Title :
A Secure Scheme Against Power Exhausting Attacks in Hierarchical Wireless Sensor Networks
Author :
Ching-Tsung Hsueh ; Chih-Yu Wen ; Yen-Chieh Ouyang
Author_Institution :
Dept. of Electr. Eng., Nat. Chung Hsing Univ., Taichung, Taiwan
Abstract :
Security and energy efficiency are critical concerns in wireless sensor network (WSN) design. This paper aims to develop an energy-efficient secure scheme against power exhausting attacks, especially the denial-of-sleep attacks, which can shorten the lifetime of WSNs rapidly. Although various media access control (MAC) protocols have been proposed to save the power and extend the lifetime of WSNs, the existing designs of MAC protocol are insufficient to protect the WSNs from denial-of-sleep attacks in MAC layer. This is attributed to the fact that the well-known security mechanisms usually awake the sensor nodes before these nodes are allowed to execute the security processes. Therefore, the practical design is to simplify the authenticating process in order to reduce the energy consumption of sensor nodes and enhance the performance of the MAC protocol in countering the power exhausting attacks. This paper proposes a cross-layer design of secure scheme integrating the MAC protocol. The analyses show that the proposed scheme can counter the replay attack and forge attack in an energy-efficient way. The detailed analysis of energy distribution shows a reasonable decision rule of coordination between energy conservation and security requirements for WSNs.
Keywords :
access protocols; cryptographic protocols; energy conservation; telecommunication power management; telecommunication security; wireless sensor networks; MAC protocol; WSN lifetime extension; authenticating process; cross-layer design; denial-of-sleep attack; energy conservation; energy consumption reduction; energy distribution analysis; energy-efficient secure scheme; forge attack; hierarchical wireless sensor network security; media access control protocol; power exhausting attack; power saving; replay attack; Logic gates; Media Access Protocol; Receivers; Security; Sensors; Wireless sensor networks; Wireless sensor networks; denial-of-sleep; energy efficiency; power exhausting attacks; secure scheme; wireless sensor networks;
Journal_Title :
Sensors Journal, IEEE
DOI :
10.1109/JSEN.2015.2395442