Skip to main content
Top
Published in: Wireless Personal Communications 2/2018

17-11-2017

GSHMAC: Green and Secure Hybrid Medium Access Control for Wireless Sensor Network

Authors: Pranav M. Pawar, Rasmus H. Nielsen, Neeli R. Prasad, Ramjee Prasad

Published in: Wireless Personal Communications | Issue 2/2018

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The cost efficiency of wireless platforms and their easy deployment enable the applicability of it in widespread application domains. Wireless sensor networks (WSNs) are not excluded from it. Their application domains vary from industrial monitoring to military applications. A WSN is a resource-constrained network and energy of the WSN node is a valuable resource. Like every other network, WSNs are also vulnerable to security attacks. A security attack can results in networks consuming more resources, leading to earlier depletion of node energy. A significant part of the resource consumption in a WSN is controlled by the medium access control (MAC) mechanism. This paper focuses on WSN MAC mechanisms and countermeasures for attacks targeting the MAC layer in a WSN. Denial of sleep attacks are the most relevant for WSN MAC as these types of attacks have shattered effects, which bring down the sensor lifetime from years to days. This paper proposes a secure hybrid MAC mechanism, Green and Secure Hybrid Medium Access Control (GSHMAC) to overcome the devastating effect of WSN MAC attacks. The proposed mechanism provides features such as collision threshold-based MAC mode control and countermeasures on WSN MAC using internal MAC mechanisms. GSHMAC shows improved energy-efficiency, delay, and throughput in the presence of attacks, as compared with state-of-art secure MAC mechanisms.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Anastasi, G., Conti, M., Di Francesco, M., & Passarella, A. (2009). Energy conservation in wireless sensor networks: A survey. Ad hoc Networks, 7(3), 537–568.CrossRef Anastasi, G., Conti, M., Di Francesco, M., & Passarella, A. (2009). Energy conservation in wireless sensor networks: A survey. Ad hoc Networks, 7(3), 537–568.CrossRef
2.
go back to reference Chen, X., Makki, K., Yen, K., & Pissinou, N. (2009). Sensor network security: A survey. IEEE Communications Surveys & Tutorials, 11(2), 52–73.CrossRef Chen, X., Makki, K., Yen, K., & Pissinou, N. (2009). Sensor network security: A survey. IEEE Communications Surveys & Tutorials, 11(2), 52–73.CrossRef
3.
go back to reference Pawar, P. M., Nielsen, R. H., Prasad, N. R., Ohmori, S., & Prasad, R. (2012). Activity modelling and comparative evaluation of WSN-MAC security attacks. Journal of Cyber Security and Mobility, 1(3), 205–225. Pawar, P. M., Nielsen, R. H., Prasad, N. R., Ohmori, S., & Prasad, R. (2012). Activity modelling and comparative evaluation of WSN-MAC security attacks. Journal of Cyber Security and Mobility, 1(3), 205–225.
4.
go back to reference Abbasi, A. A., & Younis, M. (2007). A survey on clustering algorithms for wireless sensor network. Elsevier Computer Communication, 30(14–15), 2826–2841.CrossRef Abbasi, A. A., & Younis, M. (2007). A survey on clustering algorithms for wireless sensor network. Elsevier Computer Communication, 30(14–15), 2826–2841.CrossRef
5.
go back to reference Pawar, P.M., Nielsen, R.H., Prasad, N.R., Ohmori, S., Prasad, R. (2011). Hybrid mechanisms: Towards an efficient wireless sensor network medium access control. In WPMC, Brest, France (pp. 1–5). Pawar, P.M., Nielsen, R.H., Prasad, N.R., Ohmori, S., Prasad, R. (2011). Hybrid mechanisms: Towards an efficient wireless sensor network medium access control. In WPMC, Brest, France (pp. 1–5).
6.
go back to reference Eisler, M., Labiaga, R., Stern, H. (2001). Chapter 17: Network performance analysis. In M. Loukides (Ed.), Managing NFS and NIS (pp. 168–216). Sebastopol: O’Reilly. Eisler, M., Labiaga, R., Stern, H. (2001). Chapter 17: Network performance analysis. In M. Loukides (Ed.), Managing NFS and NIS (pp. 168–216). Sebastopol: O’Reilly.
7.
go back to reference Ren, Q., Liang, Q. (2004). Secure media access control (MAC) in wireless sensor networks: intrusion detections and countermeasures. In PIMRC, Barcelona, Spain (pp. 3025–3029). Ren, Q., Liang, Q. (2004). Secure media access control (MAC) in wireless sensor networks: intrusion detections and countermeasures. In PIMRC, Barcelona, Spain (pp. 3025–3029).
8.
go back to reference Brownfield M., Gupta, Y., Davis N. (2005). Wireless sensor network denial of sleep attack. In IEEE IAS, West Point, NY, USA (pp. 356–364). Brownfield M., Gupta, Y., Davis N. (2005). Wireless sensor network denial of sleep attack. In IEEE IAS, West Point, NY, USA (pp. 356–364).
9.
go back to reference Raymond D.R., Midkiff S.F. (2007). Clustered adaptive rate limiting: defeating denial-of-sleep attacks in wireless sensor networks. In MILCOM, Orlando, FL, USA (pp. 1–7). Raymond D.R., Midkiff S.F. (2007). Clustered adaptive rate limiting: defeating denial-of-sleep attacks in wireless sensor networks. In MILCOM, Orlando, FL, USA (pp. 1–7).
10.
go back to reference Raymond, D. R., Marchany, R. C., Brownfield, M. I., & Midkiff, S. F. (2009). Effects of denial-of-sleep attacks on wireless sensor network MAC protocols. IEEE Transactions on Vehicular Technology, 58(1), 367–380.CrossRef Raymond, D. R., Marchany, R. C., Brownfield, M. I., & Midkiff, S. F. (2009). Effects of denial-of-sleep attacks on wireless sensor network MAC protocols. IEEE Transactions on Vehicular Technology, 58(1), 367–380.CrossRef
11.
go back to reference Kulkarni, R.V., Venayagamoorthy, G.K., Thakur, A.V., Madria, S.K. (2009). Generalized neuron based secure media access control protocol for wireless sensor networks. In MCDM, Nashville, TN, USA (pp. 16–22). Kulkarni, R.V., Venayagamoorthy, G.K., Thakur, A.V., Madria, S.K. (2009). Generalized neuron based secure media access control protocol for wireless sensor networks. In MCDM, Nashville, TN, USA (pp. 16–22).
12.
go back to reference Chen C., Hui, L., Pei, Q., Ning, L., Qingquan, P. (2009). An effective scheme for defending denial-of-sleep attack in wireless sensor networks. In Proceedings of IEEE 5th International Conference on Information Assurance and Security, Xi’an, China (pp. 446–449). Chen C., Hui, L., Pei, Q., Ning, L., Qingquan, P. (2009). An effective scheme for defending denial-of-sleep attack in wireless sensor networks. In Proceedings of IEEE 5th International Conference on Information Assurance and Security, Xi’an, China (pp. 446–449).
13.
go back to reference Rao, P.S., Varma, K.V.S.R.P., Satapati, R., Vamsidhar, E. (2010). Multilayer perceptron based secure media access control protocol for wireless sensor networks. In ICCIC, Coimbatore, India (pp. 1–5). Rao, P.S., Varma, K.V.S.R.P., Satapati, R., Vamsidhar, E. (2010). Multilayer perceptron based secure media access control protocol for wireless sensor networks. In ICCIC, Coimbatore, India (pp. 1–5).
14.
go back to reference Hsueh, C.-T., Wen, C.-Y., Ouyang,Y.-C. (2012). Two-tier receiver-initiated secure scheme for hierarchical wireless sensor networks. In ITST’ 12, Taipei, Taiwan (pp. 254–258). Hsueh, C.-T., Wen, C.-Y., Ouyang,Y.-C. (2012). Two-tier receiver-initiated secure scheme for hierarchical wireless sensor networks. In ITST’ 12, Taipei, Taiwan (pp. 254–258).
15.
go back to reference Bhattasali, T., Chaki, R., & Sanyal, S. (2012). Sleep deprivation attack detection in wireless sensor network. International Journal of Computer Applications, 40(15), 19–25.CrossRef Bhattasali, T., Chaki, R., & Sanyal, S. (2012). Sleep deprivation attack detection in wireless sensor network. International Journal of Computer Applications, 40(15), 19–25.CrossRef
16.
go back to reference Qian, Y., Zhou, J., Qian, L., Chen, K. (2006). Highly scalable multihop clustering algorithm for wireless sensor networks. In ICCCAS’ 06, Guilin, Guangzi, China (pp. 1527–1531). Qian, Y., Zhou, J., Qian, L., Chen, K. (2006). Highly scalable multihop clustering algorithm for wireless sensor networks. In ICCCAS’ 06, Guilin, Guangzi, China (pp. 1527–1531).
17.
go back to reference Pawar, P.M., Nielsen, R.H., Prasad, N.R., Ohmori, S., Prasad, R. (2012) GCF: Green conflict free scheduling algorithm for WSN. In ICC-E2Nets’ 12, Ottawa, Canada (pp. 5795–5799). Pawar, P.M., Nielsen, R.H., Prasad, N.R., Ohmori, S., Prasad, R. (2012) GCF: Green conflict free scheduling algorithm for WSN. In ICC-E2Nets’ 12, Ottawa, Canada (pp. 5795–5799).
18.
go back to reference Pawar, P.M., Nielsen, R.H., Prasad, N.R., Prasad, R. (2014). A hybrid algorithm for efficient wireless sensor network time synchronization. In Wireless VITAE’ 14, Aalborg, Denmark (pp. 1–5). Pawar, P.M., Nielsen, R.H., Prasad, N.R., Prasad, R. (2014). A hybrid algorithm for efficient wireless sensor network time synchronization. In Wireless VITAE’ 14, Aalborg, Denmark (pp. 1–5).
Metadata
Title
GSHMAC: Green and Secure Hybrid Medium Access Control for Wireless Sensor Network
Authors
Pranav M. Pawar
Rasmus H. Nielsen
Neeli R. Prasad
Ramjee Prasad
Publication date
17-11-2017
Publisher
Springer US
Published in
Wireless Personal Communications / Issue 2/2018
Print ISSN: 0929-6212
Electronic ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-017-5065-7

Other articles of this Issue 2/2018

Wireless Personal Communications 2/2018 Go to the issue