Conservation Of Battery Power by Alleviating DOS Attacks in Wireless Sensor Networks

Page 1

International Research Journal of Engineering and Technology (IRJET)

e-ISSN: 2395 -0056

Volume: 04 Issue: 03 | Mar -2017

p-ISSN: 2395-0072

www.irjet.net

CONSERVATION OF BATTERY POWER BY ALLEVIATING DOS ATTACKS IN WIRELESS SENSOR NETWORKS Arpitha R , Chaitra M Department of Information Science and Engineering, THE NATIONAL INSTITUTE OF ENGINEERING, Mysuru 570008, Karnataka, India ---------------------------------------------------------------------***--------------------------------------------------------------------environment they cannot be recharged. Due to unattended Abstract - Sensor nodes which are building blocks of Sensor deployment and inability of recharging, the power consumption of the nodes should be optimal. Numerous schemes are being proposed to extend lifetime, to save energy and also provide security in WSN. Duty cycle [1] based approach is one among the scheme used to conserve the energy in a better and efficient manner. In duty cycle nodes are made to awake periodically to sense preamble from sleep to active, active to idle, idle to sleep mode. When a data is being sent at sender node in the form of preamble, a very long preamble is sent in order to overcome the sleep period. Both sender and receiver are synchronized with time. Depending on the different initiator, the duty cycle scheme can be classified into two types: Sender Initiated Scheme and Receiver Initiated Scheme. B-MAC and X-MAC are sender initiated and RI-MAC is of receiver initiated schemes. In the B-MAC (media access control) protocol a long preamble is being sent which is replaced by short preamble in X-MAC (media access control) protocol. The RI MAC (media access control) protocol will still reduce the energy consumption by sending acknowledgment to sender. RI-MAC protocol decreases the channel occupying period for both sender and receiver.

networks get their energy from battery resources whose lifespan is of major concern. As sensors are used to monitor sensitive areas, security and energy efficiency is essential consideration when designing wireless sensor networks (WSNs). The Denial-of-Sleep attack is a specific type of denialof-service (DoS) attack that targets a battery-powered device which results in quick exhaustion of this constrained resource. To implement minimum power consumption, sensor networks periodically place sensor nodes to sleep. This is achieved by using the media access control (MAC) protocols. These protocols are designed in such a way that they reduce the energy consumption of sensor nodes by keeping the antenna in sleep mode as much as possible. This leads to power saving. The MAC protocols change the sleep time based on the type of communication required. However, malicious nodes can be introduced in the network and these attackers use their information about the MAC protocol, by manipulating the sleep time of the node, so that life time of the node reduces. This paper, addresses the Denial of sleep attack in WSN while at the same time proposing a scheme for authenticating the new nodes which try to change the sleep schedule of the nodes. Only transmissions from valid nodes are accepted. The paper presents a detailed analysis for various scenarios and also analyzes the performance while implementing this secure authentication.

[2]The Denial-of Sleep attack is one of the power exhausting attacks which tries to keep the sensor nodes awake to consume more energy of the constrained power supply. It is hard to replace those sensors which fail on account of their battery drainage, and also without security mechanism, an anti-node can broadcast a fake preamble frequently. If the receiver cannot differentiate between the real preamble and the fake one, the receiver will receive and process the data from the anti-node. Such attack will keep the receiver awake as long as the data transmission sustains, which exhausts the battery of nodes rapidly. Moreover, an anti-node can replay a fake preamble ACK to the sender. Thus, the sender will start to send the data to the anti-node but it will never receive the right data ACK. Similarly, the sender may send data

Key Words: Sensors, Denial of Service, Denial of Sleep, Power Exhaustion, Media Access Control (MAC) Protocol.

1. INTRODUCTION Wireless Sensor Networks (WSNs) can be used to monitor environments, and therefore have broad range of interesting applications. The applications which may use WSN can be of sensitive nature and therefore might require enhanced secured environment. The Sensor nodes get their power from batteries. Since the sensor nodes are deployed in harsh

Š 2017, IRJET

|

Impact Factor value: 5.181

|

ISO 9001:2008 Certified Journal

|

Page 941


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.