Detecting denial of sleep attacks by analysis of wireless sensor networks and the Internet of Things
Downloads
Published
DOI:
https://doi.org/10.58414/SCIENTIFICTEMPER.2023.14.4.52Keywords:
Denial of service, Denial of sleep, Internet of Things, Wake-up radio, Network security, Wireless sensor networks, AODV protocol.Dimensions Badge
Issue
Section
License
Copyright (c) 2023 The Scientific Temper

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
The Internet of Things (IoT) amalgamates a large number of physical objects that are distinctively identified, ubiquitously interconnected and accessible through the Internet. IoT endeavors to renovate any object in the real world into a computing device that has sensing, communicating, computing and control capabilities. There are a budding number of IoT devices and applications and this escort to an increase in the number and complexity of malicious attacks. It is important to defend IoT systems against malicious attacks, especially to prevent attackers from acquiring control over the devices. Energy utilization is significant for battery-enabled devices in the IoT and wireless sensor networks which are operated long time period. The Denial-of-Sleep attack is an explicit type of denial-of-service attack that beleaguered a battery-powered device’s power supply that results in the exhaustion of this critical resource. This paper focuses on the survey on Denial of sleep attacks in Wireless Sensor networks and the IoT.Abstract
How to Cite
Downloads
Similar Articles
- Sharanagouda N. Patil, Ramesh M. Kagalkar, Analysis of substrate materials for flexible and wearable MIMO antenna for wireless communication , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper
- Shaik Abdulla P., Abdul Razak T., Retrieval-Based Inception V3-Net Algorithm and Invariant Data Classification using Enhanced Deep Belief Networks for Content-Based Image Retrieval , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- V. Karthikeyan, C. Jayanthi, Advancements in image quality assessment: a comparative study of image processing and deep learning techniques , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- Josephine Theresa S, Graph Neural Network Ensemble with Particle Swarm Optimization for Privacy-Preserving Thermal Comfort Prediction , The Scientific Temper: Vol. 16 No. 12 (2025): The Scientific Temper
- Milindkumar N. Dandale, Amar P. Yadav, P. S. K. Reddy, Seema G. Kadu, Madhusudana T, Manthan S. Manavadaria, Deep learning enhanced drug discovery for novel biomaterials in regenerative medicine utilizing graph neural network approach for predicting cellular responses , The Scientific Temper: Vol. 15 No. 01 (2024): The Scientific Temper
- Priya Nandhagopal, Jayasimman Lawrence, ETTG: Enhanced token and tag generation for authenticating users and deduplicating data stored in public cloud storage , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper
- B. S. E. Zoraida, J. Jasmine Christina Magdalene, Smart grid precision: Evaluating machine learning models for forecasting of energy consumption from a smart grid , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- Balaji V, Purnendu Bikash Acharjee, Muniyandy Elangovan, Gauri Kalnoor, Ravi Rastogi, Vishnu Patidar, Developing a semantic framework for categorizing IoT agriculture sensor data: A machine learning and web semantics approach , The Scientific Temper: Vol. 14 No. 04 (2023): The Scientific Temper
- V. Baby Deepa, R. Jeya, Dynamic resource allocation with otpimization techniques for qos in cloud computing , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- Bommaiah Boya, Premara Devaraju, Integrating clinical and ECG data for heart disease prediction: A hybrid deep learning approach based on two modalities with particle swarm optimization , The Scientific Temper: Vol. 16 No. 05 (2025): The Scientific Temper
<< < 6 7 8 9 10 11 12 13 14 15 > >>
You may also start an advanced similarity search for this article.

