Detecting denial of sleep attacks by analysis of wireless sensor networks and the Internet of Things
Downloads
Published
DOI:
https://doi.org/10.58414/SCIENTIFICTEMPER.2023.14.4.52Keywords:
Denial of service, Denial of sleep, Internet of Things, Wake-up radio, Network security, Wireless sensor networks, AODV protocol.Dimensions Badge
Issue
Section
License
Copyright (c) 2023 The Scientific Temper

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
The Internet of Things (IoT) amalgamates a large number of physical objects that are distinctively identified, ubiquitously interconnected and accessible through the Internet. IoT endeavors to renovate any object in the real world into a computing device that has sensing, communicating, computing and control capabilities. There are a budding number of IoT devices and applications and this escort to an increase in the number and complexity of malicious attacks. It is important to defend IoT systems against malicious attacks, especially to prevent attackers from acquiring control over the devices. Energy utilization is significant for battery-enabled devices in the IoT and wireless sensor networks which are operated long time period. The Denial-of-Sleep attack is an explicit type of denial-of-service attack that beleaguered a battery-powered device’s power supply that results in the exhaustion of this critical resource. This paper focuses on the survey on Denial of sleep attacks in Wireless Sensor networks and the IoT.Abstract
How to Cite
Downloads
Similar Articles
- Chandrasekaran M, Rajesh P K, Optimization of cost to customer of power train in commercial vehicle using knapsack dynamic programming influenced by vehicle IoT data , The Scientific Temper: Vol. 14 No. 02 (2023): The Scientific Temper
- A. Anand, A. Nisha Jebaseeli, AI-driven real-time performance optimization and comparison of virtual machines and containers in cloud environments , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- Rajni Mathur, Bharti Singh, Anjali Kalse, Veena R. Kolte, Saloni Desai, Sameer Sonawane, Examining the impact of economic cycles on India’s information technology sector , The Scientific Temper: Vol. 15 No. 01 (2024): The Scientific Temper
- S Selvakumari, M Durairaj, Performance Analysis of Deep Learning Optimizers for Arrhythmia Classification using PTB-XL ECG Dataset: Emphasis on Adam Optimizer , The Scientific Temper: Vol. 16 No. 11 (2025): The Scientific Temper
- Anita M, Shakila S, Stochastic kernelized discriminant extreme learning machine classifier for big data predictive analytics , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- Amanda Q. Okronipa, Jones Y. Nyame, Adoption of health information systems in emerging economies: Evidence from Ghana , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper
- Brijesh Singh, Ajay Massand, Determinants of Gen Z’s adoption of chatbots in online shopping: An empirical investigation , The Scientific Temper: Vol. 15 No. 04 (2024): The Scientific Temper
- V. Seethala Devi, N. Vanjulavalli, K. Sujith, R. Surendiran, A metaheuristic optimisation algorithm-based optimal feature subset strategy that enhances the machine learning algorithm’s classifier performance , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- N. Saranya, M. Kalpana Devi, A. Mythili, Summia P. H, Data science and machine learning methods for detecting credit card fraud , The Scientific Temper: Vol. 14 No. 03 (2023): The Scientific Temper
- Sadhana Gaikwad, Rajvardhan, Overview on biased news reporting of Indian television with legal aspect , The Scientific Temper: Vol. 16 No. 04 (2025): The Scientific Temper
<< < 10 11 12 13 14 15 16 17 18 19 > >>
You may also start an advanced similarity search for this article.

