Analysis of the WSN MAC Protocols under Jamming DoS Attack

Mihajlov, Boris and Bogdanoski, Mitko (2014) Analysis of the WSN MAC Protocols under Jamming DoS Attack. International Journal of Network Security, 16 (4). pp. 304-312. ISSN 1816-3548

[thumbnail of download_paper.jsp_PaperID=IJNS-2013-06-30-1&PaperName=ijns-v16-n4%2Fijns-2014-v16-n4-p304-312.pdf] Text
download_paper.jsp_PaperID=IJNS-2013-06-30-1&PaperName=ijns-v16-n4%2Fijns-2014-v16-n4-p304-312.pdf - Accepted Version

Download (714B)


Wireless Sensor Network (WSN) is a wireless network consisting of small nodes with sensing, computation, and wireless communications capabilities. The design of wireless sensor networks depends of many factors, such as transmission errors, network topology and power consumption. Many routing protocols, protocols for data transmission, are specifically designed for wireless sensor networks where energy consumption is essential. This paper provides a brief description of the IEEE 802.15.4/ZigBee standard, also surveys the known attacks on wireless sensor networks. WSNs are particularly vulnerable to several key types of attacks. These attacks can be performed in several different ways. One of the commonly used methods is a denial of service (DoS), but there are also other types of attacks from which we should be aware as a traffic analysis, privacy violation, physical attacks etc. Three MAC protocols, such as IEEE 802.15.4 MAC, T-MAC, and S-MAC are proposed to analyse the
performance of the WSN under DoS attack using OMNeT++ simulator. Different application scenarios have been evaluated. Performance parameters such as throughput, network delay, energy consumption in the coordinator, and network load are the main considered factors in our study.

Item Type: Article
Subjects: Natural sciences > Computer and information sciences
Engineering and Technology > Electrical engineering, electronic engineering, information engineering
Divisions: Military Academy
Depositing User: Mitko Bogdanoski
Date Deposited: 07 Aug 2014 10:26
Last Modified: 30 Oct 2014 10:23

Actions (login required)

View Item View Item