IMPLEMENTATION OF A MITIGATION STRATEGY FOR DENIAL OF SLEEP ATTACK AT NETWORK ORGANIZATION LEVEL IN WIRELESS SENSOR NETWORKS
Abstract
Wireless sensor networks are special types of networks which use wireless interfaces to connect mobile nodes. These networks do not need fixed infrastructure. Due to high mobility in nodes and dynamic infrastructure of WSN, the energy (power) of the nodes is an important issue. There are many factors which affect the proper functioning of a wireless sensor network. However, the most fundamental is intrusion attack against a victim node and the consequent depletion of its battery. This eventually have adverse effects on the performance of the network. Adaptive Time-out of the protocol enables sensor nodes transit to standby mode from time to time. The inability of a node to enter a sleep mode is referred to as sleep deprivation or denial of sleep attack. This study proposes a technique for mitigating denial of sleep attack at the Network Organization stage of wireless sensor networks. To prevents the intruder from gaining access into the network. Simulation was used to evaluate the performance of the proposed technique. Experimental results using OMNET ++ simulator shows that the proposed method mitigates the impact of denial of sleep attacks on wireless sensor networks.
KEYWORDS: attack; denial of sleep; network organization algorithms; sink node; wireless sensor networks.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a copyright form (JACTA) that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).