Skip to main content

A Cross Layer Energy Efficient Security Mechanism for Denial of Sleep Attacks on Wireless Sensor Network

  • Conference paper

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 294))

Abstract

Wireless sensor networks are particularly exposed to several kinds of attacks. Due to resources constrained property in WSN, Denial of sleep attacks is recognized as one of the most serious threats. Attacks of this type exhaust power supply of sensor nodes and reduce the sensor lifetime. Most of existing researches propose authentication and encryption solutions to protect the network from denial of sleep attacks. However, it is more efficient to use simpler solutions to the same security challenges due to limited processing capability, memory storage, and energy capacity. In this paper we propose a cross layer energy-efficient security mechanism to protect the network from these attacks. Simulation reveals that our proposal is energy efficient and able to achieve significant performance in term of preventing network nodes from different denial of sleep attacks.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Stajano, F., Anderson, R.: The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks. In: ICISC. Springer (2000)

    Google Scholar 

  2. Wei, Y., Heidemann, J., Estrin, D.: An Energy- Efficient MAC Protocol for Wireless Sensor Networks. In: IEEE INFOCOM, New York, vol. 2, pp. 1567–1576 (2002)

    Google Scholar 

  3. Pirretti, M., Zhu, S., Vijaykrishnan, N., Mcdaniel, P.: Kandemir. M.: The Sleep Deprivation Attack in Sensor Networks: Analysis and Methods of Defense. International Journal of Distributed Sensor Networks 2, 267–287 (2006)

    Article  Google Scholar 

  4. Xiaoming, L., Spear, M., Levitt, K., Matloff, N.S., Wu, S.F.: A Synchronization Attack and Defense in Energy-Efficient Listen-Sleep Slotted MAC Protocols. In: SECURWARE 2008, Second International Conference on Emerging Security Information, Systems and Technologies, pp. 403–411 (2008)

    Google Scholar 

  5. Brownfield, M., Gupta, Y., Davis, N.: Wireless sensor network denial of sleep attack. In: Proc. 6th Annual IEEE SMC Inf. Assurance Workshop, pp. 356–364 (2005)

    Google Scholar 

  6. Law, Y.l.: Link-layer Jamming Attacks on SMAC. Technical Paper, Univ. of Twente, NL (2005)

    Google Scholar 

  7. Stahlberg, M.: Radio Jamming attacks against two popular mobile networks. In: Seminar on Network Security, Helsinki University of Tech (2000)

    Google Scholar 

  8. 3Com IEEE802.11b Wireless LANs Technical Paper (2000)

    Google Scholar 

  9. Chen, C., Hui, L., Pei, Q., Ning, L., Peng, Q.: An Effective Scheme for Defending Denial-of-Sleep Attack in Wireless Sensor Networks. In: Fifth International Conference on Information Assurance and Security, pp. 446–449 (2009)

    Google Scholar 

  10. Raymond, D.R., Marchany, R.C., Brownfield, M.I., Midkiff, S.F.: Effects of Denial-of-Sleep Attacks on Wireless Sensor Network MAC Protocols. IEEE Transactions on Vehicular Technology 58(1), 367–380 (2009)

    Article  Google Scholar 

  11. Rainer, F., Hans-Joachim, H.: Fighting Insomnia: A Secure Wake-Up Scheme for Wireless Sensor Networks. In: Third International Conference on Emerging Security Information, Systems and Technologies, pp. 191–196 (2009)

    Google Scholar 

  12. Zhao, J., Nygard, K.E.: A Two-Phase Security Algorithm for Hierarchical Sensor Networks. In: The Third International Conference on Future Computational Technologies and Applications, pp. 144–120 (2011)

    Google Scholar 

  13. Gabrielli, A., Mancini, L.V., Setia, S., Jajodia, S.: Securing Topology Maintenance Protocols for Sensor Networks: Attacks and Countermeasures. IEEE Transactions on Dependable and Secure Computing, 450–465 (2011)

    Google Scholar 

  14. Bhuse, V., Gupta, A.: Anomaly intrusion detection in wireless sensor networks. Journal of High Speed Networks 15(1), 33–51 (2006)

    Google Scholar 

  15. Boubiche, D., Bilami, A.: HEEP (Hybrid Energy Efficiency Protocol) Based on Chain Clustering. Int. J. Sensor Networks 10(1/2), 25–35 (2011)

    Article  Google Scholar 

  16. Heinzelman, W.R., Chandrakasan, A., Balakrishnan, H.: An Application-Specific Protocol Architecture for Wireless Micro sensor Networks. IEEE Transactions on the Wireless Communications 1(4), 660–670 (2002)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Boubiche, D.E., Bilami, A., Athmani, S. (2012). A Cross Layer Energy Efficient Security Mechanism for Denial of Sleep Attacks on Wireless Sensor Network. In: Benlamri, R. (eds) Networked Digital Technologies. NDT 2012. Communications in Computer and Information Science, vol 294. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-30567-2_13

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-30567-2_13

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-30566-5

  • Online ISBN: 978-3-642-30567-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics