Wireless sensor networks: a survey
Computer Networks: The International Journal of Computer and Telecommunications Networking
Discord model for detecting unexpected demands in mobile networks
Future Generation Computer Systems - Special issue: Modeling and simulation in supercomputing and telecommunications
Denial-of-Service in Wireless Sensor Networks: Attacks and Defenses
IEEE Pervasive Computing
Wireless sensor networks for personal health monitoring: Issues and an implementation
Computer Communications
Privacy and emergency response in e-healthcare leveraging wireless body sensor networks
IEEE Wireless Communications
Wireless, multipurpose in-home health monitoring platform: two case trials
IEEE Transactions on Information Technology in Biomedicine - Special section on affective and pervasive computing for healthcare
A survey on jamming attacks and countermeasures in WSNs
IEEE Communications Surveys & Tutorials
Sensor network security: a survey
IEEE Communications Surveys & Tutorials
Securing wireless sensor networks: a survey
IEEE Communications Surveys & Tutorials
IEEE Transactions on Information Technology in Biomedicine
Efficient mobile sensor authentication in smart home and WPAN
IEEE Transactions on Consumer Electronics
Maximum damage malware attack in mobile wireless networks
IEEE/ACM Transactions on Networking (TON)
Hi-index | 0.00 |
One of the critical issue of wireless sensor networks is a poor sensor battery. It leads to sensor vulnerability for battery exhausting attacks. Quick depletion of battery power is not only explained by intrusions but also by a malfunction of networks protocols. In this paper, a special type of denial-of-service attack is investigated. The intrusion effect is the depletion of sensor battery power. In contrast to general denial-of-service attack, quality of service under the considered attack is not necessarily degraded. Therefore, the application of traditional defense mechanism against this intrusion is not always possible. Taking into account proprieties of wireless sensor networks, a model for evaluation of energy consumption under the attack is described. Using this model, the attack detection method is offered.