SlideShare a Scribd company logo
A Secure Scheme against Power Exhausting Attacks in
Hierarchical Wireless Sensor Networks
ABSTRACT:
Security and energy efficiency are critical concerns in wireless sensor network
(WSN) design. This paper aims to develop an energy-efficient secure scheme
against power exhausting attacks, especially the denial-of-sleep attacks, which can
shorten the lifetime ofWSNs rapidly. Although various media access control
(MAC) protocols have been proposed to save the power and extend the lifetime of
WSNs, the existing designs of MAC protocol are insufficient to protect the WSNs
from denial of sleep attacks in MAC layer. This is attributed to the fact that the
well-known security mechanisms usually awake the sensor nodes before these
nodes are allowed to execute the security processes. Therefore, the practical design
is to simplify the authenticating process in order to reduce the energy consumption
of sensor nodes and enhance the performance of the MAC protocol in countering
the power exhausting attacks. This paper proposes a cross-layer design of secure
scheme integrating the MAC protocol. The analyses show that the proposed
scheme can counter the replay attack and forge attack in an energy-efficient way.
The detailed analysis of energy distribution shows a reasonable decision rule of
coordination between energy conservation and security requirements for WSNs.
EXISTING SYSTEM:
• In existing, The B-MAC is an LPL based WSN MAC protocol, which
decouples the sender and receiver with time synchronization.
• The B-MAC protocol has no ACKs and the receiver has to listen and to wait
for the long preamble ended from the sender.
• This long preamble design of LPL based protocol consumes the major
energy of both sender and receiver.
• A dynamic session key policy (DSKP) was proposed based on a one time
password (OTP) system to protect users during the authentication process
and sessionkey agreement process.
• It is hard to trace and detect. By using the counter indicated hash-chain
algorithm, the DSKP is computationally cheap.
DISADVANTAGES OF EXISTING SYSTEM:
• Consumes more energy both sender and receiver
• DSKP is hard to trace and detect
• Not suitable to the asynchronous LPL based MAC protocol
PROPOSED SYSTEM:
• In this project, a cross-layer design of secure scheme integrating the MAC
protocol, Two-Tier Energy-Efficient Secure Scheme (TE2S), is proposed to
protect the WSNs from the existing attacks based on our preliminary
frameworks.
• This cross-layer design involves coupling two layers at design time without
creating new interface for information sharing at runtime. This project
proposes a two-tier secure transmission scheme. This scheme uses the hash-
chain to generate the dynamic session key, which can be used for mutual
authentication and the symmetric encryption key.
• The only computations of dynamic session key are the hash functions, such
as MD5 or SHA-1, which are very simple and fast. By integrating with
MAC protocol, there is no extra packet compared with the existing MAC
designs.
• The two-tier design can check and interrupt the attacks at different check
points. The combination of low complexity security process and multiple
check points design can defense against attacks and send the sensor nodes
back to sleep mode as soonas possible.
ADVANTAGES OF PROPOSED SYSTEM:
• Consume the less energy
• Increase the network lifetime
• Use the hash-chain to generate the symmetric encryption key
SYSTEM ARCHITECTURE:
SYSTEM FLOW:
SYSTEM REQUIREMENTS:
HARDWARE REQUIREMENTS:
 System : Pentium IV 2.4 GHz.
 Hard Disk : 40 GB.
 Floppy Drive : 1.44 Mb.
 Monitor : 15 VGA Colour.
 Mouse : Logitech.
 Ram : 512 Mb.
SOFTWARE REQUIREMENTS:
 Operating system : Windows XP/7/LINUX.
 Implementation : NS2
 NS2 Version : NS2.2.28
 Front End : OTCL (Object Oriented Tool Command
Language)
 Tool : Cygwin (To simulate in Windows OS)
REFERENCE:
Ching-Tsung Hsueh, Chih-Yu Wen, Member, IEEE, and Yen-Chieh Ouyang,
Member, IEEE, “A Secure Scheme Against Power Exhausting Attacks in
Hierarchical Wireless Sensor Networks”, IEEE SENSORS JOURNAL, VOL. 15,
NO. 6, JUNE 2015.

More Related Content

DOCX
A secure scheme against power exhausting attacks in hierarchical wireless sen...
PPTX
PhD Thesis NS2 Projects
PPT
Security in WSN
PPTX
Wsn1 ppt
DOCX
Secure and efficient data transmission for cluster based wireless sensor netw...
PPTX
SECURE AND EFFICIENT DATA TRANSMISSION FOR CLUSTER-BASED WIRELESS SENSOR NETW...
PPTX
Security in Wireless Sensor Network
PPTX
Wireless Sensor Network Security
A secure scheme against power exhausting attacks in hierarchical wireless sen...
PhD Thesis NS2 Projects
Security in WSN
Wsn1 ppt
Secure and efficient data transmission for cluster based wireless sensor netw...
SECURE AND EFFICIENT DATA TRANSMISSION FOR CLUSTER-BASED WIRELESS SENSOR NETW...
Security in Wireless Sensor Network
Wireless Sensor Network Security

What's hot (17)

PPTX
Network Simulation Tools Projects
PPTX
Wireless Sensor Network
PPTX
Wireless sensor network security issues
PPTX
Security in wireless sensor network
PPTX
EAACK-A Secure Intrusion Detection System Overview
PPTX
Network Engineering Projects in NS3
DOCX
Eaack—a secure intrusion detection system for mane ts
PPT
security in wireless sensor network
PPTX
Wireless sensor network security
DOCX
Vampire attacks draining life from wireless ad hoc sensor networks
PPTX
Wireless Network Thesis in NS2
PPTX
Postgraduate Projects in NS2
PPTX
Ppt (secure and efficient data transmission 2)
PPTX
11011 a0449 secure routing wsn
PPT
Security and privacy in Wireless Sensor Networks
PDF
Overview on security and privacy issues in wireless sensor networks-2014
PPTX
Secure and efficient data transmission for cluster based wireless
Network Simulation Tools Projects
Wireless Sensor Network
Wireless sensor network security issues
Security in wireless sensor network
EAACK-A Secure Intrusion Detection System Overview
Network Engineering Projects in NS3
Eaack—a secure intrusion detection system for mane ts
security in wireless sensor network
Wireless sensor network security
Vampire attacks draining life from wireless ad hoc sensor networks
Wireless Network Thesis in NS2
Postgraduate Projects in NS2
Ppt (secure and efficient data transmission 2)
11011 a0449 secure routing wsn
Security and privacy in Wireless Sensor Networks
Overview on security and privacy issues in wireless sensor networks-2014
Secure and efficient data transmission for cluster based wireless
Ad

Similar to A secure scheme against power exhausting (20)

DOCX
A secure scheme against power exhausting attacks in hierarchical wireless sen...
PDF
Secure & Energy Efficient Scheme against Denial-of-Sleep Attack in WSN
PDF
An Encrypted MAC for the Authentication Process in WSN
DOCX
A Secure Scheme Against Power Exhausting Attacks in Hierarchical Wireless Sen...
DOCX
A secure scheme against power exhausting attacks in hierarchical wireless sen...
DOCX
A secure scheme against power exhausting attacks in hierarchical wireless sen...
PDF
An Energy Efficient Scheme against Power Exhausting Attacks in Wireless Senso...
DOCX
Secure And Efficient Defense Strategy Against Energy Exhausting Attacks In Wsn
PDF
IRJET-Secured Approach for Authentication of Messages in Wireless Sensor Netw...
PDF
Conservation Of Battery Power by Alleviating DOS Attacks in Wireless Sensor N...
PDF
Enhanced security for non English users of Wireless Sensor Networks
PDF
An Energy Efficient Data Secrecy Scheme For Wireless Body Sensor Networks
PPTX
Security Method in Data Acquisition Wireless Sensor Network
PDF
Ijretm 2014-sp-043
PDF
Balancing Trade-off between Data Security and Energy Model for Wireless Senso...
PDF
IRJET-A Reliable Strategy Against Power Dissipating Attacks in Hierarchical W...
PPT
Krishna thesis presentation
PDF
Protocols for Wireless Sensor Networks and Its Security
PDF
Multi-stage secure clusterhead selection using discrete rule-set against unkn...
DOC
Novel secure communication protocol basepaper
A secure scheme against power exhausting attacks in hierarchical wireless sen...
Secure & Energy Efficient Scheme against Denial-of-Sleep Attack in WSN
An Encrypted MAC for the Authentication Process in WSN
A Secure Scheme Against Power Exhausting Attacks in Hierarchical Wireless Sen...
A secure scheme against power exhausting attacks in hierarchical wireless sen...
A secure scheme against power exhausting attacks in hierarchical wireless sen...
An Energy Efficient Scheme against Power Exhausting Attacks in Wireless Senso...
Secure And Efficient Defense Strategy Against Energy Exhausting Attacks In Wsn
IRJET-Secured Approach for Authentication of Messages in Wireless Sensor Netw...
Conservation Of Battery Power by Alleviating DOS Attacks in Wireless Sensor N...
Enhanced security for non English users of Wireless Sensor Networks
An Energy Efficient Data Secrecy Scheme For Wireless Body Sensor Networks
Security Method in Data Acquisition Wireless Sensor Network
Ijretm 2014-sp-043
Balancing Trade-off between Data Security and Energy Model for Wireless Senso...
IRJET-A Reliable Strategy Against Power Dissipating Attacks in Hierarchical W...
Krishna thesis presentation
Protocols for Wireless Sensor Networks and Its Security
Multi-stage secure clusterhead selection using discrete rule-set against unkn...
Novel secure communication protocol basepaper
Ad

More from jpstudcorner (20)

DOCX
Variable length signature for near-duplicate
DOCX
Robust representation and recognition of facial
DOCX
Revealing the trace of high quality jpeg
DOCX
Revealing the trace of high quality jpeg
DOCX
Pareto depth for multiple-query image retrieval
DOCX
Multifocus image fusion based on nsct
DOCX
Image super resolution based on
DOCX
Fractal analysis for reduced reference
DOCX
Face sketch synthesis via sparse representation based greedy search
DOCX
Face recognition across non uniform motion
DOCX
Combining left and right palmprint images for
DOCX
A probabilistic approach for color correction
DOCX
A no reference texture regularity metric
DOCX
A feature enriched completely blind image
DOCX
Sel csp a framework to facilitate
DOCX
Query aware determinization of uncertain
DOCX
Psmpa patient self controllable
DOCX
Privacy preserving and truthful detection
DOCX
Privacy policy inference of user uploaded
DOCX
Page a partition aware engine
Variable length signature for near-duplicate
Robust representation and recognition of facial
Revealing the trace of high quality jpeg
Revealing the trace of high quality jpeg
Pareto depth for multiple-query image retrieval
Multifocus image fusion based on nsct
Image super resolution based on
Fractal analysis for reduced reference
Face sketch synthesis via sparse representation based greedy search
Face recognition across non uniform motion
Combining left and right palmprint images for
A probabilistic approach for color correction
A no reference texture regularity metric
A feature enriched completely blind image
Sel csp a framework to facilitate
Query aware determinization of uncertain
Psmpa patient self controllable
Privacy preserving and truthful detection
Privacy policy inference of user uploaded
Page a partition aware engine

Recently uploaded (20)

PPTX
Geodesy 1.pptx...............................................
PPTX
CYBER-CRIMES AND SECURITY A guide to understanding
PPTX
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
PDF
Digital Logic Computer Design lecture notes
PPTX
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
PPTX
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
PDF
composite construction of structures.pdf
PPTX
bas. eng. economics group 4 presentation 1.pptx
PDF
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
PPTX
CH1 Production IntroductoryConcepts.pptx
PDF
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
PPTX
Lesson 3_Tessellation.pptx finite Mathematics
PPTX
additive manufacturing of ss316l using mig welding
PDF
Arduino robotics embedded978-1-4302-3184-4.pdf
PDF
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
PDF
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
PPTX
OOP with Java - Java Introduction (Basics)
PDF
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
PPTX
Internet of Things (IOT) - A guide to understanding
PDF
PPT on Performance Review to get promotions
Geodesy 1.pptx...............................................
CYBER-CRIMES AND SECURITY A guide to understanding
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
Digital Logic Computer Design lecture notes
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
composite construction of structures.pdf
bas. eng. economics group 4 presentation 1.pptx
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
CH1 Production IntroductoryConcepts.pptx
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
Lesson 3_Tessellation.pptx finite Mathematics
additive manufacturing of ss316l using mig welding
Arduino robotics embedded978-1-4302-3184-4.pdf
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
OOP with Java - Java Introduction (Basics)
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
Internet of Things (IOT) - A guide to understanding
PPT on Performance Review to get promotions

A secure scheme against power exhausting

  • 1. A Secure Scheme against Power Exhausting Attacks in Hierarchical Wireless Sensor Networks ABSTRACT: Security and energy efficiency are critical concerns in wireless sensor network (WSN) design. This paper aims to develop an energy-efficient secure scheme against power exhausting attacks, especially the denial-of-sleep attacks, which can shorten the lifetime ofWSNs rapidly. Although various media access control (MAC) protocols have been proposed to save the power and extend the lifetime of WSNs, the existing designs of MAC protocol are insufficient to protect the WSNs from denial of sleep attacks in MAC layer. This is attributed to the fact that the well-known security mechanisms usually awake the sensor nodes before these nodes are allowed to execute the security processes. Therefore, the practical design is to simplify the authenticating process in order to reduce the energy consumption of sensor nodes and enhance the performance of the MAC protocol in countering the power exhausting attacks. This paper proposes a cross-layer design of secure scheme integrating the MAC protocol. The analyses show that the proposed scheme can counter the replay attack and forge attack in an energy-efficient way.
  • 2. The detailed analysis of energy distribution shows a reasonable decision rule of coordination between energy conservation and security requirements for WSNs. EXISTING SYSTEM: • In existing, The B-MAC is an LPL based WSN MAC protocol, which decouples the sender and receiver with time synchronization. • The B-MAC protocol has no ACKs and the receiver has to listen and to wait for the long preamble ended from the sender. • This long preamble design of LPL based protocol consumes the major energy of both sender and receiver. • A dynamic session key policy (DSKP) was proposed based on a one time password (OTP) system to protect users during the authentication process and sessionkey agreement process. • It is hard to trace and detect. By using the counter indicated hash-chain algorithm, the DSKP is computationally cheap. DISADVANTAGES OF EXISTING SYSTEM: • Consumes more energy both sender and receiver
  • 3. • DSKP is hard to trace and detect • Not suitable to the asynchronous LPL based MAC protocol PROPOSED SYSTEM: • In this project, a cross-layer design of secure scheme integrating the MAC protocol, Two-Tier Energy-Efficient Secure Scheme (TE2S), is proposed to protect the WSNs from the existing attacks based on our preliminary frameworks. • This cross-layer design involves coupling two layers at design time without creating new interface for information sharing at runtime. This project proposes a two-tier secure transmission scheme. This scheme uses the hash- chain to generate the dynamic session key, which can be used for mutual authentication and the symmetric encryption key. • The only computations of dynamic session key are the hash functions, such as MD5 or SHA-1, which are very simple and fast. By integrating with MAC protocol, there is no extra packet compared with the existing MAC designs.
  • 4. • The two-tier design can check and interrupt the attacks at different check points. The combination of low complexity security process and multiple check points design can defense against attacks and send the sensor nodes back to sleep mode as soonas possible. ADVANTAGES OF PROPOSED SYSTEM: • Consume the less energy • Increase the network lifetime • Use the hash-chain to generate the symmetric encryption key
  • 7. SYSTEM REQUIREMENTS: HARDWARE REQUIREMENTS:  System : Pentium IV 2.4 GHz.  Hard Disk : 40 GB.  Floppy Drive : 1.44 Mb.  Monitor : 15 VGA Colour.  Mouse : Logitech.  Ram : 512 Mb. SOFTWARE REQUIREMENTS:  Operating system : Windows XP/7/LINUX.  Implementation : NS2  NS2 Version : NS2.2.28  Front End : OTCL (Object Oriented Tool Command Language)  Tool : Cygwin (To simulate in Windows OS)
  • 8. REFERENCE: Ching-Tsung Hsueh, Chih-Yu Wen, Member, IEEE, and Yen-Chieh Ouyang, Member, IEEE, “A Secure Scheme Against Power Exhausting Attacks in Hierarchical Wireless Sensor Networks”, IEEE SENSORS JOURNAL, VOL. 15, NO. 6, JUNE 2015.