SlideShare a Scribd company logo
1 of 5
Download to read offline
ISSN 2350-1022
International Journal of Recent Research in Mathematics Computer Science and Information Technology
Vol. 2, Issue 2, pp: (135-139), Month: October 2015 – March 2016, Available at: www.paperpublications.org
Page | 135
Paper Publications
An Energy Efficient Scheme against Power
Exhausting Attacks in Wireless Sensor
Networks
1
J.Joel Jino Moses, 2
V.Bibin Chirstopher
1
P.G student,2
Assistant Professor, Department of Computer Science Ponjesly College of Engineering, Nagercoil
Abstract: A wireless sensor network (WSN) is an technology playing a vital role nowdays. One of the major
challenges wireless sensor networks face today is security. Security and energy efficiency are critical concerns in
wireless sensor network (WSN) design. The power of wireless sensor networks lies in the ability to deploy large
numbers of tiny nodes that assemble and configure themselves. The denial of service attack,which tries to keep the
sensor nodes awake to consume more energy of the constrained power supply.An anti-node can send fake data
packets to sensor node of unprotected wireless sensor network to initiate unnecessary transmission repeatedly.This
consumes more energy and reduces lifetime of sensor nodes.Using cross layer design the energy consumption is
reduced. This paper aims with power exhausting attacks and energy consumption on wireless sensor networks.
Keywords: Wireless sensor networks, security, power exhausting, energy efficiency, cross layer design.
1. INTRODUCTION
The emerging field of wireless sensor networks combines sensing, computation, and communication into a single tiny
device. Sensor networks are primarily designed for real-time collection and analysis of low level data in hostile
environments. The WSN is built of nodes from a few to several hundreds or even thousands, where each node is
connected to one (or sometimes several) sensors.The denial of service attack,which tries to keep the sensor nodes awake
to consume more energy of the constrained power supply.An anti-node can send fake data packets to sensor node of
unprotected wireless sensor network to initiate unnecessary transmission repeatedly.This consumes more energy and
reduces lifetime of sensor nodes.Using cross layer design the energy consumption is reduced and also the lifetime is
increased.
2. ATTACKS IN WIRELESS SENSOR NETWORKS
Attacks against wireless sensor networks could be broadly considered from two different levels of views.
The attack against the security mechanisms.
Against the basic mechanisms.
2.1 Denial of service:
The Denial-of-Sleep is one of the power exhausting attacks of WSNs. This attack is a special type of Denial-of-Service
(DoS) attack, which tries to keep the sensor nodes awake to consume more energy of the constrained power supply. An
anti-node can send fake data packets to sensor node of unprotected WSNs to initiate unnecessary transmissions
repeatedly. It causes the jamming of a node or set of nodes. The jamming of a network can come in two forms: constant
jamming, and intermittent jamming. Constant jamming involves the complete jamming of the entire network. No
messages are able to be sent or received. If the jamming is only intermittent, then nodes are able to exchange messages
periodically, but not consistently.
ISSN 2350-1022
International Journal of Recent Research in Mathematics Computer Science and Information Technology
Vol. 2, Issue 2, pp: (135-139), Month: October 2015 – March 2016, Available at: www.paperpublications.org
Page | 136
Paper Publications
3. POWER EXHAUSTING ATTACKS
The denial of sleep attack is one of the power exhausting attacks in wireless sensor network[1][3],[7][9].This attack is a
special type of denial of service attack,which tries to keep the sensor nodes awake to consume more energy of the
constrained power supply.An anti-node can send fake data packets to sensor node of unprotected wireless sensor network
to initiate unnecessary transmission repeatedly.
Without security mechanism,anti node can broadcast a fake preamble frequently in the sender initiated schemes.It the
receiver cannot tell the real preamble and the fake one,the receiver will receive and process the data from the anti-
node.Such attack will keep the receiver awake as long as the data transmission sustains,which exhausts the battery of node
rapidly.Moreover,an anti-node can reply a fake preamble ACK to the sender.Thus,the sender will start to send data to the
anti-node but it will never receive the right data ACK.Similarly,the sender may send data repeatedly and exhaust the
battery of node rapidly.In receiver-initiated schemes,an anti-node can broadcast a “fake beacon” to cheat sender to process
and send the data to the anti-node but it will never receive the right data ACK.An anti-node can reply a fake beacon ACK
to the receiver.Thus,the receiver will never receive and process the data from the anti-node.
3.1 EXISTING SYSTEM:
3.1.1 B-MAC:
The B-MAC is an LPL based WSN MAC protocol[4], which decouples the sender and receiver with time
synchronization.The receiver wakes up periodically to sense the preamble from the sender and then to receive and process
the data.When the sender needs to send data,it sends a long preamble to cover the sleep period to ensure the receiver
waking up and sensing.Figure 1 shows the process done in B-MAC protocol.
The B-MAC protocol has no ACKs and the receiver has to listen and to wait for the long preamble sended from the
sender.This long preamble design of LPL based protocol consumes the major energy of both sender and receiver.Existing
method insufficient to protect the WSNs from denial of sleep attacks in MAC layer.
Figure 1: Timeline of B-MAC protocol
3.2 PROPOSED SYSTEM:
3.2.1 X-MAC:
A cross-layer design of secure scheme integrating the MAC protocol is used.Two-Tier Energy-Efficient Secure Scheme
(TE2S) is proposed to protect the WSNs from the existing attacks based on our preliminary frameworks[5][6].This cross-
layer design involves coupling two layers at design time without creating new interface for information sharing at
ISSN 2350-1022
International Journal of Recent Research in Mathematics Computer Science and Information Technology
Vol. 2, Issue 2, pp: (135-139), Month: October 2015 – March 2016, Available at: www.paperpublications.org
Page | 137
Paper Publications
runtime[8].This project proposes a two-tier secure transmission scheme. This scheme uses the hash- chain to generate the
dynamic session key, which can be used for mutual authentication and the symmetric encryption key. The only
computations of dynamic session key are the hash functions SHA-1, which is very simple and fast.By integrating with
MAC protocol, there is no extra packet compared with the existing MAC designs.The two-tier design can check and
interrupt the attacks at different check points. The combination of low complexity security process and multiple check
points design can defense against attacks and send the sensor nodes back to sleep mode as soon as possible.Figure 2
shows the timeline of X-MAC protocol.
Figure 2: Timeline of X-MAC protocol
X-MAC protocol improves LPL based B-MAC protocol by replacing the long preamble with short preambles.The above
fig shows the timeline of X-MAC protocol,which allows the receiver to send ACK back to the sender as soon as it senses
the preamble.This short preamble design reduces the energy consumption of both the sender and receiver.
3.3 TE2S:
The basic goal of the proposed model is to reduce the energy that is exhausted from the node. This can be overcome by
applying clustering method and key generation method to the node. This can be performed by detecting antinode to
transmit the data. To detect the anti-node the node wants to broadcast a hello message to the neighboring node.
The neighboring node response with the correct key that is already provided means the neighboring node with the correct
response form a cluster. If not means that one is mark as an anti-node and detected. And to select the cluster head the node
which has a maximum response it is marked as a cluster head. And then cluster gateway is selected thus the cluster
member and the cluster head is selected. Then the key distribution phase is used to transmit the data at each node. The key
is formed with the help of hash function. If the key is valid means the cluster member turn into a-wake state if not means
it go back to the sleep state. Thus the power exhausting attack is considerably reduced and also energy consumption is
reduced.
3.4 SYSTEM ARCHITECTURE:
The energy efficient architecture for power exhausting attacks is given in the figure 3.The basic goal of the proposed
model is to reduce the energy that is exhausted from the node. This can be overcome by applying clustering method and
key generation method to the node. This can be performed by detecting antinode to transmit the data. To detect the anti-
node the node wants to broadcast a hello message to the neighboring node.
ISSN 2350-1022
International Journal of Recent Research in Mathematics Computer Science and Information Technology
Vol. 2, Issue 2, pp: (135-139), Month: October 2015 – March 2016, Available at: www.paperpublications.org
Page | 138
Paper Publications
Figure 3: Architecture for Energy Efficient Scheme against power exhausting attacks
The neighboring node response with the correct key that is already provided means the neighboring node with the correct
response form a cluster. If not means that one is mark as an anti-node and detected. And to select the cluster head the node
which has a maximum response it is marked as a cluster head.
And then cluster gateway is selected thus the cluster member and the cluster head is selected. Then the key distribution
phase is used to transmit the data at each node. The key is formed with the help of hash function. If the key is valid means
the cluster member turn into a-wake state if not means it go back to the sleep state. Thus the power exhausting attack is
considerably reduced. The source node broadcast the hello message to its neighbor nodes. The distributed key is passed to
all sensor nodes. The nodes which are not able to decrypt the message will be the anti-node.
The nodes are grouped as the clusters. The cluster formation is done by the received hello messages. The node which
receives more acknowledged hello will be the cluster head and remaining are the cluster members. The communication
between two cluster are done by the cluster gateway. Now the key is distributed with in the cluster for data transmission
process. Once the key is distributed the nodes access the data using the decryption process.
4. DESIGN PRINCIPLES OF TE2S
The proposed cross-layer design, Two-Tier Energy-Efficient secure Scheme integrates the MAC protocol and involves
coupling two layers without creating new interface for information sharing at runtime ,which aims to protect the WSNs
from Denial-of-Sleep attack.
4.1 Sender-Initiated Scheme:
Step1: The sender selects random number Rs and computes the secure token (i.e.Token=h(kc|Rs),where h(x) denotes a
one-way hash function with input x and the vertical bar | denotes concatenation of strings.
Step 2: The sender sends its ID (IDs), receiver’s ID (IDr),secure token and random number Rs as the preamble.
Step 3: The receiver verifies the secure token. If the token is not valid, the receiver goes back to sleep mode immediately.
If the token is valid, then receiver selects a random number Rr and computes the session key Ks = h(Kc|Rs|Rr). The
receiver also computes the hash chain h(Ks) and h(h(Ks)).
Step 4: The receiver sends the h(h(Ks)) and random number Rr as the ACK.
Step 5: The sender computes the session key Ks = h(Kc|Rs|Rr) and the hash chain h(Ks) and h(h(Ks)). The sender then
verifies the h(h(Ks)).If the h(h(Ks)) is not valid, the sender will not send the data.
ISSN 2350-1022
International Journal of Recent Research in Mathematics Computer Science and Information Technology
Vol. 2, Issue 2, pp: (135-139), Month: October 2015 – March 2016, Available at: www.paperpublications.org
Page | 139
Paper Publications
4.2 Data Transmission:
Step 1: The sender sends the h(Ks) and EKs(DATA | MACKs(DATA)) to receiver. The EKs(x) denotes encrypts x by
using symmetric algorithm with key Ks. The MACKs(DATA) denotes the message authentication function with key Ks,
where DATA is the input message.
Step 2: The receiver verifies the h(Ks). If the h(Ks) is not valid, the receiver goes back to sleep mode immediately. If the
h(Ks) is valid, the receiver decrypts the data and checks the MAC of data.
Step 3: The receiver sends the data ACK to sender.
5. TOTAL ENERGY CALCULATION
The total energy calculation is calculated using the formula as given below,
The initial energy is the energy which is at the starting of the process,and final energy is the energy produced at the final
stage.By subtracting the initial and the final energy total energy consumption value will be achieved
6. CONCLUSION
The practical design is to simplify the authenticating process in order to reduce the energy consumption of sensor nodes
and enhance the performance of the MAC protocol in countering the power exhausting attacks. A cross-layer design of
secure scheme integrating the MAC protocol analyses show that the proposed scheme can counter the attack in an
energy-efficient way.The Energy consumption is reduced using the proposed method and also the lifetime of the sensor
nodes are increased.
REFERENCES
[1] M. Brownfield, Y. Gupta, and N. Davis, “Wireless sensor network denial of sleep attack,” in Proc. 6th Annu. IEEE
SMC Inf. Assurance Workshop (IAW), New York, NY, USA, Jun. 2005, pp. 356–364.
[2] M. Buettner, G. V. Yee, E. Anderson, and R. Han, “X-MAC: A short preamble MAC protocol for duty-cycled
wireless sensor networks,” in Proc. 4th Int. Conf. Embedded Netw. Sensor Syst. (SenSys), Boulder, CO, USA, 2006,
pp. 307–320.
[3] R. Falk and H.-J. Hof, “Fighting insomnia: A secure wake-up scheme for wireless sensor networks,” in Proc. 3rd
Int. Conf. Emerg. Security Inf., Syst. Technol. (SECURWARE),
[4] W. Ye, J. Heidemann, and D. Estrin, “An energy-efficient MAC protocol for wireless sensor networks,” in Proc.
21st Annu. Joint Conf. IEEE Comput. Commun. Soc. (INFOCOM), Los Angeles, CA, USA, 2002, vol. 3, pp. 1567–
1576.
[5] C.-T. Hsueh, C.-Y. Wen, and Y.-C. Ouyang, “A secure scheme for power exhausting attacks in wireless sensor
networks,” in Proc. 3rd
Int. Conf. Ubiquitous Future Netw. (ICUFN), Dalian, China, Jun. 2011,pp. 258–263.
[6] C.-T. Hsueh, C.-Y. Wen, and Y.-C. Ouyang, “Two-tier receiver-initiated secure scheme for hierarchical wireless
sensor networks,” in Proc. 12th
Int. Conf. ITS Telecommun. (ITST), Taipei, Taiwan, 2012, pp. 254–258
[7] D. R. Raymond, R. C. Marchany, M. I. Brownfield, and S. F. Midkiff, “Effects of denial-of- sleep attacks on
wireless sensor network MAC protocols,” IEEE Trans. Veh. Technol., vol. 58, no. 1, pp. 367–380, Jan. 2009.
[8] V. Srivastava and M. Motani, “Cross-layer design: A survey and the road ahead,”IEEE Commun. Mag., vol. 43,
no. 12, pp. 112–119, Dec. 2005.
[9] F. Stajano and R. J. Anderson, “The resurrecting duckling: Security issues for ad-hoc wireless networks,” in Proc.
7th Int. Workshop Security Protocols, London, U.K., 1999, pp. 172–194.Athens, Greece, Jun. 2009, pp. 191–196.
Consume energy=initialenergy-finalenergy

More Related Content

What's hot

Protected Data Collection In WSN by Filtering Attackers Influence (Published ...
Protected Data Collection In WSN by Filtering Attackers Influence (Published ...Protected Data Collection In WSN by Filtering Attackers Influence (Published ...
Protected Data Collection In WSN by Filtering Attackers Influence (Published ...
sangasandeep
 
Optimized rationalize security and efficient data gathering in wireless senso...
Optimized rationalize security and efficient data gathering in wireless senso...Optimized rationalize security and efficient data gathering in wireless senso...
Optimized rationalize security and efficient data gathering in wireless senso...
ijmnct
 
AN ENHANCED DETECTION AND ENERGYEFFICIENT EN-ROUTE FILTERING SCHEME IN WIRELE...
AN ENHANCED DETECTION AND ENERGYEFFICIENT EN-ROUTE FILTERING SCHEME IN WIRELE...AN ENHANCED DETECTION AND ENERGYEFFICIENT EN-ROUTE FILTERING SCHEME IN WIRELE...
AN ENHANCED DETECTION AND ENERGYEFFICIENT EN-ROUTE FILTERING SCHEME IN WIRELE...
ieijjournal
 
Reliability in wsn for security
Reliability in wsn for securityReliability in wsn for security
Reliability in wsn for security
Swamy Vivekananda
 

What's hot (18)

Ijetr012022
Ijetr012022Ijetr012022
Ijetr012022
 
Energy Efficient Data Transmission through Relay Nodes in Wireless Sensor Net...
Energy Efficient Data Transmission through Relay Nodes in Wireless Sensor Net...Energy Efficient Data Transmission through Relay Nodes in Wireless Sensor Net...
Energy Efficient Data Transmission through Relay Nodes in Wireless Sensor Net...
 
Ijcnc050207
Ijcnc050207Ijcnc050207
Ijcnc050207
 
Ba24345348
Ba24345348Ba24345348
Ba24345348
 
Ijnsa050209
Ijnsa050209Ijnsa050209
Ijnsa050209
 
Secure and Efficient Transmission Using Jammer and Relay Networks
Secure and Efficient Transmission Using Jammer and Relay NetworksSecure and Efficient Transmission Using Jammer and Relay Networks
Secure and Efficient Transmission Using Jammer and Relay Networks
 
Energy saving Wireless Sensor Networks using Kerberos
Energy saving Wireless Sensor Networks using KerberosEnergy saving Wireless Sensor Networks using Kerberos
Energy saving Wireless Sensor Networks using Kerberos
 
Protected Data Collection In WSN by Filtering Attackers Influence (Published ...
Protected Data Collection In WSN by Filtering Attackers Influence (Published ...Protected Data Collection In WSN by Filtering Attackers Influence (Published ...
Protected Data Collection In WSN by Filtering Attackers Influence (Published ...
 
Wireless sensor network lifetime constraints
Wireless sensor network lifetime constraintsWireless sensor network lifetime constraints
Wireless sensor network lifetime constraints
 
A0320105
A0320105A0320105
A0320105
 
Threats in wireless sensor networks
Threats in wireless sensor networksThreats in wireless sensor networks
Threats in wireless sensor networks
 
Energy Efficient Routing Strategies for Large Scale Wireless Sensor in Hetero...
Energy Efficient Routing Strategies for Large Scale Wireless Sensor in Hetero...Energy Efficient Routing Strategies for Large Scale Wireless Sensor in Hetero...
Energy Efficient Routing Strategies for Large Scale Wireless Sensor in Hetero...
 
AN EFFICIENT SLEEP SCHEDULING STRATEGY FOR WIRELESS SENSOR NETWORK
AN EFFICIENT SLEEP SCHEDULING STRATEGY FOR WIRELESS SENSOR NETWORKAN EFFICIENT SLEEP SCHEDULING STRATEGY FOR WIRELESS SENSOR NETWORK
AN EFFICIENT SLEEP SCHEDULING STRATEGY FOR WIRELESS SENSOR NETWORK
 
Optimized rationalize security and efficient data gathering in wireless senso...
Optimized rationalize security and efficient data gathering in wireless senso...Optimized rationalize security and efficient data gathering in wireless senso...
Optimized rationalize security and efficient data gathering in wireless senso...
 
AN ENHANCED DETECTION AND ENERGYEFFICIENT EN-ROUTE FILTERING SCHEME IN WIRELE...
AN ENHANCED DETECTION AND ENERGYEFFICIENT EN-ROUTE FILTERING SCHEME IN WIRELE...AN ENHANCED DETECTION AND ENERGYEFFICIENT EN-ROUTE FILTERING SCHEME IN WIRELE...
AN ENHANCED DETECTION AND ENERGYEFFICIENT EN-ROUTE FILTERING SCHEME IN WIRELE...
 
Source location privacy in wireless sensor networks using data mules.
Source location privacy in wireless sensor networks using data mules.Source location privacy in wireless sensor networks using data mules.
Source location privacy in wireless sensor networks using data mules.
 
Proposed mac protocol for reduce energy consumption over wsn network
Proposed mac protocol for reduce energy consumption over wsn networkProposed mac protocol for reduce energy consumption over wsn network
Proposed mac protocol for reduce energy consumption over wsn network
 
Reliability in wsn for security
Reliability in wsn for securityReliability in wsn for security
Reliability in wsn for security
 

Viewers also liked

Control Cloud Data Access Using Attribute-Based Encryption
Control Cloud Data Access Using Attribute-Based EncryptionControl Cloud Data Access Using Attribute-Based Encryption
Control Cloud Data Access Using Attribute-Based Encryption
paperpublications3
 
Нижегородский инновационный бизнес-инкубатор
Нижегородский инновационный бизнес-инкубаторНижегородский инновационный бизнес-инкубатор
Нижегородский инновационный бизнес-инкубатор
aqua-municipal
 
О мерах государственной поддержки малого предпринимательства
О мерах государственной поддержки малого предпринимательства О мерах государственной поддержки малого предпринимательства
О мерах государственной поддержки малого предпринимательства
aqua-municipal
 
Present penulisan artikal penyelidikan tindakan
Present  penulisan artikal penyelidikan tindakanPresent  penulisan artikal penyelidikan tindakan
Present penulisan artikal penyelidikan tindakan
Nik Man
 
O latifúndio e a hegemonia do capital no contexto da história agrária da regi...
O latifúndio e a hegemonia do capital no contexto da história agrária da regi...O latifúndio e a hegemonia do capital no contexto da história agrária da regi...
O latifúndio e a hegemonia do capital no contexto da história agrária da regi...
Silvânio Barcelos
 
Il bilancio economico 2011
Il bilancio economico 2011Il bilancio economico 2011
Il bilancio economico 2011
ANPAS
 
A lei de deus (revisitando pietro ubaldi 2)
A lei de deus (revisitando pietro ubaldi   2)A lei de deus (revisitando pietro ubaldi   2)
A lei de deus (revisitando pietro ubaldi 2)
Silvânio Barcelos
 

Viewers also liked (20)

Understanding interaction context for development interactive models
Understanding interaction context for development interactive modelsUnderstanding interaction context for development interactive models
Understanding interaction context for development interactive models
 
Administration of DHCP Addressing
Administration of DHCP AddressingAdministration of DHCP Addressing
Administration of DHCP Addressing
 
Control Cloud Data Access Using Attribute-Based Encryption
Control Cloud Data Access Using Attribute-Based EncryptionControl Cloud Data Access Using Attribute-Based Encryption
Control Cloud Data Access Using Attribute-Based Encryption
 
Wireless Charging for Multi-Node Using Wireless Charging Vehicle
Wireless Charging for Multi-Node Using Wireless Charging VehicleWireless Charging for Multi-Node Using Wireless Charging Vehicle
Wireless Charging for Multi-Node Using Wireless Charging Vehicle
 
Presentation
PresentationPresentation
Presentation
 
12 03-23 корнилюк-іноземні банки в україні
12 03-23 корнилюк-іноземні банки в україні12 03-23 корнилюк-іноземні банки в україні
12 03-23 корнилюк-іноземні банки в україні
 
El cant de la Sibil·la: de Grècia a la prohibició i de la prohibició a la dec...
El cant de la Sibil·la: de Grècia a la prohibició i de la prohibició a la dec...El cant de la Sibil·la: de Grècia a la prohibició i de la prohibició a la dec...
El cant de la Sibil·la: de Grècia a la prohibició i de la prohibició a la dec...
 
Нижегородский инновационный бизнес-инкубатор
Нижегородский инновационный бизнес-инкубаторНижегородский инновационный бизнес-инкубатор
Нижегородский инновационный бизнес-инкубатор
 
Ekosocialno kmetijstvo vrabl_macek95
Ekosocialno kmetijstvo vrabl_macek95Ekosocialno kmetijstvo vrabl_macek95
Ekosocialno kmetijstvo vrabl_macek95
 
О мерах государственной поддержки малого предпринимательства
О мерах государственной поддержки малого предпринимательства О мерах государственной поддержки малого предпринимательства
О мерах государственной поддержки малого предпринимательства
 
Majski h pozenel_07
Majski h pozenel_07Majski h pozenel_07
Majski h pozenel_07
 
Fd osler 95
Fd osler 95Fd osler 95
Fd osler 95
 
Fd seljak 07
Fd seljak 07Fd seljak 07
Fd seljak 07
 
Balance De Fosforo 2009
Balance De Fosforo 2009Balance De Fosforo 2009
Balance De Fosforo 2009
 
Fitosanitarno področje v sloveniji 2010
Fitosanitarno področje v sloveniji 2010Fitosanitarno področje v sloveniji 2010
Fitosanitarno področje v sloveniji 2010
 
スーパーウルトララピッドプロトタイピング
スーパーウルトララピッドプロトタイピングスーパーウルトララピッドプロトタイピング
スーパーウルトララピッドプロトタイピング
 
Present penulisan artikal penyelidikan tindakan
Present  penulisan artikal penyelidikan tindakanPresent  penulisan artikal penyelidikan tindakan
Present penulisan artikal penyelidikan tindakan
 
O latifúndio e a hegemonia do capital no contexto da história agrária da regi...
O latifúndio e a hegemonia do capital no contexto da história agrária da regi...O latifúndio e a hegemonia do capital no contexto da história agrária da regi...
O latifúndio e a hegemonia do capital no contexto da história agrária da regi...
 
Il bilancio economico 2011
Il bilancio economico 2011Il bilancio economico 2011
Il bilancio economico 2011
 
A lei de deus (revisitando pietro ubaldi 2)
A lei de deus (revisitando pietro ubaldi   2)A lei de deus (revisitando pietro ubaldi   2)
A lei de deus (revisitando pietro ubaldi 2)
 

Similar to An Energy Efficient Scheme against Power Exhausting Attacks in Wireless Sensor Networks

Energy Conservation in Wireless Sensor Networks Using Cluster-Based Approach
Energy Conservation in Wireless Sensor Networks Using Cluster-Based ApproachEnergy Conservation in Wireless Sensor Networks Using Cluster-Based Approach
Energy Conservation in Wireless Sensor Networks Using Cluster-Based Approach
IJRES Journal
 
Survey of Wireless Sensor Network Application
Survey of Wireless Sensor Network ApplicationSurvey of Wireless Sensor Network Application
Survey of Wireless Sensor Network Application
ijsrd.com
 
An Enhanced Detection and Energy-Efficient En-Route Filtering Scheme in Wirel...
An Enhanced Detection and Energy-Efficient En-Route Filtering Scheme in Wirel...An Enhanced Detection and Energy-Efficient En-Route Filtering Scheme in Wirel...
An Enhanced Detection and Energy-Efficient En-Route Filtering Scheme in Wirel...
ieijjournal
 
EFFECT OF HASH FUNCTION ON PERFORMANCE OF LOW POWER WAKE UP RECEIVER FOR WIRE...
EFFECT OF HASH FUNCTION ON PERFORMANCE OF LOW POWER WAKE UP RECEIVER FOR WIRE...EFFECT OF HASH FUNCTION ON PERFORMANCE OF LOW POWER WAKE UP RECEIVER FOR WIRE...
EFFECT OF HASH FUNCTION ON PERFORMANCE OF LOW POWER WAKE UP RECEIVER FOR WIRE...
IJNSA Journal
 

Similar to An Energy Efficient Scheme against Power Exhausting Attacks in Wireless Sensor Networks (20)

Secure And Efficient Defense Strategy Against Energy Exhausting Attacks In Wsn
Secure And Efficient Defense Strategy Against Energy Exhausting Attacks In WsnSecure And Efficient Defense Strategy Against Energy Exhausting Attacks In Wsn
Secure And Efficient Defense Strategy Against Energy Exhausting Attacks In Wsn
 
IRJET-A Reliable Strategy Against Power Dissipating Attacks in Hierarchical W...
IRJET-A Reliable Strategy Against Power Dissipating Attacks in Hierarchical W...IRJET-A Reliable Strategy Against Power Dissipating Attacks in Hierarchical W...
IRJET-A Reliable Strategy Against Power Dissipating Attacks in Hierarchical W...
 
Spread Spectrum Based Energy Efficient Wireless Sensor Networks
Spread Spectrum Based Energy Efficient Wireless Sensor NetworksSpread Spectrum Based Energy Efficient Wireless Sensor Networks
Spread Spectrum Based Energy Efficient Wireless Sensor Networks
 
Secured node detection technique based on artificial neural network for wirel...
Secured node detection technique based on artificial neural network for wirel...Secured node detection technique based on artificial neural network for wirel...
Secured node detection technique based on artificial neural network for wirel...
 
Survey and Analysis of Medium Access Control Protocols for Wireless Sensor Ne...
Survey and Analysis of Medium Access Control Protocols for Wireless Sensor Ne...Survey and Analysis of Medium Access Control Protocols for Wireless Sensor Ne...
Survey and Analysis of Medium Access Control Protocols for Wireless Sensor Ne...
 
Energy Conservation in Wireless Sensor Networks Using Cluster-Based Approach
Energy Conservation in Wireless Sensor Networks Using Cluster-Based ApproachEnergy Conservation in Wireless Sensor Networks Using Cluster-Based Approach
Energy Conservation in Wireless Sensor Networks Using Cluster-Based Approach
 
Energy Conservation in Wireless Sensor Networks: A Review
Energy Conservation in Wireless Sensor Networks: A ReviewEnergy Conservation in Wireless Sensor Networks: A Review
Energy Conservation in Wireless Sensor Networks: A Review
 
ALL ABOUT DATA AGGREGATION IN WIRELESS SENSOR NETWORKS
ALL ABOUT DATA AGGREGATION IN WIRELESS SENSOR NETWORKSALL ABOUT DATA AGGREGATION IN WIRELESS SENSOR NETWORKS
ALL ABOUT DATA AGGREGATION IN WIRELESS SENSOR NETWORKS
 
Survey of Wireless Sensor Network Application
Survey of Wireless Sensor Network ApplicationSurvey of Wireless Sensor Network Application
Survey of Wireless Sensor Network Application
 
An Enhanced Detection and Energy-Efficient En-Route Filtering Scheme in Wirel...
An Enhanced Detection and Energy-Efficient En-Route Filtering Scheme in Wirel...An Enhanced Detection and Energy-Efficient En-Route Filtering Scheme in Wirel...
An Enhanced Detection and Energy-Efficient En-Route Filtering Scheme in Wirel...
 
FTTCP: Fault Tolerant Two-level Clustering Protocol for WSN
FTTCP: Fault Tolerant Two-level Clustering Protocol for WSNFTTCP: Fault Tolerant Two-level Clustering Protocol for WSN
FTTCP: Fault Tolerant Two-level Clustering Protocol for WSN
 
Energy Efficient Data Aggregation in Wireless Sensor Networks: A Survey
Energy Efficient Data Aggregation in Wireless Sensor Networks: A SurveyEnergy Efficient Data Aggregation in Wireless Sensor Networks: A Survey
Energy Efficient Data Aggregation in Wireless Sensor Networks: A Survey
 
EFFECT OF HASH FUNCTION ON PERFORMANCE OF LOW POWER WAKE UP RECEIVER FOR WIRE...
EFFECT OF HASH FUNCTION ON PERFORMANCE OF LOW POWER WAKE UP RECEIVER FOR WIRE...EFFECT OF HASH FUNCTION ON PERFORMANCE OF LOW POWER WAKE UP RECEIVER FOR WIRE...
EFFECT OF HASH FUNCTION ON PERFORMANCE OF LOW POWER WAKE UP RECEIVER FOR WIRE...
 
Energy efficient mac protocols for wireless sensor network
Energy efficient mac protocols for wireless sensor networkEnergy efficient mac protocols for wireless sensor network
Energy efficient mac protocols for wireless sensor network
 
H0515259
H0515259H0515259
H0515259
 
A secure routing process to simultaneously defend against false report and wo...
A secure routing process to simultaneously defend against false report and wo...A secure routing process to simultaneously defend against false report and wo...
A secure routing process to simultaneously defend against false report and wo...
 
CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...
CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...
CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...
 
Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...
Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...
Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...
 
Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...
Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...
Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...
 
Vebek
VebekVebek
Vebek
 

Recently uploaded

1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
AldoGarca30
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
MayuraD1
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
ssuser89054b
 
Digital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxDigital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptx
pritamlangde
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
Kamal Acharya
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
HenryBriggs2
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Kandungan 087776558899
 

Recently uploaded (20)

Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna Municipality
 
Moment Distribution Method For Btech Civil
Moment Distribution Method For Btech CivilMoment Distribution Method For Btech Civil
Moment Distribution Method For Btech Civil
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.
 
Digital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxDigital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptx
 
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxA CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
 
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
 
Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
 
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 

An Energy Efficient Scheme against Power Exhausting Attacks in Wireless Sensor Networks

  • 1. ISSN 2350-1022 International Journal of Recent Research in Mathematics Computer Science and Information Technology Vol. 2, Issue 2, pp: (135-139), Month: October 2015 – March 2016, Available at: www.paperpublications.org Page | 135 Paper Publications An Energy Efficient Scheme against Power Exhausting Attacks in Wireless Sensor Networks 1 J.Joel Jino Moses, 2 V.Bibin Chirstopher 1 P.G student,2 Assistant Professor, Department of Computer Science Ponjesly College of Engineering, Nagercoil Abstract: A wireless sensor network (WSN) is an technology playing a vital role nowdays. One of the major challenges wireless sensor networks face today is security. Security and energy efficiency are critical concerns in wireless sensor network (WSN) design. The power of wireless sensor networks lies in the ability to deploy large numbers of tiny nodes that assemble and configure themselves. The denial of service attack,which tries to keep the sensor nodes awake to consume more energy of the constrained power supply.An anti-node can send fake data packets to sensor node of unprotected wireless sensor network to initiate unnecessary transmission repeatedly.This consumes more energy and reduces lifetime of sensor nodes.Using cross layer design the energy consumption is reduced. This paper aims with power exhausting attacks and energy consumption on wireless sensor networks. Keywords: Wireless sensor networks, security, power exhausting, energy efficiency, cross layer design. 1. INTRODUCTION The emerging field of wireless sensor networks combines sensing, computation, and communication into a single tiny device. Sensor networks are primarily designed for real-time collection and analysis of low level data in hostile environments. The WSN is built of nodes from a few to several hundreds or even thousands, where each node is connected to one (or sometimes several) sensors.The denial of service attack,which tries to keep the sensor nodes awake to consume more energy of the constrained power supply.An anti-node can send fake data packets to sensor node of unprotected wireless sensor network to initiate unnecessary transmission repeatedly.This consumes more energy and reduces lifetime of sensor nodes.Using cross layer design the energy consumption is reduced and also the lifetime is increased. 2. ATTACKS IN WIRELESS SENSOR NETWORKS Attacks against wireless sensor networks could be broadly considered from two different levels of views. The attack against the security mechanisms. Against the basic mechanisms. 2.1 Denial of service: The Denial-of-Sleep is one of the power exhausting attacks of WSNs. This attack is a special type of Denial-of-Service (DoS) attack, which tries to keep the sensor nodes awake to consume more energy of the constrained power supply. An anti-node can send fake data packets to sensor node of unprotected WSNs to initiate unnecessary transmissions repeatedly. It causes the jamming of a node or set of nodes. The jamming of a network can come in two forms: constant jamming, and intermittent jamming. Constant jamming involves the complete jamming of the entire network. No messages are able to be sent or received. If the jamming is only intermittent, then nodes are able to exchange messages periodically, but not consistently.
  • 2. ISSN 2350-1022 International Journal of Recent Research in Mathematics Computer Science and Information Technology Vol. 2, Issue 2, pp: (135-139), Month: October 2015 – March 2016, Available at: www.paperpublications.org Page | 136 Paper Publications 3. POWER EXHAUSTING ATTACKS The denial of sleep attack is one of the power exhausting attacks in wireless sensor network[1][3],[7][9].This attack is a special type of denial of service attack,which tries to keep the sensor nodes awake to consume more energy of the constrained power supply.An anti-node can send fake data packets to sensor node of unprotected wireless sensor network to initiate unnecessary transmission repeatedly. Without security mechanism,anti node can broadcast a fake preamble frequently in the sender initiated schemes.It the receiver cannot tell the real preamble and the fake one,the receiver will receive and process the data from the anti- node.Such attack will keep the receiver awake as long as the data transmission sustains,which exhausts the battery of node rapidly.Moreover,an anti-node can reply a fake preamble ACK to the sender.Thus,the sender will start to send data to the anti-node but it will never receive the right data ACK.Similarly,the sender may send data repeatedly and exhaust the battery of node rapidly.In receiver-initiated schemes,an anti-node can broadcast a “fake beacon” to cheat sender to process and send the data to the anti-node but it will never receive the right data ACK.An anti-node can reply a fake beacon ACK to the receiver.Thus,the receiver will never receive and process the data from the anti-node. 3.1 EXISTING SYSTEM: 3.1.1 B-MAC: The B-MAC is an LPL based WSN MAC protocol[4], which decouples the sender and receiver with time synchronization.The receiver wakes up periodically to sense the preamble from the sender and then to receive and process the data.When the sender needs to send data,it sends a long preamble to cover the sleep period to ensure the receiver waking up and sensing.Figure 1 shows the process done in B-MAC protocol. The B-MAC protocol has no ACKs and the receiver has to listen and to wait for the long preamble sended from the sender.This long preamble design of LPL based protocol consumes the major energy of both sender and receiver.Existing method insufficient to protect the WSNs from denial of sleep attacks in MAC layer. Figure 1: Timeline of B-MAC protocol 3.2 PROPOSED SYSTEM: 3.2.1 X-MAC: A cross-layer design of secure scheme integrating the MAC protocol is used.Two-Tier Energy-Efficient Secure Scheme (TE2S) is proposed to protect the WSNs from the existing attacks based on our preliminary frameworks[5][6].This cross- layer design involves coupling two layers at design time without creating new interface for information sharing at
  • 3. ISSN 2350-1022 International Journal of Recent Research in Mathematics Computer Science and Information Technology Vol. 2, Issue 2, pp: (135-139), Month: October 2015 – March 2016, Available at: www.paperpublications.org Page | 137 Paper Publications runtime[8].This project proposes a two-tier secure transmission scheme. This scheme uses the hash- chain to generate the dynamic session key, which can be used for mutual authentication and the symmetric encryption key. The only computations of dynamic session key are the hash functions SHA-1, which is very simple and fast.By integrating with MAC protocol, there is no extra packet compared with the existing MAC designs.The two-tier design can check and interrupt the attacks at different check points. The combination of low complexity security process and multiple check points design can defense against attacks and send the sensor nodes back to sleep mode as soon as possible.Figure 2 shows the timeline of X-MAC protocol. Figure 2: Timeline of X-MAC protocol X-MAC protocol improves LPL based B-MAC protocol by replacing the long preamble with short preambles.The above fig shows the timeline of X-MAC protocol,which allows the receiver to send ACK back to the sender as soon as it senses the preamble.This short preamble design reduces the energy consumption of both the sender and receiver. 3.3 TE2S: The basic goal of the proposed model is to reduce the energy that is exhausted from the node. This can be overcome by applying clustering method and key generation method to the node. This can be performed by detecting antinode to transmit the data. To detect the anti-node the node wants to broadcast a hello message to the neighboring node. The neighboring node response with the correct key that is already provided means the neighboring node with the correct response form a cluster. If not means that one is mark as an anti-node and detected. And to select the cluster head the node which has a maximum response it is marked as a cluster head. And then cluster gateway is selected thus the cluster member and the cluster head is selected. Then the key distribution phase is used to transmit the data at each node. The key is formed with the help of hash function. If the key is valid means the cluster member turn into a-wake state if not means it go back to the sleep state. Thus the power exhausting attack is considerably reduced and also energy consumption is reduced. 3.4 SYSTEM ARCHITECTURE: The energy efficient architecture for power exhausting attacks is given in the figure 3.The basic goal of the proposed model is to reduce the energy that is exhausted from the node. This can be overcome by applying clustering method and key generation method to the node. This can be performed by detecting antinode to transmit the data. To detect the anti- node the node wants to broadcast a hello message to the neighboring node.
  • 4. ISSN 2350-1022 International Journal of Recent Research in Mathematics Computer Science and Information Technology Vol. 2, Issue 2, pp: (135-139), Month: October 2015 – March 2016, Available at: www.paperpublications.org Page | 138 Paper Publications Figure 3: Architecture for Energy Efficient Scheme against power exhausting attacks The neighboring node response with the correct key that is already provided means the neighboring node with the correct response form a cluster. If not means that one is mark as an anti-node and detected. And to select the cluster head the node which has a maximum response it is marked as a cluster head. And then cluster gateway is selected thus the cluster member and the cluster head is selected. Then the key distribution phase is used to transmit the data at each node. The key is formed with the help of hash function. If the key is valid means the cluster member turn into a-wake state if not means it go back to the sleep state. Thus the power exhausting attack is considerably reduced. The source node broadcast the hello message to its neighbor nodes. The distributed key is passed to all sensor nodes. The nodes which are not able to decrypt the message will be the anti-node. The nodes are grouped as the clusters. The cluster formation is done by the received hello messages. The node which receives more acknowledged hello will be the cluster head and remaining are the cluster members. The communication between two cluster are done by the cluster gateway. Now the key is distributed with in the cluster for data transmission process. Once the key is distributed the nodes access the data using the decryption process. 4. DESIGN PRINCIPLES OF TE2S The proposed cross-layer design, Two-Tier Energy-Efficient secure Scheme integrates the MAC protocol and involves coupling two layers without creating new interface for information sharing at runtime ,which aims to protect the WSNs from Denial-of-Sleep attack. 4.1 Sender-Initiated Scheme: Step1: The sender selects random number Rs and computes the secure token (i.e.Token=h(kc|Rs),where h(x) denotes a one-way hash function with input x and the vertical bar | denotes concatenation of strings. Step 2: The sender sends its ID (IDs), receiver’s ID (IDr),secure token and random number Rs as the preamble. Step 3: The receiver verifies the secure token. If the token is not valid, the receiver goes back to sleep mode immediately. If the token is valid, then receiver selects a random number Rr and computes the session key Ks = h(Kc|Rs|Rr). The receiver also computes the hash chain h(Ks) and h(h(Ks)). Step 4: The receiver sends the h(h(Ks)) and random number Rr as the ACK. Step 5: The sender computes the session key Ks = h(Kc|Rs|Rr) and the hash chain h(Ks) and h(h(Ks)). The sender then verifies the h(h(Ks)).If the h(h(Ks)) is not valid, the sender will not send the data.
  • 5. ISSN 2350-1022 International Journal of Recent Research in Mathematics Computer Science and Information Technology Vol. 2, Issue 2, pp: (135-139), Month: October 2015 – March 2016, Available at: www.paperpublications.org Page | 139 Paper Publications 4.2 Data Transmission: Step 1: The sender sends the h(Ks) and EKs(DATA | MACKs(DATA)) to receiver. The EKs(x) denotes encrypts x by using symmetric algorithm with key Ks. The MACKs(DATA) denotes the message authentication function with key Ks, where DATA is the input message. Step 2: The receiver verifies the h(Ks). If the h(Ks) is not valid, the receiver goes back to sleep mode immediately. If the h(Ks) is valid, the receiver decrypts the data and checks the MAC of data. Step 3: The receiver sends the data ACK to sender. 5. TOTAL ENERGY CALCULATION The total energy calculation is calculated using the formula as given below, The initial energy is the energy which is at the starting of the process,and final energy is the energy produced at the final stage.By subtracting the initial and the final energy total energy consumption value will be achieved 6. CONCLUSION The practical design is to simplify the authenticating process in order to reduce the energy consumption of sensor nodes and enhance the performance of the MAC protocol in countering the power exhausting attacks. A cross-layer design of secure scheme integrating the MAC protocol analyses show that the proposed scheme can counter the attack in an energy-efficient way.The Energy consumption is reduced using the proposed method and also the lifetime of the sensor nodes are increased. REFERENCES [1] M. Brownfield, Y. Gupta, and N. Davis, “Wireless sensor network denial of sleep attack,” in Proc. 6th Annu. IEEE SMC Inf. Assurance Workshop (IAW), New York, NY, USA, Jun. 2005, pp. 356–364. [2] M. Buettner, G. V. Yee, E. Anderson, and R. Han, “X-MAC: A short preamble MAC protocol for duty-cycled wireless sensor networks,” in Proc. 4th Int. Conf. Embedded Netw. Sensor Syst. (SenSys), Boulder, CO, USA, 2006, pp. 307–320. [3] R. Falk and H.-J. Hof, “Fighting insomnia: A secure wake-up scheme for wireless sensor networks,” in Proc. 3rd Int. Conf. Emerg. Security Inf., Syst. Technol. (SECURWARE), [4] W. Ye, J. Heidemann, and D. Estrin, “An energy-efficient MAC protocol for wireless sensor networks,” in Proc. 21st Annu. Joint Conf. IEEE Comput. Commun. Soc. (INFOCOM), Los Angeles, CA, USA, 2002, vol. 3, pp. 1567– 1576. [5] C.-T. Hsueh, C.-Y. Wen, and Y.-C. Ouyang, “A secure scheme for power exhausting attacks in wireless sensor networks,” in Proc. 3rd Int. Conf. Ubiquitous Future Netw. (ICUFN), Dalian, China, Jun. 2011,pp. 258–263. [6] C.-T. Hsueh, C.-Y. Wen, and Y.-C. Ouyang, “Two-tier receiver-initiated secure scheme for hierarchical wireless sensor networks,” in Proc. 12th Int. Conf. ITS Telecommun. (ITST), Taipei, Taiwan, 2012, pp. 254–258 [7] D. R. Raymond, R. C. Marchany, M. I. Brownfield, and S. F. Midkiff, “Effects of denial-of- sleep attacks on wireless sensor network MAC protocols,” IEEE Trans. Veh. Technol., vol. 58, no. 1, pp. 367–380, Jan. 2009. [8] V. Srivastava and M. Motani, “Cross-layer design: A survey and the road ahead,”IEEE Commun. Mag., vol. 43, no. 12, pp. 112–119, Dec. 2005. [9] F. Stajano and R. J. Anderson, “The resurrecting duckling: Security issues for ad-hoc wireless networks,” in Proc. 7th Int. Workshop Security Protocols, London, U.K., 1999, pp. 172–194.Athens, Greece, Jun. 2009, pp. 191–196. Consume energy=initialenergy-finalenergy