9
Views
0
CrossRef citations to date
0
Altmetric
Original Articles

The Sleep Deprivation Attack in Sensor Networks: Analysis and Methods of Defense

, , , , &
Pages 267-287 | Published online: 23 Feb 2007

References

  • Bandyopadhyay , S. and Coyle , E. J. 2003 . An Energy-Efficient Hierarchical Clustering Algorithm for Wireless Sensor Networks . INFOCOM , 3 : 1713 – 1723 .
  • Basagni , S. Distributed Clustering for Ad Hoc Networks . The International Symposium on Parallel Architectures, Algorithms, and Networks . June 23–25 1999 , Fremantle, Australia. pp. 310 – 315 .
  • Boukerche , A. , Cheng , X. and Linus , J. Energy-Aware Data-Centric Routing in Microsensor Networks . International Workshop on Modeling Analysis and Simulation of Wireless and Mobile Systems . September 19 2003 , San Diego, CA. pp. 42 – 49 .
  • Brooks , R. R. and Iyengar , S. S . 1998 . Multi-Sensor Fusion: Fundamentals and Applications with Software , Upper Saddle River, NJ : Prentice Hall .
  • Brooks , R. R. , Ramanathan , P. and Sayeed , A. M. Distributed Target Classification and Tracking in Sensor Networks . Proceedings of the IEEE . Vol. 91 , August . pp. 1163 – 1171 .
  • 6. S. Capkun, and J. Hubaux, Secure Positioning in Sensor Networks. Tech. rep., EPFL/IC/200444, 2004.
  • Cardenas , A. , Radosavac , S. and Baras , J. Detection and Prevention of Mac Layer Misbehavior for Ad Hoc Networks . Workshop on Security of ad hoc and Sensor Networks . October 25 2004 , Washington, DC.
  • 8. D. W. Carman, P. S. Kruus, and B. J. Matt, Constraints and Approaches for Distributed Sensor Network Security. Tech. rep., NAI Labs #00–010, 2000
  • Chan , H. and Perrig , A. 2003 . Security and Privacy in Sensor Networks . IEEE Computer Magazine , : 103 – 105 .
  • Chan , H. and Perrig , A. 2004 . ACE: An Emergent Algorithm for Highly Uniform Cluster Formation . European Workshop on Wireless Sensor Networks . January 19–21 2004 , Berlin, Germany.
  • Chen , B. , Jamieson , K. , Balakrishnan , H. and Morris , R. 2002 . Span: An Energy-Efficient Coordination Algorithm for Topology Maintenance in Ad Hoc Wireless Networks . Wireless Networks , 8 ( 5 ) : 481 – 494 . [CSA] [CROSSREF]
  • Chiang , C. , Wu , H. , Liu , W. and Gerla , M. 1997 . Routing in Clustered Multihop, Mobile Wireless Networks with Fading Chanel . IEEE Singapore International Conference on Networks, SICON ‘97 . April 10–17 1997 . pp. 197 – 211 .
  • Chu , M. , Haussecker , H. and Zhao , F. 2002 . Scalable Information-Driven Sensor Querying and Routing for Ad Hoc Heterogeneous Sensor Networks . The Int't J. of High Performance Computing Applications , 16 ( 3 ) : 293 – 313 . [CSA]
  • Duarte-Melo , E. J. and Liu , M. 2002 . Analysis of Energy Consumption and Lifetime of Heterogeneous Wireless Sensor Networks . Globecom , 1 : 21 – 25 . [CSA]
  • Gao , J. , Guibas , L. J. , Hershberger , J. , Zhang , L. and Zhu , A. 2001 . Discrete Mobile Centers . Computational Geometry , : 188 – 196 . [CSA]
  • Gerla , M. and Tsai , J. T.-C. 1995 . Multicluster, Mobile, Multimedia Radio Network . Wireless Networks , 1 ( 3 ) : 255 – 265 . 30 (1)[CSA] [CROSSREF]
  • He , T. , Krishnamurthy , S. , Stankovic , J. A. , Abdelzaher , T. , Luo , L. , Stoleru , R. , Yan , T. , Gu , L. , Hui , J. and Krogh , B. Energy-Efficient Surveillance System using Wireless Sensor Networks, MobiSys ‘04 . Proceedings on the 2nd International Conference on Mobile Systems, applications and Services . June 6–9 2004 , Boston, MA, USA. pp. 270 – 283 .
  • Heidemann , J. , Silva , F. , Intanagonwiwat , C. , Govindan , R. , Estrin , D. and Ganesan , D. Building Efficient Wireless Sensor Networks with Low-Level naming . ACM Symposium on Operating Systems Principles . October 21–24 , Banff, Alberta, CA. pp. 146 – 159 .
  • Heinzelman , W. R. , Chandrakasan , A. and Balakrishnan , H. 2000 . Energy-Efficient Communication Protocol for Wireless Microsensor Networks . Hawaii International Conference on System Sciences . January 4–7 2000 , Maui, Hawaii.
  • Intanagonwiwat , C. , Govindan , R. and Estrin , D. 2000 . Directed Diffusion: A Scalable and Robust Communication Paradigm for Sensor Networks . MobiCom , : 56 – 67 . [CSA]
  • Karlof , C. and Wagner , D. 2003 . Secure Routing in Sensor Networks: Attacks and Countermeasures . Proc. of the IEEE SNPA Workshop . May 11 2003 , Anchorge, AL.
  • 22. J. Krishnaswami, Denial-of-Service Attacks on Battery-Powered Mobile Computers, Master's thesis, Virginia Polytechnic Institute and State University, 2003
  • 23. P. Kyasanur, and N. Vaidya, Detection and Handling of Mac Layer Misbehavior in Wireless Networks. DSN: Dependable Systems and Networks, San Francisco, CA, June 22–25 2003
  • Lazos , L. and Pooverdran , R. Serloc: Secure Range-Independent Localization for Wireless Sensor Networks . ACM Workshop on Wireless Security . October 1 , Philadelphia, PA.
  • Pattem , S. , Poduri , S. and Krishnamachari , B. Energy-Quality Tradeoffs for Target Tracking in Wireless Sensor Networks . Information Processing In Sensor Networks . April 22–23 2003 , PaloAlto, CA, USA. pp. 32 – 46 .
  • Perrig , A. , Szewczyk , R. , Tygar , J. D. , Wen , V. and Culler , D. E. 2002 . SPINS: Security Protocols for Sensor Networks . Wireless Networks , 8 ( 5 ) : 521 – 534 . [CSA] [CROSSREF]
  • Phoha , S. , Jacobson , N. , Friedlander , D. and Brooks , R. R. 2003 . Sensor Network Based Localization and Target Tracking through Hybridization and Dynamic Space-Time Clustering . Globecom , 5 : 1555 – 1567 . [CSA]
  • Raghunathan , V. , Schurgers , C. , Park , S. and Srivastava , M. B. 2002 . Energy-Aware Wireless Microsensor Networks . IEEE, Sig. Proc. Magazine , 19 ( 2 ) : 40 – 50 . [CSA] [CROSSREF]
  • Raya , M. , Hubaux , J. and Aad , I. 2004 . Domino: A System to Detect Greedy Behavior in ieee 802.11 Hotspots, MobiSys . Proceedings of the Second International Conference on Mobile Systems, Applications and Services . 2004 .
  • Shih , E. , Cho , S.-H. , Ickes , N. , Min , R. , Sinha , A. , Wang , A. and Chandrakasan , A. 2001 . Physical Layer Driven Protocol and Algorithm Design for Energy-Efficient Wireless Sensor Networks, MobiCom . 1.652 MobiSys 01: the seventh annual international conference on Mobile computing and networking . July 16–21 2001 , Rome, Italy. pp. 272 – 287 .
  • 31. J. Shin, L. J. Guibas, and F. Zhao, A Distributed Algorithm for Managing Multi-Target Identities in Wireless Ad-Hoc Sensor Networks, Information Processing In Sensor Networks, pp. 223–238, 2003.
  • 32. F. Stajano, Security for Ubiquitous Computing, John Wiley & Sons, Ltd., New York, NY, June 6–9, 2004, Hyatt Harborside, Boston, MA, USA. 2002.
  • Stajano , F. and Anderson , R. The Resurrecting Duckling: Security Issues in Ad-Hoc Wireless Networks . Proc. of the Third AT&T Software Symposium . Oct 20 1999 , Middletown, NJ.
  • Wagner , D. 2004 . Resilient Aggregation in Sensor Networks . Workshop on Security of ad hoc and Sensor Networks . 2004 .
  • Woo , A. , Tong , T. and Culler , D. Taming the Underlying Challenges of Reliable Multihop Routing in Sensor Networks . Conference On Embedded Networked Sensor Systems . November 5–7 2003 , Los Angeles, CA. pp. 14 – 27 .
  • Wood , A. D. and Stankovic , J. A. 2002 . Denial of Service in Sensor Networks . Computer , 35 ( 10 ) : 54 – 62 . [CSA] [CROSSREF]
  • Zhang , W. and Cao , G. 2004 . DCTC: Dynamic Convoy Tree-Based Collaboration for Target Tracking in Sensor Networks . IEEE Trans. on Wireless Communication , 3 ( 5 ) : 1689 – 1701 . [CSA] [CROSSREF]
  • Zhang , W. and Cao , G. 2004 . Optimizing Tree Reconfiguration for Mobile Target Tracking in Sensor Networks . 4 : 2434 – 2445 . [CSA]
  • Zhao , F. , Shin , J. and Reich , J. 2002 . Information-Driven Dynamic Sensor Collaboration . IEEE Sig. Proc. Magazine , 19 ( 2 ) : 61 – 72 . [CSA] [CROSSREF]
  • Zhu , S. , Setia , S. and Jajodia , S. LEAP: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks . Conference on Computer and Communications Security . October 27–30 2003 , Washington, D.C.. pp. 62 – 72 .

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.