SlideShare a Scribd company logo
NEXGEN TECHNOLOGY
FINAL YEAR IEEE PROJECTS TITLES 2015-2016
CONTACT: PRAVEEN KUMAR. L (+91 – 9751442511, +91 – 9791938249)
MAIL ID: sunsid1989@gmail.com, praveen@nexgenproject.com
web:www.nexgenproject.com
1. A Secure Scheme Against Power Exhausting Attacks in Hierarchical Wireless
Sensor Networks
Security and energy efficiency are critical concerns in wireless sensor network (WSN) design.
This paper aims to develop an energy-efficient secure scheme against power exhausting attacks,
especially the denial-of-sleep attacks, which can shorten the lifetime of WSNs rapidly. Although
various media access control (MAC) protocols have been proposed to save the power and extend
the lifetime of WSNs, the existing designs of MAC protocol are insufficient to protect the WSNs
from denial-of-sleep attacks in MAC layer. This is attributed to the fact that the well-known
security mechanisms usually awake the sensor nodes before these nodes are allowed to execute
the security processes. Therefore, the practical design is to simplify the authenticating process in
order to reduce the energy consumption of sensor nodes and enhance the performance of the
MAC protocol in countering the power exhausting attacks. This paper proposes a cross-layer
design of secure scheme integrating the MAC protocol. The analyses show that the proposed
scheme can counter the replay attack and forge attack in an energy-efficient way. The detailed
analysis of energy distribution shows a reasonable decision rule of coordination between energy
conservation and security requirements for WSNs.

More Related Content

DOCX
A secure scheme against power exhausting attacks in hierarchical wireless sen...
DOCX
A secure scheme against power exhausting
PPT
gcettb presentation on sensor network
PPTX
Wireless sensor network
PPTX
PhD Thesis NS2 Projects
PPTX
Wireless Security Thesis Topics
A secure scheme against power exhausting attacks in hierarchical wireless sen...
A secure scheme against power exhausting
gcettb presentation on sensor network
Wireless sensor network
PhD Thesis NS2 Projects
Wireless Security Thesis Topics

What's hot (18)

PPTX
Network-Simulator-Master-Thesis-in-UK
PPT
Intro to wsn
PPTX
EAACK-A Secure Intrusion Detection System Overview
PDF
An Effective Policy Anomaly Management Framework for Firewalls
DOCX
Matrix Table
PPTX
Wireless Body Area Network Research Project Topics
DOCX
Java 2015 2016 ieee project list-(v)
PPTX
Wireless sensor network (WSN)
PDF
'Moon' Security Management System for OPNFV
DOCX
Eaack—a secure intrusion detection system for mane ts
PPTX
Intrusion Detection in A Smart Forest-Fire Early Warning Sensory System
PDF
Sourcefire - A Next-Generation Intrusion Prevention Solution Delivering Scala...
PPT
Wireless sensor network
PPT
Wireless Sensor Network
PPT
PPTX
Network Projects
PPTX
Presentation seminar shubham
Network-Simulator-Master-Thesis-in-UK
Intro to wsn
EAACK-A Secure Intrusion Detection System Overview
An Effective Policy Anomaly Management Framework for Firewalls
Matrix Table
Wireless Body Area Network Research Project Topics
Java 2015 2016 ieee project list-(v)
Wireless sensor network (WSN)
'Moon' Security Management System for OPNFV
Eaack—a secure intrusion detection system for mane ts
Intrusion Detection in A Smart Forest-Fire Early Warning Sensory System
Sourcefire - A Next-Generation Intrusion Prevention Solution Delivering Scala...
Wireless sensor network
Wireless Sensor Network
Network Projects
Presentation seminar shubham
Ad

Similar to A Secure Scheme Against Power Exhausting Attacks in Hierarchical Wireless Sensor Networks (20)

DOCX
A secure scheme against power exhausting attacks in hierarchical wireless sen...
DOCX
Secure And Efficient Defense Strategy Against Energy Exhausting Attacks In Wsn
PDF
PDF
A Security Framework for Replication Attacks in Wireless Sensor Networks
PDF
Access-2022-24126_Proof_hi.pdf
PDF
Optimization of Transmission Schemes in Energy-Constrained Wireless Sensor Ne...
DOCX
Wireless body area network
PDF
A-SURVEY SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORK
PDF
IRJET-A Reliable Strategy Against Power Dissipating Attacks in Hierarchical W...
DOCX
PDF
AN ANTI-CLONE ATTACK KEY MANAGEMENT SCHEME FOR WIRELESS SENSOR NETWORKS
PDF
IMPLEMENTATION OF SECURITY PROTOCOL FOR WIRELESS SENSOR
PDF
An Intuitionistic Fuzzy Sets Implementation for Key Distribution in Hybrid Me...
PDF
EFFECT OF HASH FUNCTION ON PERFORMANCE OF LOW POWER WAKE UP RECEIVER FOR WIRE...
PDF
29 6 jul17 29may 7308 ijeecs paper_july_6 edit septian(edit)
PDF
[IJET-V1I3P2] Authors :Monali Madne, Prof.Manjusha Yeola
PDF
Wireless Sensor Network Nodes: Security and Deployment in the Niger-Delta Oil...
PDF
Java eaack—a secure intrusion-detection system for mane ts
DOCX
Eaack—a secure intrusion detection system for mane ts
A secure scheme against power exhausting attacks in hierarchical wireless sen...
Secure And Efficient Defense Strategy Against Energy Exhausting Attacks In Wsn
A Security Framework for Replication Attacks in Wireless Sensor Networks
Access-2022-24126_Proof_hi.pdf
Optimization of Transmission Schemes in Energy-Constrained Wireless Sensor Ne...
Wireless body area network
A-SURVEY SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORK
IRJET-A Reliable Strategy Against Power Dissipating Attacks in Hierarchical W...
AN ANTI-CLONE ATTACK KEY MANAGEMENT SCHEME FOR WIRELESS SENSOR NETWORKS
IMPLEMENTATION OF SECURITY PROTOCOL FOR WIRELESS SENSOR
An Intuitionistic Fuzzy Sets Implementation for Key Distribution in Hybrid Me...
EFFECT OF HASH FUNCTION ON PERFORMANCE OF LOW POWER WAKE UP RECEIVER FOR WIRE...
29 6 jul17 29may 7308 ijeecs paper_july_6 edit septian(edit)
[IJET-V1I3P2] Authors :Monali Madne, Prof.Manjusha Yeola
Wireless Sensor Network Nodes: Security and Deployment in the Niger-Delta Oil...
Java eaack—a secure intrusion-detection system for mane ts
Eaack—a secure intrusion detection system for mane ts
Ad

More from Nexgen Technology (20)

DOCX
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
DOCX
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
DOCX
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
DOCX
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
DOCX
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
DOCX
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
DOCX
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CH...
DOCX
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHENN...
DOCX
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
DOCX
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
DOCX
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHENNA...
DOCX
Ieee 2020 21 vlsi projects in pondicherry,ieee vlsi projects in chennai
DOCX
Ieee 2020 21 power electronics in pondicherry,Ieee 2020 21 power electronics
DOCX
Ieee 2020 -21 ns2 in pondicherry, Ieee 2020 -21 ns2 projects,best project cen...
DOCX
Ieee 2020 21 ns2 in pondicherry,best project center in pondicherry,final year...
DOCX
Ieee 2020 21 java dotnet in pondicherry,final year projects in pondicherry,pr...
DOCX
Ieee 2020 21 iot in pondicherry,final year projects in pondicherry,project ce...
DOCX
Ieee 2020 21 blockchain in pondicherry,final year projects in pondicherry,bes...
DOCX
Ieee 2020 -21 bigdata in pondicherry,project center in pondicherry,best proje...
DOCX
Ieee 2020 21 embedded in pondicherry,final year projects in pondicherry,best...
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CH...
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHENN...
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHENNA...
Ieee 2020 21 vlsi projects in pondicherry,ieee vlsi projects in chennai
Ieee 2020 21 power electronics in pondicherry,Ieee 2020 21 power electronics
Ieee 2020 -21 ns2 in pondicherry, Ieee 2020 -21 ns2 projects,best project cen...
Ieee 2020 21 ns2 in pondicherry,best project center in pondicherry,final year...
Ieee 2020 21 java dotnet in pondicherry,final year projects in pondicherry,pr...
Ieee 2020 21 iot in pondicherry,final year projects in pondicherry,project ce...
Ieee 2020 21 blockchain in pondicherry,final year projects in pondicherry,bes...
Ieee 2020 -21 bigdata in pondicherry,project center in pondicherry,best proje...
Ieee 2020 21 embedded in pondicherry,final year projects in pondicherry,best...

A Secure Scheme Against Power Exhausting Attacks in Hierarchical Wireless Sensor Networks

  • 1. NEXGEN TECHNOLOGY FINAL YEAR IEEE PROJECTS TITLES 2015-2016 CONTACT: PRAVEEN KUMAR. L (+91 – 9751442511, +91 – 9791938249) MAIL ID: sunsid1989@gmail.com, praveen@nexgenproject.com web:www.nexgenproject.com 1. A Secure Scheme Against Power Exhausting Attacks in Hierarchical Wireless Sensor Networks Security and energy efficiency are critical concerns in wireless sensor network (WSN) design. This paper aims to develop an energy-efficient secure scheme against power exhausting attacks, especially the denial-of-sleep attacks, which can shorten the lifetime of WSNs rapidly. Although various media access control (MAC) protocols have been proposed to save the power and extend the lifetime of WSNs, the existing designs of MAC protocol are insufficient to protect the WSNs from denial-of-sleep attacks in MAC layer. This is attributed to the fact that the well-known security mechanisms usually awake the sensor nodes before these nodes are allowed to execute the security processes. Therefore, the practical design is to simplify the authenticating process in order to reduce the energy consumption of sensor nodes and enhance the performance of the MAC protocol in countering the power exhausting attacks. This paper proposes a cross-layer design of secure scheme integrating the MAC protocol. The analyses show that the proposed scheme can counter the replay attack and forge attack in an energy-efficient way. The detailed analysis of energy distribution shows a reasonable decision rule of coordination between energy conservation and security requirements for WSNs.