Effects of denial-of-sleep attacks on wireless sensor network MAC protocols

DR Raymond, RC Marchany… - IEEE transactions on …, 2008 - ieeexplore.ieee.org
Wireless platforms are becoming less expensive and more powerful, enabling the promise
of widespread use for everything from health monitoring to military sensing. Like other …

Energy depletion attacks in low power wireless networks

VL Nguyen, PC Lin, RH Hwang - IEEE Access, 2019 - ieeexplore.ieee.org
Low Power Wireless (LPW) networks have recently been emerging as key candidates to
offer affordable connectivity for the constrained devices in the Internet of Things (IoT) …

Sleep deprivation attack detection in wireless sensor network

T Bhattasali, R Chaki, S Sanyal - arXiv preprint arXiv:1203.0231, 2012 - arxiv.org
Deployment of sensor network in hostile environment makes it mainly vulnerable to battery
drainage attacks because it is impossible to recharge or replace the battery power of sensor …

A novel SVM based IDS for distributed denial of sleep strike in wireless sensor networks

N Mohd, A Singh, HS Bhadauria - Wireless Personal Communications, 2020 - Springer
It is well known that the safety, reliability and energy efficiencies are the prime concerns
while designing and deploying wireless sensor networks. Therefore, unattained features …

Denial of Sleep attacks in Bluetooth Low Energy wireless sensor networks

J Uher, RG Mennecke… - MILCOM 2016-2016 IEEE …, 2016 - ieeexplore.ieee.org
Many of the benefits of an Internet of Things sensor network model stem from the extremely
long service life of its base sensing layer. When data from the base sensing layer is provided …

Conservation of energy in wireless sensor network by preventing denial of sleep attack

S Naik, N Shekokar - Procedia Computer Science, 2015 - Elsevier
Abstract Wireless Sensor Networks (WSNs) can be used to monitor environments, and
therefore have broad range of interesting applications. The applications which may use …

[PDF][PDF] Countering Three Denial-of-Sleep Attacks on ContikiMAC.

KF Krentz, C Meinel, H Graupner - EWSN, 2017 - ewsn.org
Like virtually all media access control (MAC) protocols for 802.15. 4 networks, also
ContikiMAC is vulnerable to various denial-of-sleep attacks. The focus of this paper is on …

[HTML][HTML] Secure opportunistic routing in 2-hop IEEE 802.15. 4 networks with SMOR

KF Krentz, T Voigt - Computer Communications, 2024 - Elsevier
Abstract The IEEE 802.15. 4 radio standard features the possibility for IEEE 802.15. 4 nodes
to run on batteries for several years. This is made possible by duty-cycling medium access …

Performance analysis of denial-of-sleep attack-prone MAC protocols in wireless sensor networks

E Udoh, V Getov - 2018 UKSim-AMSS 20th International …, 2018 - ieeexplore.ieee.org
Wireless sensor networks which form part of the core for the Internet of Things consist of
resource constrained sensors that are usually powered by batteries. Therefore, careful …

SMACK: Short message authentication check against battery exhaustion in the Internet of Things

C Gehrmann, M Tiloca… - 2015 12Th annual IEEE …, 2015 - ieeexplore.ieee.org
Internet of Things (IoT) commonly identifies the upcoming network society where all
connectable devices will be able to communicate with one another. In addition, IoT devices …