Authors
David R Raymond, Randy C Marchany, Michael I Brownfield, Scott F Midkiff
Publication date
2008/3/31
Journal
IEEE transactions on vehicular technology
Volume
58
Issue
1
Pages
367-380
Publisher
IEEE
Description
Wireless platforms are becoming less expensive and more powerful, enabling the promise of widespread use for everything from health monitoring to military sensing. Like other networks, sensor networks are vulnerable to malicious attack. However, the hardware simplicity of these devices makes defense mechanisms designed for traditional networks infeasible. This paper explores the denial-of-sleep attack, in which a sensor node's power supply is targeted. Attacks of this type can reduce the sensor lifetime from years to days and have a devastating impact on a sensor network. This paper classifies sensor network denial-of-sleep attacks in terms of an attacker's knowledge of the medium access control (MAC) layer protocol and ability to bypass authentication and encryption protocols. Attacks from each classification are then modeled to show the impacts on four sensor network MAC protocols, i.e., Sensor MAC (S …
Total citations
2007200820092010201120122013201420152016201720182019202020212022202320245481524212942283729222512191363
Scholar articles
DR Raymond, RC Marchany, MI Brownfield, SF Midkiff - IEEE transactions on vehicular technology, 2008