TITLE

KABLOSUZ ALGILAYICI AğLARDA HİZMET ENGELLEME SALDIRILARINA DAYANIKLI ORTAM ERİŞİM PROTOKOLÜ TASARIMI

AUTHOR(S)
Çakiroğlu, Murat; Özcerıt, A. Turan
PUB. DATE
December 2007
SOURCE
Journal of the Faculty of Engineering & Architecture of Gazi Uni;Dec2007, Vol. 22 Issue 4, p697
SOURCE TYPE
Academic Journal
DOC. TYPE
Article
ABSTRACT
Wireless Sensor Networks (WSN) are very popular area of interest both in academic studies and industrial applications since they can work individually without additional maintenance and can be deployed in diverse applications. However, the limited source of the nodes cannot guarantee a sufficient level of security and also complicates the design and the implementation of the algorithms/protocols. DoS (Denial of Service) attacks that manipulate vulnerabilities of access protocol by disrupting network communication or arising exceptional cases and cutting network's lifetime are primary threats for wireless sensor networks. S-MAC (Sensor Medium Access Control) and its derivatives (T-MAC [1], D-MAC [2] etc.) which, are the most common medium access protocols designed for WSNs, are vulnerable against such attacks. In this paper, we have implemented the design of the AR-MAC (Attack Resistant MAC) protocol that detects the types of jammers and maintains the appropriate solution for each jammer type. By means of the new MAC protocol designed, the WSNs have been more robust to DoS attacks in MAC layer and the lifetime of the nodes have been extended under such attacks without additional hardware.
ACCESSION #
28652959

 

Related Articles

  • PUE Attack Detection in CWSN Using Collaboration and Learning Behavior. Blesa, Javier; Romero, Elena; Rozas, Alba; Araujo, Alvaro; Nieto-Taladriz, Octavio // International Journal of Distributed Sensor Networks;2013, p1 

    Cognitive Wireless Sensor Network (CWSN) is a new paradigm which integrates cognitive features in traditional Wireless Sensor Networks (WSNs) to mitigate important problems such as spectrum occupancy. Security in Cognitive Wireless Sensor Networks is an important problem because these kinds of...

  • Secure Routing in Cluster based Wireless Sensor Networks using Symmetric Cryptography with Session Keys. Upendar Rao, Rayala // International Journal of Computer Applications;10/1/2012, Vol. 55, p48 

    Wireless sensor network is an emerging technology, uses in many applications like boarder area enemy tracking system, fire alarm system, etc. Sensors are low power devices which possess huge attacks. These low power devices are not suitable for complex cryptographic algorithms. In this paper we...

  • Towards Secure and Dynamic Password Based User Authentication Scheme in Hierarchical Wireless Sensor Networks. Chun-Ta Li; Chi-Yao Weng; Cheng-Chi Lee; Chin-Wen Lee // International Journal of Security & Its Applications;May2013, Vol. 7 Issue 3, p249 

    Two-factor user authentication is an important research issue for providing security and privacy in hierarchical wireless sensor networks (HWSNs). In 2012, Das, Sharma, Chatterjee and Sing proposed a dynamic password-based user authentication scheme for HWSNs. In this paper, we show weaknesses...

  • Maximizing Data Extraction in Energy-Limited Sensor Networks. Sadagopan, Narayanan; Krishnamachari, Bhaskar // International Journal of Distributed Sensor Networks;2005, Vol. 1 Issue 1, p123 

    We examine the problem of maximizing data collection from an energy-limited store-and-extract wireless sensor network, which is analogous to the maximum lifetime problem of interest in continuous data-gathering sensor networks. One significant difference is that this problem requires attention...

  • Improved Key Predistribution Scheme in Wireless Sensor Networks using Cell Splitting in Hexagonal Grid based Deployment Model. Kishore, R.; Radha, S.; Hymlin Rose, S.G. // International Journal of Distributed Sensor Networks;Nov/Dec2009, Vol. 5 Issue 6, p850 

    Security in wireless sensor networks is an upcoming field which is quite different from traditional network security mechanisms. Many applications are dependent on the secure operation of a wireless sensor network, and have serious effects if the network is disrupted. Therefore, it is necessary...

  • On Effect of Compromised Nodes on Security of Wireless Sensor Network. Choudhury, Parichoy Pal; Bagchi, Pramita; Sengupta, Sebanti; Ghosh, Anurag // Adhoc & Sensor Wireless Networks;2010, Vol. 9 Issue 3/4, p255 

    For secure communications in wireless sensor network in adversarial conditions, one way is providing keys to sensor nodes before deployment. Two sensor nodes can communicate provided they have at least one key in common or there is a path between the two nodes where each pair of neighboring...

  • Probabilistic Key Management Practical Concerns in Wireless Sensor Networks. Silva, Rui Miguel Soares; Pereira, Nuno Sidónio A.; Nunes, Mário Serafim // Journal of Networks;Feb2008, Vol. 3 Issue 2, p29 

    The subject of Key Management in Wireless Sensor Networks has gained increased attention from the security community around the world in the last years. Several proposals were made concerning the peculiarities of resource constrains inherent to sensor devices. One of the most accepted proposals...

  • Pro-Active Prevention of Clone Node Attacks in Wireless Sensor Networks. Anandkumar, K. M.; Jayakumar, C. // Journal of Computer Science;Oct2012, Vol. 8 Issue 10, p1691 

    Problem statement: Wireless mobile sensor networks are deploying large, self-organized and adaptable sets of sensors for many applications such as military, environmental, health care, remote monitoring and other applications. Unfortunately, the simplicity and low-cost of these sensors make...

  • An unequal cluster-based routing protocol in wireless sensor networks. Guihai Chen; Chengfa Li; Mao Ye; Jie Wu // Wireless Networks (10220038);Feb2009, Vol. 15 Issue 2, p193 

    Clustering provides an effective method for prolonging the lifetime of a wireless sensor network. Current clustering algorithms usually utilize two techniques; selecting cluster heads with more residual energy, and rotating cluster heads periodically to distribute the energy consumption among...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics