메뉴 건너뛰기




Volumn 2006, Issue , 2006, Pages 297-304

Effects of denial of sleep attacks on wireless sensor network MAC protocols

Author keywords

Medium Access Control (MAC); Wireless security; Wireless sensor networks

Indexed keywords

MEDIUM ACCESS CONTROL (MAC); SLEEP ATTACKS; WIRELESS SECURITY; WIRELESS SENSOR NETWORKS;

EID: 33845958392     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (32)

References (18)
  • 1
    • 33845961970 scopus 로고    scopus 로고
    • Online reference available at
    • "Micaz datasheet." Online reference available at: http://www.xbow.com.
    • Micaz datasheet1
  • 2
    • 33845930237 scopus 로고    scopus 로고
    • Tmote sky low power wireless sensor module. Online reference available at: http://www.moteiv.com.
    • "Tmote sky low power wireless sensor module." Online reference available at: http://www.moteiv.com.
  • 3
    • 0003264517 scopus 로고    scopus 로고
    • PAMAS: Power aware multi-access protocol with signaling for ad hoc networks
    • S. Singh and C. S. Raghavendra, "PAMAS: Power aware multi-access protocol with signaling for ad hoc networks," In ACM Comput. Commun. Rev., pp. 5-26, 1999.
    • (1999) ACM Comput. Commun. Rev , pp. 5-26
    • Singh, S.1    Raghavendra, C.S.2
  • 4
    • 0036343658 scopus 로고    scopus 로고
    • An energy-efficient MAC protocol for wireless sensor networks
    • W. Ye, J. Heidemann, and D. Estrin, "An energy-efficient MAC protocol for wireless sensor networks," In IEEE INFOCOM, pp. 1567-1576, 2002.
    • (2002) IEEE INFOCOM , pp. 1567-1576
    • Ye, W.1    Heidemann, J.2    Estrin, D.3
  • 5
    • 18844402855 scopus 로고    scopus 로고
    • An adaptive energy-efficient MAC protocol for wireless sensor networks
    • T. VanDam and K. Langendoen, "An adaptive energy-efficient MAC protocol for wireless sensor networks," In ACM SENSYS, pp. 171-180, 2003.
    • (2003) ACM SENSYS , pp. 171-180
    • VanDam, T.1    Langendoen, K.2
  • 6
    • 33749071598 scopus 로고    scopus 로고
    • Wireless sensor network energy-adaptive MAC protocol
    • M. Brownfield, K. Mehrjoo, A. fayez, and N. Davis, "Wireless sensor network energy-adaptive MAC protocol," In IEEE CCNC, pp. 778-782, 2006.
    • (2006) IEEE CCNC , pp. 778-782
    • Brownfield, M.1    Mehrjoo, K.2    fayez, A.3    Davis, N.4
  • 8
    • 33845950508 scopus 로고    scopus 로고
    • A. Perrig, R. Canetti, D. Song, and J. D. Tygar, Efficient and secure source authentication for multicast, in NDSS, pp. 35-46, 2001.
    • A. Perrig, R. Canetti, D. Song, and J. D. Tygar, "Efficient and secure source authentication for multicast," in NDSS, pp. 35-46, 2001.
  • 9
    • 26444574670 scopus 로고    scopus 로고
    • TinySec: A link layer security architecture for wireless sensor networks
    • C. Karlof, N. Sastry, and D. Wagner, "TinySec: A link layer security architecture for wireless sensor networks," In ACM SENSYS, pp. 162-175, 2004.
    • (2004) ACM SENSYS , pp. 162-175
    • Karlof, C.1    Sastry, N.2    Wagner, D.3
  • 11
    • 0036793924 scopus 로고    scopus 로고
    • Denial of service in sensor networks
    • A. D. Wood and J. A. Stankovic, "Denial of service in sensor networks," In IEEE Computer, pp. 54-62, 2002.
    • (2002) IEEE Computer , pp. 54-62
    • Wood, A.D.1    Stankovic, J.A.2
  • 12
    • 29844457889 scopus 로고    scopus 로고
    • The feasibility of launching and detecting jamming attacks in wireless networks
    • W. Xu, W. Trappe, Y. Zhang, and T. Wood, "The feasibility of launching and detecting jamming attacks in wireless networks," In ACM MOBICOM, pp. 46-57, 2005.
    • (2005) ACM MOBICOM , pp. 46-57
    • Xu, W.1    Trappe, W.2    Zhang, Y.3    Wood, T.4
  • 13
    • 33745468784 scopus 로고    scopus 로고
    • Wireless sensor network denial of sleep attack
    • M. Brownfield, Y. Gupta, and N. Davis, "Wireless sensor network denial of sleep attack," In IEEE IA Workshop, pp. 356-364, 2005.
    • (2005) IEEE IA Workshop , pp. 356-364
    • Brownfield, M.1    Gupta, Y.2    Davis, N.3
  • 14
    • 33745969132 scopus 로고    scopus 로고
    • Defending against path-based DoS attacks in wireless sensor networks
    • J. Deng, R. Han, and S. Mishra, "Defending against path-based DoS attacks in wireless sensor networks," In ACM SASN, pp. 89-96, 2005.
    • (2005) ACM SASN , pp. 89-96
    • Deng, J.1    Han, R.2    Mishra, S.3
  • 17
    • 33745949686 scopus 로고    scopus 로고
    • Energy- efficient link-layer jamming attacks against wireless sensor network MAC protocols
    • Y. W. Law, L. vanHoesel, J. Doumen, and P. Havinga, "Energy- efficient link-layer jamming attacks against wireless sensor network MAC protocols," In ACM SASN, pp. 76-88, 2005.
    • (2005) In ACM SASN , pp. 76-88
    • Law, Y.W.1    vanHoesel, L.2    Doumen, J.3    Havinga, P.4
  • 18
    • 33845919241 scopus 로고    scopus 로고
    • Tinyos community forum. Online reference available at: http://www.tinyos.net/.
    • "Tinyos community forum." Online reference available at: http://www.tinyos.net/.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.