Performance Analysis of 802.11 and SMAC Protocol under Sleep Deprivation Torture Attack in Wireless Sensor Networks
Keywords:
Wireless Sensor Networks ( WSN’S), Media Access Control(MAC), Sensor MAC (SMAC)Abstract
A Wireless Sensor Network (WSN) consists of a group of sensors which are geographically distributed and are capable of computing, communicating and sensing. One of the major challenges of WSN is to preserve energy. MAC protocols which operate at the data link layer have full control over the wireless radio; their design can contribute significantly to the overall energy requirements of a sensor node. The goal of the sensor MAC (S-MAC) protocol (Ye et al. 2002) is to reduce unnecessary energy consumption, while providing good scalability and collision avoidance. S-MAC adopts a duty-cycle approach, that is, nodes periodically transition between a listen state and a sleep state. The sleep deprivation torture attack also known as denial-of-sleep attack is a powerful attack in which an attacker prevents a sensor from going into sleep mode. It makes a device inoperable by draining the battery more quickly than it would be under normal usage. This paper provides a comparative study of 802.11 and SMAC protocol under this attack. A simulation has been carried out in NS2 and analysis shows that SMAC performs similar to 802.11 under such attack.
References
Chen C., Hui L., Pei Q., Ning L., Qingquan P, “An Effective Scheme for Defending Denial-of-Sleep Attack in Wireless Sensor Networks”, Proceedings of the 2009 Fifth International Conference on Information Assurance and Security, Vol. 02, IEEE CS, May 2009.
David R. Raymond, Randy C. Marchany, Michael I. Brownfield, and Scott F. Midkiff, “Effect of Denial of sleep attacks on wireless sensor network MAC protocols” published by IEEE , June 2008.
Dharam Vir, Dr.S.K.Agarwal, Dr.S.A.Imam:”WSN Performance Evauation of power consumption”,International Journal of Scientific and Research Publications, Volume 3, Issue 12, December 2013.
Genita Gautam, Biswaraj Sen, “Survey on different types of Security threats in wireless Sen sor Networks”, International Journal of Computer Science and Information Technologies, Vol. 6 (1) , 2015, pp-770-774.
Genita Gautam, Biswaraj Sen, “Design and simulation of Wireless Sensor networks in NS2”, International Journal of Computer Applications, Vol. 113 (16) , 2015, pp-14-16.
Jianliang Zheng and Myung J. Lee,”A Comprehensive Performance Study of IEEE 802.15.4”, IEEE, Aug. 1999.
Michael Brownfield, Yatharth Gupta, Mem and Nathaniel Davis IV :” Wireless Sensor Network Denial of sleep attack” , IEEE 2005.
M. Riduan Ahmad, Eryk Dutkiewicz and Xiaojing Huang,” A Survey of Low Duty Cycle MAC Protocols in Wireless Sensor Networks”, www.intechopen.com, 07, February, 2011.
P. Lin, C. Qiao, and X. Wang, “Medium access control with a dynamic duty cycle for sensor networks”, IEEE Wireless Communications and Networking Conference, Volume: 3,March 2004.
Rajesh Yadav, Shirshu Varma, N. Malaviya,” A SURVEY OF MAC PROTOCOLS FOR WIRELESS SENSOR NETWORKS”, UbiCC Journal, Volume 4, Number 3, August 2009..
R. Rugin, G. Mazzini, “A simple and efficient MAC-routing integrated algorithm for sensor network”, IEEE International Conference on Communications, Volume: 6, June 2006.
S. Cui, R. Madan, A. J. Goldsmith, and S. Lall, “Joint Routing, MAC, and Link Layer optimization in Sensor Networks with Energy Constraints”, to appear at ICC'05, Korea, May, 2005.
Security Model Using NS2 “International Journal of Latest Trends in Engineering and Technology (IJLTET), Vol. 4 Issue 1 May 2014.
Shweta Agarwal, Varsha Jain, Kuldeep Goswami,” ENERGY EFFICIENT MAC PROTOCOLS FOR WIRELESS SENSOR NETWORK”, www.intechopen.com, 07, February, 2011.
Shamneesh Sharma, Dinesh Kumar and Keshav Kishore,”Wireless Sensor Networks- A Review on Topologies and Node Architecture”, International Journal of Computer Sciences and Engineering”, Vol 1 Issue 2, Oct 2013.
Tapalina Bhattasali, Rituparna Chaki, Sugata sanyal: “Sleep deprivation Attack Detection in Wireless Sensor network”, International Journal of Computer Applications, February 2012.
Teerawat Issariyakul, Ekram Hossain,“Introduction to Network Simulator 2”, Springer US,2008, pp 1-18.
T.V. Dam and K. Langendoen, “An Adaptive Energy-Efficient MAC Protocol for Wireless Sensor Networks”, The First ACM Conference on Embedded Networked Sensor Systems (Sensys‘03), Los Angeles, CA, USA, November, 2003.
Waltenegus Dargie and Christian Poellabauer,” FUNDAMENTALS OF WIRELESS SENSOR NETWORKS”, 2nd Edition ,John Wiley & Sons, Ltd, pp.25-30.
Vidya M, Reshmi S, “Denial-of-service Attacks in Wireless Sensor Ndetworks”, International Journal of Advanced Computer Theory and Engineering, Volume -3, Issue -2, 2014.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
