IJIRST (International Journal for Innovative Research in Science & Technology)ISSN (online) : 2349-6010

 International Journal for Innovative Research in Science & Technology

A Novel Study on Privacy Scheduling Data Attacks in Hierarchical WSN


Print Email Cite
International Journal for Innovative Research in Science & Technology
Volume 4 Issue - 3
Year of Publication : 2017
Authors : S.Saranya

BibTeX:

@article{IJIRSTV4I3018,
     title={A Novel Study on Privacy Scheduling Data Attacks in Hierarchical WSN},
     author={S.Saranya},
     journal={International Journal for Innovative Research in Science & Technology},
     volume={4},
     number={3},
     pages={48--53},
     year={},
     url={http://www.ijirst.org/articles/IJIRSTV4I3018.pdf},
     publisher={IJIRST (International Journal for Innovative Research in Science & Technology)},
}



Abstract:

A wireless sensor network is a collection of numerous sensors distributed on an area of interest to collect and process data from the environment. One particular threat in wireless sensor networks is node compromise attacks, that is, attacks where the adversary gets physical access to a node and to the programs and keying material stored on it. In this Paper Privacy and energy efficiency are critical concerns in wireless sensor network (WSN) design. This paper aims to develop an energy-efficient secure scheme against power exhausting attacks, especially the denial-of-sleep attacks, which can shorten the lifetime of WSNs rapidly. Although various Medium access control (MAC) protocols have been proposed to save the power and extend the lifetime of WSNs, the existing designs of MAC protocol are insufficient to protect the WSNs from denial-of-sleep attacks in MAC layer. This is attributed to the fact that the well-known privacy mechanisms usually awake the sensor nodes before these nodes are allowed to execute the privacy processes. Therefore, the practical design is to simplify the authenticating process in order to reduce the energy consumption of sensor nodes and enhance the performance of the MAC protocol in countering the power exhausting attacks. This paper proposes a cross-layer design of secure scheme integrating the MAC protocol. The analyses show that the proposed scheme can counter the replay attack and forge attack in an energy-efficient way. The detailed analysis of energy distribution shows a reason-able decision rule of coordination between energy conservation and privacy requirements for WSNs.


Keywords:

Wireless sensor networks, energy efficiency, denial-of-sleep, TCP, MAC


Download Article