SlideShare a Scribd company logo
NEXGEN TECHNOLOGY
FINAL YEAR IEEE PROJECTS TITLES 2015-2016
CONTACT: PRAVEEN KUMAR. L (+91 – 9751442511, +91 – 9791938249)
MAIL ID: sunsid1989@gmail.com, praveen@nexgenproject.com
web:www.nexgenproject.com
1. A Secure Scheme Against Power Exhausting Attacks in Hierarchical Wireless
Sensor Networks
Security and energy efficiency are critical concerns in wireless sensor network (WSN) design.
This paper aims to develop an energy-efficient secure scheme against power exhausting attacks,
especially the denial-of-sleep attacks, which can shorten the lifetime of WSNs rapidly. Although
various media access control (MAC) protocols have been proposed to save the power and extend
the lifetime of WSNs, the existing designs of MAC protocol are insufficient to protect the WSNs
from denial-of-sleep attacks in MAC layer. This is attributed to the fact that the well-known
security mechanisms usually awake the sensor nodes before these nodes are allowed to execute
the security processes. Therefore, the practical design is to simplify the authenticating process in
order to reduce the energy consumption of sensor nodes and enhance the performance of the
MAC protocol in countering the power exhausting attacks. This paper proposes a cross-layer
design of secure scheme integrating the MAC protocol. The analyses show that the proposed
scheme can counter the replay attack and forge attack in an energy-efficient way. The detailed
analysis of energy distribution shows a reasonable decision rule of coordination between energy
conservation and security requirements for WSNs.

More Related Content

DOCX
A secure scheme against power exhausting
PPT
gcettb presentation on sensor network
PPTX
Wireless sensor network
PPTX
PhD Thesis NS2 Projects
PPTX
Wireless Security Thesis Topics
PPTX
Network-Simulator-Master-Thesis-in-UK
A secure scheme against power exhausting
gcettb presentation on sensor network
Wireless sensor network
PhD Thesis NS2 Projects
Wireless Security Thesis Topics
Network-Simulator-Master-Thesis-in-UK

What's hot (17)

PPT
Intro to wsn
PPTX
EAACK-A Secure Intrusion Detection System Overview
PDF
An Effective Policy Anomaly Management Framework for Firewalls
DOCX
Matrix Table
PPTX
Wireless Body Area Network Research Project Topics
DOCX
Java 2015 2016 ieee project list-(v)
PPTX
Wireless sensor network (WSN)
PDF
'Moon' Security Management System for OPNFV
DOCX
Eaack—a secure intrusion detection system for mane ts
PPTX
Intrusion Detection in A Smart Forest-Fire Early Warning Sensory System
PDF
Sourcefire - A Next-Generation Intrusion Prevention Solution Delivering Scala...
PPT
Wireless sensor network
PPT
Wireless Sensor Network
PPT
PPTX
Network Projects
PPTX
Presentation seminar shubham
Intro to wsn
EAACK-A Secure Intrusion Detection System Overview
An Effective Policy Anomaly Management Framework for Firewalls
Matrix Table
Wireless Body Area Network Research Project Topics
Java 2015 2016 ieee project list-(v)
Wireless sensor network (WSN)
'Moon' Security Management System for OPNFV
Eaack—a secure intrusion detection system for mane ts
Intrusion Detection in A Smart Forest-Fire Early Warning Sensory System
Sourcefire - A Next-Generation Intrusion Prevention Solution Delivering Scala...
Wireless sensor network
Wireless Sensor Network
Network Projects
Presentation seminar shubham
Ad

Viewers also liked (20)

DOCX
A poisson hidden markov model for multiview video traffic
DOCX
A spectral clustering approach to identifying cuts in wireless sensor networks
PDF
LPR REVIEWS
PDF
คำวินิจฉัย ต.แม่ยางร้อง
PPTX
Curriculum Vitae workshop
PDF
El+mito+y+la+leyenda
PPTX
Inventosexoticos 130527221328-phpapp02
PDF
Best house in_greater_noida_west
PDF
Ici itd qs project 1
PDF
Brla copeinca (201203 spanish)
PPTX
trabajo de inventarios
PDF
A irrigação no Brasil - Situação e Diretrizes
PPT
για ένα παιδί που κοιμάται Zwh b2
PDF
Building structure project 1 report
PDF
Mitos y leyendas
DOC
Anthony Perry Resume
PPTX
O blogue como suporte a uma WebQuest - formação
PPT
Enhancing global competency global education conference 11.14
PPTX
Pub comm session 14 communication strategy
A poisson hidden markov model for multiview video traffic
A spectral clustering approach to identifying cuts in wireless sensor networks
LPR REVIEWS
คำวินิจฉัย ต.แม่ยางร้อง
Curriculum Vitae workshop
El+mito+y+la+leyenda
Inventosexoticos 130527221328-phpapp02
Best house in_greater_noida_west
Ici itd qs project 1
Brla copeinca (201203 spanish)
trabajo de inventarios
A irrigação no Brasil - Situação e Diretrizes
για ένα παιδί που κοιμάται Zwh b2
Building structure project 1 report
Mitos y leyendas
Anthony Perry Resume
O blogue como suporte a uma WebQuest - formação
Enhancing global competency global education conference 11.14
Pub comm session 14 communication strategy
Ad

Similar to A secure scheme against power exhausting attacks in hierarchical wireless sensor networks (20)

DOCX
A secure scheme against power exhausting attacks in hierarchical wireless sen...
PDF
Secure & Energy Efficient Scheme against Denial-of-Sleep Attack in WSN
PPTX
Security Method in Data Acquisition Wireless Sensor Network
PDF
Enhancing Data Transmission and Protection in Wireless Sensor Node- A Review
PDF
Balancing Trade-off between Data Security and Energy Model for Wireless Senso...
PDF
Integration of security and authentication agent in ns-2 and leach protocol f...
PDF
Integration of security and authentication agent in ns-2 and leach protocol f...
PDF
Integration of security and authentication agent in ns 2 and leach protocol f...
PDF
An Energy Efficient Scheme against Power Exhausting Attacks in Wireless Senso...
PDF
V 14 15432 8feb 27jan 6sep18 ch
PDF
Tactical approach to identify and quarantine spurious node participation requ...
PDF
A SURVEY ON SECURITY IN WIRELESS SENSOR NETWORKS
PDF
A SURVEY ON SECURITY IN WIRELESS SENSOR NETWORKS
PDF
A SURVEY ON SECURITY IN WIRELESS SENSOR NETWORKS
PDF
Integrated Framework for Secure and Energy Efficient Communication System in ...
PDF
Multi-stage secure clusterhead selection using discrete rule-set against unkn...
PDF
AN ADVANCED DATA SECURITY METHOD IN WSN
PDF
AN ADVANCED DATA SECURITY METHOD IN WSN
PDF
Next Generation Network: Security and Architecture
PDF
Data Transfer Security solution for Wireless Sensor Network
A secure scheme against power exhausting attacks in hierarchical wireless sen...
Secure & Energy Efficient Scheme against Denial-of-Sleep Attack in WSN
Security Method in Data Acquisition Wireless Sensor Network
Enhancing Data Transmission and Protection in Wireless Sensor Node- A Review
Balancing Trade-off between Data Security and Energy Model for Wireless Senso...
Integration of security and authentication agent in ns-2 and leach protocol f...
Integration of security and authentication agent in ns-2 and leach protocol f...
Integration of security and authentication agent in ns 2 and leach protocol f...
An Energy Efficient Scheme against Power Exhausting Attacks in Wireless Senso...
V 14 15432 8feb 27jan 6sep18 ch
Tactical approach to identify and quarantine spurious node participation requ...
A SURVEY ON SECURITY IN WIRELESS SENSOR NETWORKS
A SURVEY ON SECURITY IN WIRELESS SENSOR NETWORKS
A SURVEY ON SECURITY IN WIRELESS SENSOR NETWORKS
Integrated Framework for Secure and Energy Efficient Communication System in ...
Multi-stage secure clusterhead selection using discrete rule-set against unkn...
AN ADVANCED DATA SECURITY METHOD IN WSN
AN ADVANCED DATA SECURITY METHOD IN WSN
Next Generation Network: Security and Architecture
Data Transfer Security solution for Wireless Sensor Network

More from Nexgen Technology (20)

DOCX
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
DOCX
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
DOCX
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
DOCX
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
DOCX
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
DOCX
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
DOCX
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CH...
DOCX
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHENN...
DOCX
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
DOCX
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
DOCX
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHENNA...
DOCX
Ieee 2020 21 vlsi projects in pondicherry,ieee vlsi projects in chennai
DOCX
Ieee 2020 21 power electronics in pondicherry,Ieee 2020 21 power electronics
DOCX
Ieee 2020 -21 ns2 in pondicherry, Ieee 2020 -21 ns2 projects,best project cen...
DOCX
Ieee 2020 21 ns2 in pondicherry,best project center in pondicherry,final year...
DOCX
Ieee 2020 21 java dotnet in pondicherry,final year projects in pondicherry,pr...
DOCX
Ieee 2020 21 iot in pondicherry,final year projects in pondicherry,project ce...
DOCX
Ieee 2020 21 blockchain in pondicherry,final year projects in pondicherry,bes...
DOCX
Ieee 2020 -21 bigdata in pondicherry,project center in pondicherry,best proje...
DOCX
Ieee 2020 21 embedded in pondicherry,final year projects in pondicherry,best...
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CH...
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHENN...
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHENNA...
Ieee 2020 21 vlsi projects in pondicherry,ieee vlsi projects in chennai
Ieee 2020 21 power electronics in pondicherry,Ieee 2020 21 power electronics
Ieee 2020 -21 ns2 in pondicherry, Ieee 2020 -21 ns2 projects,best project cen...
Ieee 2020 21 ns2 in pondicherry,best project center in pondicherry,final year...
Ieee 2020 21 java dotnet in pondicherry,final year projects in pondicherry,pr...
Ieee 2020 21 iot in pondicherry,final year projects in pondicherry,project ce...
Ieee 2020 21 blockchain in pondicherry,final year projects in pondicherry,bes...
Ieee 2020 -21 bigdata in pondicherry,project center in pondicherry,best proje...
Ieee 2020 21 embedded in pondicherry,final year projects in pondicherry,best...

A secure scheme against power exhausting attacks in hierarchical wireless sensor networks

  • 1. NEXGEN TECHNOLOGY FINAL YEAR IEEE PROJECTS TITLES 2015-2016 CONTACT: PRAVEEN KUMAR. L (+91 – 9751442511, +91 – 9791938249) MAIL ID: sunsid1989@gmail.com, praveen@nexgenproject.com web:www.nexgenproject.com 1. A Secure Scheme Against Power Exhausting Attacks in Hierarchical Wireless Sensor Networks Security and energy efficiency are critical concerns in wireless sensor network (WSN) design. This paper aims to develop an energy-efficient secure scheme against power exhausting attacks, especially the denial-of-sleep attacks, which can shorten the lifetime of WSNs rapidly. Although various media access control (MAC) protocols have been proposed to save the power and extend the lifetime of WSNs, the existing designs of MAC protocol are insufficient to protect the WSNs from denial-of-sleep attacks in MAC layer. This is attributed to the fact that the well-known security mechanisms usually awake the sensor nodes before these nodes are allowed to execute the security processes. Therefore, the practical design is to simplify the authenticating process in order to reduce the energy consumption of sensor nodes and enhance the performance of the MAC protocol in countering the power exhausting attacks. This paper proposes a cross-layer design of secure scheme integrating the MAC protocol. The analyses show that the proposed scheme can counter the replay attack and forge attack in an energy-efficient way. The detailed analysis of energy distribution shows a reasonable decision rule of coordination between energy conservation and security requirements for WSNs.