scholarly journals Narcolepsy – The sleep attack

2018 ◽  
Vol 2 (2) ◽  
pp. 41-42 ◽  
Author(s):  
Aswathy R ◽  
Keyword(s):  
Neurology ◽  
1966 ◽  
Vol 16 (1) ◽  
pp. 18-18 ◽  
Author(s):  
W. Dement ◽  
A. Rechtschaffen ◽  
G. Gulevich
Keyword(s):  

Author(s):  
Vivekanadam B

A typical Wireless Sensor Network (WSN) comprises of multiple nodes that are used to control as well as monitor the environment and perform pre-described actions. Based on the network, the sensor nodes are distributed and their energy consumption proves to be challenging. When the nodes are located near the sink, they serve as the interface for data transfer between the sink and the node. Because of this, there is a decrease in the networks lifetime and further the energy consumption of the nodes increases significantly. Denial-of-sleep attack is a threat that sensor nodes face in WSNs. DoSA is the condition when there is much loss of energy at the nodes by preventing them from entering into sleep mode and power save mode. We propose a hybrid methodology of Hopfield neural network and firefly algorithm using leach to tackle this issue such that there is a significant increase in network lifetime and energy consumption patterns.


2009 ◽  
Vol 32 (6) ◽  
pp. 365 ◽  
Author(s):  
Pedro J. Garcia Ruiz
Keyword(s):  

2013 ◽  
Vol 9 (2) ◽  
pp. 1063-1067
Author(s):  
Manju Vc ◽  
Dr.Sasi Kumar.

A wireless sensor network is a wireless network organized with a large number of sensor nodes with specialized sensors that can monitor various physical attributes such as temperature, pressure, vibration, and sound. Sensor nodes are powered up with batteries. Due to unattended nature of the deployment, the sensor nodes’ batteries cannot be recharged. In such conditions, the nodes must optimally consume power. Various protocols are designed to reduce the energy consumption of sensor nodes by keeping the antenna in sleep mode 90% of time, so that power is saved. MAC protocols are designed to adaptively vary the sleep time based on the communication need. But attackers use their knowledge of their underlying MAC protocol, to reduce the sleep time for the node, so that the lifetime of a node reduces. This problem is popularly known as Denial of sleep attack. In this paper, we propose an effective solution }to defend against such attacks in  a sensor network. Our proposed solution introduces communication overhead only when the attack is suspected and also the defending mechanism is triggered only in the area of attack. Also the analysis shows that our solution is very strong against SYNC replay attack and jamming attacks.


Sign in / Sign up

Export Citation Format

Share Document