Open Access   Article Go Back

Performance Analysis of 802.11 and SMAC Protocol under Sleep Deprivation Torture Attack in Wireless Sensor Networks

Genita Gautam1 , Biswaraj Sen2

Section:Research Paper, Product Type: Journal Paper
Volume-3 , Issue-5 , Page no. 317-322, May-2015

Online published on May 30, 2015

Copyright © Genita Gautam , Biswaraj Sen . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Genita Gautam , Biswaraj Sen, “Performance Analysis of 802.11 and SMAC Protocol under Sleep Deprivation Torture Attack in Wireless Sensor Networks,” International Journal of Computer Sciences and Engineering, Vol.3, Issue.5, pp.317-322, 2015.

MLA Style Citation: Genita Gautam , Biswaraj Sen "Performance Analysis of 802.11 and SMAC Protocol under Sleep Deprivation Torture Attack in Wireless Sensor Networks." International Journal of Computer Sciences and Engineering 3.5 (2015): 317-322.

APA Style Citation: Genita Gautam , Biswaraj Sen, (2015). Performance Analysis of 802.11 and SMAC Protocol under Sleep Deprivation Torture Attack in Wireless Sensor Networks. International Journal of Computer Sciences and Engineering, 3(5), 317-322.

BibTex Style Citation:
@article{Gautam_2015,
author = {Genita Gautam , Biswaraj Sen},
title = {Performance Analysis of 802.11 and SMAC Protocol under Sleep Deprivation Torture Attack in Wireless Sensor Networks},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {5 2015},
volume = {3},
Issue = {5},
month = {5},
year = {2015},
issn = {2347-2693},
pages = {317-322},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=525},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=525
TI - Performance Analysis of 802.11 and SMAC Protocol under Sleep Deprivation Torture Attack in Wireless Sensor Networks
T2 - International Journal of Computer Sciences and Engineering
AU - Genita Gautam , Biswaraj Sen
PY - 2015
DA - 2015/05/30
PB - IJCSE, Indore, INDIA
SP - 317-322
IS - 5
VL - 3
SN - 2347-2693
ER -

VIEWS PDF XML
2401 2305 downloads 2589 downloads
  
  
           

Abstract

A Wireless Sensor Network (WSN) consists of a group of sensors which are geographically distributed and are capable of computing, communicating and sensing. One of the major challenges of WSN is to preserve energy. MAC protocols which operate at the data link layer have full control over the wireless radio; their design can contribute significantly to the overall energy requirements of a sensor node. The goal of the sensor MAC (S-MAC) protocol (Ye et al. 2002) is to reduce unnecessary energy consumption, while providing good scalability and collision avoidance. S-MAC adopts a duty-cycle approach, that is, nodes periodically transition between a listen state and a sleep state. The sleep deprivation torture attack also known as denial-of-sleep attack is a powerful attack in which an attacker prevents a sensor from going into sleep mode. It makes a device inoperable by draining the battery more quickly than it would be under normal usage. This paper provides a comparative study of 802.11 and SMAC protocol under this attack. A simulation has been carried out in NS2 and analysis shows that SMAC performs similar to 802.11 under such attack.

Key-Words / Index Term

Wireless Sensor Networks ( WSN’S) , Media Access Control(MAC) , Sensor MAC (SMAC)

References

[1] Chen C., Hui L., Pei Q., Ning L., Qingquan P, “An Effective Scheme for Defending Denial-of-Sleep Attack in Wireless Sensor Networks”, Proceedings of the 2009 Fifth International Conference on Information Assurance and Security, Vol. 02, IEEE CS, May 2009.
[2] David R. Raymond, Randy C. Marchany, Michael I. Brownfield, and Scott F. Midkiff, “Effect of Denial of sleep attacks on wireless sensor network MAC protocols” published by IEEE , June 2008.
[3] Dharam Vir, Dr.S.K.Agarwal, Dr.S.A.Imam:”WSN Performance Evauation of power consumption”,International Journal of Scientific and Research Publications, Volume 3, Issue 12, December 2013.
[4] Genita Gautam, Biswaraj Sen, “Survey on different types of Security threats in wireless Sen sor Networks”, International Journal of Computer Science and Information Technologies, Vol. 6 (1) , 2015, pp-770-774.
[5] Genita Gautam, Biswaraj Sen, “Design and simulation of Wireless Sensor networks in NS2”, International Journal of Computer Applications, Vol. 113 (16) , 2015, pp-14-16.
[6] Jianliang Zheng and Myung J. Lee,”A Comprehensive Performance Study of IEEE 802.15.4”, IEEE, Aug. 1999.
[7] Michael Brownfield, Yatharth Gupta, Mem and Nathaniel Davis IV :” Wireless Sensor Network Denial of sleep attack” , IEEE 2005.
[8] M. Riduan Ahmad, Eryk Dutkiewicz and Xiaojing Huang,” A Survey of Low Duty Cycle MAC Protocols in Wireless Sensor Networks”, www.intechopen.com, 07, February, 2011.
[9] P. Lin, C. Qiao, and X. Wang, “Medium access control with a dynamic duty cycle for sensor networks”, IEEE Wireless Communications and Networking Conference, Volume: 3,March 2004.
[10] Rajesh Yadav, Shirshu Varma, N. Malaviya,” A SURVEY OF MAC PROTOCOLS FOR WIRELESS SENSOR NETWORKS”, UbiCC Journal, Volume 4, Number 3, August 2009..
[11] R. Rugin, G. Mazzini, “A simple and efficient MAC-routing integrated algorithm for sensor network”, IEEE International Conference on Communications, Volume: 6, June 2006.
[12] S. Cui, R. Madan, A. J. Goldsmith, and S. Lall, “Joint Routing, MAC, and Link Layer optimization in Sensor Networks with Energy Constraints”, to appear at ICC'05, Korea, May, 2005.
[13] Security Model Using NS2 “International Journal of Latest Trends in Engineering and Technology (IJLTET), Vol. 4 Issue 1 May 2014.
[14] Shweta Agarwal, Varsha Jain, Kuldeep Goswami,” ENERGY EFFICIENT MAC PROTOCOLS FOR WIRELESS SENSOR NETWORK”, www.intechopen.com, 07, February, 2011.
[15] Shamneesh Sharma, Dinesh Kumar and Keshav Kishore,”Wireless Sensor Networks- A Review on Topologies and Node Architecture”, International Journal of Computer Sciences and Engineering”, Vol 1 Issue 2, Oct 2013.
[16] Tapalina Bhattasali, Rituparna Chaki, Sugata sanyal: “Sleep deprivation Attack Detection in Wireless Sensor network”, International Journal of Computer Applications, February 2012.
[17] Teerawat Issariyakul, Ekram Hossain,“Introduction to Network Simulator 2”, Springer US,2008, pp 1-18.
[18] T.V. Dam and K. Langendoen, “An Adaptive Energy-Efficient MAC Protocol for Wireless Sensor Networks”, The First ACM Conference on Embedded Networked Sensor Systems (Sensys‘03), Los Angeles, CA, USA, November, 2003.
[19] Waltenegus Dargie and Christian Poellabauer,” FUNDAMENTALS OF WIRELESS SENSOR NETWORKS”, 2nd Edition ,John Wiley & Sons, Ltd, pp.25-30.
[20] Vidya M, Reshmi S, “Denial-of-service Attacks in Wireless Sensor Ndetworks”, International Journal of Advanced Computer Theory and Engineering, Volume -3, Issue -2, 2014.