Mechanisms for detecting and preventing denial of sleep attacks on wireless sensor networks

Wireless sensor network is a self-configured, infrastructure less wireless network consisting of a large number of sensor nodes equipped with specialized sensors that can monitor various physical attributes such as temperature, pressure, vibration and sound. WSN relies on hardware simplicity to make sensor field deployments both affordable and long lasting without any maintenance support. Security and energy efficiency is the most important concerns in wireless sensor networks (WSNs) design. Sensor nodes are powered up with batteries. Due to unattended nature of deployment, the sensor nodes cannot be recharged again. In this condition, the nodes must optimally consume power. Energy constrained sensor networks periodically place nodes to sleep in order to extend the network lifetime. Various protocols are designed to reduce the energy consumption of sensor nodes by keeping the antenna in sleep mode 90% of time, so that power is saved. MAC protocols are designed to vary the sleep time based on the communication need. However, attackers use their knowledge of their underlying MAC protocol, to reduce the sleep time of the node, so that life time of the node reduces. This problem we refer it as Denial of sleep attack and in this paper we propose effective solution to defend against this attack on a sensor network.

[1]  Deborah Estrin,et al.  Medium access control with coordinated adaptive sleeping for wireless sensor networks , 2004, IEEE/ACM Transactions on Networking.

[2]  Scott F. Midkiff,et al.  Effects of Denial-of-Sleep Attacks on Wireless Sensor Network MAC Protocols , 2009, IEEE Transactions on Vehicular Technology.

[3]  IV NathanielJ.Davis,et al.  Wireless sensor network energy-adaptive mac protocol , 2006, CCNC 2006. 2006 3rd IEEE Consumer Communications and Networking Conference, 2006..

[4]  Gang Zhou,et al.  DEEJAM: Defeating Energy-Efficient Jamming in IEEE 802.15.4-based Wireless Networks , 2007, 2007 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.

[5]  Anish Arora,et al.  Antireplay Protocols for Sensor Networks , 2005, Handbook on Theoretical and Algorithmic Aspects of Sensor, Ad Hoc Wireless, and Peer-to-Peer Networks.

[6]  Koen Langendoen,et al.  An adaptive energy-efficient MAC protocol for wireless sensor networks , 2003, SenSys '03.

[7]  Zhongliang Deng,et al.  Application Specific Analysis of MAC Layer Protocols Used in Wireless Sensor Networks , 2010, 2010 6th International Conference on Wireless Communications Networking and Mobile Computing (WiCOM).

[8]  G. Padmavathi,et al.  A Study on Vehicle Detection and Tracking Using Wireless Sensor Networks , 2010, Wirel. Sens. Netw..

[9]  Almohanad S. Fayez,et al.  Cross-layer wireless sensor network radio power management , 2006, IEEE Wireless Communications and Networking Conference, 2006. WCNC 2006..

[10]  David E. Culler,et al.  Versatile low power media access for wireless sensor networks , 2004, SenSys '04.

[11]  J.A. Stankovic,et al.  Denial of Service in Sensor Networks , 2002, Computer.

[12]  Wenyuan Xu,et al.  The feasibility of launching and detecting jamming attacks in wireless networks , 2005, MobiHoc '05.