Denial-of-Sleep Vulnerabilities and Defenses in Wireless Sensor Network MAC Protocols

ii

[1]  Ran Canetti,et al.  Efficient and Secure Source Authentication for Multicast , 2001, NDSS.

[2]  N. Pissinou,et al.  A framework for trust-based cluster head election in wireless sensor networks , 2006, Second IEEE Workshop on Dependability and Security in Sensor Networks and Systems.

[3]  Deborah Estrin,et al.  Medium access control with coordinated adaptive sleeping for wireless sensor networks , 2004, IEEE/ACM Transactions on Networking.

[4]  David E. Culler,et al.  The Emergence of Networking Abstractions and Techniques in TinyOS , 2004, NSDI.

[5]  John S. Baras,et al.  ATEMU: a fine-grained sensor network simulator , 2004, 2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2004. IEEE SECON 2004..

[6]  D. Manjunath A Review of Current Operating Systems for Wireless Sensor Networks , 2007, Computers and Their Applications.

[7]  Wenyuan Xu,et al.  The feasibility of launching and detecting jamming attacks in wireless networks , 2005, MobiHoc '05.

[8]  Antonio Alfredo Ferreira Loureiro,et al.  Decentralized intrusion detection in wireless sensor networks , 2005, Q2SWinet '05.

[9]  IV NathanielJ.Davis,et al.  Wireless sensor network energy-adaptive mac protocol , 2006, CCNC 2006. 2006 3rd IEEE Consumer Communications and Networking Conference, 2006..

[10]  T. Narten Internet routing , 1989, SIGCOMM 1989.

[11]  Anish Arora,et al.  Antireplay Protocols for Sensor Networks , 2005, Handbook on Theoretical and Algorithmic Aspects of Sensor, Ad Hoc Wireless, and Peer-to-Peer Networks.

[12]  David A. Wagner,et al.  TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.

[13]  Ray Jain,et al.  The art of computer systems performance analysis - techniques for experimental design, measurement, simulation, and modeling , 1991, Wiley professional computing.

[14]  Stephen T. Kent,et al.  Security Architecture for the Internet Protocol , 1998, RFC.

[15]  Adrian Perrig,et al.  ACE: An Emergent Algorithm for Highly Uniform Cluster Formation , 2004, EWSN.

[16]  Keith W. Ross,et al.  Computer networking - a top-down approach featuring the internet , 2000 .

[17]  Hyuk Lim,et al.  J-Sim: a simulation and emulation environment for wireless sensor networks , 2006, IEEE Wireless Communications.

[18]  Ross J. Anderson Security engineering - a guide to building dependable distributed systems (2. ed.) , 2001 .

[19]  Ian F. Akyildiz,et al.  Sensor Networks , 2002, Encyclopedia of GIS.

[20]  Wendi Heinzelman,et al.  Energy-efficient communication protocol for wireless microsensor networks , 2000, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences.

[21]  Michael S. Hsiao,et al.  Denial-of-service attacks on battery-powered mobile computers , 2004, Second IEEE Annual Conference on Pervasive Computing and Communications, 2004. Proceedings of the.

[22]  Robbert van Renesse,et al.  Scalable Wireless Ad Hoc Network Simulation , 2005, Handbook on Theoretical and Algorithmic Aspects of Sensor, Ad Hoc Wireless, and Peer-to-Peer Networks.

[23]  Frank Stajano,et al.  The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks , 1999, Security Protocols Workshop.

[24]  Esteban Egea López,et al.  OBIWAN: wireless sensor networks with OMNET++ , 2006 .

[25]  Jerry den Hartog,et al.  Link-layer jamming attacks on S-MAC , 2004, Proceeedings of the Second European Workshop on Wireless Sensor Networks, 2005..

[26]  Yang Xiao,et al.  Security services and enhancements in the IEEE 802.15.4 wireless sensor networks , 2005, GLOBECOM '05. IEEE Global Telecommunications Conference, 2005..

[27]  Hugo Krawczyk,et al.  A Security Architecture for the Internet Protocol , 1999, IBM Syst. J..

[28]  Gregory J. Pottie,et al.  Protocols for self-organization of a wireless sensor network , 2000, IEEE Wirel. Commun..

[29]  L.C. Baird,et al.  Keyless Jam Resistance , 2007, 2007 IEEE SMC Information Assurance and Security Workshop.

[30]  Mary Baker,et al.  Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.

[31]  Almohanad S. Fayez,et al.  Cross-layer wireless sensor network radio power management , 2006, IEEE Wireless Communications and Networking Conference, 2006. WCNC 2006..

[32]  Boleslaw K. Szymanski,et al.  SENSE: A SENSOR NETWORK SIMULATOR , 2004 .

[33]  Peng Ning,et al.  Secure Distributed Cluster Formation in Wireless Sensor Networks , 2006, 2006 22nd Annual Computer Security Applications Conference (ACSAC'06).

[34]  Ian F. Akyildiz,et al.  Wireless sensor networks , 2007 .

[35]  Joseph G. Tront,et al.  Battery-Sensing Intrusion Protection for Wireless Handheld Computers Using a Dynamic Threshold Calculation Algorithm for Attack Detection , 2007, 2007 40th Annual Hawaii International Conference on System Sciences (HICSS'07).

[36]  David A. Wagner,et al.  Security considerations for IEEE 802.15.4 networks , 2004, WiSe '04.

[37]  Yee Wei Law,et al.  Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols , 2005, TOSN.

[38]  Kalyan S. Perumalla,et al.  ON EVALUATION NEEDS OF REAL-LIFE SENSOR NETWORK DEPLOYMENTS , 2006 .

[39]  Mani B. Srivastava,et al.  SensorSim: a simulation framework for sensor networks , 2000, MSWIM '00.

[40]  Adam Dunkels,et al.  Contiki - a lightweight and flexible operating system for tiny networked sensors , 2004, 29th Annual IEEE International Conference on Local Computer Networks.

[41]  Sang Hyuk Son,et al.  JAM: a jammed-area mapping service for sensor networks , 2003, RTSS 2003. 24th IEEE Real-Time Systems Symposium, 2003.

[42]  Ossama Younis,et al.  HEED: a hybrid, energy-efficient, distributed clustering approach for ad hoc sensor networks , 2004, IEEE Transactions on Mobile Computing.

[43]  Averill M. Law,et al.  Simulation Modeling and Analysis , 1982 .

[44]  John Anderson,et al.  An analysis of a large scale habitat monitoring application , 2004, SenSys '04.

[45]  Mohammad Ilyas,et al.  Smart Dust , 2006 .

[46]  Scott F. Midkiff,et al.  Effects of Denial-of-Sleep Attacks on Wireless Sensor Network MAC Protocols , 2009, IEEE Transactions on Vehicular Technology.

[47]  M. Brownfield,et al.  Wireless sensor network denial of sleep attack , 2005, Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop.

[48]  李幼升,et al.  Ph , 1989 .

[49]  David R. Raymond,et al.  Scalable, Cluster-based Anti-replay Protection for Wireless Sensor Networks , 2007, 2007 IEEE SMC Information Assurance and Security Workshop.

[50]  J.A. Stankovic,et al.  Denial of Service in Sensor Networks , 2002, Computer.

[51]  Mani B. Srivastava,et al.  A dynamic operating system for sensor nodes , 2005, MobiSys '05.

[52]  David M. Nicol,et al.  A scalable simulator for TinyOS applications , 2002, Proceedings of the Winter Simulation Conference.

[53]  Deborah Estrin,et al.  An energy-efficient MAC protocol for wireless sensor networks , 2002, Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies.

[54]  Jeff Rose,et al.  MANTIS OS: An Embedded Multithreaded Operating System for Wireless Micro Sensor Platforms , 2005, Mob. Networks Appl..

[55]  William Stallings,et al.  Cryptography and network security - principles and practice (3. ed.) , 2014 .

[56]  David E. Culler,et al.  The nesC language: A holistic approach to networked embedded systems , 2003, PLDI.

[57]  David E. Culler,et al.  TOSSIM: accurate and scalable simulation of entire TinyOS applications , 2003, SenSys '03.

[58]  Biplab Sikdar,et al.  A protocol for tracking mobile targets using sensor networks , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[59]  William Stallings,et al.  Cryptography and Network Security: Principles and Practice , 1998 .

[60]  A. Czarlinska,et al.  Distributed actuation attacks in wireless sensor networks: implications and countermeasures , 2006, Second IEEE Workshop on Dependability and Security in Sensor Networks and Systems.

[61]  Michael S. Hsiao,et al.  Towards an intrusion detection system for battery exhaustion attacks on mobile computing devices , 2005, Third IEEE International Conference on Pervasive Computing and Communications Workshops.

[62]  Hao Chen,et al.  Exploiting MMS Vulnerabilities to Stealthily Exhaust Mobile Phone's Battery , 2006, 2006 Securecomm and Workshops.

[63]  C. Karlof,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[64]  J. Elson,et al.  Fine-grained network time synchronization using reference broadcasts , 2002, OSDI '02.

[65]  Gul A. Agha,et al.  SENS: a sensor, environment and network simulator , 2004, 37th Annual Simulation Symposium, 2004. Proceedings..

[66]  Deborah Estrin,et al.  EmStar: An Environment for Developing Wireless Embedded Systems Software , 2003 .

[67]  David E. Culler,et al.  Versatile low power media access for wireless sensor networks , 2004, SenSys '04.

[68]  John Anderson,et al.  Wireless sensor networks for habitat monitoring , 2002, WSNA '02.

[69]  Michael I. Brownfield,et al.  Energy-efficient Wireless Sensor Network MAC Protocol , 2006 .

[70]  Scott F. Midkiff,et al.  Clustered Adaptive Rate Limiting: Defeating Denial-of-Sleep Attacks in Wireless Sensor Networks , 2007, MILCOM 2007 - IEEE Military Communications Conference.

[71]  Sasikanth Avancha,et al.  Security for Sensor Networks , 2004 .

[72]  Jianying Zhou,et al.  Applying intrusion detection systems to wireless sensor networks , 2006, CCNC 2006. 2006 3rd IEEE Consumer Communications and Networking Conference, 2006..

[73]  Thomas W. Carley Sidh: A Wireless Sensor Network Simulator , 2005 .

[74]  M. Lakshmanan,et al.  AN ADAPTIVE ENERGY EFFICIENT MAC PROTOCOL FOR WIRELESS SENSOR NETWORKS , 2009 .

[75]  J. Heidemann,et al.  A Flexible and Reliable Radio Communication Stack on Motes , 2002 .

[76]  Gang Zhou,et al.  DEEJAM: Defeating Energy-Efficient Jamming in IEEE 802.15.4-based Wireless Networks , 2007, 2007 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.