time synchronization. This long preamble design of LPL based protocol consumes the major energy of both sender and receiver. Ri-Mac Protocol RI-MAC protocol is one of the receiver-initiated schemes to minimize the channel occupancy time of a pair of a sender and receiver which allows the sender to send data to the receiver as soon as it senses the beacon. However, current layer-2 protocol designs are insufficient to protect a WSN from Denial-of-Sleep attack. The energy conservation is one of the major goals of WSN design, whereas the security scheme always consumes more energy of system. There is no well decision rule to compromise the requirements between energy conservation and security scheme Denial of service: The Denial-of-Sleep is one of the power exhausting attacks of WSNs. This attack is a special type of Denial-of-Service (DoS) attack, which tries to keep the sensor nodes awake to consume more energy of the constrained power supply. An anti-node can send fake data packets to sensor node of unprotected WSNs to initiate unnecessary transmissions repeatedly. It causes the jamming of a node or set of nodes. The jamming of a network can come in two forms: constant jamming, and intermittent jamming. Constant jamming involves the complete jamming of the entire network. No messages are able to be sent or received. If the jamming is only intermittent, then nodes are able to exchange messages periodically, but not consistently. IV. PROPOSED DEFENDING STRATEGY More complexity to link layer protocols and are generally energy inefficient. Indeed it is not suitable to use energy inefficient security solutions to prevent sensors networks from energy exhaust attacks. Therefore we propose a simple and energy efficient security mechanism to preserve the network from different types of denial of sleep attacks. The new security mechanism is based on cross layer architecture that exploits interaction and collaboration of three adjacent layers in the OSI model i.e. network, Mac and physical layers. The main goal of our security mechanism is to detect attacker nodes when they attempt to accomplish denial of sleep attacks and reject any packets sent from them. By using the routing information at the MAC layer, each sensor node knows previously the source of packets that will be received. Thus, any node trying to communicate (exchange controls or data packets) with the sensor nodes is immediately detected as an attacker if it is not included in the routing path. Proposed process The attacker node is malicious and it is hard to detect it. Therefore it has knowledge of the Mac protocol and obeys Mac- layer rules of collision, fragmentation, and communication schedules. The attacker node can broadcast a long message to all nodes in its radio range. Since in SMAC broadcast message there is no RTS packets that precede data message, the receiver node can't authenticate previously the followed broadcast message. Therefore, the authentication and encryption solution proposed in can't prevent this kind of attacks since targeted node must receive broadcast message before it can be decrypted, which affects its sleep period and then drains the energy reserve. The solution pro-posed in mitigates the broadcast message; however it radically proposes a new Mac protocol. In our proposed mechanism, targeted node receives only the first data fragment and rejects remaining fragment (by entering in the sleep mode) of the broadcast message. Since the first fragment of the broadcast message contains the identity of sender, the proposed security mechanism can detect the intruder node and rejects then the followed fragment of broadcast message. Therefore, the effect of broadcast attack is significantly reduced as targeted node receives one fragment and does not prolong its wake up state to receive remaining fragments. V. CONCLUSION To secure network nodes from denial of sleep attacks, we proposed a cross layer energy efficient security mechanism where the cross layer interaction is heavily exploited. Our approach reuses mainly the already available data generated by network, Mac and physical layers to provide security scheme for network node. We don’t claim that the proposed solution can prevent all types of denial of sleep attacks; though our proposal mitigates most of them. Simulation results demonstrate the performance provided by our security mechanism in terms of energy saving and network lifetime.
  • 4. Integrated Intelligent Research (IIR) International Journal of Business Intelligents Volume: 05 Issue: 01 June 2016 Page No.8-11 ISSN: 2278-2400 11 REFERENCE [1] F. Stajano, R. Anderson, “The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks,” In ICISC, Springer-Verlag, 2000. [2] Ye. Wei, J. Heidemann, and D. Estrin, “An Energy- Efficient MAC Protocol for Wireless Sensor Networks,” IEEE INFOCOM, New York, Vol. 2, pp. 1567-1576, June 2002. [3] M. Pirretti, S. Zhu, N. Vijaykrishnan, P. Mcdaniel, and M. Kandemir, “The Sleep Deprivation Attack in Sensor Networks: Analysis and Methods of Defense,” International Journal of Distributed Sensor Networks, 2: 267– 287, 2006. [4] L. Xiaoming, M. Spear, K. Levitt, N.S. Matloff, and S.F. Wu, “A Synchronization Attack and Defense in Energy- Efficient Listen-Sleep Slotted MAC Protocols,” SECURWARE '08. Second International Conference on Emerging Security Information, Systems and Technologies, pp. 403-411, 2008. [5] M. Brownfield, Y. Gupta, and N. Davis, ”Wireless sensor network denial of sleep attack,” In Proc. 6th Annu. IEEE SMC Inf. Assurance Workshop, pp. 356–364. 2005. [6] Y.l. Law, “Link-layer Jamming Attacks on SMAC,” Technical Paper, Univ. of Twente, NL, 2005. [7] M. Stahlberg, “Radio Jamming attacks against two popular mobile networks,” In Helsinki University of Tech. Seminar on Network Security, 2000. [8] 3Com IEEE802.11b Wireless LANs Technical Paper.13p., referred 10.10.2000. [9] C.C. Li, H.Q. Pei, and L. P. Ning, Qingquan, “An Effective Scheme for Defending Denial-of-Sleep Attack in Wireless Sensor Networks,” Fifth International Conference on Information Assurance and Security. pp. 446- 449. 2009. [10] D.R. Raymond, R.C. Marchany, M.I. Brownfield, and S.F. Midkiff,, “Effects of Denial-of-Sleep Attacks on Wireless Sensor Network MAC Protocols,” IEEE transactions on vehicular technology, VOL. 58, No. 1, pp. 367-380, January 2009.